Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
a7d9ccfe by security tracker role at 2026-03-25T08:13:15+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,7 +1,247 @@
-CVE-2026-4371
+CVE-2026-4784 (A vulnerability was found in code-projects Simple Laundry 
System 1.0.  ...)
+       TODO: check
+CVE-2026-4783 (A vulnerability has been found in itsourcecode College 
Management Syst ...)
+       TODO: check
+CVE-2026-4781 (A flaw has been found in SourceCodester Sales and Inventory 
System 1.0 ...)
+       TODO: check
+CVE-2026-4780 (A vulnerability was detected in SourceCodester Sales and 
Inventory Sys ...)
+       TODO: check
+CVE-2026-4779 (A security vulnerability has been detected in SourceCodester 
Sales and ...)
+       TODO: check
+CVE-2026-4778 (A weakness has been identified in SourceCodester Sales and 
Inventory S ...)
+       TODO: check
+CVE-2026-4777 (A security flaw has been discovered in SourceCodester Sales and 
Invent ...)
+       TODO: check
+CVE-2026-4766 (The Easy Image Gallery plugin for WordPress is vulnerable to 
Stored Cr ...)
+       TODO: check
+CVE-2026-4433 (An SSH misconfigurations exists in Tenable OT that led to the 
potentia ...)
+       TODO: check
+CVE-2026-3912 (Injection vulnerabilities due to validation/sanitisation of 
user-suppl ...)
+       TODO: check
+CVE-2026-33253 (SANUPS SOFTWARE provided by SANYO DENKI CO., LTD. registers 
Windows se ...)
+       TODO: check
+CVE-2026-33215 (NATS-Server is a High-Performance server for NATS.io, a cloud 
and edge ...)
+       TODO: check
+CVE-2026-32326 (SHARP routers do not perform authentication for some web APIs. 
The dev ...)
+       TODO: check
+CVE-2026-2343 (The PeproDev Ultimate Invoice WordPress plugin through 2.2.5 
has a bul ...)
+       TODO: check
+CVE-2026-2072 (Cross-Site Scripting vulnerability in Hitachi Infrastructure 
Analytics ...)
+       TODO: check
+CVE-2026-28895 (The issue was addressed with improved checks. This issue is 
fixed in i ...)
+       TODO: check
+CVE-2026-28894 (A denial-of-service issue was addressed with improved input 
validation ...)
+       TODO: check
+CVE-2026-28893 (A privacy issue was addressed with improved handling of 
temporary file ...)
+       TODO: check
+CVE-2026-28892 (A permissions issue was addressed by removing the vulnerable 
code. Thi ...)
+       TODO: check
+CVE-2026-28891 (A race condition was addressed with additional validation. 
This issue  ...)
+       TODO: check
+CVE-2026-28890 (An out-of-bounds read was addressed with improved bounds 
checking. Thi ...)
+       TODO: check
+CVE-2026-28889 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2026-28888 (A race condition was addressed with improved state handling. 
This issu ...)
+       TODO: check
+CVE-2026-28886 (A null pointer dereference was addressed with improved input 
validatio ...)
+       TODO: check
+CVE-2026-28882 (This issue was addressed with improved checks. This issue is 
fixed in  ...)
+       TODO: check
+CVE-2026-28881 (A privacy issue was addressed by moving sensitive data. This 
issue is  ...)
+       TODO: check
+CVE-2026-28880 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2026-28879 (A use-after-free issue was addressed with improved memory 
management.  ...)
+       TODO: check
+CVE-2026-28878 (A privacy issue was addressed by removing sensitive data. This 
issue i ...)
+       TODO: check
+CVE-2026-28877 (An authorization issue was addressed with improved state 
management. T ...)
+       TODO: check
+CVE-2026-28876 (A parsing issue in the handling of directory paths was 
addressed with  ...)
+       TODO: check
+CVE-2026-28875 (A buffer overflow was addressed with improved bounds checking. 
This is ...)
