Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
939ddc0c by Salvatore Bonaccorso at 2026-04-03T10:41:13+02:00
Process batch of NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -26,51 +26,51 @@ CVE-2026-35507 (Shynet before 0.14.0 allows Host header 
injection in the passwor
 CVE-2026-35467 (The stored API keys in temporary browser client is not marked 
as prote ...)
        TODO: check
 CVE-2026-35466 (XSS vulnerability in cveInterface.js allows for inject HTML to 
be pass ...)
-       TODO: check
+       NOT-FOR-US: CERTCC cveClient
 CVE-2026-35383 (Bentley Systems iTwin Platform exposed a Cesium ion access 
token in th ...)
-       TODO: check
+       NOT-FOR-US: Bentley Systems iTwin Platform
 CVE-2026-35053 (OneUptime is an open-source monitoring and observability 
platform. Pri ...)
-       TODO: check
+       NOT-FOR-US: OneUptime
 CVE-2026-34932 (hoppscotch is an open source API development ecosystem. Prior 
to versi ...)
-       TODO: check
+       NOT-FOR-US: hoppscotch
 CVE-2026-34931 (hoppscotch is an open source API development ecosystem. Prior 
to versi ...)
-       TODO: check
+       NOT-FOR-US: hoppscotch
 CVE-2026-34848 (hoppscotch is an open source API development ecosystem. Prior 
to versi ...)
-       TODO: check
+       NOT-FOR-US: hoppscotch
 CVE-2026-34847 (hoppscotch is an open source API development ecosystem. Prior 
to versi ...)
-       TODO: check
+       NOT-FOR-US: hoppscotch
 CVE-2026-34840 (OneUptime is an open-source monitoring and observability 
platform. Pri ...)
-       TODO: check
+       NOT-FOR-US: OneUptime
 CVE-2026-34838 (Group-Office is an enterprise customer relationship management 
and gro ...)
-       TODO: check
+       NOT-FOR-US: Group-Office
 CVE-2026-34834 (Bulwark Webmail is a self-hosted webmail client for Stalwart 
Mail Serv ...)
-       TODO: check
+       NOT-FOR-US: Bulwark Webmail
 CVE-2026-34833 (Bulwark Webmail is a self-hosted webmail client for Stalwart 
Mail Serv ...)
-       TODO: check
+       NOT-FOR-US: Bulwark Webmail
 CVE-2026-34832 (Scoold is a Q&A and a knowledge sharing platform for teams. 
Prior to v ...)
-       TODO: check
+       NOT-FOR-US: Scoold
 CVE-2026-34825 (NocoBase is an AI-powered no-code/low-code platform for 
building busin ...)
-       TODO: check
+       NOT-FOR-US: NocoBase
 CVE-2026-34762 (Ella Core is a 5G core designed for private networks. Prior to 
version ...)
-       TODO: check
+       NOT-FOR-US: Ella Core
 CVE-2026-34761 (Ella Core is a 5G core designed for private networks. Prior to 
version ...)
-       TODO: check
+       NOT-FOR-US: Ella Core
 CVE-2026-34760 (vLLM is an inference and serving engine for large language 
models (LLM ...)
        TODO: check
 CVE-2026-33107 (Server-side request forgery (ssrf) in Azure Databricks allows 
an unaut ...)
-       TODO: check
+       NOT-FOR-US: Azure Databricks
 CVE-2026-33105 (Improper authorization in Microsoft Azure Kubernetes Service 
allows an ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2026-32213 (Improper authorization in Azure AI Foundry allows an 
unauthorized atta ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2026-32211 (Missing authentication for critical function in Azure MCP 
Server allow ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2026-32173 (Improper authentication in Azure SRE Agent allows an 
unauthorized atta ...)
-       TODO: check
+       NOT-FOR-US: Microsoft
 CVE-2026-30252 (Multiple reflected cross-site scripting (XSS) vulnerabilities 
in the l ...)
-       TODO: check
+       NOT-FOR-US: Interzen Consulting S.r.l ZenShare Suite
 CVE-2026-30251 (A reflected cross-site scripting (XSS) vulnerability in the 
login_newp ...)
