Date: Sun, 08 Feb 2026 10:25:29 +0000 From: Bernard Spil <brnrd@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: a1ebf7d99444 - main - security/vuxml: Document Roundcube vulnerabilities Message-ID: <69886499.1ec53.6732fa36@gitrepo.freebsd.org>
index | next in thread | raw e-mail
The branch main has been updated by brnrd: URL: https://cgit.FreeBSD.org/ports/commit/?id=a1ebf7d994441af2f2b417a80fcc04717c54c93a commit a1ebf7d994441af2f2b417a80fcc04717c54c93a Author: Bernard Spil <brnrd@FreeBSD.org> AuthorDate: 2026-02-08 10:25:27 +0000 Commit: Bernard Spil <brnrd@FreeBSD.org> CommitDate: 2026-02-08 10:25:27 +0000 security/vuxml: Document Roundcube vulnerabilities --- security/vuxml/vuln/2026.xml | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) diff --git a/security/vuxml/vuln/2026.xml b/security/vuxml/vuln/2026.xml index 25d343d6e437..e3a24c4f089b 100644 --- a/security/vuxml/vuln/2026.xml +++ b/security/vuxml/vuln/2026.xml @@ -1,3 +1,29 @@ + <vuln vid="f301a241-04d3-11f1-a38c-8447094a420f"> + <topic>Roundcube -- Multiple vulnerabilities</topic> + <affects> + <package> + <name>roundcube</name> + <range><lt>1.6.13,1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>The Roundcube project reports:</p> + <blockquote cite="https://github.com/roundcube/roundcubemail/releases/tag/1.6.13"> + <p>Unspecified CSS injection vulnerability.</p> + <p>Remote image blocking bypass via SVG content.</p> + </blockquote> + </body> + </description> + <references> + <url>https://github.com/roundcube/roundcubemail/releases/tag/1.6.13</url> + </references> + <dates> + <discovery>2026-02-08</discovery> + <entry>2026-02-08</entry> + </dates> + </vuln> + <vuln vid="73ff246b-04b2-11f1-84fc-4ccc6adda413"> <topic>qt6-webengine -- multiple vulnerabilities</topic> <affects>home | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?69886499.1ec53.6732fa36>
