Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
330f2e63 by Salvatore Bonaccorso at 2026-01-26T21:53:35+01:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -25,7 +25,7 @@ CVE-2026-23864 (Multiple denial of service vulnerabilities
exist in React Server
CVE-2026-21509 (Reliance on untrusted inputs in a security decision in
Microsoft Offic ...)
NOT-FOR-US: Microsoft
CVE-2026-1446 (There is a Cross Site Scripting issue in Esri ArcGIS Pro
versions 3.6. ...)
- TODO: check
+ NOT-FOR-US: Esri
CVE-2026-1429 (Single Sign-On Portal System developed by WellChoose has a
Reflected C ...)
NOT-FOR-US: WellChoose
CVE-2026-1428 (Single Sign-On Portal System developed by WellChoose has a OS
Command ...)
@@ -51,49 +51,49 @@ CVE-2025-71178 (Crucial Storage Executive installer
versions prior to 11.08.0820
CVE-2025-70982 (Incorrect access control in the importUser function of
SpringBlade v4. ...)
NOT-FOR-US: SpringBlade
CVE-2025-70368 (Worklenz version 2.1.5 contains a Stored Cross-Site Scripting
(XSS) vu ...)
- TODO: check
+ NOT-FOR-US: Worklenz
CVE-2025-67274 (An issue in continuous.software aangine v.2025.2 allows a
remote attac ...)
- TODO: check
+ NOT-FOR-US: continuous.software aangine
CVE-2025-59109 (The dormakaba registration units 9002 (PIN Pad Units) have an
exposed ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59108 (By default, the password for the Access Manager's web
interface, is se ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59107 (Dormakaba provides the software FWServiceTool to update the
firmware v ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59106 (The binary serving the web server and executing basically all
actions ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59105 (With physical access to the device and enough time an attacker
can des ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59104 (With physical access to the device and enough time an attacker
is able ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59103 (The Access Manager 92xx in hardware revision K7 is based on
Linux inst ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59102 (The web server of the Access Manager offers a functionality to
downloa ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59101 (Instead of typical session tokens or cookies, it is verified
on a per- ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59100 (The web interface offers a functionality to export the
internal SQLite ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59099 (The Access Manager is using the open source web server
CompactWebServe ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59098 (The Access Manager is offering a trace functionality to debug
errors a ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59097 (The exos 9300 application can be used to configure Access
Managers (e. ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59096 (The default password for the extended admin user mode in the
applicati ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59095 (The program libraries (DLL) and binaries used by exos 9300
contain mul ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59094 (A local privilege escalation vulnerability has been identified
in the ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59093 (Exos 9300 instances are using a randomly generated database
password t ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59092 (An RPC service, which is part of exos 9300, is reachable on
port 4000, ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59091 (Multiple hardcoded credentials have been identified, which are
allowed ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-59090 (On the exos 9300 server, a SOAP API is reachable on port 8002.
This AP ...)
- TODO: check
+ NOT-FOR-US: dormakaba
CVE-2025-57785 (A Double Free in XSLT `show_index` has been identified in
Hiawatha web ...)
TODO: check
CVE-2025-57784 (Tomahawk auth timing attack due to usage of `strcmp` has been
identifi ...)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/330f2e63c685340053ee5ffa6f45acfea3b798ab
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/330f2e63c685340053ee5ffa6f45acfea3b798ab
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits