Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
8ed95651 by security tracker role at 2026-01-23T08:13:19+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,8 +1,216 @@
-CVE-2026-24117
+CVE-2026-24515 (In libexpat before 2.7.4, XML_ExternalEntityParserCreate does 
not copy ...)
+       TODO: check
+CVE-2026-24342
+       REJECTED
+CVE-2026-24341
+       REJECTED
+CVE-2026-24340
+       REJECTED
+CVE-2026-24339
+       REJECTED
+CVE-2026-24338
+       REJECTED
+CVE-2026-24337
+       REJECTED
+CVE-2026-24336
+       REJECTED
+CVE-2026-24335
+       REJECTED
+CVE-2026-24334
+       REJECTED
+CVE-2026-24307 (Improper validation of specified type of input in M365 Copilot 
allows  ...)
+       TODO: check
+CVE-2026-24306 (Improper access control in Azure Front Door (AFD) allows an 
unauthoriz ...)
+       TODO: check
+CVE-2026-24305 (Azure Entra ID Elevation of Privilege Vulnerability)
+       TODO: check
+CVE-2026-24304 (Improper access control in Azure Resource Manager allows an 
authorized ...)
+       TODO: check
+CVE-2026-24138 (FOG is a free open-source cloning/imaging/rescue 
suite/inventory manag ...)
+       TODO: check
+CVE-2026-24137 (sigstore framework is a common go library shared across 
sigstore servi ...)
+       TODO: check
+CVE-2026-24132 (Orval generates type-safe JS clients (TypeScript) from any 
valid OpenA ...)
+       TODO: check
+CVE-2026-24130 (Moonraker is a Python web server providing API access to 
Klipper 3D pr ...)
+       TODO: check
+CVE-2026-24129 (Runtipi is a Docker-based, personal homeserver orchestrator 
that facil ...)
+       TODO: check
+CVE-2026-24124 (Dragonfly is an open source P2P-based file distribution and 
image acce ...)
+       TODO: check
+CVE-2026-24058 (Soft Serve is a self-hostable Git server for the command line. 
Version ...)
+       TODO: check
+CVE-2026-23988 (Rufus is a utility that helps format and create bootable USB 
flash dri ...)
+       TODO: check
+CVE-2026-21524 (Exposure of sensitive information to an unauthorized actor in 
Azure Da ...)
+       TODO: check
+CVE-2026-21521 (Improper neutralization of escape, meta, or control sequences 
in Copil ...)
+       TODO: check
+CVE-2026-21520 (Exposure of Sensitive Information to an Unauthorized Actor in 
Copilot  ...)
+       TODO: check
+CVE-2026-21264 (Improper neutralization of input during web page generation 
('cross-si ...)
+       TODO: check
+CVE-2026-21227 (Improper limitation of a pathname to a restricted directory 
('path tra ...)
+       TODO: check
+CVE-2026-20912 (Gitea does not properly validate repository ownership when 
linking att ...)
+       TODO: check
+CVE-2026-20904 (Gitea does not properly validate ownership when toggling 
OpenID URI vi ...)
+       TODO: check
+CVE-2026-20897 (Gitea does not properly validate repository ownership when 
deleting Gi ...)
+       TODO: check
+CVE-2026-20888 (Gitea does not properly verify authorization when canceling 
scheduled  ...)
+       TODO: check
+CVE-2026-20883 (Gitea's stopwatch API does not re-validate repository access 
permissio ...)
+       TODO: check
+CVE-2026-20800 (Gitea's notification API does not re-validate repository 
access permis ...)
+       TODO: check
+CVE-2026-20750 (Gitea does not properly validate project ownership in 
organization pro ...)
+       TODO: check
+CVE-2026-20736 (Gitea does not properly verify repository context when 
deleting attach ...)
+       TODO: check
+CVE-2026-20613 (The ArchiveReader.extractContents() function used by cctl 
image load a ...)
