[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Mar 13 20:13:42 GMT 2026



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
68681698 by security tracker role at 2026-03-13T20:13:36+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,4 +1,430 @@
-CVE-2026-4105
+CVE-2026-4111 (A flaw was identified in the RAR5 archive decompression logic of the l ...)
+	TODO: check
+CVE-2026-4092 (Path Traversal in Clasp impacting versions < 3.2.0 allows a remote att ...)
+	TODO: check
+CVE-2026-4063 (The Social Icons Widget & Block by WPZOOM plugin for WordPress is vuln ...)
+	TODO: check
+CVE-2026-3999 (A broken access control may allow an authenticated user to perform a   ...)
+	TODO: check
+CVE-2026-3986 (The Calculated Fields Form plugin for WordPress is vulnerable to Store ...)
+	TODO: check
+CVE-2026-3873 (Use of Hard-coded Credentials vulnerability in Avantra allows Accessin ...)
+	TODO: check
+CVE-2026-32746 (telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in  ...)
+	TODO: check
+CVE-2026-32745 (In JetBrains Datalore before 2026.1 session hijacking was possible due ...)
+	TODO: check
+CVE-2026-32600 (xml-security is a library that implements XML signatures and encryptio ...)
+	TODO: check
+CVE-2026-32594 (Parse Server is an open source backend that can be deployed to any inf ...)
+	TODO: check
+CVE-2026-32543 (Missing Authorization vulnerability in CyberChimps Responsive Blocks r ...)
+	TODO: check
+CVE-2026-32487 (Missing Authorization vulnerability in raratheme Lawyer Landing Page l ...)
+	TODO: check
+CVE-2026-32486 (Missing Authorization vulnerability in wptravelengine Travel Booking t ...)
+	TODO: check
+CVE-2026-32462 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32461 (Missing Authorization vulnerability in Really Simple Plugins Really Si ...)
+	TODO: check
+CVE-2026-32460 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32459 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2026-32458 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2026-32457 (Missing Authorization vulnerability in Wombat Plugins Advanced Product ...)
+	TODO: check
+CVE-2026-32456 (Cross-Site Request Forgery (CSRF) vulnerability in Janis Elsts Admin M ...)
+	TODO: check
+CVE-2026-32455 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32454 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32453 (Missing Authorization vulnerability in ThemeFusion Avada Core fusion-c ...)
+	TODO: check
+CVE-2026-32452 (Missing Authorization vulnerability in ThemeFusion Fusion Builder fusi ...)
+	TODO: check
+CVE-2026-32451 (Missing Authorization vulnerability in ThemeFusion Fusion Builder fusi ...)
+	TODO: check
+CVE-2026-32450 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32449 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32448 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32447 (Missing Authorization vulnerability in Vito Peleg Atarim atarim-visual ...)
+	TODO: check
+CVE-2026-32446 (Missing Authorization vulnerability in Syed Balkhi Contact Form by WPF ...)
+	TODO: check
+CVE-2026-32445 (Missing Authorization vulnerability in Elementor Elementor Website Bui ...)
+	TODO: check
+CVE-2026-32443 (Cross-Site Request Forgery (CSRF) vulnerability in Josh Kohlbach Produ ...)
+	TODO: check
+CVE-2026-32442 (Missing Authorization vulnerability in E2Pdf e2pdf e2pdf allows Exploi ...)
+	TODO: check
+CVE-2026-32440 (Missing Authorization vulnerability in Ex-Themes WP Food wp-food allow ...)
+	TODO: check
+CVE-2026-32439 (Missing Authorization vulnerability in WebGeniusLab BigHearts bigheart ...)
+	TODO: check
+CVE-2026-32438 (Missing Authorization vulnerability in vowelweb VW School Education vw ...)
+	TODO: check
+CVE-2026-32437 (Missing Authorization vulnerability in vowelweb VW Portfolio vw-portfo ...)
+	TODO: check
+CVE-2026-32436 (Missing Authorization vulnerability in vowelweb VW Photography vw-phot ...)