-       TODO: check
+       NOT-FOR-US: Interzen Consulting S.r.l ZenShare Suite
 CVE-2026-28815 (A remote attacker can supply a short X-Wing HPKE encapsulated 
key and  ...)
        NOT-FOR-US: Apple
 CVE-2026-26135 (Server-side request forgery (ssrf) in Azure Custom Locations 
Resource  ...)
@@ -255,7 +255,7 @@ CVE-2026-34829 (Rack is a modular Ruby web server 
interface. Prior to versions 2
        NOTE: Fixed by: 
https://github.com/rack/rack/commit/367a2a0ec6fbef605c9412dadfd5763b7867441f 
(v3.1.21)
        NOTE: Fixed by: 
https://github.com/rack/rack/commit/c42e357995065aa0c144eba0215a689d8105e4de 
(v2.2.23)
 CVE-2026-34828 (listmonk is a standalone, self-hosted, newsletter and mailing 
list man ...)
-       TODO: check
+       NOT-FOR-US: listmonk
 CVE-2026-34827 (Rack is a modular Ruby web server interface. From versions 
3.0.0.beta1 ...)
        [experimental] - ruby-rack 3.2.6-1
        - ruby-rack <unfixed>
@@ -270,73 +270,73 @@ CVE-2026-34826 (Rack is a modular Ruby web server 
interface. Prior to versions 2
        NOTE: Fixed by: 
https://github.com/rack/rack/commit/345a4cfa51f451e58b2931322998e04f3cf6dc0d 
(v3.1.21)
        NOTE: Fixed by: 
https://github.com/rack/rack/commit/94a7ca91a750ced0e445f39fabbc8ee6d2ab3bf1 
(v2.2.23)
 CVE-2026-34823 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34822 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34821 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34820 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34819 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34818 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34817 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34816 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34815 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34814 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34813 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34812 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34811 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34810 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34809 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34808 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34807 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34806 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34805 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34804 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34803 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34802 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34801 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34800 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34799 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34798 (Endian Firewall version 3.3.25 and prior allow stored 
cross-site scrip ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34797 (Endian Firewall version 3.3.25 and prior allow authenticated 
users to  ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34796 (Endian Firewall version 3.3.25 and prior allow authenticated 
users to  ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34795 (Endian Firewall version 3.3.25 and prior allow authenticated 
users to  ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34794 (Endian Firewall version 3.3.25 and prior allow authenticated 
users to  ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34793 (Endian Firewall version 3.3.25 and prior allow authenticated 
users to  ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34792 (Endian Firewall version 3.3.25 and prior allow authenticated 
users to  ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34791 (Endian Firewall version 3.3.25 and prior allow authenticated 
users to  ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34790 (Endian Firewall version 3.3.25 and prior allow authenticated 
users to  ...)
-       TODO: check
+       NOT-FOR-US: Endian Firewall
 CVE-2026-34786 (Rack is a modular Ruby web server interface. Prior to versions 
2.2.23, ...)
        [experimental] - ruby-rack 3.2.6-1
        - ruby-rack <unfixed>
@@ -359,65 +359,65 @@ CVE-2026-34763 (Rack is a modular Ruby web server 
interface. Prior to versions 2
        NOTE: Fixed by: 
https://github.com/rack/rack/commit/29b17c58e55539b5b9c1afd0d86266e54150193f 
(v3.1.21)
        NOTE: Fixed by: 
https://github.com/rack/rack/commit/7796548b545601accdfe8f4079088bd44d0a3495 
(v2.2.23)
 CVE-2026-34759 (OneUptime is an open-source monitoring and observability 
platform. Pri ...)
-       TODO: check
+       NOT-FOR-US: OneUptime
 CVE-2026-34758 (OneUptime is an open-source monitoring and observability 
platform. Pri ...)
-       TODO: check
+       NOT-FOR-US: OneUptime
 CVE-2026-34752 (Haraka is a Node.js mail server. Prior to version 3.1.4, 
sending an em ...)
-       TODO: check
+       NOT-FOR-US: Haraka
 CVE-2026-34745 (Fireshare facilitates self-hosted media and link sharing. 
