[Git][security-tracker-team/security-tracker][master] Process some NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Feb 12 21:06:53 GMT 2026



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
16177a3f by Salvatore Bonaccorso at 2026-02-12T22:06:28+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,5 +1,5 @@
 CVE-2026-2276 (Reflected Cross-Site Scripting (XSS) vulnerability in the Wix web appl ...)
-	TODO: check
+	NOT-FOR-US: Wix web application
 CVE-2026-26219 (newbee-mall stores and verifies user passwords using an unsalted MD5 h ...)
 	NOT-FOR-US: newbee-mall
 CVE-2026-26218 (newbee-mall includes pre-seeded administrator accounts in its database ...)
@@ -29,17 +29,17 @@ CVE-2026-24895 (FrankenPHP is a modern application server for PHP. Prior to 1.11
 CVE-2026-24894 (FrankenPHP is a modern application server for PHP. Prior to 1.11.2, wh ...)
 	NOT-FOR-US: FrankenPHP
 CVE-2026-24044 (Element Server Suite Community Edition (ESS Community) deploys a Matri ...)
-	TODO: check
+	NOT-FOR-US: Element Server Suite Community Edition (ESS Community)
 CVE-2026-22821 (mreporting is the more reporting GLPI plugin. Prior to 1.9.4, there is ...)
-	TODO: check
+	NOT-FOR-US: GLPI plugin
 CVE-2026-21722 (Public dashboards with annotations enabled did not limit their annotat ...)
 	TODO: check
 CVE-2026-21438 (webtransport-go is an implementation of the WebTransport protocol. Pri ...)
-	TODO: check
+	NOT-FOR-US: webtransport-go
 CVE-2026-21435 (webtransport-go is an implementation of the WebTransport protocol. Pri ...)
-	TODO: check
+	NOT-FOR-US: webtransport-go
 CVE-2026-21434 (webtransport-go is an implementation of the WebTransport protocol. Fro ...)
-	TODO: check
+	NOT-FOR-US: webtransport-go
 CVE-2026-1671 (The Activity Log for WordPress plugin for WordPress is vulnerable to u ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2026-1356 (The Converter for Media \u2013 Optimize images | Convert WebP & AVIF p ...)
@@ -51,17 +51,17 @@ CVE-2026-1316 (The Customer Reviews for WooCommerce plugin for WordPress is vuln
 CVE-2026-1104 (The FastDup \u2013 Fastest WordPress Migration & Duplicator plugin for ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2025-70981 (CordysCRM 1.4.1 is vulnerable to SQL Injection in the employee list qu ...)
-	TODO: check
+	NOT-FOR-US: CordysCRM
 CVE-2025-70886 (An issue in halo v.2.22.4 and before allows a remote attacker to cause ...)
-	TODO: check
+	NOT-FOR-US: Halo
 CVE-2025-70314 (webfsd 1.21 is vulnerable to a Buffer Overflow via a crafted request.  ...)
-	TODO: check
+	NOT-FOR-US: webfsd
 CVE-2025-69807 (p2r3 Bareiron commit: 8e4d4020d is vulnerable to Buffer Overflow, whic ...)
-	TODO: check
+	NOT-FOR-US: p2r3 Bareiron
 CVE-2025-69806 (p2r3 bareiron commit: 8e4d4020d contains an Out-of-bounds Read, which  ...)
-	TODO: check
+	NOT-FOR-US: p2r3 Bareiron
 CVE-2025-69752 (An issue in the "My Details" user profile functionality of Ideagen Q-P ...)
-	TODO: check
+	NOT-FOR-US: Ideagen Q-Pulse
 CVE-2025-69634 (Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0. ...)
 	TODO: check
 CVE-2025-67433 (A heap buffer overflow in the processRequest function of Open TFTP Ser ...)
@@ -671,7 +671,7 @@ CVE-2025-69872 (DiskCache (python-diskcache) through 5.6.3 uses Python pickle fo
 	NOTE: https://github.com/EthanKim88/ethan-cve-disclosures/blob/main/CVE-2025-69872-DiskCache-Pickle-Deserialization.md
 	TODO: check, check upstream (report) status
 CVE-2025-69871 (A race condition vulnerability exists in MedusaJS Medusa v2.12.2 and e ...)
-	TODO: check
+	NOT-FOR-US: Medusa
 CVE-2025-68406 (A path traversal vulnerability has been reported to affect Qsync Centr ...)
 	NOT-FOR-US: QNAP
 CVE-2025-66278 (A path traversal vulnerability has been reported to affect File Statio ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/16177a3fe64e262425a5477289500775beace83d

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/16177a3fe64e262425a5477289500775beace83d
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260212/559c52f0/attachment.htm>


More information about the debian-security-tracker-commits mailing list