+	TODO: check
+CVE-2026-32435 (Missing Authorization vulnerability in vowelweb VW Pet Shop vw-pet-sho ...)
+	TODO: check
+CVE-2026-32434 (Missing Authorization vulnerability in vowelweb VW Fitness vw-fitness  ...)
+	TODO: check
+CVE-2026-32433 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2026-32432 (Missing Authorization vulnerability in codepeople WP Time Slots Bookin ...)
+	TODO: check
+CVE-2026-32431 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32430 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32429 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32428 (Missing Authorization vulnerability in Ays Pro Popup Like box ays-face ...)
+	TODO: check
+CVE-2026-32427 (Missing Authorization vulnerability in vowelweb VW Education Lite vw-e ...)
+	TODO: check
+CVE-2026-32426 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2026-32425 (Missing Authorization vulnerability in linknacional Payment Gateway Pi ...)
+	TODO: check
+CVE-2026-32424 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32423 (Missing Authorization vulnerability in Bowo Admin and Site Enhancement ...)
+	TODO: check
+CVE-2026-32422 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2026-32421 (Missing Authorization vulnerability in Agile Logix Post Timeline post- ...)
+	TODO: check
+CVE-2026-32420 (Cross-Site Request Forgery (CSRF) vulnerability in Ruben Garcia GamiPr ...)
+	TODO: check
+CVE-2026-32419 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32418 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2026-32417 (Missing Authorization vulnerability in wppochipp Pochipp pochipp allow ...)
+	TODO: check
+CVE-2026-32416 (Missing Authorization vulnerability in bPlugins PDF Poster pdf-poster  ...)
+	TODO: check
+CVE-2026-32415 (Path Traversal: '.../...//' vulnerability in Bogdan Bendziukov Squeeze ...)
+	TODO: check
+CVE-2026-32414 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+	TODO: check
+CVE-2026-32413 (Missing Authorization vulnerability in Maciej Bis Permalink Manager Li ...)
+	TODO: check
+CVE-2026-32412 (Server-Side Request Forgery (SSRF) vulnerability in Gift Up! Gift Up G ...)
+	TODO: check
+CVE-2026-32411 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32410 (Missing Authorization vulnerability in WBW Plugins WBW Currency Switch ...)
+	TODO: check
+CVE-2026-32409 (Missing Authorization vulnerability in WPMU DEV - Your All-in-One Word ...)
+	TODO: check
+CVE-2026-32408 (Missing Authorization vulnerability in themefusecom Brizy brizy allows ...)
+	TODO: check
+CVE-2026-32407 (Missing Authorization vulnerability in WPClever WPC Smart Wishlist for ...)
+	TODO: check
+CVE-2026-32406 (Missing Authorization vulnerability in WPClever WPC Product Bundles fo ...)
+	TODO: check
+CVE-2026-32405 (Exposure of Sensitive System Information to an Unauthorized Control Sp ...)
+	TODO: check
+CVE-2026-32404 (Missing Authorization vulnerability in Studio99 Studio99 WP Monitor st ...)
+	TODO: check
+CVE-2026-32403 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32402 (Missing Authorization vulnerability in Ays Pro Image Slider by Ays ays ...)
+	TODO: check
+CVE-2026-32401 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2026-32400 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2026-32399 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2026-32398 (Concurrent Execution using Shared Resource with Improper Synchronizati ...)
+	TODO: check
+CVE-2026-32397 (Missing Authorization vulnerability in YMC Filter & Grids ymc-smart-fi ...)
+	TODO: check
+CVE-2026-32396 (Missing Authorization vulnerability in RadiusTheme Team tlp-team allow ...)
+	TODO: check
+CVE-2026-32395 (Missing Authorization vulnerability in Xpro Xpro Addons For Beaver Bui ...)
+	TODO: check
+CVE-2026-32394 (Missing Authorization vulnerability in PublishPress PublishPress Capab ...)
+	TODO: check
+CVE-2026-32393 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2026-32392 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2026-32391 (Missing Authorization vulnerability in linethemes SmartFix smartfix al ...)
+	TODO: check
+CVE-2026-32390 (Missing Authorization vulnerability in linethemes Nanosoft nanosoft al ...)