+       TODO: check
+CVE-2026-28874 (The issue was addressed with improved checks. This issue is 
fixed in i ...)
+       TODO: check
+CVE-2026-28871 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2026-28870 (An information leakage was addressed with additional 
validation. This  ...)
+       TODO: check
+CVE-2026-28868 (A logging issue was addressed with improved data redaction. 
This issue ...)
+       TODO: check
+CVE-2026-28867 (This issue was addressed with improved authentication. This 
issue is f ...)
+       TODO: check
+CVE-2026-28866 (This issue was addressed with improved validation of symlinks. 
This is ...)
+       TODO: check
+CVE-2026-28865 (An authentication issue was addressed with improved state 
management.  ...)
+       TODO: check
+CVE-2026-28864 (This issue was addressed with improved permissions checking. 
This issu ...)
+       TODO: check
+CVE-2026-28863 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2026-28862 (A privacy issue was addressed with improved private data 
redaction for ...)
+       TODO: check
+CVE-2026-28861 (A logic issue was addressed with improved state management. 
This issue ...)
+       TODO: check
+CVE-2026-28859 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2026-28858 (A buffer overflow was addressed with improved bounds checking. 
This is ...)
+       TODO: check
+CVE-2026-28857 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2026-28856 (The issue was addressed with improved authentication. This 
issue is fi ...)
+       TODO: check
+CVE-2026-28855 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2026-28852 (A stack overflow was addressed with improved input validation. 
This is ...)
+       TODO: check
+CVE-2026-28845 (An authorization issue was addressed with improved state 
management. T ...)
+       TODO: check
+CVE-2026-28844 (A file access issue was addressed with improved input 
validation. This ...)
+       TODO: check
+CVE-2026-28842 (The issue was addressed with improved bounds checks. This 
issue is fix ...)
+       TODO: check
+CVE-2026-28841 (A buffer overflow was addressed with improved size validation. 
This is ...)
+       TODO: check
+CVE-2026-28839 (The issue was addressed with improved checks. This issue is 
fixed in m ...)
+       TODO: check
+CVE-2026-28838 (A permissions issue was addressed with additional sandbox 
restrictions ...)
+       TODO: check
+CVE-2026-28837 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2026-28835 (A use-after-free issue was addressed with improved memory 
management.  ...)
+       TODO: check
+CVE-2026-28834 (A race condition was addressed with improved state handling. 
This issu ...)
+       TODO: check
+CVE-2026-28833 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2026-28832 (An out-of-bounds read was addressed with improved bounds 
checking. Thi ...)
+       TODO: check
+CVE-2026-28831 (An authorization issue was addressed with improved state 
management. T ...)
+       TODO: check
+CVE-2026-28829 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2026-28828 (A permissions issue was addressed by removing the vulnerable 
code. Thi ...)
+       TODO: check
+CVE-2026-28827 (A parsing issue in the handling of directory paths was 
addressed with  ...)
+       TODO: check
+CVE-2026-28826 (A logic issue was addressed with improved restrictions. This 
issue is  ...)
+       TODO: check
+CVE-2026-28825 (An out-of-bounds write issue was addressed with improved 
bounds checki ...)
+       TODO: check
+CVE-2026-28824 (An authorization issue was addressed with improved state 
management. T ...)
+       TODO: check
+CVE-2026-28823 (A path handling issue was addressed with improved validation. 
This iss ...)
+       TODO: check
+CVE-2026-28822 (A type confusion issue was addressed with improved memory 
handling. Th ...)
+       TODO: check
+CVE-2026-28821 (A validation issue existed in the entitlement verification. 
This issue ...)
+       TODO: check
+CVE-2026-28820 (This issue was addressed with improved checks. This issue is 
fixed in  ...)
+       TODO: check
+CVE-2026-28818 (A logging issue was addressed with improved data redaction. 
This issue ...)
+       TODO: check
+CVE-2026-28817 (A race condition was addressed with improved state handling. 
