Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
818abb10 by security tracker role at 2026-02-24T20:13:13+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,226 +1,374 @@
-CVE-2026-2793
+CVE-2026-3131 (Improper  access control in multiple DVLS REST API endpoints in 
Devolu ...)
+       TODO: check
+CVE-2026-3105 (SummaryThis advisory addresses a SQL injection vulnerability in 
the AP ...)
+       TODO: check
+CVE-2026-3102 (A vulnerability was determined in exiftool up to 13.49 on 
macOS. This  ...)
+       TODO: check
+CVE-2026-3101 (A vulnerability was found in Intelbras TIP 635G 1.12.3.5. This 
vulnera ...)
+       TODO: check
+CVE-2026-2664 (An out of bounds read vulnerability in the grpcfuse kernel 
module pres ...)
+       TODO: check
+CVE-2026-2634 (Malicious scripts could cause desynchronization between the 
address ba ...)
+       TODO: check
+CVE-2026-2460 (A vulnerability exists in REB500 for an authenticated user with 
low-le ...)
+       TODO: check
+CVE-2026-2459 (A vulnerability exists in REB500 for an authenticated user with 
Instal ...)
+       TODO: check
+CVE-2026-27732 (WWBN AVideo is an open source video platform. Prior to version 
22.0, t ...)
+       TODO: check
+CVE-2026-27590 (Caddy is an extensible server platform that uses TLS by 
default. Prior ...)
+       TODO: check
+CVE-2026-27589 (Caddy is an extensible server platform that uses TLS by 
default. Prior ...)
+       TODO: check
+CVE-2026-27588 (Caddy is an extensible server platform that uses TLS by 
default. Prior ...)
+       TODO: check
+CVE-2026-27587 (Caddy is an extensible server platform that uses TLS by 
default. Prior ...)
+       TODO: check
+CVE-2026-27586 (Caddy is an extensible server platform that uses TLS by 
default. Prior ...)
+       TODO: check
+CVE-2026-27585 (Caddy is an extensible server platform that uses TLS by 
default. Prior ...)
+       TODO: check
+CVE-2026-27584 (Actual is a local-first personal finance tool. Prior to 
version 26.2.1 ...)
+       TODO: check
+CVE-2026-27571 (NATS-Server is a High-Performance server for NATS.io, a cloud 
and edge ...)
+       TODO: check
+CVE-2026-27568 (WWBN AVideo is an open source video platform. Prior to version 
21.0, A ...)
+       TODO: check
+CVE-2026-27567 (Payload is a free and open source headless content management 
system.  ...)
+       TODO: check
+CVE-2026-27521 (Binardat 10G08-0800GSM network switch firmware 
versionV300SP10260209an ...)
+       TODO: check
+CVE-2026-27520 (Binardat 10G08-0800GSM network switch firmware versions prior 
toV300SP ...)
+       TODO: check
+CVE-2026-27519 (Binardat 10G08-0800GSM network switch firmware 
versionV300SP10260209 a ...)
+       TODO: check
+CVE-2026-27518 (Binardat 10G08-0800GSM network switch firmware 
versionV300SP10260209 a ...)
+       TODO: check
+CVE-2026-27517 (Binardat 10G08-0800GSM network switch firmware 
versionV300SP10260209 a ...)
+       TODO: check
+CVE-2026-27516 (Binardat 10G08-0800GSM network switch firmware 
versionV300SP10260209 a ...)
+       TODO: check
+CVE-2026-27515 (Binardat 10G08-0800GSM network switch firmware versions prior 
toV300SP ...)
+       TODO: check
+CVE-2026-27507 (Binardat 10G08-0800GSM network switch firmware 
versionV300SP10260209 a ...)
+       TODO: check
+CVE-2026-27483 (MindsDB is a platform for building artificial intelligence 
from enterp ...)
+       TODO: check
+CVE-2026-27477 (Mastodon is a free, open-source social network server based on 
Activit ...)
+       TODO: check
+CVE-2026-27468 (Mastodon is a free, open-source social network server based on 
Activit ...)
+       TODO: check
+CVE-2026-27208 (bleon-ethical/api-gateway-deploy provides API gateway 
deployment. Vers ...)
+       TODO: check
+CVE-2026-27156 (NiceGUI is a Python-based UI framework. Prior to version 
3.8.0, severa ...)
+       TODO: check
+CVE-2026-26342 (Tattile Smart+, Vega, and Basic device families firmware 
versions 1.18 ...)
+       TODO: check
+CVE-2026-26341 (Tattile Smart+, Vega, and Basic device families firmware 
versions 1.18 ...)
+       TODO: check
+CVE-2026-26340 (Tattile Smart+, Vega, and Basic device families firmware 
versions 1.18 ...)