+	TODO: check
+CVE-2026-32388 (Missing Authorization vulnerability in linethemes GLB glb allows Explo ...)
+	TODO: check
+CVE-2026-32387 (Missing Authorization vulnerability in Noor Alam Checkout for PayPal c ...)
+	TODO: check
+CVE-2026-32386 (Missing Authorization vulnerability in EnvoThemes Envo Extra envo-extr ...)
+	TODO: check
+CVE-2026-32385 (Missing Authorization vulnerability in Metagauss RegistrationMagic cus ...)
+	TODO: check
+CVE-2026-32384 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2026-32383 (Missing Authorization vulnerability in raratheme Ridhi ridhi allows Ex ...)
+	TODO: check
+CVE-2026-32382 (Missing Authorization vulnerability in raratheme Digital Download digi ...)
+	TODO: check
+CVE-2026-32381 (Missing Authorization vulnerability in raratheme App Landing Page app- ...)
+	TODO: check
+CVE-2026-32380 (Missing Authorization vulnerability in raratheme Numinous numinous all ...)
+	TODO: check
+CVE-2026-32379 (Missing Authorization vulnerability in raratheme Rara Academic rara-ac ...)
+	TODO: check
+CVE-2026-32378 (Missing Authorization vulnerability in raratheme Book Landing Page boo ...)
+	TODO: check
+CVE-2026-32377 (Missing Authorization vulnerability in raratheme Pranayama Yoga pranay ...)
+	TODO: check
+CVE-2026-32376 (Missing Authorization vulnerability in raratheme Kalon kalon allows Ex ...)
+	TODO: check
+CVE-2026-32375 (Missing Authorization vulnerability in raratheme Travel Diaries travel ...)
+	TODO: check
+CVE-2026-32374 (Missing Authorization vulnerability in raratheme The Minimal the-minim ...)
+	TODO: check
+CVE-2026-32373 (Missing Authorization vulnerability in Cozy Vision SMS Alert Order Not ...)
+	TODO: check
+CVE-2026-32372 (Exposure of Sensitive System Information to an Unauthorized Control Sp ...)
+	TODO: check
+CVE-2026-32371 (Missing Authorization vulnerability in raratheme Elegant Pink elegant- ...)
+	TODO: check
+CVE-2026-32370 (Missing Authorization vulnerability in raratheme Influencer influencer ...)
+	TODO: check
+CVE-2026-32369 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2026-32368 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2026-32367 (Improper Control of Generation of Code ('Code Injection') vulnerabilit ...)
+	TODO: check
+CVE-2026-32366 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2026-32365 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2026-32364 (Improper Control of Filename for Include/Require Statement in PHP Prog ...)
+	TODO: check
+CVE-2026-32363 (Missing Authorization vulnerability in Funlus Oy WPLifeCycle free-php- ...)
+	TODO: check
+CVE-2026-32362 (Missing Authorization vulnerability in activity-log.com WP Sessions Ti ...)
+	TODO: check
+CVE-2026-32361 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32360 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32359 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32358 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2026-32357 (Server-Side Request Forgery (SSRF) vulnerability in Katsushi Kawamori  ...)
+	TODO: check
+CVE-2026-32356 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32355 (Deserialization of Untrusted Data vulnerability in Crocoblock JetEngin ...)
+	TODO: check
+CVE-2026-32354 (Insertion of Sensitive Information Into Sent Data vulnerability in mag ...)
+	TODO: check
+CVE-2026-32353 (Server-Side Request Forgery (SSRF) vulnerability in MailerPress Team M ...)
+	TODO: check
+CVE-2026-32352 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32351 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-32350 (Missing Authorization vulnerability in wpradiant Chocolate House choco ...)
+	TODO: check
+CVE-2026-32349 (Server-Side Request Forgery (SSRF) vulnerability in Andy Fragen Embed  ...)
+	TODO: check
+CVE-2026-32348 (Missing Authorization vulnerability in MadrasThemes MAS Videos masvide ...)
+	TODO: check
+CVE-2026-32347 (Missing Authorization vulnerability in raratheme Restaurant and Cafe r ...)
