[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Mar 11 09:08:15 GMT 2026
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
c7cff454 by Salvatore Bonaccorso at 2026-03-11T10:07:49+01:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -19,9 +19,9 @@ CVE-2026-3222 (The WP Maps plugin for WordPress is vulnerable to time-based blin
CVE-2026-31844 (An authenticated SQL Injection vulnerability (CWE-89) exists in the Ko ...)
- koha <itp> (bug #702134)
CVE-2026-31838 (Istio is an open platform to connect, manage, and secure microservices ...)
- TODO: check
+ NOT-FOR-US: Istio
CVE-2026-31837 (Istio is an open platform to connect, manage, and secure microservices ...)
- TODO: check
+ NOT-FOR-US: Istio
CVE-2026-31834 (Umbraco is an ASP.NET CMS. From 15.3.1 to before 16.5.1 and 17.2.2, A ...)
NOT-FOR-US: Umbraco CMS
CVE-2026-31833 (Umbraco is an ASP.NET CMS. From 16.2.0 to before 16.5.1 and 17.2.2, An ...)
@@ -29,13 +29,13 @@ CVE-2026-31833 (Umbraco is an ASP.NET CMS. From 16.2.0 to before 16.5.1 and 17.2
CVE-2026-31832 (Umbraco is an ASP.NET CMS. From 14.0.0 to before 16.5.1 and 17.2.2, A ...)
NOT-FOR-US: Umbraco CMS
CVE-2026-31830 (sigstore-ruby is a pure Ruby implementation of the sigstore verify com ...)
- TODO: check
+ NOT-FOR-US: sigstore-ruby (Ruby implementation of sigstore)
CVE-2026-31829 (Flowise is a drag & drop user interface to build a customized large la ...)
NOT-FOR-US: Flowise
CVE-2026-31828 (Parse Server is an open source backend that can be deployed to any inf ...)
- TODO: check
+ NOT-FOR-US: Parse Server
CVE-2026-31827 (Alienbin is an anonymous code and text sharing web service. In 1.0.0 a ...)
- TODO: check
+ NOT-FOR-US: Alienbin
CVE-2026-31826 (pypdf is a free and open-source pure-python PDF library. Prior to 6.8. ...)
TODO: check
CVE-2026-31825 (Sylius is an Open Source eCommerce Framework on Symfony. Sylius API fi ...)
@@ -53,7 +53,7 @@ CVE-2026-31820 (Sylius is an Open Source eCommerce Framework on Symfony. An auth
CVE-2026-31819 (Sylius is an Open Source eCommerce Framework on Symfony. CurrencySwitc ...)
NOT-FOR-US: Sylius
CVE-2026-31817 (OliveTin gives access to predefined shell commands from a web interfac ...)
- TODO: check
+ NOT-FOR-US: OliveTin
CVE-2026-31815 (Unicorn adds modern reactive component functionality to your Django te ...)
TODO: check
CVE-2026-31812 (Quinn is a pure-Rust, async-compatible implementation of the IETF QUIC ...)
@@ -95,7 +95,7 @@ CVE-2026-30947 (Parse Server is an open source backend that can be deployed to a
CVE-2026-30946 (Parse Server is an open source backend that can be deployed to any inf ...)
NOT-FOR-US: Parse Server
CVE-2026-30837 (Elysia is a Typescript framework for request validation, type inferenc ...)
- TODO: check
+ NOT-FOR-US: Elysia
CVE-2026-2918 (The Happy Addons for Elementor plugin for WordPress is vulnerable to I ...)
NOT-FOR-US: WordPress plugin
CVE-2026-2917 (The Happy Addons for Elementor plugin for WordPress is vulnerable to I ...)
@@ -117,11 +117,11 @@ CVE-2026-2358 (The WP ULike plugin for WordPress is vulnerable to Stored Cross-S
CVE-2026-2324 (The LatePoint \u2013 Calendar Booking Plugin for Appointments and Even ...)
NOT-FOR-US: WordPress plugin
CVE-2026-29793 (Feathersjs is a framework for creating web APIs and real-time applicat ...)
- TODO: check
+ NOT-FOR-US: Feathersjs
CVE-2026-29792 (Feathersjs is a framework for creating web APIs and real-time applicat ...)
- TODO: check
+ NOT-FOR-US: Feathersjs
CVE-2026-29515 (MiCode FileExplorer contains an authentication bypass vulnerability in ...)
- TODO: check
+ NOT-FOR-US: MiCode FileExplorer
CVE-2026-28807 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
TODO: check
CVE-2026-28806 (Improper Authorization vulnerability in nerves-hub nerves_hub_web allo ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c7cff45484efd187c95bc2a0491899cfb4dd9dc4
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c7cff45484efd187c95bc2a0491899cfb4dd9dc4
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260311/4efc3dc2/attachment.htm>
More information about the debian-security-tracker-commits
mailing list