+       TODO: check
+CVE-2026-1201 (An Authorization Bypass Through User-Controlled Key 
vulnerability in H ...)
+       TODO: check
+CVE-2026-0927 (The KiviCare \u2013 Clinic & Patient Management System (EHR) 
plugin fo ...)
+       TODO: check
+CVE-2026-0798 (Gitea may send release notification emails for private 
repositories to ...)
+       TODO: check
+CVE-2026-0796 (ALGO 8180 IP Audio Alerter Web UI Command Injection Remote Code 
Execut ...)
+       TODO: check
+CVE-2026-0795 (ALGO 8180 IP Audio Alerter Web UI Command Injection Remote Code 
Execut ...)
+       TODO: check
+CVE-2026-0794 (ALGO 8180 IP Audio Alerter SIP Use-After-Free Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2026-0793 (ALGO 8180 IP Audio Alerter InformaCast Heap-based Buffer 
Overflow Remo ...)
+       TODO: check
+CVE-2026-0792 (ALGO 8180 IP Audio Alerter SIP INVITE Alert-Info Stack-based 
Buffer Ov ...)
+       TODO: check
+CVE-2026-0791 (ALGO 8180 IP Audio Alerter SIP INVITE Replaces Stack-based 
Buffer Over ...)
+       TODO: check
+CVE-2026-0790 (ALGO 8180 IP Audio Alerter Web UI Direct Request Information 
Disclosur ...)
+       TODO: check
+CVE-2026-0789 (ALGO 8180 IP Audio Alerter Web UI Inclusion of Authentication 
Cookie i ...)
+       TODO: check
+CVE-2026-0788 (ALGO 8180 IP Audio Alerter Web UI Persistent Cross-Site 
Scripting Vuln ...)
+       TODO: check
+CVE-2026-0787 (ALGO 8180 IP Audio Alerter SAC Command Injection Remote Code 
Execution ...)
+       TODO: check
+CVE-2026-0786 (ALGO 8180 IP Audio Alerter SCI Command Injection Remote Code 
Execution ...)
+       TODO: check
+CVE-2026-0785 (ALGO 8180 IP Audio Alerter API Command Injection Remote Code 
Execution ...)
+       TODO: check
+CVE-2026-0784 (ALGO 8180 IP Audio Alerter Web UI Command Injection Remote Code 
Execut ...)
+       TODO: check
+CVE-2026-0783 (ALGO 8180 IP Audio Alerter Web UI Command Injection Remote Code 
Execut ...)
+       TODO: check
+CVE-2026-0782 (ALGO 8180 IP Audio Alerter Web UI Command Injection Remote Code 
Execut ...)
+       TODO: check
+CVE-2026-0781 (ALGO 8180 IP Audio Alerter Web UI Command Injection Remote Code 
Execut ...)
+       TODO: check
+CVE-2026-0780 (ALGO 8180 IP Audio Alerter Web UI Command Injection Remote Code 
Execut ...)
+       TODO: check
+CVE-2026-0779 (ALGO 8180 IP Audio Alerter Ping Command Injection Remote Code 
Executio ...)
+       TODO: check
+CVE-2026-0778 (Enel X JuiceBox 40 Telnet Service Missing Authentication Remote 
Code E ...)
+       TODO: check
+CVE-2026-0776 (Discord Client Uncontrolled Search Path Element Local Privilege 
Escala ...)
+       TODO: check
+CVE-2026-0775 (npm cli Incorrect Permission Assignment Local Privilege 
Escalation Vul ...)
+       TODO: check
+CVE-2026-0774 (WatchYourLAN Configuration Page Argument Injection Remote Code 
Executi ...)
+       TODO: check
+CVE-2026-0773 (Upsonic Cloudpickle Deserialization of Untrusted Data Remote 
Code Exec ...)
+       TODO: check
+CVE-2026-0772 (Langflow Disk Cache Deserialization of Untrusted Data Remote 
Code Exec ...)