+	TODO: check
+CVE-2026-32346 (Missing Authorization vulnerability in raratheme Travel Agency travel- ...)
+	TODO: check
+CVE-2026-32345 (Missing Authorization vulnerability in raratheme Perfect Portfolio per ...)
+	TODO: check
+CVE-2026-32344 (Cross-Site Request Forgery (CSRF) vulnerability in desertthemes Corpiv ...)
+	TODO: check
+CVE-2026-32343 (Cross-Site Request Forgery (CSRF) vulnerability in Magazine3 Easy Tabl ...)
+	TODO: check
+CVE-2026-32342 (Cross-Site Request Forgery (CSRF) vulnerability in Ays Pro Quiz Maker  ...)
+	TODO: check
+CVE-2026-32341 (Missing Authorization vulnerability in raratheme Benevolent benevolent ...)
+	TODO: check
+CVE-2026-32340 (Missing Authorization vulnerability in raratheme Business One Page bus ...)
+	TODO: check
+CVE-2026-32339 (Missing Authorization vulnerability in raratheme Bakes And Cakes bakes ...)
+	TODO: check
+CVE-2026-32338 (Missing Authorization vulnerability in raratheme Construction Landing  ...)
+	TODO: check
+CVE-2026-32337 (Missing Authorization vulnerability in raratheme Preschool and Kinderg ...)
+	TODO: check
+CVE-2026-32336 (Missing Authorization vulnerability in raratheme Rara Business rara-bu ...)
+	TODO: check
+CVE-2026-32335 (Missing Authorization vulnerability in raratheme The Conference the-co ...)
+	TODO: check
+CVE-2026-32334 (Missing Authorization vulnerability in raratheme JobScout jobscout all ...)
+	TODO: check
+CVE-2026-32332 (Missing Authorization vulnerability in Ays Pro Easy Form easy-form all ...)
+	TODO: check
+CVE-2026-32331 (Missing Authorization vulnerability in Israpil Textmetrics webtexttool ...)
+	TODO: check
+CVE-2026-32330 (Cross-Site Request Forgery (CSRF) vulnerability in 10Web Photo Gallery ...)
+	TODO: check
+CVE-2026-32329 (Missing Authorization vulnerability in Ays Pro Advanced Related Posts  ...)
+	TODO: check
+CVE-2026-32328 (Cross-Site Request Forgery (CSRF) vulnerability in shufflehound Lemmon ...)
+	TODO: check
+CVE-2026-32314 (Yamux is a stream multiplexer over reliable, ordered connections such  ...)
+	TODO: check
+CVE-2026-32313 (xmlseclibs is a library written in PHP for working with XML Encryption ...)
+	TODO: check
+CVE-2026-31949 (LibreChat is a ChatGPT clone with additional features. Prior to 0.8.3- ...)
+	TODO: check
+CVE-2026-31944 (LibreChat is a ChatGPT clone with additional features. From 0.8.2 to 0 ...)
+	TODO: check
+CVE-2026-31922 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2026-31919 (Missing Authorization vulnerability in Josh Kohlbach Advanced Coupons  ...)
+	TODO: check
+CVE-2026-31918 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2026-31917 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2026-31916 (Missing Authorization vulnerability in Iulia Cazan Latest Post Shortco ...)
+	TODO: check
+CVE-2026-31915 (Missing Authorization vulnerability in UX-themes Flatsome flatsome all ...)
+	TODO: check
+CVE-2026-31899 (CairoSVG is an SVG converter based on Cairo, a 2D graphics library. Pr ...)
+	TODO: check
+CVE-2026-31897 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+	TODO: check
+CVE-2026-31886 (Dagu is a workflow engine with a built-in Web user interface. Prior to ...)
+	TODO: check
+CVE-2026-31885 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+	TODO: check
+CVE-2026-31884 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+	TODO: check
+CVE-2026-31883 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+	TODO: check
+CVE-2026-31882 (Dagu is a workflow engine with a built-in Web user interface. Prior to ...)
