pkgsrc-Changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

CVS commit: pkgsrc/doc



Module Name:    pkgsrc
Committed By:   leot
Date:           Sun Mar 15 17:39:35 UTC 2026

Modified Files:
        pkgsrc/doc: pkg-vulnerabilities

Log Message:
pkg-vulnerabilities: add last days CVEs

+ ImageMagick{,6}, binutils, caddy, calibre, capnproto, chromium, consul,
  cpp-httplib, curl, dpkg,
  dropbear (not fixed, possible patch under review),
  erlang,
  ettercap (fixed upstream, latest stable release 0.8.4 affected),
  freerdp2,
  giflib, php-glpi, go, gpac,
  inetutils (fixed upstream, latest stable release 2.7 affected),
  irrd, jetty, libarchive,
  libheif (fixed upstream, latest stable release 1.21.2 affected),
  libredwg (not fixed),
  libsoup (not fixed),
  libssh,
  mold (not fixed),
  openexr, openssl,
  p5-Apache-Session-Generate (not fixed),
  php-concrete-cms, postgresql-timescaledb, py-Glances, py-JWT, py-authlib,
  py-black, py-cairosvg, py-django, py-lxml-html-clean, py-markdown,
  py-multipart,
  py-nltk (some fixed, other not public, unclear status),
  py-pdf, py-tornado, py-wagtail,
  python (fixed upstream, latest stable releases affected),
  quickjs,
  rustdesk-sever (assume not fixed, no information from upstream linked in the CVE),
  sqlite3, vaultwarden, vim,
  wordpress (fixed upstream, probably no stable releases with fix),
  zabbix-server, zookeeper


To generate a diff of this commit:
cvs rdiff -u -r1.742 -r1.743 pkgsrc/doc/pkg-vulnerabilities

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: pkgsrc/doc/pkg-vulnerabilities
diff -u pkgsrc/doc/pkg-vulnerabilities:1.742 pkgsrc/doc/pkg-vulnerabilities:1.743
--- pkgsrc/doc/pkg-vulnerabilities:1.742        Thu Mar  5 16:49:34 2026
+++ pkgsrc/doc/pkg-vulnerabilities      Sun Mar 15 17:39:34 2026
@@ -1,4 +1,4 @@
-# $NetBSD: pkg-vulnerabilities,v 1.742 2026/03/05 16:49:34 leot Exp $
+# $NetBSD: pkg-vulnerabilities,v 1.743 2026/03/15 17:39:34 leot Exp $
 #
 #FORMAT 1.0.0
 #
@@ -30018,3 +30018,189 @@ vim<9.2.0078  stack-overflow  https://nvd.
 wireshark<4.6.4        denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-3201
 wireshark<4.6.4        null-pointer-dereference        https://nvd.nist.gov/vuln/detail/CVE-2026-3202
 wireshark<4.6.4        out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-3203
+ImageMagick<7.1.2.16   integer-overflow        https://nvd.nist.gov/vuln/detail/CVE-2026-28493
+ImageMagick<7.1.2.16   stack-overflow  https://nvd.nist.gov/vuln/detail/CVE-2026-28494
+ImageMagick6<6.9.13.41 stack-overflow  https://nvd.nist.gov/vuln/detail/CVE-2026-28494
+ImageMagick<7.1.2.16   heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-28686
+ImageMagick6<6.9.13.41 heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-28686
+ImageMagick<7.1.2.16   use-after-free  https://nvd.nist.gov/vuln/detail/CVE-2026-28687
+ImageMagick6<6.9.13.41 use-after-free  https://nvd.nist.gov/vuln/detail/CVE-2026-28687
+ImageMagick<7.1.2.16   use-after-free  https://nvd.nist.gov/vuln/detail/CVE-2026-28688
+ImageMagick6<6.9.13.41 use-after-free  https://nvd.nist.gov/vuln/detail/CVE-2026-28688
+ImageMagick<7.1.2.16   symlink-attack  https://nvd.nist.gov/vuln/detail/CVE-2026-28689
+ImageMagick6<6.9.13.41 symlink-attack  https://nvd.nist.gov/vuln/detail/CVE-2026-28689
+ImageMagick<7.1.2.16   stack-overflow  https://nvd.nist.gov/vuln/detail/CVE-2026-28690
+ImageMagick6<6.9.13.41 stack-overflow  https://nvd.nist.gov/vuln/detail/CVE-2026-28690
+ImageMagick<7.1.2.16   denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-28691
+ImageMagick6<6.9.13.41 denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-28691
+ImageMagick<7.1.2.16   out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-28692
+ImageMagick6<6.9.13.41 out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-28692
+ImageMagick<7.1.2.16   out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-28693
+ImageMagick6<6.9.13.41 out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-28693