+       TODO: check
+CVE-2026-26222 (Altec DocLink (now maintained by Beyond Limits Inc.) version 
4.0.336.0 ...)
+       TODO: check
+CVE-2026-25603 (Improper Limitation of a Pathname to a Restricted Directory 
('Path Tra ...)
+       TODO: check
+CVE-2026-24241 (NVIDIA Delegated Licensing Service for all appliance platforms 
contain ...)
+       TODO: check
+CVE-2026-23984 (An Improper Input Validation vulnerability exists in Apache 
Superset t ...)
+       TODO: check
+CVE-2026-23983 (A Sensitive Data Exposure vulnerability exists in Apache 
Superset allo ...)
+       TODO: check
+CVE-2026-23982 (An Improper Authorization vulnerability exists in Apache 
Superset that ...)
+       TODO: check
+CVE-2026-23980 (Improper Neutralization of Special Elements used in a SQL 
Command ('SQ ...)
+       TODO: check
+CVE-2026-23969 (Apache Superset utilizes a configurable dictionary, 
DISALLOWED_SQL_FUN ...)
+       TODO: check
+CVE-2026-23859 (Dell Wyse Management Suite, versions prior to WMS 5.5, contain 
a Clien ...)
+       TODO: check
+CVE-2026-23858 (Dell Wyse Management Suite, versions prior to WMS 5.5, contain 
an Impr ...)
+       TODO: check
+CVE-2026-23678 (Binardat 10G08-0800GSM network switch firmware 
versionV300SP10260209 a ...)
+       TODO: check
+CVE-2026-22766 (Dell Wyse Management Suite, versions prior to WMS 5.5, contain 
an Unre ...)
+       TODO: check
+CVE-2026-22765 (Dell Wyse Management Suite, versions prior to WMS 5.5, contain 
a Missi ...)
+       TODO: check
+CVE-2026-1773 (IEC 60870-5-104: Potential Denial of Service impact on 
reception of in ...)
+       TODO: check
+CVE-2026-1772 (RTU500 web interface: An unprivileged user can read user 
management in ...)
+       TODO: check
+CVE-2026-1768 (A permission cache poisoning vulnerability in Devolutions 
Server allow ...)
+       TODO: check
+CVE-2026-0402 (A post-authentication Out-of-bounds Read vulnerability in 
SonicOS allo ...)
+       TODO: check
+CVE-2026-0401 (A post-authentication NULL Pointer Dereference vulnerability in 
SonicO ...)
+       TODO: check
+CVE-2026-0400 (A post-authentication Format String vulnerability in SonicOS 
allows a  ...)
+       TODO: check
+CVE-2026-0399 (Multiple post-authentication stack-based buffer overflow 
vulnerabiliti ...)
+       TODO: check
+CVE-2025-69985 (FUXA 1.2.8 and prior contains an Authentication Bypass 
vulnerability l ...)
+       TODO: check
+CVE-2025-67445 (TOTOLINK X5000R V9.1.0cu.2415_B20250515 contains a 
denial-of-service v ...)
+       TODO: check
+CVE-2025-63409 (Privilege escalation and improper access control in GCOM EPON 
1GE C00R ...)
+       TODO: check
+CVE-2025-62512 (Piwigo is an open source photo gallery application for the 
web. In ver ...)
+       TODO: check
+CVE-2025-47904 (Download of Code Without Integrity Check vulnerability in 
Microchip Ti ...)
+       TODO: check
+CVE-2025-33181 (NVIDIA Cumulus Linux and NVOS products contain a vulnerability 
in the  ...)
+       TODO: check
+CVE-2025-33180 (NVIDIA Cumulus Linux and NVOS products contain a vulnerability 
in the  ...)
+       TODO: check
+CVE-2025-33179 (NVIDIA Cumulus Linux and NVOS products contain a vulnerability 
in the  ...)
+       TODO: check
+CVE-2025-27555 (Airflow versions before 2.11.1 have a vulnerability that 
allows authen ...)
+       TODO: check
+CVE-2025-1789 (Local privilege escalation in Genetec Update Service. An 
authenticated ...)
+       TODO: check
+CVE-2025-1787 (Local admin could to leak information from the Genetec Update 
Service  ...)
+       TODO: check
+CVE-2025-14963 (A vulnerability identified in the Trellix HX Agent driver file 
 fekern ...)
+       TODO: check
+CVE-2025-14577 (Slican NCP/IPL/IPM/IPU devices are vulnerable to PHP Function 
Injectio ...)
+       TODO: check
+CVE-2025-13776 (Multiple Finka programs use hard-coded Firebird database 
credentials ( ...)
+       TODO: check
+CVE-2025-11165 (A sandbox escape vulnerability exists in dotCMS\u2019s 
Velocity script ...)
+       TODO: check
+CVE-2025-10010 (The CPSD CryptoPro Secure Disk application boots a small Linux 
operati ...)