+       TODO: check
+CVE-2026-0771 (Langflow PythonFunction Code Injection Remote Code Execution 
Vulnerabi ...)
+       TODO: check
+CVE-2026-0770 (Langflow exec_globals Inclusion of Functionality from Untrusted 
Contro ...)
+       TODO: check
+CVE-2026-0769 (Langflow eval_custom_component_code Eval Injection Remote Code 
Executi ...)
+       TODO: check
+CVE-2026-0768 (Langflow code Code Injection Remote Code Execution 
Vulnerability. This ...)
+       TODO: check
+CVE-2026-0767 (Open WebUI Cleartext Transmission of Credentials Information 
Disclosur ...)
+       TODO: check
+CVE-2026-0766 (Open WebUI load_tool_module_by_id Command Injection Remote Code 
Execut ...)
+       TODO: check
+CVE-2026-0765 (Open WebUI PIP install_frontmatter_requirements Command 
Injection Remo ...)
+       TODO: check
+CVE-2026-0764 (GPT Academic upload Deserialization of Untrusted Data Remote 
Code Exec ...)
+       TODO: check
+CVE-2026-0763 (GPT Academic run_in_subprocess_wrapper_func Deserialization of 
Untrust ...)
+       TODO: check
+CVE-2026-0762 (GPT Academic stream_daas Deserialization of Untrusted Data 
Remote Code ...)
+       TODO: check
+CVE-2026-0761 (Foundation Agents MetaGPT actionoutput_str_to_mapping Code 
Injection R ...)
+       TODO: check
+CVE-2026-0760 (Foundation Agents MetaGPT deserialize_message Deserialization 
of Untru ...)
+       TODO: check
+CVE-2026-0759 (Katana Network Development Starter Kit executeCommand Command 
Injectio ...)
+       TODO: check
+CVE-2026-0758 (mcp-server-siri-shortcuts shortcutName Command Injection 
Privilege Esc ...)
+       TODO: check
+CVE-2026-0757 (MCP Manager for Claude Desktop execute-command Command 
Injection Sandb ...)
+       TODO: check
+CVE-2026-0756 (github-kanban-mcp-server execAsync Command Injection Remote 
Code Execu ...)
+       TODO: check
+CVE-2026-0755 (gemini-mcp-tool execAsync Command Injection Remote Code 
Execution Vuln ...)
+       TODO: check
+CVE-2026-0710 (A flaw was found in SIPp. A remote attacker could exploit this 
by send ...)
+       TODO: check
+CVE-2025-9290 (An authentication weakness was identified in Omada Controllers, 
Gatewa ...)
+       TODO: check
+CVE-2025-9289 (A Cross-Site Scripting (XSS) vulnerability was identified in a 
paramet ...)
+       TODO: check
+CVE-2025-67847 (A flaw was found in Moodle. An attacker with access to the 
restore int ...)
+       TODO: check
+CVE-2025-67652 (An attacker with access to the project file could use the 
exposed  cre ...)
+       TODO: check
+CVE-2025-55705 (This vulnerability occurs when the system permits multiple 
simultaneou ...)
+       TODO: check
+CVE-2025-54816 (This vulnerability occurs when a WebSocket endpoint does not 
enforce   ...)
+       TODO: check
+CVE-2025-53968 (This vulnerability arises because there are no limitations on 
the numb ...)
+       TODO: check
+CVE-2025-25051 (An attacker could decrypt sensitive data, impersonate 
legitimate users ...)
+       TODO: check
+CVE-2025-22234 (The fix applied in CVE-2025-22228 inadvertently broke the 
timing attac ...)
+       TODO: check
+CVE-2025-15522 (The Uncanny Automator \u2013 Easy Automation, Integration, 
Webhooks &  ...)
