[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Mon Mar 23 20:35:55 GMT 2026
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
ec51229c by Salvatore Bonaccorso at 2026-03-23T21:34:39+01:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -16,117 +16,117 @@ CVE-2026-4596 (A vulnerability was identified in projectworlds Lawyer Management
CVE-2026-4595 (A vulnerability was determined in code-projects Exam Form Submission 1 ...)
NOT-FOR-US: code-projects
CVE-2026-4594 (A vulnerability has been found in erupts erupt up to 1.13.3. Affected ...)
- TODO: check
+ NOT-FOR-US: erupt
CVE-2026-4593 (A flaw has been found in erupts erupt bis 1.13.3. Affected by this vul ...)
- TODO: check
+ NOT-FOR-US: erupt
CVE-2026-4592 (A security vulnerability has been detected in kalcaddle kodbox 1.64. T ...)
- TODO: check
+ NOT-FOR-US: kalcaddle kodbox
CVE-2026-4591 (A weakness has been identified in kalcaddle kodbox 1.64. This affects ...)
- TODO: check
+ NOT-FOR-US: kalcaddle kodbox
CVE-2026-4590 (A security flaw has been discovered in kalcaddle kodbox 1.64. The impa ...)
- TODO: check
+ NOT-FOR-US: kalcaddle kodbox
CVE-2026-4589 (A vulnerability was identified in kalcaddle kodbox 1.64. The affected ...)
- TODO: check
+ NOT-FOR-US: kalcaddle kodbox
CVE-2026-4588 (A vulnerability was determined in kalcaddle kodbox 1.64. Impacted is t ...)
- TODO: check
+ NOT-FOR-US: kalcaddle kodbox
CVE-2026-4587 (A vulnerability was found in HybridAuth up to 3.12.2. This issue affec ...)
- TODO: check
+ NOT-FOR-US: HybridAuth
CVE-2026-4586 (A vulnerability was found in CodePhiliaX Chat2DB up to 0.3.7. This aff ...)
- TODO: check
+ NOT-FOR-US: CodePhiliaX Chat2DB
CVE-2026-4585 (A vulnerability has been found in Tiandy Easy7 Integrated Management P ...)
- TODO: check
+ NOT-FOR-US: Tiandy Easy7 Integrated Management Platform
CVE-2026-4584 (A flaw has been found in Shenzhen HCC Technology MPOS M6 PLUS 1V.31-N. ...)
- TODO: check
+ NOT-FOR-US: Shenzhen HCC Technology MPOS M6 PLUS
CVE-2026-4583 (A vulnerability was detected in Shenzhen HCC Technology MPOS M6 PLUS 1 ...)
- TODO: check
+ NOT-FOR-US: Shenzhen HCC Technology MPOS M6 PLUS
CVE-2026-4582 (A security vulnerability has been detected in Shenzhen HCC Technology ...)
- TODO: check
+ NOT-FOR-US: Shenzhen HCC Technology MPOS M6 PLUS
CVE-2026-4581 (A weakness has been identified in code-projects Simple Laundry System ...)
NOT-FOR-US: code-projects
CVE-2026-4580 (A security flaw has been discovered in code-projects Simple Laundry Sy ...)
NOT-FOR-US: code-projects
CVE-2026-4404 (Use of hard coded credentials in GoHarbor Harbor version 2.15.0 and be ...)
- TODO: check
+ NOT-FOR-US: Harbor
CVE-2026-3635 (Summary When trustProxy is configured with a restrictive trust functio ...)
TODO: check
CVE-2026-33723 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33719 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33717 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33716 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33690 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33688 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33685 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33683 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33681 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33651 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33650 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33649 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33648 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33647 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33548 (Mantis Bug Tracker (MantisBT) is an open source issue tracker. In vers ...)
TODO: check
CVE-2026-33517 (Mantis Bug Tracker (MantisBT) is an open source issue tracker. In vers ...)
TODO: check
CVE-2026-33513 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33512 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33507 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33502 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33501 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33500 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33499 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33493 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33492 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33488 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33485 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33483 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33482 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33480 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33479 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33478 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33354 (WWBN AVideo is an open source video platform. In versions up to and in ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33352 (WWBN AVideo is an open source video platform. Prior to version 26.0, a ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33351 (WWBN AVideo is an open source video platform. Prior to version 26.0, a ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-33297 (WWBN AVideo is an open source video platform. Prior to version 26.0, t ...)
- TODO: check
+ NOT-FOR-US: WWBN AVideo
CVE-2026-32969 (An unauthenticated remote attacker can exploit a Pre-Auth blind SQL In ...)
- TODO: check
+ NOT-FOR-US: MB connect line
CVE-2026-32968 (Due to the improper neutralisation of special elements used in an OS c ...)
- TODO: check
+ NOT-FOR-US: MB connect line
CVE-2026-32879 (New API is a large language mode (LLM) gateway and artificial intellig ...)
- TODO: check
+ NOT-FOR-US: New API
CVE-2026-32852 (MailEnable versions prior to10.55 contain a reflected cross-site scrip ...)
NOT-FOR-US: MailEnable
CVE-2026-32851 (MailEnable versions prior to10.55 contain a reflected cross-site scrip ...)
@@ -134,7 +134,7 @@ CVE-2026-32851 (MailEnable versions prior to10.55 contain a reflected cross-site
CVE-2026-32850 (MailEnable versions prior to10.55 contain a reflected cross-site scrip ...)
NOT-FOR-US: MailEnable
CVE-2026-32845 (cgltf version 1.15 and prior contain an integer overflow vulnerability ...)
- TODO: check
+ NOT-FOR-US: cgltf
CVE-2026-31851 (Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 does ...)
TODO: check
CVE-2026-31850 (Nexxt Solutions Nebula 300+ firmware through version 12.01.01.37 store ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ec51229cb638baedc2b3fa15033bd1181d30556f
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ec51229cb638baedc2b3fa15033bd1181d30556f
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260323/2b70afb3/attachment.htm>
More information about the debian-security-tracker-commits
mailing list