This issu ...)
+       TODO: check
+CVE-2026-28816 (A path handling issue was addressed with improved validation. 
This iss ...)
+       TODO: check
+CVE-2026-26306 (The installer for OM Workspace (Windows Edition) Ver 2.4 and 
earlier i ...)
+       TODO: check
+CVE-2026-24159 (NVIDIA NeMo Framework contains a vulnerability where an 
attacker may c ...)
+       TODO: check
+CVE-2026-24158 (NVIDIA Triton Inference Server contains a vulnerability in the 
HTTP en ...)
+       TODO: check
+CVE-2026-24157 (NVIDIA NeMo Framework contains a vulnerability in checkpoint 
loading w ...)
+       TODO: check
+CVE-2026-24152 (NVIDIA Megatron-LM contains a vulnerability in checkpoint 
loading wher ...)
+       TODO: check
+CVE-2026-24151 (NVIDIA Megatron-LM contains a vulnerability in inferencing 
where an At ...)
+       TODO: check
+CVE-2026-24150 (NVIDIA Megatron-LM contains a vulnerability in checkpoint 
loading wher ...)
+       TODO: check
+CVE-2026-24141 (NVIDIA Model Optimizer for Windows and Linux contains a 
vulnerability  ...)
+       TODO: check
+CVE-2026-21790 (HCL Traveler is susceptible to a weak default HTTP header 
validation v ...)
+       TODO: check
+CVE-2026-20701 (An access issue was addressed with additional sandbox 
restrictions. Th ...)
+       TODO: check
+CVE-2026-20699 (A downgrade issue affecting Intel-based Mac computers was 
addressed wi ...)
+       TODO: check
+CVE-2026-20698 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2026-20697 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2026-20695 (An information disclosure issue was addressed with improved 
memory man ...)
+       TODO: check
+CVE-2026-20694 (This issue was addressed with improved handling of symlinks. 
This issu ...)
+       TODO: check
+CVE-2026-20693 (This issue was addressed through improved state management. 
This issue ...)
+       TODO: check
+CVE-2026-20692 (A privacy issue was addressed with improved handling of user 
preferenc ...)
+       TODO: check
+CVE-2026-20691 (An authorization issue was addressed with improved state 
management. T ...)
+       TODO: check
+CVE-2026-20690 (An out-of-bounds access issue was addressed with improved 
bounds check ...)
+       TODO: check
+CVE-2026-20688 (A path handling issue was addressed with improved validation. 
This iss ...)
+       TODO: check
+CVE-2026-20687 (A use after free issue was addressed with improved memory 
management.  ...)
+       TODO: check
+CVE-2026-20686 (This issue was addressed with improved input validation. This 
issue is ...)
+       TODO: check
+CVE-2026-20684 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2026-20670 (An authorization issue was addressed with improved state 
management. T ...)
+       TODO: check
+CVE-2026-20668 (A logging issue was addressed with improved data redaction. 
This issue ...)
+       TODO: check
+CVE-2026-20665 (This issue was addressed through improved state management. 
This issue ...)
+       TODO: check
+CVE-2026-20664 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2026-20657 (The issue was addressed with improved memory handling. This 
issue is f ...)
+       TODO: check
+CVE-2026-20651 (A privacy issue was addressed with improved handling of 
temporary file ...)
+       TODO: check
+CVE-2026-20639 (An integer overflow was addressed with improved input 
validation. This ...)
+       TODO: check
+CVE-2026-20637 (A use after free issue was addressed with improved memory 
management.  ...)
+       TODO: check
+CVE-2026-20633 (This issue was addressed with improved handling of symlinks. 
This issu ...)
+       TODO: check
+CVE-2026-20632 (A parsing issue in the handling of directory paths was 
addressed with  ...)
+       TODO: check
+CVE-2026-20631 (A logic issue was addressed with improved checks. This issue 
is fixed  ...)
+       TODO: check
+CVE-2026-20622 (A privacy issue was addressed with improved handling of 
temporary file ...)
