Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
52b3f682 by Salvatore Bonaccorso at 2026-03-10T09:05:23+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -25,19 +25,19 @@ CVE-2026-3588 (A server-side request forgery (SSRF) 
vulnerability in IKEA Dirige
 CVE-2026-3089 (Actual Sync Server allows authenticated users to upload files 
through  ...)
        NOT-FOR-US: Actual Sync Server
 CVE-2026-3038 (The rtsock_msg_buffer() function serializes routing information 
into a ...)
-       TODO: check
+       NOT-FOR-US: FreeBSD
 CVE-2026-30140 (An incorrect access control vulnerability exists in Tenda W15E 
V02.03. ...)
        NOT-FOR-US: Tenda
 CVE-2026-2919 (Malicious scripts could display attacker-controlled web content 
under  ...)
-       TODO: check
+       NOT-FOR-US: Firefox Focus for iOS
 CVE-2026-2261 (Due to a programming error, blocklistd leaks a socket 
descriptor for e ...)
-       TODO: check
+       NOT-FOR-US: FreeBSD
 CVE-2026-29023 (Keygraph Shannon contains a hard-coded API key in its router 
configura ...)
-       TODO: check
+       NOT-FOR-US: Keygraph Shannon
 CVE-2026-25866 (MobaXterm versions prior to 26.1 contain an uncontrolled 
search path e ...)
-       TODO: check
+       NOT-FOR-US: MobaXterm
 CVE-2026-25041 (Budibase is a low code platform for creating internal tools, 
workflows ...)
-       TODO: check
+       NOT-FOR-US: Budibase
 CVE-2026-24713 (Improper Input Validation vulnerability in Apache IoTDB.  This 
issue a ...)
        NOT-FOR-US: Apache software not packaged in Debian
 CVE-2026-24015 (A vulnerability in Apache IoTDB.  This issue affects Apache 
IoTDB: fro ...)
@@ -54,37 +54,37 @@ CVE-2025-70243 (Stack buffer overflow vulnerability in 
D-Link DIR-513 v1.10 via
 CVE-2025-70238 (Stack buffer overflow vulnerability in D-Link DIR-513 v1.10 
via the cu ...)
        NOT-FOR-US: D-Link
 CVE-2025-70060 (An issue pertaining to CWE-79: Improper Neutralization of 
Input During ...)
-       TODO: check
+       NOT-FOR-US: YMFE yapi
 CVE-2025-70059 (An issue pertaining to CWE-400: Uncontrolled Resource 
Consumption was  ...)
-       TODO: check
+       NOT-FOR-US: YMFE yapi
 CVE-2025-70050 (An issue pertaining to CWE-312: Cleartext Storage of Sensitive 
Informa ...)
        TODO: check
 CVE-2025-70048 (An issue pertaining to CWE-319: Cleartext Transmission of 
Sensitive In ...)
-       TODO: check
+       NOT-FOR-US: Nexusoft NexusInterface
 CVE-2025-70047 (An issue pertaining to CWE-400: Uncontrolled Resource 
Consumption was  ...)
-       TODO: check
+       NOT-FOR-US: Nexusoft NexusInterface
 CVE-2025-70046 (An issue pertaining to CWE-829: Inclusion of Functionality 
from Untrus ...)
-       TODO: check
+       NOT-FOR-US: Miazzy
 CVE-2025-70042 (An issue pertaining to CWE-918: Server-Side Request Forgery 
was discov ...)
-       TODO: check
+       NOT-FOR-US: oslabs-beta ThermaKube
 CVE-2025-70040 (An issue pertaining to CWE-532: Insertion of Sensitive 
Information int ...)
-       TODO: check
+       NOT-FOR-US: LupinLin1 jimeng-web-mcp
 CVE-2025-70039 (An issue pertaining to CWE-78: Improper Neutralization of 
Special Elem ...)
-       TODO: check
+       NOT-FOR-US: linagora Twake
 CVE-2025-70038 (An issue pertaining to CWE-79: Improper Neutralization of 
Input During ...)