+ImageMagick<7.1.2.16   heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-30883
+ImageMagick6<6.9.13.41 heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-30883
+ImageMagick<7.1.2.16   heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-30931
+ImageMagick<7.1.2.16   out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-30935
+ImageMagick<7.1.2.16   heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-30936
+ImageMagick6<6.9.13.41 heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-30936
+ImageMagick<7.1.2.16   heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-30937
+ImageMagick6<6.9.13.41 heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-30937
+ImageMagick<7.1.2.16   heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-31853
+ImageMagick6<6.9.13.41 heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-31853
+ImageMagick<7.1.2.16   stack-overflow  https://nvd.nist.gov/vuln/detail/CVE-2026-32259
+ImageMagick6<6.9.13.41 stack-overflow  https://nvd.nist.gov/vuln/detail/CVE-2026-32259
+binutils<2.46  denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2025-69644
+binutils<2.46  denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2025-69645
+binutils<2.46  denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2025-69646
+binutils<2.46  denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2025-69647
+binutils<2.46  denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2025-69648
+binutils<2.46  denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2025-69649
+binutils<2.46  denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2025-69650
+binutils<2.46  denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2025-69651
+binutils<2.46  denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2025-69652
+caddy<2.11.2   improper-authentication https://nvd.nist.gov/vuln/detail/CVE-2026-30851
+caddy<2.11.2   sensitive-information-disclosure        https://nvd.nist.gov/vuln/detail/CVE-2026-30852
+calibre<9.5.0  path-traversal  https://nvd.nist.gov/vuln/detail/CVE-2026-30853
+capnproto<1.4.0        http-request-smuggling  https://nvd.nist.gov/vuln/detail/CVE-2026-32239
+capnproto<1.4.0        http-request-smuggling  https://nvd.nist.gov/vuln/detail/CVE-2026-32240
+chromium<145.0.7632.159        integer-overflow        https://nvd.nist.gov/vuln/detail/CVE-2026-3536
+chromium<145.0.7632.159        integer-overflow        https://nvd.nist.gov/vuln/detail/CVE-2026-3538
+chromium<145.0.7632.159        heap-corruption https://nvd.nist.gov/vuln/detail/CVE-2026-3539
+chromium<145.0.7632.159        out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-3540
+chromium<145.0.7632.159        out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-3541
+chromium<145.0.7632.159        out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-3542
+chromium<145.0.7632.159        out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-3543
+chromium<145.0.7632.159        out-of-bounds-write     https://nvd.nist.gov/vuln/detail/CVE-2026-3544
+chromium<145.0.7632.159        sandbox-escape  https://nvd.nist.gov/vuln/detail/CVE-2026-3545
+chromium<146.0.7680.75 out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-3909
+chromium<146.0.7680.75 arbitrary-code-execution        https://nvd.nist.gov/vuln/detail/CVE-2026-3910
+chromium<146.0.7680.71 heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-3913
+chromium<146.0.7680.71 integer-overflow        https://nvd.nist.gov/vuln/detail/CVE-2026-3914
+chromium<146.0.7680.71 heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-3915
+chromium<146.0.7680.71 out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-3916
+chromium<146.0.7680.71 use-after-free  https://nvd.nist.gov/vuln/detail/CVE-2026-3917
+chromium<146.0.7680.71 use-after-free  https://nvd.nist.gov/vuln/detail/CVE-2026-3918
+chromium<146.0.7680.71 use-after-free  https://nvd.nist.gov/vuln/detail/CVE-2026-3919
+chromium<146.0.7680.71 out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-3920