+       TODO: check
+CVE-2026-20607 (A permissions issue was addressed with additional 
restrictions. This i ...)
+       TODO: check
+CVE-2026-1166 (Open Redirect vulnerability in Hitachi Ops Center 
Administrator.This i ...)
+       TODO: check
+CVE-2025-43534 (A path handling issue was addressed with improved validation. 
This iss ...)
+       TODO: check
+CVE-2025-33254 (NVIDIA Triton Inference Server contains a vulnerability where 
an attac ...)
+       TODO: check
+CVE-2025-33248 (NVIDIA Megatron-LM contains a vulnerability in the hybrid 
conversion s ...)
+       TODO: check
+CVE-2025-33247 (NVIDIA Megatron LM contains a vulnerability in quantization 
configurat ...)
+       TODO: check
+CVE-2025-33244 (NVIDIA APEX for Linux contains a vulnerability where an 
unauthorized a ...)
+       TODO: check
+CVE-2025-33242 (NVIDIA B300 MCU contains a vulnerability in the CX8 MCU that 
could all ...)
+       TODO: check
+CVE-2025-33238 (NVIDIA Triton Inference Server Sagemaker HTTP server contains 
a vulner ...)
+       TODO: check
+CVE-2025-33216 (NVIDIA SNAP-4 Container contains a vulnerability in the 
configuration  ...)
+       TODO: check
+CVE-2025-33215 (NVIDIA SNAP-4 Container contains a vulnerability in the 
VIRTIO-BLK com ...)
+       TODO: check
+CVE-2026-4371 (A malicious mail server could send malformed strings with 
negative len ...)
        - thunderbird <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-24/#CVE-2026-4371
-CVE-2026-3889
+CVE-2026-3889 (Spoofing issue in Thunderbird. This vulnerability affects 
Thunderbird  ...)
        - thunderbird <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-24/#CVE-2026-3889
 CVE-2026-3836
@@ -843,27 +1083,35 @@ CVE-2025-60946 (Census CSWeb 8.0.1 allows arbitrary file 
path input. A remote, a
 CVE-2025-41660 (A low-privileged remote attacker may be able to replace the 
boot appli ...)
        NOT-FOR-US: CODESYS
 CVE-2026-4680 (Use after free in FedCM in Google Chrome prior to 
146.0.7680.165 allow ...)
+       {DSA-6177-1}
        - chromium 146.0.7680.164-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-4679 (Integer overflow in Fonts in Google Chrome prior to 
146.0.7680.165 all ...)
+       {DSA-6177-1}
        - chromium 146.0.7680.164-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-4678 (Use after free in WebGPU in Google Chrome prior to 
146.0.7680.165 allo ...)
+       {DSA-6177-1}
        - chromium 146.0.7680.164-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-4677 (Inappropriate implementation in WebAudio in Google Chrome prior 
to 146 ...)
+       {DSA-6177-1}
        - chromium 146.0.7680.164-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-4676 (Use after free in Dawn in Google Chrome prior to 146.0.7680.165 
allowe ...)
+       {DSA-6177-1}
        - chromium 146.0.7680.164-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-4675 (Heap buffer overflow in WebGL in Google Chrome prior to 
146.0.7680.165 ...)
+       {DSA-6177-1}
        - chromium 146.0.7680.164-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-4674 (Out of bounds read in CSS in Google Chrome prior to 
146.0.7680.165 all ...)
+       {DSA-6177-1}
        - chromium 146.0.7680.164-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-4673 (Heap buffer overflow in WebAudio in Google Chrome prior to 
146.0.7680. ...)
+       {DSA-6177-1}
        - chromium 146.0.7680.164-1
        [bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-4647 (A flaw was found in the GNU Binutils BFD library, a widely used 
compon ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a7d9ccfec43f60877a56b6b6a56cd3025a7531bb

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a7d9ccfec43f60877a56b6b6a56cd3025a7531bb
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to