pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/doc
Module Name: pkgsrc
Committed By: leot
Date: Sun Mar 15 17:39:35 UTC 2026
Modified Files:
pkgsrc/doc: pkg-vulnerabilities
Log Message:
pkg-vulnerabilities: add last days CVEs
+ ImageMagick{,6}, binutils, caddy, calibre, capnproto, chromium, consul,
cpp-httplib, curl, dpkg,
dropbear (not fixed, possible patch under review),
erlang,
ettercap (fixed upstream, latest stable release 0.8.4 affected),
freerdp2,
giflib, php-glpi, go, gpac,
inetutils (fixed upstream, latest stable release 2.7 affected),
irrd, jetty, libarchive,
libheif (fixed upstream, latest stable release 1.21.2 affected),
libredwg (not fixed),
libsoup (not fixed),
libssh,
mold (not fixed),
openexr, openssl,
p5-Apache-Session-Generate (not fixed),
php-concrete-cms, postgresql-timescaledb, py-Glances, py-JWT, py-authlib,
py-black, py-cairosvg, py-django, py-lxml-html-clean, py-markdown,
py-multipart,
py-nltk (some fixed, other not public, unclear status),
py-pdf, py-tornado, py-wagtail,
python (fixed upstream, latest stable releases affected),
quickjs,
rustdesk-sever (assume not fixed, no information from upstream linked in the CVE),
sqlite3, vaultwarden, vim,
wordpress (fixed upstream, probably no stable releases with fix),
zabbix-server, zookeeper
To generate a diff of this commit:
cvs rdiff -u -r1.742 -r1.743 pkgsrc/doc/pkg-vulnerabilities
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/doc/pkg-vulnerabilities
diff -u pkgsrc/doc/pkg-vulnerabilities:1.742 pkgsrc/doc/pkg-vulnerabilities:1.743
--- pkgsrc/doc/pkg-vulnerabilities:1.742 Thu Mar 5 16:49:34 2026
+++ pkgsrc/doc/pkg-vulnerabilities Sun Mar 15 17:39:34 2026
@@ -1,4 +1,4 @@
-# $NetBSD: pkg-vulnerabilities,v 1.742 2026/03/05 16:49:34 leot Exp $
+# $NetBSD: pkg-vulnerabilities,v 1.743 2026/03/15 17:39:34 leot Exp $
#
#FORMAT 1.0.0
#
@@ -30018,3 +30018,189 @@ vim<9.2.0078 stack-overflow https://nvd.
wireshark<4.6.4 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-3201
wireshark<4.6.4 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2026-3202
wireshark<4.6.4 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-3203
+ImageMagick<7.1.2.16 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-28493
+ImageMagick<7.1.2.16 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-28494
+ImageMagick6<6.9.13.41 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-28494
+ImageMagick<7.1.2.16 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-28686
+ImageMagick6<6.9.13.41 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-28686
+ImageMagick<7.1.2.16 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2026-28687
+ImageMagick6<6.9.13.41 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2026-28687
+ImageMagick<7.1.2.16 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2026-28688
+ImageMagick6<6.9.13.41 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2026-28688
+ImageMagick<7.1.2.16 symlink-attack https://nvd.nist.gov/vuln/detail/CVE-2026-28689
+ImageMagick6<6.9.13.41 symlink-attack https://nvd.nist.gov/vuln/detail/CVE-2026-28689
+ImageMagick<7.1.2.16 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-28690
+ImageMagick6<6.9.13.41 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-28690
+ImageMagick<7.1.2.16 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-28691
+ImageMagick6<6.9.13.41 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-28691
+ImageMagick<7.1.2.16 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-28692
+ImageMagick6<6.9.13.41 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-28692
+ImageMagick<7.1.2.16 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-28693
+ImageMagick6<6.9.13.41 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-28693
+ImageMagick<7.1.2.16 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-30883
+ImageMagick6<6.9.13.41 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-30883
+ImageMagick<7.1.2.16 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-30931
+ImageMagick<7.1.2.16 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-30935
+ImageMagick<7.1.2.16 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-30936
+ImageMagick6<6.9.13.41 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-30936
+ImageMagick<7.1.2.16 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-30937
+ImageMagick6<6.9.13.41 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-30937
+ImageMagick<7.1.2.16 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-31853
+ImageMagick6<6.9.13.41 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-31853