Prior to ver ...)
-       TODO: check
+       NOT-FOR-US: Fireshare
 CVE-2026-34742 (The Go MCP SDK used Go's standard encoding/json. Prior to 
version 1.4. ...)
-       TODO: check
+       NOT-FOR-US: Go MCP SDK
 CVE-2026-34736 (Open edX Platform enables the authoring and delivery of online 
learnin ...)
-       TODO: check
+       NOT-FOR-US: Open edX
 CVE-2026-34735 (The Hytale Modding Wiki is a free service for Hytale mods to 
host thei ...)
-       TODO: check
+       NOT-FOR-US: Hytale Modding Wiki
 CVE-2026-34730 (Copier is a library and CLI app for rendering project 
templates. Prior ...)
-       TODO: check
+       NOT-FOR-US: Copier library and CLI app
 CVE-2026-34729 (phpMyFAQ is an open source FAQ web application. Prior to 
version 4.1.1 ...)
-       TODO: check
+       NOT-FOR-US: phpMyFAQ
 CVE-2026-34728 (phpMyFAQ is an open source FAQ web application. Prior to 
version 4.1.1 ...)
-       TODO: check
+       NOT-FOR-US: phpMyFAQ
 CVE-2026-34726 (Copier is a library and CLI app for rendering project 
templates. Prior ...)
-       TODO: check
+       NOT-FOR-US: Copier library and CLI app
 CVE-2026-34725 (DbGate is cross-platform database manager. From version 7.0.0 
to befor ...)
-       TODO: check
+       NOT-FOR-US: DbGate
 CVE-2026-34717 (OpenProject is an open-source, web-based project management 
software.  ...)
-       TODO: check
+       NOT-FOR-US: OpenProject
 CVE-2026-34715 (ewe is a Gleam web server. Prior to version 3.0.6, the 
encode_headers  ...)
-       TODO: check
+       NOT-FOR-US: ewe
 CVE-2026-34610 (The leancrypto library is a cryptographic library that 
exclusively con ...)
        TODO: check
 CVE-2026-34608 (NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging 
Platform.  ...)
-       TODO: check
+       NOT-FOR-US: NanoMQ
 CVE-2026-34606 (Frappe Learning Management System (LMS) is a learning system 
that help ...)
-       TODO: check
+       NOT-FOR-US: Frappe Learning Management System (LMS)
 CVE-2026-34601 (xmldom is a pure JavaScript W3C standard-based (XML DOM Level 
2 Core)  ...)
        TODO: check
 CVE-2026-34598 (YesWiki is a wiki system written in PHP. Prior to version 
4.6.0, a sto ...)
-       TODO: check
+       NOT-FOR-US: YesWiki
 CVE-2026-34593 (Ash Framework is a declarative, extensible framework for 
building Elix ...)
        TODO: check
 CVE-2026-34591 (Poetry is a dependency manager for Python. From version 1.4.0 
to befor ...)
        TODO: check
 CVE-2026-34590 (Postiz is an AI social media scheduling tool. Prior to version 
2.21.4, ...)
-       TODO: check
+       NOT-FOR-US: Postiz
 CVE-2026-34584 (listmonk is a standalone, self-hosted, newsletter and mailing 
list man ...)
-       TODO: check
+       NOT-FOR-US: listmonk
 CVE-2026-34581 (goshs is a SimpleHTTPServer written in Go. From version 1.1.0 
to befor ...)
-       TODO: check
+       NOT-FOR-US: goshs
 CVE-2026-34577 (Postiz is an AI social media scheduling tool. Prior to version 
2.21.3, ...)
-       TODO: check
+       NOT-FOR-US: Postiz
 CVE-2026-34576 (Postiz is an AI social media scheduling tool. Prior to version 
2.21.3, ...)
-       TODO: check
+       NOT-FOR-US: Postiz
 CVE-2026-34526 (SillyTavern is a locally installed user interface that allows 
users to ...)
-       TODO: check
+       NOT-FOR-US: SillyTavern
 CVE-2026-34524 (SillyTavern is a locally installed user interface that allows 
users to ...)