-       TODO: check
+       NOT-FOR-US: linagora Twake
 CVE-2025-70037 (An issue pertaining to CWE-601: URL Redirection to Untrusted 
Site was  ...)
-       TODO: check
+       NOT-FOR-US: linagora Twake
 CVE-2025-70034 (An issue pertaining to CWE-1333: Inefficient Regular 
Expression Comple ...)
-       TODO: check
+       NOT-FOR-US: mscdex ssh2
 CVE-2025-70033 (An issue pertaining to CWE-79: Improper Neutralization of 
Input During ...)
-       TODO: check
+       NOT-FOR-US: Sunbird-Ed SunbirdEd-portal
 CVE-2025-70032 (An issue pertaining to CWE-601: URL Redirection to Untrusted 
Site was  ...)
-       TODO: check
+       NOT-FOR-US: Sunbird-Ed SunbirdEd-portal
 CVE-2025-70031 (An issue pertaining to CWE-352: Cross-Site Request Forgery was 
discove ...)
-       TODO: check
+       NOT-FOR-US: Sunbird-Ed SunbirdEd-portal
 CVE-2025-70030 (An issue pertaining to CWE-1333: Inefficient Regular 
Expression Comple ...)
-       TODO: check
+       NOT-FOR-US: Sunbird-Ed SunbirdEd-portal
 CVE-2025-69648 (GNU Binutils thru 2.45.1 readelf contains a denial-of-service 
vulnerab ...)
        - binutils <unfixed> (unimportant)
        NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=33641
@@ -116,51 +116,51 @@ CVE-2025-61612 (In nr modem, there is a possible system 
crash due to improper in
 CVE-2025-61611 (In modem, there is a possible improper input validation. This 
could le ...)
        NOT-FOR-US: Unisoc
 CVE-2025-41772 (An unauthenticated remote attacker can obtain valid session 
tokens bec ...)
-       TODO: check
+       NOT-FOR-US: Firmware UBR
 CVE-2025-41767 (A high-privileged remote attacker can fully compromise the 
device by a ...)
-       TODO: check
+       NOT-FOR-US: Firmware UBR
 CVE-2025-41766 (A low-privileged remote attacker can trigger a stack-based 
buffer over ...)
-       TODO: check
+       NOT-FOR-US: Firmware UBR
 CVE-2025-41765 (Due to insufficient authorization enforcement, an unauthorized 
remote  ...)
-       TODO: check
+       NOT-FOR-US: Firmware UBR
 CVE-2025-41764 (Due to insufficient authorization enforcement, an unauthorized 
remote  ...)
-       TODO: check
+       NOT-FOR-US: Firmware UBR
 CVE-2025-41763 (A low\u2011privileged remote attacker can directly interact 
with the w ...)
-       TODO: check
+       NOT-FOR-US: Firmware UBR
 CVE-2025-41762 (An unauthenticated attacker can abuse the weak hash of the 
backup gene ...)
-       TODO: check
+       NOT-FOR-US: Firmware UBR
 CVE-2025-41761 (A low\u2011privileged local attacker who gains access to the 
UBR servi ...)
-       TODO: check
+       NOT-FOR-US: Firmware UBR
 CVE-2025-41760 (An administrator may attempt to block all traffic by 
configuring a pas ...)
-       TODO: check
+       NOT-FOR-US: Firmware UBR
 CVE-2025-41759 (An administrator may attempt to block all networks by 
specifying "\*"  ...)
-       TODO: check
+       NOT-FOR-US: Firmware UBR
 CVE-2025-41758 (A low-privileged remote attacker can exploit an arbitrary file 
write v ...)
-       TODO: check
+       NOT-FOR-US: Firmware UBR
 CVE-2025-41757 (A low-privileged remote attacker can abuse the backup restore 
function ...)
-       TODO: check
+       NOT-FOR-US: Firmware UBR
 CVE-2025-41756 (A low-privileged remote attacker can exploit the ubr-editfile 
method i ...)
-       TODO: check
+       NOT-FOR-US: Firmware UBR
 CVE-2025-41755 (A low-privileged remote attacker can exploit the ubr-logread 
method in ...)