+ImageMagick<7.1.2.16 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-32259
+ImageMagick6<6.9.13.41 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-32259
+binutils<2.46 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-69644
+binutils<2.46 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-69645
+binutils<2.46 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-69646
+binutils<2.46 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-69647
+binutils<2.46 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-69648
+binutils<2.46 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-69649
+binutils<2.46 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-69650
+binutils<2.46 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-69651
+binutils<2.46 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-69652
+caddy<2.11.2 improper-authentication https://nvd.nist.gov/vuln/detail/CVE-2026-30851
+caddy<2.11.2 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2026-30852
+calibre<9.5.0 path-traversal https://nvd.nist.gov/vuln/detail/CVE-2026-30853
+capnproto<1.4.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2026-32239
+capnproto<1.4.0 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2026-32240
+chromium<145.0.7632.159 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-3536
+chromium<145.0.7632.159 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-3538
+chromium<145.0.7632.159 heap-corruption https://nvd.nist.gov/vuln/detail/CVE-2026-3539
+chromium<145.0.7632.159 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-3540
+chromium<145.0.7632.159 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-3541
+chromium<145.0.7632.159 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-3542
+chromium<145.0.7632.159 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-3543
+chromium<145.0.7632.159 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2026-3544
+chromium<145.0.7632.159 sandbox-escape https://nvd.nist.gov/vuln/detail/CVE-2026-3545
+chromium<146.0.7680.75 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-3909
+chromium<146.0.7680.75 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2026-3910
+chromium<146.0.7680.71 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-3913
+chromium<146.0.7680.71 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-3914
+chromium<146.0.7680.71 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-3915
+chromium<146.0.7680.71 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-3916
+chromium<146.0.7680.71 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2026-3917
+chromium<146.0.7680.71 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2026-3918
+chromium<146.0.7680.71 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2026-3919
+chromium<146.0.7680.71 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-3920
+chromium<146.0.7680.71 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2026-3921
+chromium<146.0.7680.71 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2026-3922
+chromium<146.0.7680.71 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2026-3923
+chromium<146.0.7680.71 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2026-3924
+chromium<146.0.7680.71 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-3926
+chromium<146.0.7680.71 ui-spoofing https://nvd.nist.gov/vuln/detail/CVE-2026-3927
+chromium<146.0.7680.71 ui-spoofing https://nvd.nist.gov/vuln/detail/CVE-2026-3928
+chromium<146.0.7680.71 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2026-3929
+chromium<146.0.7680.71 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-3931
+chromium<146.0.7680.71 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2026-3934
+chromium<146.0.7680.71 ui-spoofing https://nvd.nist.gov/vuln/detail/CVE-2026-3935
+chromium<146.0.7680.71 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2026-3938
+chromium<146.0.7680.71 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2026-3939
+chromium<146.0.7680.71 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2026-3940
+chromium<146.0.7680.71 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2026-3941
+chromium<146.0.7680.71 ui-spoofing https://nvd.nist.gov/vuln/detail/CVE-2026-3942
+consul<1.22.5 symlink-attack https://nvd.nist.gov/vuln/detail/CVE-2026-2808
+cpp-httplib<0.35.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2026-28434
+cpp-httplib<0.35.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-28435
+cpp-httplib<0.37.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-29076
