[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Fri Feb 6 20:13:32 GMT 2026
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
c50d3795 by security tracker role at 2026-02-06T20:13:26+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,4 +1,212 @@
-CVE-2026-25727
+CVE-2026-2103 (Infor SyteLine ERP uses hard-coded static cryptographic keys to encryp ...)
+ TODO: check
+CVE-2026-2065 (A security flaw has been discovered in Flycatcher Toys smART Pixelator ...)
+ TODO: check
+CVE-2026-2064 (A vulnerability was identified in Portabilis i-Educar up to 2.10. Affe ...)
+ TODO: check
+CVE-2026-2063 (A security flaw has been discovered in D-Link DIR-823X 250416. This vu ...)
+ TODO: check
+CVE-2026-2062 (A vulnerability was identified in Open5GS up to 2.7.6. This affects th ...)
+ TODO: check
+CVE-2026-2061 (A vulnerability was determined in D-Link DIR-823X 250416. Affected by ...)
+ TODO: check
+CVE-2026-2060 (A vulnerability was found in code-projects Simple Blood Donor Manageme ...)
+ TODO: check
+CVE-2026-2059 (A vulnerability has been found in SourceCodester Medical Center Portal ...)
+ TODO: check
+CVE-2026-2058 (A flaw has been found in mathurvishal CloudClassroom-PHP-Project up to ...)
+ TODO: check
+CVE-2026-2057 (A vulnerability was detected in SourceCodester Medical Center Portal M ...)
+ TODO: check
+CVE-2026-2056 (A security vulnerability has been detected in D-Link DIR-605L and DIR- ...)
+ TODO: check
+CVE-2026-2055 (A weakness has been identified in D-Link DIR-605L and DIR-619L 2.06B01 ...)
+ TODO: check
+CVE-2026-2054 (A security flaw has been discovered in D-Link DIR-605L and DIR-619L 2. ...)
+ TODO: check
+CVE-2026-2018 (A flaw has been found in itsourcecode School Management System 1.0. Th ...)
+ TODO: check
+CVE-2026-2017 (A vulnerability was detected in IP-COM W30AP up to 1.0.0.11(1340). Aff ...)
+ TODO: check
+CVE-2026-2016 (A security vulnerability has been detected in happyfish100 libfastcomm ...)
+ TODO: check
+CVE-2026-2015 (A weakness has been identified in Portabilis i-Educar up to 2.10. Affe ...)
+ TODO: check
+CVE-2026-2014 (A security flaw has been discovered in itsourcecode Student Management ...)
+ TODO: check
+CVE-2026-2013 (A vulnerability was identified in itsourcecode Student Management Syst ...)
+ TODO: check
+CVE-2026-2012 (A vulnerability was determined in itsourcecode Student Management Syst ...)
+ TODO: check
+CVE-2026-2011 (A vulnerability was found in itsourcecode Student Management System 1. ...)
+ TODO: check
+CVE-2026-25753 (PlaciPy is a placement management system designed for educational inst ...)
+ TODO: check
+CVE-2026-25752 (FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) softwa ...)
+ TODO: check
+CVE-2026-25751 (FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) softwa ...)
+ TODO: check
+CVE-2026-25725 (Claude Code is an agentic coding tool. Prior to version 2.1.2, Claude ...)
+ TODO: check
+CVE-2026-25724 (Claude Code is an agentic coding tool. Prior to version 2.1.7, Claude ...)
+ TODO: check
+CVE-2026-25723 (Claude Code is an agentic coding tool. Prior to version 2.0.55, Claude ...)
+ TODO: check
+CVE-2026-25722 (Claude Code is an agentic coding tool. Prior to version 2.0.57, Claude ...)
+ TODO: check
+CVE-2026-25651 (client-certificate-auth is middleware for Node.js implementing client ...)
+ TODO: check
+CVE-2026-25650 (MCP Salesforce Connector is a Model Context Protocol (MCP) server impl ...)
+ TODO: check
+CVE-2026-25647 (Lute is a structured Markdown engine supporting Go and JavaScript. Lut ...)
+ TODO: check
+CVE-2026-25643 (Frigate is a network video recorder (NVR) with realtime local object d ...)
+ TODO: check
+CVE-2026-25642 (HedgeDoc is an open source, real-time, collaborative, markdown notes a ...)
+ TODO: check
+CVE-2026-25641 (SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, there i ...)
+ TODO: check
+CVE-2026-25640 (Pydantic AI is a Python agent framework for building applications and ...)
+ TODO: check
+CVE-2026-25587 (SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, as Map ...)
+ TODO: check
+CVE-2026-25586 (SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, a sandb ...)