+       TODO: check
+CVE-2024-56373 (DAG Author (who already has quite a lot of permissions) could 
manipula ...)
+       TODO: check
+CVE-2024-48928 (Piwigo is an open source photo gallery application for the 
web. In ver ...)
+       TODO: check
+CVE-2024-1524 (When the "Silent Just-In-Time Provisioning" feature is enabled 
for a f ...)
+       TODO: check
+CVE-2026-2793 (Memory safety bugs present in Firefox ESR 115.32, Firefox ESR 
140.7, T ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2793
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2793
-CVE-2026-2792
+CVE-2026-2792 (Memory safety bugs present in Firefox ESR 140.7, Thunderbird 
ESR 140.7 ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2792
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2792
-CVE-2026-2807
+CVE-2026-2807 (Memory safety bugs present in Firefox 147 and Thunderbird 147. 
Some of ...)
        - firefox <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2807
-CVE-2026-2791
+CVE-2026-2791 (Mitigation bypass in the Networking: Cache component. This 
vulnerabili ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2791
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2791
-CVE-2026-2790
+CVE-2026-2790 (Same-origin policy bypass in the Networking: JAR component. 
This vulne ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2790
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2790
-CVE-2026-2806
+CVE-2026-2806 (Uninitialized memory in the Graphics: Text component. This 
vulnerabili ...)
        - firefox <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2806
-CVE-2026-2789
+CVE-2026-2789 (Use-after-free in the Graphics: ImageLib component. This 
vulnerability ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2789
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2789
-CVE-2026-2788
+CVE-2026-2788 (Incorrect boundary conditions in the Audio/Video: GMP 
component. This  ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2788
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2788
-CVE-2026-2787
+CVE-2026-2787 (Use-after-free in the DOM: Window and Location component. This 
vulnera ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2787
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2787
-CVE-2026-2805
+CVE-2026-2805 (Invalid pointer in the DOM: Core & HTML component. This 
vulnerability  ...)
        - firefox <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2805
-CVE-2026-2786
+CVE-2026-2786 (Use-after-free in the JavaScript Engine component. This 
vulnerability  ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2786
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2786
-CVE-2026-2804
+CVE-2026-2804 (Use-after-free in the JavaScript: WebAssembly component. This 
vulnerab ...)
        - firefox <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2804
-CVE-2026-2785
+CVE-2026-2785 (Invalid pointer in the JavaScript Engine component. This 
vulnerability ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2785
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2785
-CVE-2026-2784
+CVE-2026-2784 (Mitigation bypass in the DOM: Security component. This 
vulnerability a ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2784
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2784
-CVE-2026-2803
+CVE-2026-2803 (Information disclosure, mitigation bypass in the Settings UI 
component ...)
        - firefox <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2803
-CVE-2026-2802
+CVE-2026-2802 (Race condition in the JavaScript: GC component. This 
vulnerability aff ...)
        - firefox <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2802
-CVE-2026-2783
+CVE-2026-2783 (Information disclosure due to JIT miscompilation in the 
JavaScript Eng ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2783
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2783
-CVE-2026-2782
+CVE-2026-2782 (Privilege escalation in the Netmonitor component. This 
vulnerability a ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2782
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2782
-CVE-2026-2801
+CVE-2026-2801 (Incorrect boundary conditions in the JavaScript: WebAssembly 
component ...)
        - firefox <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2801
-CVE-2026-2781
+CVE-2026-2781 (Integer overflow in the Libraries component in NSS. This 
vulnerability ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2781
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2781
-CVE-2026-2780
+CVE-2026-2780 (Privilege escalation in the Netmonitor component. This 
vulnerability a ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2780
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2780
-CVE-2026-2800
+CVE-2026-2800 (Spoofing issue in the WebAuthn component in Firefox for 
Android. This  ...)
        - firefox <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2800
-CVE-2026-2779
+CVE-2026-2779 (Incorrect boundary conditions in the Networking: JAR component. 
This v ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2779
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2779
-CVE-2026-2778
+CVE-2026-2778 (Sandbox escape due to incorrect boundary conditions in the DOM: 
Core & ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2778
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2778
-CVE-2026-2777
+CVE-2026-2777 (Privilege escalation in the Messaging System component. This 
vulnerabi ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2777
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2777
-CVE-2026-2776
+CVE-2026-2776 (Sandbox escape due to incorrect boundary conditions in the 
Telemetry c ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2776
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2776
-CVE-2026-2775
+CVE-2026-2775 (Mitigation bypass in the DOM: HTML Parser component. This 
vulnerabilit ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2775
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2775
-CVE-2026-2774
+CVE-2026-2774 (Integer overflow in the Audio/Video component. This 
vulnerability affe ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2774
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2774
-CVE-2026-2773
+CVE-2026-2773 (Incorrect boundary conditions in the Web Audio component. This 
vulnera ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2773
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2773
-CVE-2026-2772
+CVE-2026-2772 (Use-after-free in the Audio/Video: Playback component. This 
vulnerabil ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2772
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2772
-CVE-2026-2771
+CVE-2026-2771 (Undefined behavior in the DOM: Core & HTML component. This 
vulnerabili ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2771
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2771
-CVE-2026-2770
+CVE-2026-2770 (Use-after-free in the DOM: Bindings (WebIDL) component. This 
vulnerabi ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2770
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2770
-CVE-2026-2799
+CVE-2026-2799 (Use-after-free in the DOM: Core & HTML component. This 
vulnerability a ...)