+cpp-httplib<0.37.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-31870
+curl<8.19.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2026-1965
+curl<8.19.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2026-3783
+curl<8.19.0 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2026-3784
+curl<8.19.0 use-after-free https://nvd.nist.gov/vuln/detail/CVE-2026-3805
+dpkg<1.23.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-2219
+dropbear-[0-9]* improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2026-3706
+erlang<27.3.4.9 http-request-smuggling https://nvd.nist.gov/vuln/detail/CVE-2026-23941
+erlang<27.3.4.9 path-traversal https://nvd.nist.gov/vuln/detail/CVE-2026-23942
+erlang<27.3.4.9 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-23943
+ettercap-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-3606
+freerdp2<3.24.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2026-29774
+freerdp2<3.24.0 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2026-29775
+freerdp2<3.24.0 integer-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-29776
+freerdp2<3.24.0 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-31806
+freerdp2<3.24.0 heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-31883
+freerdp2<3.24.0 floating-point-exception https://nvd.nist.gov/vuln/detail/CVE-2026-31884
+freerdp2<3.24.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-31885
+freerdp2<3.24.0 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-31897
+giflib<6.1.2 double-free https://nvd.nist.gov/vuln/detail/CVE-2026-23868
+php{56,74,81,82,83,84}-glpi<11.0.5 code-execution https://nvd.nist.gov/vuln/detail/CVE-2026-22248
+go125<1.25.8 input-validation https://nvd.nist.gov/vuln/detail/CVE-2026-25679
+go126<1.26.1 input-validation https://nvd.nist.gov/vuln/detail/CVE-2026-25679
+go126<1.26.1 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2026-27137
+go126<1.26.1 denial-of-sevice https://nvd.nist.gov/vuln/detail/CVE-2026-27138
+go125<1.25.8 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2026-27139
+go126<1.26.1 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2026-27139
+go125<1.25.8 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2026-27142
+go126<1.26.1 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2026-27142
+gpac<26.03 stack-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-4015
+gpac<26.03 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2026-4016
+inetutils-[0-9]* out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2026-32746
+irrd<4.4.5 open-redirect https://nvd.nist.gov/vuln/detail/CVE-2026-28681
+jetty<12.0.31 input-validation https://nvd.nist.gov/vuln/detail/CVE-2025-11143
+jetty<12.0.32 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-1605
+libarchive<3.8.6 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-4111
+libheif-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-3949
+libheif-[0-9]* out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-3950
+libredwg-[0-9]* denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-61154
+libsoup-[0-9]* authentication-bypass https://nvd.nist.gov/vuln/detail/CVE-2026-3099
+libssh<0.11.4 out-of-bounds-read https://nvd.nist.gov/vuln/detail/CVE-2026-3731
+mold-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-3994
+openexr<3.4.6 out-of-bounds-write https://nvd.nist.gov/vuln/detail/CVE-2026-27622
+openssl<3.6.2 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2026-2673
+p5-Apache-Session-Generate-[0-9]* weak-cryptography https://nvd.nist.gov/vuln/detail/CVE-2025-40931
+php{56,74,81,82,83,84}-concrete-cms<9.4.8 cross-site-request-forgery https://nvd.nist.gov/vuln/detail/CVE-2026-2994
+php{56,74,81,82,83,84}-concrete-cms<9.4.8 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2026-3240
+php{56,74,81,82,83,84}-concrete-cms<9.4.8 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2026-3241
+php{56,74,81,82,83,84}-concrete-cms<9.4.8 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2026-3242
+php{56,74,81,82,83,84}-concrete-cms<9.4.8 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2026-3244
+php{56,74,81,82,83,84}-concrete-cms<9.4.8 code-execution https://nvd.nist.gov/vuln/detail/CVE-2026-3452
+#png-[0-9]* heap-overflow https://nvd.nist.gov/vuln/detail/CVE-2026-3713 # pnm2png not built in pkgsrc
+postgresql-timescaledb<2.25.2 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2026-29089
+py{27,310,311,312,313,314}-Glances<4.5.1 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2026-30928
+py{27,310,311,312,313,314}-Glances<4.5.1 sql-injection https://nvd.nist.gov/vuln/detail/CVE-2026-30930