+chromium<146.0.7680.71 use-after-free  https://nvd.nist.gov/vuln/detail/CVE-2026-3921
+chromium<146.0.7680.71 use-after-free  https://nvd.nist.gov/vuln/detail/CVE-2026-3922
+chromium<146.0.7680.71 use-after-free  https://nvd.nist.gov/vuln/detail/CVE-2026-3923
+chromium<146.0.7680.71 use-after-free  https://nvd.nist.gov/vuln/detail/CVE-2026-3924
+chromium<146.0.7680.71 out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-3926
+chromium<146.0.7680.71 ui-spoofing     https://nvd.nist.gov/vuln/detail/CVE-2026-3927
+chromium<146.0.7680.71 ui-spoofing     https://nvd.nist.gov/vuln/detail/CVE-2026-3928
+chromium<146.0.7680.71 information-disclosure  https://nvd.nist.gov/vuln/detail/CVE-2026-3929
+chromium<146.0.7680.71 heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-3931
+chromium<146.0.7680.71 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2026-3934
+chromium<146.0.7680.71 ui-spoofing     https://nvd.nist.gov/vuln/detail/CVE-2026-3935
+chromium<146.0.7680.71 information-disclosure  https://nvd.nist.gov/vuln/detail/CVE-2026-3938
+chromium<146.0.7680.71 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2026-3939
+chromium<146.0.7680.71 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2026-3940
+chromium<146.0.7680.71 security-bypass https://nvd.nist.gov/vuln/detail/CVE-2026-3941
+chromium<146.0.7680.71 ui-spoofing     https://nvd.nist.gov/vuln/detail/CVE-2026-3942
+consul<1.22.5  symlink-attack  https://nvd.nist.gov/vuln/detail/CVE-2026-2808
+cpp-httplib<0.35.0     sensitive-information-disclosure        https://nvd.nist.gov/vuln/detail/CVE-2026-28434
+cpp-httplib<0.35.0     denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-28435
+cpp-httplib<0.37.0     denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-29076
+cpp-httplib<0.37.1     denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-31870
+curl<8.19.0    sensitive-information-disclosure        https://nvd.nist.gov/vuln/detail/CVE-2026-1965
+curl<8.19.0    sensitive-information-disclosure        https://nvd.nist.gov/vuln/detail/CVE-2026-3783
+curl<8.19.0    sensitive-information-disclosure        https://nvd.nist.gov/vuln/detail/CVE-2026-3784
+curl<8.19.0    use-after-free  https://nvd.nist.gov/vuln/detail/CVE-2026-3805
+dpkg<1.23.6    denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-2219
+dropbear-[0-9]*        improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2026-3706
+erlang<27.3.4.9        http-request-smuggling  https://nvd.nist.gov/vuln/detail/CVE-2026-23941
+erlang<27.3.4.9        path-traversal  https://nvd.nist.gov/vuln/detail/CVE-2026-23942
+erlang<27.3.4.9        denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-23943
+ettercap-[0-9]*        out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-3606
+freerdp2<3.24.0        out-of-bounds-write     https://nvd.nist.gov/vuln/detail/CVE-2026-29774
+freerdp2<3.24.0        out-of-bounds-write     https://nvd.nist.gov/vuln/detail/CVE-2026-29775
+freerdp2<3.24.0        integer-overflow        https://nvd.nist.gov/vuln/detail/CVE-2026-29776
+freerdp2<3.24.0        heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-31806
+freerdp2<3.24.0        heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-31883
+freerdp2<3.24.0        floating-point-exception        https://nvd.nist.gov/vuln/detail/CVE-2026-31884
+freerdp2<3.24.0        out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-31885
+freerdp2<3.24.0        out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-31897
+giflib<6.1.2   double-free     https://nvd.nist.gov/vuln/detail/CVE-2026-23868
+php{56,74,81,82,83,84}-glpi<11.0.5     code-execution  https://nvd.nist.gov/vuln/detail/CVE-2026-22248
+go125<1.25.8   input-validation        https://nvd.nist.gov/vuln/detail/CVE-2026-25679
+go126<1.26.1   input-validation        https://nvd.nist.gov/vuln/detail/CVE-2026-25679
+go126<1.26.1   improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2026-27137