-       TODO: check
+       NOT-FOR-US: Firmware UBR
 CVE-2025-41754 (A low-privileged remote attacker can exploit the ubr-editfile 
method i ...)
-       TODO: check
+       NOT-FOR-US: Firmware UBR
 CVE-2025-40639 (A SQL injection vulnerability has been found in Eventobot. 
This vulner ...)
-       TODO: check
+       NOT-FOR-US: Eventobot
 CVE-2025-40638 (A reflected Cross-Site Scripting (XSS) vulnerability has been  
found i ...)
-       TODO: check
+       NOT-FOR-US: Eventobot
 CVE-2025-33022
        REJECTED
 CVE-2025-15576 (If two sibling jails are restricted to separate filesystem 
trees, whic ...)
-       TODO: check
+       NOT-FOR-US: FreeBSD
 CVE-2025-15568 (A command injection vulnerability was identified in the web 
module of  ...)
        NOT-FOR-US: TPLink
 CVE-2025-15547 (By default, jailed processes cannot mount filesystems, 
including nullf ...)
-       TODO: check
+       NOT-FOR-US: FreeBSD
 CVE-2025-14769 (In some cases, the `tcp-setmss` handler may free the packet 
data and t ...)
-       TODO: check
+       NOT-FOR-US: FreeBSD
 CVE-2025-14558 (The rtsol(8) and rtsold(8) programs do not validate the domain 
search  ...)
-       TODO: check
+       NOT-FOR-US: FreeBSD
 CVE-2024-14027 (In the Linux kernel, the following vulnerability has been 
resolved:  f ...)
        - linux 6.16.3-1
        NOTE: 
https://git.kernel.org/linus/a71874379ec8c6e788a61d71b3ad014a8d9a5c08 (6.13-rc1)
@@ -497,7 +497,7 @@ CVE-2026-29784 (Ghost is a Node.js content management 
system. From version 5.101
 CVE-2026-29781 (Sliver is a command and control framework that uses a custom 
Wireguard ...)
        NOT-FOR-US: Sliver
 CVE-2026-29780 (eml_parser serves as a python module for parsing eml files and 
returni ...)
-       TODO: check
+       NOT-FOR-US: eml_parser Python module
 CVE-2026-29779 (UptimeFlare is a serverless uptime monitoring & status page 
solution,  ...)
        NOT-FOR-US: UptimeFlare
 CVE-2026-29778 (pyLoad is a free and open-source download manager written in 
Python. F ...)
@@ -625,7 +625,7 @@ CVE-2026-29795 (stellar-xdr is a library and CLI containing 
types and functional
 CVE-2026-29791 (Agentgateway is an open source data plane for agentic AI 
connectivity  ...)
        NOT-FOR-US: Agentgateway
 CVE-2026-29790 (dbt-common is the shared common utilities for dbt-core and 
adapter imp ...)
-       TODO: check
+       NOT-FOR-US: dbt-common (shared common utilities for dbt-core and 
adapter implementations use)
 CVE-2026-29789 (Vito is a self-hosted web application that helps manage 
servers and de ...)
        NOT-FOR-US: Vito
 CVE-2026-29788 (TSPortal is the WikiTide Foundation\u2019s in-house platform 
used by t ...)
@@ -2291,7 +2291,7 @@ CVE-2026-26478 (A shell command injection vulnerability 
in Mobvoi Tichome Mini s
 CVE-2026-25907 (Dell PowerScale OneFS, version 9.13.0.0, contains an overly 
restrictiv ...)
        NOT-FOR-US: Dell / EMC
 CVE-2026-24732 (Files or Directories Accessible to External Parties, Incorrect 
Permiss ...)
-       TODO: check
+       NOT-FOR-US: Hallo Welt! GmbH BlueSpice
 CVE-2026-23812 (A vulnerability has been identified where an attacker 
connecting to an ...)
        NOT-FOR-US: HPE
 CVE-2026-23811 (A vulnerability in the client isolation mechanism may allow an 
attacke ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/52b3f682e9229e24c861ef474ce6e3ab969b19fa

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/52b3f682e9229e24c861ef474ce6e3ab969b19fa
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to