+py{27,310,311,312,313,314}-JWT<2.12.0 improper-authentication https://nvd.nist.gov/vuln/detail/CVE-2026-32597
+py{27,310,311,312,313,314}-authlib<1.6.7 improper-validation-of-certificate https://nvd.nist.gov/vuln/detail/CVE-2026-28802
+py{27,310,311,312,313,314}-black<26.3.1 path-traversal https://nvd.nist.gov/vuln/detail/CVE-2026-32274
+py{27,310,311,312,313,314}-cairosvg<2.9.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-31899
+py{27,310,311,312,313,314}-django>=5<5.2.12 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-25673
+py{27,310,311,312,313,314}-django<4.2.29 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-25673
+py{27,310,311,312,313,314}-django>=5<5.2.12 race-condition https://nvd.nist.gov/vuln/detail/CVE-2026-25674
+py{27,310,311,312,313,314}-django<4.2.29 race-condition https://nvd.nist.gov/vuln/detail/CVE-2026-25674
+py{27,310,311,312,313,314}-django-allauth<65.14.1 open-redirect https://nvd.nist.gov/vuln/detail/CVE-2026-27982
+py{27,310,311,312,313,314}-lxml-html-clean<0.4.4 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2026-28348
+py{27,310,311,312,313,314}-lxml-html-clean<0.4.4 input-validation https://nvd.nist.gov/vuln/detail/CVE-2026-28350
+py{27,310,311,312,313,314}-magic-wormhole<0.23.0 path-traversal https://nvd.nist.gov/vuln/detail/CVE-2026-32116
+py{27,310,311,312,313,314}-markdown<3.8.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-69534
+py{27,310,311,312,313,314}-multipart<1.3.1 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-28356
+py{27,310,311,312,313,314}-nltk<3.9.3 path-traversal https://nvd.nist.gov/vuln/detail/CVE-2026-0846
+py{27,310,311,312,313,314}-nltk-[0-9]* path-traversal https://nvd.nist.gov/vuln/detail/CVE-2026-0847
+py{27,310,311,312,313,314}-nltk<3.9.3 arbitrary-code-execution https://nvd.nist.gov/vuln/detail/CVE-2026-0848
+py{27,310,311,312,313,314}-pdf<6.7.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-28804
+py{27,310,311,312,313,314}-pdf<6.8.0 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-31826
+py{27,310,311,312,313,314}-tornado<6.5.5 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2026-31958
+py{27,310,311,312,313,314}-wagtail<7.2.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2026-28222
+py{27,310,311,312,313,314}-wagtail<7.2.3 cross-site-scripting https://nvd.nist.gov/vuln/detail/CVE-2026-28223
+python310-[0-9]* input-validation https://nvd.nist.gov/vuln/detail/CVE-2025-13462
+python311-[0-9]* input-validation https://nvd.nist.gov/vuln/detail/CVE-2025-13462
+python312-[0-9]* input-validation https://nvd.nist.gov/vuln/detail/CVE-2025-13462
+python313-[0-9]* input-validation https://nvd.nist.gov/vuln/detail/CVE-2025-13462
+python314-[0-9]* input-validation https://nvd.nist.gov/vuln/detail/CVE-2025-13462
+python310-[0-9]* unspecified https://nvd.nist.gov/vuln/detail/CVE-2026-2297
+python311-[0-9]* unspecified https://nvd.nist.gov/vuln/detail/CVE-2026-2297
+python312-[0-9]* unspecified https://nvd.nist.gov/vuln/detail/CVE-2026-2297
+python313-[0-9]* unspecified https://nvd.nist.gov/vuln/detail/CVE-2026-2297
+python314-[0-9]* unspecified https://nvd.nist.gov/vuln/detail/CVE-2026-2297
+quickjs<20251212 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-69653
+quickjs<20251212 denial-of-service https://nvd.nist.gov/vuln/detail/CVE-2025-69654
+rustdesk-server-[0-9]* improper-authorization https://nvd.nist.gov/vuln/detail/CVE-2026-30784
+rustdesk-server-[0-9]* improper-authentication https://nvd.nist.gov/vuln/detail/CVE-2026-30790
+rustdesk-server-[0-9]* sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2026-30796
+sqlite3<3.51.3 information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2025-70873
+vaultwarden<1.35.0 brute-force-attack https://nvd.nist.gov/vuln/detail/CVE-2026-27801
+vaultwarden<1.35.4 improper-authorization https://nvd.nist.gov/vuln/detail/CVE-2026-27802
+vaultwarden<1.35.4 improper-authorization https://nvd.nist.gov/vuln/detail/CVE-2026-27803
+vaultwarden<1.35.4 authorization-bypass https://nvd.nist.gov/vuln/detail/CVE-2026-27898
+vim<9.2.0137 null-pointer-dereference https://nvd.nist.gov/vuln/detail/CVE-2026-32249
+wordpress-[0-9]* improper-authorization https://nvd.nist.gov/vuln/detail/CVE-2026-3906
+zabbix-server-{mysql,postgresql}<6.0.41 improper-authorization https://nvd.nist.gov/vuln/detail/CVE-2026-23925
+zookeeper<3.8.6 improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2026-24281
+zookeeper<3.8.6 sensitive-information-disclosure https://nvd.nist.gov/vuln/detail/CVE-2026-24308
Home |
Main Index |
Thread Index |
Old Index