+ TODO: check
+CVE-2026-25556 (MuPDF versions 1.23.0 through 1.27.0 contain a double-free vulnerabili ...)
+ TODO: check
+CVE-2026-25520 (SandboxJS is a JavaScript sandboxing library. Prior to 0.8.29, The ret ...)
+ TODO: check
+CVE-2026-24931 (Vulnerability of improper criterion security check in the card module. ...)
+ TODO: check
+CVE-2026-24930 (UAF concurrency vulnerability in the graphics module. Impact: Successf ...)
+ TODO: check
+CVE-2026-24929 (Out-of-bounds read vulnerability in the graphics module. Impact: Succe ...)
+ TODO: check
+CVE-2026-24928 (Out-of-bounds write vulnerability in the file system module. Impact: S ...)
+ TODO: check
+CVE-2026-24927 (Out-of-bounds access vulnerability in the frequency modulation module. ...)
+ TODO: check
+CVE-2026-24926 (Out-of-bounds write vulnerability in the camera module. Impact: Succes ...)
+ TODO: check
+CVE-2026-24925 (Heap-based buffer overflow vulnerability in the image module. Impact: ...)
+ TODO: check
+CVE-2026-24924 (Vulnerability of improper permission control in the print module. Impa ...)
+ TODO: check
+CVE-2026-24923 (Permission control vulnerability in the HDC module. Impact: Successful ...)
+ TODO: check
+CVE-2026-24922 (Buffer overflow vulnerability in the HDC module. Impact: Successful ex ...)
+ TODO: check
+CVE-2026-24921 (Address read vulnerability in the HDC module. Impact: Successful explo ...)
+ TODO: check
+CVE-2026-24920 (Permission control vulnerability in the AMS module. Impact: Successful ...)
+ TODO: check
+CVE-2026-24919 (Out-of-bounds write vulnerability in the DFX module. Impact: Successfu ...)
+ TODO: check
+CVE-2026-24918 (Address read vulnerability in the communication module. Impact: Succes ...)
+ TODO: check
+CVE-2026-24917 (UAF vulnerability in the security module. Impact: Successful exploitat ...)
+ TODO: check
+CVE-2026-24916 (Identity authentication bypass vulnerability in the window module. Imp ...)
+ TODO: check
+CVE-2026-24915 (Out-of-bounds read issue in the media subsystem. Impact: Successful ex ...)
+ TODO: check
+CVE-2026-24914 (Type confusion vulnerability in the camera module. Impact: Successful ...)
+ TODO: check
+CVE-2026-24903 (OrcaStatLLM Researcher is an LLM Based Research Paper Generator. A Sto ...)
+ TODO: check
+CVE-2026-24851 (OpenFGA is a high-performance and flexible authorization/permission en ...)
+ TODO: check
+CVE-2026-24776 (OpenProject is an open-source, web-based project management software. ...)
+ TODO: check
+CVE-2026-24419 (OpenSTAManager is an open source management software for technical ass ...)
+ TODO: check
+CVE-2026-24418 (OpenSTAManager is an open source management software for technical ass ...)
+ TODO: check
+CVE-2026-24417 (OpenSTAManager is an open source management software for technical ass ...)
+ TODO: check
+CVE-2026-24416 (OpenSTAManager is an open source management software for technical ass ...)
+ TODO: check
+CVE-2026-24135 (Gogs is an open source self-hosted Git service. In version 0.13.3 and ...)
+ TODO: check
+CVE-2026-24050 (Zulip is an open-source team collaboration tool. From 5.0 to before 11 ...)
+ TODO: check
+CVE-2026-23989 (REVA is an interoperability platform. Prior to 2.42.3 and 2.40.3, a bu ...)
+ TODO: check
+CVE-2026-23741 (Asterisk is an open source private branch exchange and telephony toolk ...)
+ TODO: check
+CVE-2026-23740 (Asterisk is an open source private branch exchange and telephony toolk ...)
+ TODO: check
+CVE-2026-23739 (Asterisk is an open source private branch exchange and telephony toolk ...)
+ TODO: check
+CVE-2026-23738 (Asterisk is an open source private branch exchange and telephony toolk ...)
+ TODO: check
+CVE-2026-23633 (Gogs is an open source self-hosted Git service. In version 0.13.3 and ...)
+ TODO: check
+CVE-2026-23632 (Gogs is an open source self-hosted Git service. In version 0.13.3 and ...)
+ TODO: check
+CVE-2026-22592 (Gogs is an open source self-hosted Git service. In version 0.13.3 and ...)
+ TODO: check
+CVE-2026-22254 (Winter is a free, open-source content management system (CMS) based on ...)
+ TODO: check
+CVE-2026-21643 (An improper neutralization of special elements used in an sql command ...)