+       TODO: check
+CVE-2025-15351 (Anritsu VectorStar CHX File Parsing Deserialization of 
Untrusted Data  ...)
+       TODO: check
+CVE-2025-15350 (Anritsu VectorStar CHX File Parsing Deserialization of 
Untrusted Data  ...)
+       TODO: check
+CVE-2025-15349 (Anritsu ShockLine SCPI Race Condition Remote Code Execution 
Vulnerabil ...)
+       TODO: check
+CVE-2025-15348 (Anritsu ShockLine CHX File Parsing Deserialization of 
Untrusted Data R ...)
+       TODO: check
+CVE-2025-15063 (Ollama MCP Server execAsync Command Injection Remote Code 
Execution Vu ...)
+       TODO: check
+CVE-2025-15062 (Trimble SketchUp SKP File Parsing Use-After-Free Remote Code 
Execution ...)
+       TODO: check
+CVE-2025-15061 (Framelink Figma MCP Server fetchWithRetry Command Injection 
Remote Cod ...)
+       TODO: check
+CVE-2025-15059 (GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code 
Execution ...)
+       TODO: check
+CVE-2025-14751 (A low-privileged user can bypass account credentials without 
confirmin ...)
+       TODO: check
+CVE-2025-14750 (The web application does not sufficiently verify inputs that 
are assum ...)
+       TODO: check
+CVE-2025-14745 (The RSS Aggregator \u2013 RSS Import, News Feeds, Feed to 
Post, and Au ...)
+       TODO: check
+CVE-2025-14069 (The Schema & Structured Data for WP & AMP plugin for WordPress 
is vuln ...)
+       TODO: check
+CVE-2024-11976 (The The BuddyPress plugin for WordPress is vulnerable to 
arbitrary sho ...)
+       TODO: check
+CVE-2026-24117 (Rekor is a software supply chain transparency log. In versions 
1.4.3 a ...)
        - rekor <unfixed>
        NOTE: 
https://github.com/sigstore/rekor/security/advisories/GHSA-4c4x-jm2x-pf9j
        NOTE: Fixed by: 
https://github.com/sigstore/rekor/commit/60ef2bceba192c5bf9327d003bceea8bf1f8275f
 (v1.5.0)
-CVE-2026-23831
+CVE-2026-23831 (Rekor is a software supply chain transparency log. In versions 
1.4.3 a ...)
        - rekor <unfixed>
        NOTE: 
https://github.com/sigstore/rekor/security/advisories/GHSA-273p-m2cw-6833
        NOTE: Fixed by: 
https://github.com/sigstore/rekor/commit/39bae3d192bce48ef4ef2cbd1788fb5770fee8cd
 (v1.5.0)
@@ -919,11 +1127,11 @@ CVE-2023-32719
        REJECTED
 CVE-2023-32718
        REJECTED
-CVE-2026-23954 [Container image templating arbitrary host file read and write]
+CVE-2026-23954 (Incus is a system container and virtual machine manager. 
Versions 6.21 ...)
        - incus 6.0.5-8
        - lxd <removed>
        NOTE: 
https://github.com/lxc/incus/security/advisories/GHSA-7f67-crqm-jgh7
-CVE-2026-23953 [Container environment configuration newline injection]
+CVE-2026-23953 (Incus is a system container and virtual machine manager. In 
versions 6 ...)
        - incus 6.0.5-8
        - lxd <removed>
        NOTE: 
https://github.com/lxc/incus/security/advisories/GHSA-x6jc-phwx-hp32
@@ -1123,7 +1331,7 @@ CVE-2026-1200
        - liblivemedia <removed>
 CVE-2026-1190
        - keycloak <itp> (bug #1088287)
-CVE-2026-0603
+CVE-2026-0603 (A flaw was found in Hibernate. A remote attacker with low 
privileges c ...)
        NOT-FOR-US: Hibernate Core
 CVE-2026-1102 (GitLab has remediated an issue in GitLab CE/EE affecting all 
versions  ...)