-       TODO: check
+       NOT-FOR-US: SillyTavern
 CVE-2026-34523 (SillyTavern is a locally installed user interface that allows 
users to ...)
-       TODO: check
+       NOT-FOR-US: SillyTavern
 CVE-2026-34522 (SillyTavern is a locally installed user interface that allows 
users to ...)
-       TODO: check
+       NOT-FOR-US: SillyTavern
 CVE-2026-34426 (OpenClaw versions prior to commit b57b680contain an approval 
bypass vu ...)
        NOT-FOR-US: OpenClaw
 CVE-2026-34425 (OpenClaw versions prior to commit 8aceaf5 contain a preflight 
validati ...)
@@ -442,33 +442,33 @@ CVE-2026-34119 (A heap-based buffer overflow 
vulnerability was identified in TP-
 CVE-2026-34118 (A heap-based buffer overflow vulnerability was identified in 
TP-Link T ...)
        NOT-FOR-US: TPLink
 CVE-2026-34083 (Signal K Server is a server application that runs on a central 
hub in  ...)
-       TODO: check
+       NOT-FOR-US: Signal K Server
 CVE-2026-33951 (Signal K Server is a server application that runs on a central 
hub in  ...)
-       TODO: check
+       NOT-FOR-US: Signal K Server
 CVE-2026-33950 (Signal K Server is a server application that runs on a central 
hub in  ...)
-       TODO: check
+       NOT-FOR-US: Signal K Server
 CVE-2026-33746 (Convoy is a KVM server management panel for hosting 
businesses. From v ...)
-       TODO: check
+       NOT-FOR-US: Convoy
 CVE-2026-33641 (Glances is an open-source system cross-platform monitoring 
tool. Prior ...)
        TODO: check
 CVE-2026-33617 (An unauthenticated remote attacker can access a configuration 
file con ...)
-       TODO: check
+       NOT-FOR-US: MB connect line GmbH
 CVE-2026-33616 (An unauthenticated remote attacker can exploit an 
unauthenticated blin ...)
-       TODO: check
+       NOT-FOR-US: MB connect line GmbH
 CVE-2026-33615 (An unauthenticated remote attacker can exploit an 
unauthenticated SQL  ...)
-       TODO: check
+       NOT-FOR-US: MB connect line GmbH
 CVE-2026-33614 (An unauthenticated remote attacker can exploit an 
unauthenticated SQL  ...)
-       TODO: check
+       NOT-FOR-US: MB connect line GmbH
 CVE-2026-33613 (Due to the improper neutralisation of special elements used in 
an OS c ...)
-       TODO: check
+       NOT-FOR-US: MB connect line GmbH
 CVE-2026-33544 (Tinyauth is an authentication and authorization server. Prior 
to versi ...)
-       TODO: check
+       NOT-FOR-US: Tinyauth
 CVE-2026-33533 (Glances is an open-source system cross-platform monitoring 
tool. Prior ...)
        TODO: check
 CVE-2026-33271 (Local privilege escalation due to insecure folder permissions. 
The fol ...)
        NOT-FOR-US: Acronis
 CVE-2026-32871 (FastMCP is a Pythonic way to build MCP servers and clients. 
Prior to v ...)
-       TODO: check
+       NOT-FOR-US: FastMCP
 CVE-2026-32762 (Rack is a modular Ruby web server interface. From versions 
3.0.0.beta1 ...)
        [experimental] - ruby-rack 3.2.6-1
        - ruby-rack <unfixed>
@@ -476,9 +476,9 @@ CVE-2026-32762 (Rack is a modular Ruby web server 
interface. From versions 3.0.0
        NOTE: Fixed by: 
https://github.com/rack/rack/commit/27e06c695f3a47bdd9d21a1a7e8d97e12c52c255 
(v3.2.6)
        NOTE: Fixed by: 
https://github.com/rack/rack/commit/9df5d34d4f496b22b8d07e919447e9dfa3240d41 
(v3.1.21)
 CVE-2026-32629 (phpMyFAQ is an open source FAQ web application. Prior to 
version 4.1.1 ...)