+ TODO: check
+CVE-2026-1785 (The Code Snippets plugin for WordPress is vulnerable to Cross-Site Req ...)
+ TODO: check
+CVE-2026-1769 (Improper Neutralization of Input During Web Page Generation (XSS or 'C ...)
+ TODO: check
+CVE-2026-1709 (A flaw was found in Keylime. The Keylime registrar, since version 7.12 ...)
+ TODO: check
+CVE-2026-1499 (The WP Duplicate plugin for WordPress is vulnerable to Missing Authori ...)
+ TODO: check
+CVE-2026-1337 (Insufficient escaping of unicode characters in query log in Neo4j Ente ...)
+ TODO: check
+CVE-2026-1293 (The Yoast SEO \u2013 Advanced SEO with real-time guidance and built-in ...)
+ TODO: check
+CVE-2026-1252 (The Events Listing Widget plugin for WordPress is vulnerable to Stored ...)
+ TODO: check
+CVE-2025-70963 (Gophish <=0.12.1 is vulnerable to Incorrect Access Control. The admini ...)
+ TODO: check
+CVE-2025-69216 (OpenSTAManager is an open source management software for technical ass ...)
+ TODO: check
+CVE-2025-69214 (OpenSTAManager is an open source management software for technical ass ...)
+ TODO: check
+CVE-2025-69212 (OpenSTAManager is an open source management software for technical ass ...)
+ TODO: check
+CVE-2025-64175 (Gogs is an open source self-hosted Git service. In version 0.13.3 and ...)
+ TODO: check
+CVE-2025-64111 (Gogs is an open source self-hosted Git service. In version 0.13.3 and ...)
+ TODO: check
+CVE-2025-15320 (Tanium addressed a denial of service vulnerability in Tanium Client.)
+ TODO: check
+CVE-2025-13818 (Local privilege escalation vulnerability via insecure temporary batch ...)
+ TODO: check
+CVE-2025-13523 (Mattermost Confluence plugin version <1.7.0 fails to properly escape u ...)
+ TODO: check
+CVE-2019-25305 (JumpStart 0.6.0.0 contains an unquoted service path vulnerability in t ...)
+ TODO: check
+CVE-2019-25304 (SecurOS Enterprise 10.2 contains an unquoted service path vulnerabilit ...)
+ TODO: check
+CVE-2019-25303 (TheJshen ContentManagementSystem 1.04 contains a SQL injection vulnera ...)
+ TODO: check
+CVE-2019-25302 (Acer Launch Manager 6.1.7600.16385 contains an unquoted service path v ...)
+ TODO: check
+CVE-2019-25301 (Millhouse-Project 1.414 contains a persistent cross-site scripting vul ...)
+ TODO: check
+CVE-2019-25300 (thejshen Globitek CMS 1.4 contains a SQL injection vulnerability that ...)
+ TODO: check
+CVE-2019-25299 (RimbaLinux AhadPOS 1.11 contains a SQL injection vulnerability in the ...)
+ TODO: check
+CVE-2019-25298 (html5_snmp 1.11 contains multiple SQL injection vulnerabilities that a ...)
+ TODO: check
+CVE-2019-25294 (html5_snmp 1.11 contains a persistent cross-site scripting vulnerabili ...)
+ TODO: check
+CVE-2019-25293 (BlueStacks App Player 2.4.44.62.57 contains an unquoted service path v ...)
+ TODO: check
+CVE-2019-25292 (Alps HID Monitor Service 8.1.0.10 contains an unquoted service path vu ...)
+ TODO: check
+CVE-2019-25266 (Wondershare Application Framework Service 2.4.3.231 contains an unquot ...)
+ TODO: check
+CVE-2026-25727 (time provides date and time handling in Rust. From 0.3.6 to before 0.3 ...)
- rust-time 0.3.47-1
[trixie] - rust-time <no-dsa> (Minor issue)
[bookworm] - rust-time <no-dsa> (Minor issue)
@@ -3229,6 +3437,7 @@ CVE-2026-24778 (Ghost is an open source content management system. In Ghost vers
CVE-2026-24770 (RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. ...)
NOT-FOR-US: RAGFlow
CVE-2026-24765 (PHPUnit is a testing framework for PHP. A vulnerability has been disco ...)
+ {DLA-4470-1}
- phpunit 12.5.8-1
[trixie] - phpunit <no-dsa> (Minor issue; can be fixed via point release)
[bookworm] - phpunit <no-dsa> (Minor issue; can be fixed via point release)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c50d379520cd736e6393f8d650ef167272da5a44
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c50d379520cd736e6393f8d650ef167272da5a44
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260206/d48b8ea2/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list