        - gitlab <unfixed>
@@ -1432,6 +1640,7 @@ CVE-2026-24061 (telnetd in GNU Inetutils through 2.7 
allows remote authenticatio
        NOTE: Fixed by: 
https://codeberg.org/inetutils/inetutils/commit/fd702c02497b2f398e739e3119bed0b23dd7aa7b
        NOTE: Fixed by: 
https://codeberg.org/inetutils/inetutils/commit/ccba9f748aa8d50a38d7748e2e60362edd6a32cc
 CVE-2026-1220
+       {DSA-6108-1}
        - chromium 144.0.7559.96-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-22844 (A Command Injection vulnerability in Zoom Node Multimedia 
Routers (MMR ...)
@@ -3010,7 +3219,8 @@ CVE-2021-47762 (HTTPDebuggerPro 9.11 contains an unquoted 
service path vulnerabi
        NOT-FOR-US: HTTPDebuggerPro
 CVE-2021-47761 (MilleGPG5 5.7.2 contains a local privilege escalation 
vulnerability th ...)
        NOT-FOR-US: MilleGPG5
-CVE-2021-47760 (TestLink versions 1.16 through 1.19 contain an unauthenticated 
file do ...)
+CVE-2021-47760
+       REJECTED
        NOT-FOR-US: TestLink
 CVE-2021-47759 (MTPutty 1.0.1.21 contains a sensitive information disclosure 
vulnerabi ...)
        NOT-FOR-US: MTPutty
@@ -5970,7 +6180,7 @@ CVE-2026-21682 (iccDEV provides a set of libraries and 
tools that allow for the
 CVE-2026-21681 (iccDEV provides a set of libraries and tools that allow for 
the intera ...)
        NOT-FOR-US: iccDEV
 CVE-2026-21441 (urllib3 is an HTTP client library for Python. urllib3's 
streaming API  ...)
-       {DSA-6102-1}
+       {DSA-6102-2 DSA-6102-1 DLA-4446-1}
        - python-urllib3 2.5.0-2 (bug #1125062)
        NOTE: 
https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99
        NOTE: 
https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b
 (2.6.3)
@@ -38980,7 +39190,7 @@ CVE-2025-11189 (The Kiwire Captive Portal contains a 
reflected cross-site script
        NOT-FOR-US: Kiwire Captive Portal
 CVE-2025-11188 (The Kiwire Captive Portal contains a blind SQL injection in 
the nas-id ...)
        NOT-FOR-US: Kiwire Captive Portal
-CVE-2025-11002
+CVE-2025-11002 (7-Zip ZIP File Parsing Directory Traversal Remote Code 
Execution Vulne ...)
        - 7zip 25.00+dfsg-1
        [trixie] - 7zip 25.01+dfsg-1~deb13u1
        [bookworm] - 7zip <no-dsa> (Minor issue)
@@ -95561,7 +95771,7 @@ CVE-2024-58250 (The passprompt plugin in pppd in ppp 
before 2.5.2 mishandles pri
        NOTE: Fixed by: 
https://github.com/ppp-project/ppp/commit/0a66ad22e54c72690ec2a29a019767c55c5281fc
 (v2.5.2)
        NOTE: Fix removes the passprompt plugin (can be replaced using 
passwordfd plugin, may break existing
        NOTE: configurations)
-CVE-2025-3839 [Require user interaction before opening URL in external 
application]
+CVE-2025-3839 (A flaw was found in Epiphany, a tool that allows websites to 
open exte ...)
        - epiphany-browser 48.1-1
        [bookworm] - epiphany-browser <no-dsa> (Minor issue)
        [bullseye] - epiphany-browser <postponed> (Minor issue)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8ed9565187c4b75fe5a9e9e9f012d818181ad8a1

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/8ed9565187c4b75fe5a9e9e9f012d818181ad8a1
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to