        - firefox <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2799
-CVE-2026-2769
+CVE-2026-2769 (Use-after-free in the Storage: IndexedDB component. This 
vulnerability ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2769
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2769
-CVE-2026-2798
+CVE-2026-2798 (Use-after-free in the DOM: Core & HTML component. This 
vulnerability a ...)
        - firefox <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2798
-CVE-2026-2768
+CVE-2026-2768 (Sandbox escape in the Storage: IndexedDB component. This 
vulnerability ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2768
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2768
-CVE-2026-2767
+CVE-2026-2767 (Use-after-free in the JavaScript: WebAssembly component. This 
vulnerab ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2767
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2767
-CVE-2026-2766
+CVE-2026-2766 (Use-after-free in the JavaScript Engine: JIT component. This 
vulnerabi ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2766
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2766
-CVE-2026-2765
+CVE-2026-2765 (Use-after-free in the JavaScript Engine component. This 
vulnerability  ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2765
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2765
-CVE-2026-2797
+CVE-2026-2797 (Use-after-free in the JavaScript: GC component. This 
vulnerability aff ...)
        - firefox <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2797
-CVE-2026-2796
+CVE-2026-2796 (JIT miscompilation in the JavaScript: WebAssembly component. 
This vuln ...)
        - firefox <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2796
-CVE-2026-2764
+CVE-2026-2764 (JIT miscompilation, use-after-free in the JavaScript Engine: 
JIT compo ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2764
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2764
-CVE-2026-2763
+CVE-2026-2763 (Use-after-free in the JavaScript Engine component. This 
vulnerability  ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2763
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2763
-CVE-2026-2762
+CVE-2026-2762 (Integer overflow in the JavaScript: Standard Library component. 
This v ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2762
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2762
-CVE-2026-2761
+CVE-2026-2761 (Sandbox escape in the Graphics: WebRender component. This 
vulnerabilit ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2761
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2761
-CVE-2026-2760
+CVE-2026-2760 (Sandbox escape due to incorrect boundary conditions in the 
Graphics: W ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2760
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2760
-CVE-2026-2795
+CVE-2026-2795 (Use-after-free in the JavaScript: GC component. This 
vulnerability aff ...)
        - firefox <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2795
-CVE-2026-2759
+CVE-2026-2759 (Incorrect boundary conditions in the Graphics: ImageLib 
component. Thi ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2759
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2759
-CVE-2026-2758
+CVE-2026-2758 (Use-after-free in the JavaScript: GC component. This 
vulnerability aff ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2758
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/#CVE-2026-2758
-CVE-2026-2794
+CVE-2026-2794 (Information disclosure due to uninitialized memory in Firefox 
and Fire ...)
        - firefox <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2794
-CVE-2026-2757
+CVE-2026-2757 (Incorrect boundary conditions in the WebRTC: Audio/Video 
component. Th ...)
        - firefox <unfixed>
        - firefox-esr <unfixed>
        NOTE: 
https://www.mozilla.org/en-US/security/advisories/mfsa2026-13/#CVE-2026-2757
@@ -496,7 +644,7 @@ CVE-2026-24314 (Under certain conditions SAP S/4HANA 
(Manage Payment Media) allo
        NOT-FOR-US: SAP
 CVE-2026-23694 (Aruba HiSpeed Cache (aruba-hispeed-cache) WordPress plugin 
versions pr ...)
        NOT-FOR-US: Aruba HiSpeed Cache (aruba-hispeed-cache) WordPress plugin
-CVE-2026-23693 (ElementsKit Lite (elementskit-lite) WordPress plugin versions 
prior to ...)
+CVE-2026-23693 (ElementsKit Elementor Addons \u2013 Advanced Widgets & 
Templates Addon ...)
        NOT-FOR-US: WordPress plugin
 CVE-2026-23521 (Versions of the Traccar open-source GPS tracking system up to 
and incl ...)
        NOT-FOR-US: Traccar



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/818abb10f08f299787847591abd68a0ee73040c4

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/818abb10f08f299787847591abd68a0ee73040c4
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to