+go126<1.26.1   denial-of-sevice        https://nvd.nist.gov/vuln/detail/CVE-2026-27138
+go125<1.25.8   information-disclosure  https://nvd.nist.gov/vuln/detail/CVE-2026-27139
+go126<1.26.1   information-disclosure  https://nvd.nist.gov/vuln/detail/CVE-2026-27139
+go125<1.25.8   cross-site-scripting    https://nvd.nist.gov/vuln/detail/CVE-2026-27142
+go126<1.26.1   cross-site-scripting    https://nvd.nist.gov/vuln/detail/CVE-2026-27142
+gpac<26.03     stack-overflow  https://nvd.nist.gov/vuln/detail/CVE-2026-4015
+gpac<26.03     out-of-bounds-write     https://nvd.nist.gov/vuln/detail/CVE-2026-4016
+inetutils-[0-9]*       out-of-bounds-write     https://nvd.nist.gov/vuln/detail/CVE-2026-32746
+irrd<4.4.5     open-redirect   https://nvd.nist.gov/vuln/detail/CVE-2026-28681
+jetty<12.0.31  input-validation        https://nvd.nist.gov/vuln/detail/CVE-2025-11143
+jetty<12.0.32  denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-1605
+libarchive<3.8.6       denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-4111
+libheif-[0-9]* out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-3949
+libheif-[0-9]* out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-3950
+libredwg-[0-9]*        denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2025-61154
+libsoup-[0-9]* authentication-bypass   https://nvd.nist.gov/vuln/detail/CVE-2026-3099
+libssh<0.11.4  out-of-bounds-read      https://nvd.nist.gov/vuln/detail/CVE-2026-3731
+mold-[0-9]*    heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-3994
+openexr<3.4.6  out-of-bounds-write     https://nvd.nist.gov/vuln/detail/CVE-2026-27622
+openssl<3.6.2  security-bypass https://nvd.nist.gov/vuln/detail/CVE-2026-2673
+p5-Apache-Session-Generate-[0-9]*      weak-cryptography       https://nvd.nist.gov/vuln/detail/CVE-2025-40931
+php{56,74,81,82,83,84}-concrete-cms<9.4.8      cross-site-request-forgery      https://nvd.nist.gov/vuln/detail/CVE-2026-2994
+php{56,74,81,82,83,84}-concrete-cms<9.4.8      cross-site-scripting    https://nvd.nist.gov/vuln/detail/CVE-2026-3240
+php{56,74,81,82,83,84}-concrete-cms<9.4.8      cross-site-scripting    https://nvd.nist.gov/vuln/detail/CVE-2026-3241
+php{56,74,81,82,83,84}-concrete-cms<9.4.8      cross-site-scripting    https://nvd.nist.gov/vuln/detail/CVE-2026-3242
+php{56,74,81,82,83,84}-concrete-cms<9.4.8      cross-site-scripting    https://nvd.nist.gov/vuln/detail/CVE-2026-3244
+php{56,74,81,82,83,84}-concrete-cms<9.4.8      code-execution  https://nvd.nist.gov/vuln/detail/CVE-2026-3452
+#png-[0-9]*    heap-overflow   https://nvd.nist.gov/vuln/detail/CVE-2026-3713  # pnm2png not built in pkgsrc
+postgresql-timescaledb<2.25.2  arbitrary-code-execution        https://nvd.nist.gov/vuln/detail/CVE-2026-29089
+py{27,310,311,312,313,314}-Glances<4.5.1       sensitive-information-disclosure        https://nvd.nist.gov/vuln/detail/CVE-2026-30928
+py{27,310,311,312,313,314}-Glances<4.5.1       sql-injection   https://nvd.nist.gov/vuln/detail/CVE-2026-30930
+py{27,310,311,312,313,314}-JWT<2.12.0  improper-authentication https://nvd.nist.gov/vuln/detail/CVE-2026-32597
+py{27,310,311,312,313,314}-authlib<1.6.7       improper-validation-of-certificate      https://nvd.nist.gov/vuln/detail/CVE-2026-28802
+py{27,310,311,312,313,314}-black<26.3.1        path-traversal  https://nvd.nist.gov/vuln/detail/CVE-2026-32274
+py{27,310,311,312,313,314}-cairosvg<2.9.0      denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-31899
+py{27,310,311,312,313,314}-django>=5<5.2.12    denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-25673
+py{27,310,311,312,313,314}-django<4.2.29       denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-25673
+py{27,310,311,312,313,314}-django>=5<5.2.12    race-condition  https://nvd.nist.gov/vuln/detail/CVE-2026-25674
+py{27,310,311,312,313,314}-django<4.2.29       race-condition  https://nvd.nist.gov/vuln/detail/CVE-2026-25674
+py{27,310,311,312,313,314}-django-allauth<65.14.1      open-redirect   https://nvd.nist.gov/vuln/detail/CVE-2026-27982