-       TODO: check
+       NOT-FOR-US: phpMyFAQ
 CVE-2026-32145 (Allocation of Resources Without Limits or Throttling 
vulnerability in  ...)
-       TODO: check
+       NOT-FOR-US: gleam-wisp wisp
 CVE-2026-31937 (Suricata is a network IDS, IPS and NSM engine. Prior to 
version 7.0.15 ...)
        - suricata 1:8.0.1-1
        NOTE: 
https://github.com/OISF/suricata/security/advisories/GHSA-86vg-w8vm-m3gg
@@ -500,11 +500,11 @@ CVE-2026-31931 (Suricata is a network IDS, IPS and NSM 
engine. From version 8.0.
        - suricata 1:8.0.4-1
        NOTE: 
https://github.com/OISF/suricata/security/advisories/GHSA-gr22-4784-xvw3
 CVE-2026-30867 (CocoaMQTT is a MQTT 5.0 client library for iOS and macOS 
written in Sw ...)
-       TODO: check
+       NOT-FOR-US: CocoaMQTT
 CVE-2026-30603 (An issue in the firmware update mechanism of Qianniao 
QN-L23PA0904 v20 ...)
-       TODO: check
+       NOT-FOR-US: Qianniao
 CVE-2026-30332 (A Time-of-Check to Time-of-Use (TOCTOU) race condition 
vulnerability i ...)
-       TODO: check
+       NOT-FOR-US: Balena Etcher for Windows
 CVE-2026-2737 (A vulnerability exists in Progress Flowmon versions prior to 
12.5.8 an ...)
        NOT-FOR-US: Progress Software
 CVE-2026-2701 (Authenticated user can upload a malicious file to the server 
and execu ...)
@@ -512,7 +512,7 @@ CVE-2026-2701 (Authenticated user can upload a malicious 
file to the server and
 CVE-2026-2699 (Customer Managed ShareFile Storage Zones Controller (SZC) 
allows an un ...)
        NOT-FOR-US: Progress Software
 CVE-2026-29782 (OpenSTAManager is an open source management software for 
technical ass ...)
-       TODO: check
+       NOT-FOR-US: OpenSTAManager
 CVE-2026-29144 (SEPPmail Secure Email Gateway before version 15.0.3 allows an 
attacker ...)
        TODO: check
 CVE-2026-29143 (SEPPmail Secure Email Gateway before version 15.0.3 does not 
properly  ...)
@@ -790,19 +790,19 @@ CVE-2026-34513 (AIOHTTP is an asynchronous HTTP 
client/server framework for asyn
        NOTE: 
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-hcc4-c3v8-rx92
        NOTE: Fixed by: 
https://github.com/aio-libs/aiohttp/commit/c4d77c3533122be353b8afca8e8675e3b4cbda98
 (v3.13.4)
 CVE-2026-34456 (Reviactyl is an open-source game server management panel built 
using L ...)
-       TODO: check
+       NOT-FOR-US: Reviactyl
 CVE-2026-34455 (Hi.Events is an open-source event management and ticket 
selling platfo ...)
-       TODO: check
+       NOT-FOR-US: Hi.Events
 CVE-2026-32929 (V-SFT versions 6.2.10.0 and prior contain an out-of-bounds 
read in VS6 ...)
-       TODO: check
+       NOT-FOR-US: V-SFT
 CVE-2026-32928 (V-SFT versions 6.2.10.0 and prior contain a stack-based buffer 
overflo ...)
-       TODO: check
+       NOT-FOR-US: V-SFT
 CVE-2026-32927 (V-SFT versions 6.2.10.0 and prior contain an out-of-bounds 
read vulner ...)
-       TODO: check
+       NOT-FOR-US: V-SFT
 CVE-2026-32926 (V-SFT versions 6.2.10.0 and prior contain an out-of-bounds 
read vulner ...)
-       TODO: check
+       NOT-FOR-US: V-SFT
 CVE-2026-32925 (V-SFT versions 6.2.10.0 and prior contain a stack-based buffer 
overflo ...)
-       TODO: check
+       NOT-FOR-US: V-SFT
 CVE-2026-2862 (IBM Verify Identity Access Container 11.0 through 11.0.2 and 
IBM Secur ...)
        NOT-FOR-US: IBM
 CVE-2026-2475 (IBM Verify Identity Access Container 11.0 through 11.0.2 and 
IBM Secur ...)
@@ -964,9 +964,9 @@ CVE-2026-30523 (A Business Logic vulnerability exists in 
SourceCodester Loan Man
 CVE-2026-30522 (A Business Logic vulnerability exists in SourceCodester Loan 
Managemen ...)
        NOT-FOR-US: SourceCodester
 CVE-2026-30292 (An arbitrary file overwrite vulnerability in Docudepot PDF 
Reader: PDF ...)
-       TODO: check
+       NOT-FOR-US: Docudepot
 CVE-2026-30291 (An arbitrary file overwrite vulnerability in Ora Tools PDF 
Reader ' Re ...)
-       TODO: check
+       NOT-FOR-US: Ora Tools
 CVE-2026-30289 (An arbitrary file overwrite vulnerability in Tinybeans Private 
Family  ...)
        NOT-FOR-US: Tinybeans Private Family Album App
 CVE-2026-30287 (An arbitrary file overwrite vulnerability in Deep Thought 
Industries A ...)
@@ -1571,17 +1571,17 @@ CVE-2026-30312 (DSAI-Cline's command auto-approval 
module contains a critical OS
 CVE-2026-30311 (Ridvay Code's command auto-approval module contains a critical 
OS comm ...)
        NOT-FOR-US: Ridvay Code
 CVE-2026-30310 (In its design for automatic terminal command execution, Sixth 
offers t ...)
-       TODO: check
+       NOT-FOR-US: Sixth
 CVE-2026-30309 (InfCode's terminal auto-execution module contains a critical 
command f ...)
        NOT-FOR-US: InfCode
 CVE-2026-30290 (An arbitrary file overwrite vulnerability in InTouch Contacts 
& Caller ...)
-       TODO: check
+       NOT-FOR-US: InTouch Contacts & Caller ID APP
 CVE-2026-30286 (An arbitrary file overwrite vulnerability in Funambol, Inc. 
Zefiro Clo ...)
-       TODO: check
+       NOT-FOR-US: Funambol
 CVE-2026-30285 (An arbitrary file overwrite vulnerability in Zora: Post, 
Trade, Earn C ...)
-       TODO: check
+       NOT-FOR-US: Zora
 CVE-2026-30284 (An arbitrary file overwrite vulnerability in UXGROUP LLC Voice 
Recorde ...)
-       TODO: check
+       NOT-FOR-US: UXGROUP LLC Voice Recorder
 CVE-2026-30283 (An arbitrary file overwrite vulnerability in PEAKSEL D.O.O. 
NIS Animal ...)
        NOT-FOR-US: PEAKSEL
 CVE-2026-30282 (An arbitrary file overwrite vulnerability in UXGROUP LLC Cast 
to TV Sc ...)
@@ -1595,9 +1595,9 @@ CVE-2026-30279 (An arbitrary file overwrite vulnerability 
in Squareapps LLC My L
 CVE-2026-30278 (An arbitrary file overwrite vulnerability in FLY is FUN 
Aviation Navig ...)
        NOT-FOR-US: FLY is FUN Aviation Navigation
 CVE-2026-30277 (An arbitrary file overwrite vulnerability in PDF Reader App : 
TA/UTAX  ...)
-       TODO: check
+       NOT-FOR-US: TA/UTAX Mobile Print
 CVE-2026-30276 (An arbitrary file overwrite vulnerability in DeftPDF Document 
Translat ...)
-       TODO: check
+       NOT-FOR-US: DeftPDF
 CVE-2026-2950 (Impact:  Lodash versions 4.17.23 and earlier are vulnerable to 
prototy ...)
        TODO: check
 CVE-2026-2696 (The Export All URLs WordPress plugin before 5.1 generates CSV 
filename ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/939ddc0cda931aa1742b0abd51a7853c76f3428a

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/939ddc0cda931aa1742b0abd51a7853c76f3428a
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to