+py{27,310,311,312,313,314}-lxml-html-clean<0.4.4       cross-site-scripting    https://nvd.nist.gov/vuln/detail/CVE-2026-28348
+py{27,310,311,312,313,314}-lxml-html-clean<0.4.4       input-validation        https://nvd.nist.gov/vuln/detail/CVE-2026-28350
+py{27,310,311,312,313,314}-magic-wormhole<0.23.0       path-traversal  https://nvd.nist.gov/vuln/detail/CVE-2026-32116
+py{27,310,311,312,313,314}-markdown<3.8.1      denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2025-69534
+py{27,310,311,312,313,314}-multipart<1.3.1     denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-28356
+py{27,310,311,312,313,314}-nltk<3.9.3  path-traversal  https://nvd.nist.gov/vuln/detail/CVE-2026-0846
+py{27,310,311,312,313,314}-nltk-[0-9]* path-traversal  https://nvd.nist.gov/vuln/detail/CVE-2026-0847
+py{27,310,311,312,313,314}-nltk<3.9.3  arbitrary-code-execution        https://nvd.nist.gov/vuln/detail/CVE-2026-0848
+py{27,310,311,312,313,314}-pdf<6.7.5   denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-28804
+py{27,310,311,312,313,314}-pdf<6.8.0   denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-31826
+py{27,310,311,312,313,314}-tornado<6.5.5       denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2026-31958
+py{27,310,311,312,313,314}-wagtail<7.2.3       cross-site-scripting    https://nvd.nist.gov/vuln/detail/CVE-2026-28222
+py{27,310,311,312,313,314}-wagtail<7.2.3       cross-site-scripting    https://nvd.nist.gov/vuln/detail/CVE-2026-28223
+python310-[0-9]*       input-validation        https://nvd.nist.gov/vuln/detail/CVE-2025-13462
+python311-[0-9]*       input-validation        https://nvd.nist.gov/vuln/detail/CVE-2025-13462
+python312-[0-9]*       input-validation        https://nvd.nist.gov/vuln/detail/CVE-2025-13462
+python313-[0-9]*       input-validation        https://nvd.nist.gov/vuln/detail/CVE-2025-13462
+python314-[0-9]*       input-validation        https://nvd.nist.gov/vuln/detail/CVE-2025-13462
+python310-[0-9]*       unspecified     https://nvd.nist.gov/vuln/detail/CVE-2026-2297
+python311-[0-9]*       unspecified     https://nvd.nist.gov/vuln/detail/CVE-2026-2297
+python312-[0-9]*       unspecified     https://nvd.nist.gov/vuln/detail/CVE-2026-2297
+python313-[0-9]*       unspecified     https://nvd.nist.gov/vuln/detail/CVE-2026-2297
+python314-[0-9]*       unspecified     https://nvd.nist.gov/vuln/detail/CVE-2026-2297
+quickjs<20251212       denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2025-69653
+quickjs<20251212       denial-of-service       https://nvd.nist.gov/vuln/detail/CVE-2025-69654
+rustdesk-server-[0-9]* improper-authorization  https://nvd.nist.gov/vuln/detail/CVE-2026-30784
+rustdesk-server-[0-9]* improper-authentication https://nvd.nist.gov/vuln/detail/CVE-2026-30790
+rustdesk-server-[0-9]* sensitive-information-disclosure        https://nvd.nist.gov/vuln/detail/CVE-2026-30796
+sqlite3<3.51.3 information-disclosure  https://nvd.nist.gov/vuln/detail/CVE-2025-70873
+vaultwarden<1.35.0     brute-force-attack      https://nvd.nist.gov/vuln/detail/CVE-2026-27801
+vaultwarden<1.35.4     improper-authorization  https://nvd.nist.gov/vuln/detail/CVE-2026-27802
+vaultwarden<1.35.4     improper-authorization  https://nvd.nist.gov/vuln/detail/CVE-2026-27803
+vaultwarden<1.35.4     authorization-bypass    https://nvd.nist.gov/vuln/detail/CVE-2026-27898
+vim<9.2.0137   null-pointer-dereference        https://nvd.nist.gov/vuln/detail/CVE-2026-32249
+wordpress-[0-9]*       improper-authorization  https://nvd.nist.gov/vuln/detail/CVE-2026-3906
+zabbix-server-{mysql,postgresql}<6.0.41        improper-authorization  https://nvd.nist.gov/vuln/detail/CVE-2026-23925
+zookeeper<3.8.6        improper-certificate-validation https://nvd.nist.gov/vuln/detail/CVE-2026-24281
+zookeeper<3.8.6        sensitive-information-disclosure        https://nvd.nist.gov/vuln/detail/CVE-2026-24308



Home | Main Index | Thread Index | Old Index