+	TODO: check
+CVE-2026-31864 (JumpServer is an open source bastion host and an operation and mainten ...)
+	TODO: check
+CVE-2026-31814 (Yamux is a stream multiplexer over reliable, ordered connections such  ...)
+	TODO: check
+CVE-2026-31806 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+	TODO: check
+CVE-2026-31798 (JumpServer is an open source bastion host and an operation and mainten ...)
+	TODO: check
+CVE-2026-30961 (Gokapi is a self-hosted file sharing server with automatic expiration  ...)
+	TODO: check
+CVE-2026-30955 (Gokapi is a self-hosted file sharing server with automatic expiration  ...)
+	TODO: check
+CVE-2026-30943 (Gokapi is a self-hosted file sharing server with automatic expiration  ...)
+	TODO: check
+CVE-2026-30915 (SFTPGo is an open source, event-driven file transfer solution. SFTPGo  ...)
+	TODO: check
+CVE-2026-30914 (SFTPGo is an open source, event-driven file transfer solution. In SFTP ...)
+	TODO: check
+CVE-2026-30853 (calibre is a cross-platform e-book manager for viewing, converting, ed ...)
+	TODO: check
+CVE-2026-2888 (The Formidable Forms plugin for WordPress is vulnerable to an authoriz ...)
+	TODO: check
+CVE-2026-2879 (The GetGenie plugin for WordPress is vulnerable to Insecure Direct Obj ...)
+	TODO: check
+CVE-2026-2859 (Improper permission enforcement in Checkmk versions 2.4.0 before 2.4.0 ...)
+	TODO: check
+CVE-2026-2257 (The GetGenie plugin for WordPress is vulnerable to Insecure Direct Obj ...)
+	TODO: check
+CVE-2026-29776 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+	TODO: check
+CVE-2026-29775 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+	TODO: check
+CVE-2026-29774 (FreeRDP is a free implementation of the Remote Desktop Protocol. Prior ...)
+	TODO: check
+CVE-2026-29079 (Lexbor is a web browser engine library. Prior to 2.7.0, a type\u2011co ...)
+	TODO: check
+CVE-2026-29078 (Lexbor is a web browser engine library. Prior to 2.7.0, the ISO\u20112 ...)
+	TODO: check
+CVE-2026-26954 (SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34, it is p ...)
+	TODO: check
+CVE-2026-24097 (Improper permission enforcement in Checkmk versions 2.4.0 before 2.4.0 ...)
+	TODO: check
+CVE-2026-23943 (Improper Handling of Highly Compressed Data (Compression Bomb) vulnera ...)
+	TODO: check
+CVE-2026-23942 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+	TODO: check
+CVE-2026-23941 (Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling' ...)
+	TODO: check
+CVE-2026-23940 (Uncontrolled Resource Consumption vulnerability in hexpm hexpm/hexpm a ...)
+	TODO: check
+CVE-2026-1668 (The web interface on multiple Omada switches does not adequately valid ...)
+	TODO: check
+CVE-2026-0957 (There is a memory corruption vulnerability due to an out-of-bounds wri ...)
+	TODO: check
+CVE-2026-0956 (There is a memory corruption vulnerability due to an out-of-bounds rea ...)
+	TODO: check
+CVE-2026-0955 (There is a memory corruption vulnerability due to an out-of-bounds rea ...)
+	TODO: check
+CVE-2026-0954 (There is a memory corruption vulnerability due to an out-of-bounds wri ...)
+	TODO: check
+CVE-2026-0835 (IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 thro ...)
+	TODO: check
+CVE-2025-71263 (In UNIX Fourth Research Edition (v4), the su command is vulnerable to  ...)
+	TODO: check
+CVE-2025-66249 (Improper Limitation of a Pathname to a Restricted Directory ('Path Tra ...)
+	TODO: check
+CVE-2025-60012 (Malicious configuration can lead to unauthorized file access in Apache ...)
+	TODO: check
+CVE-2025-36368 (IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 thro ...)
+	TODO: check
+CVE-2025-14811 (IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6. ...)
+	TODO: check
+CVE-2025-14504 (IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.1.0.0 thro ...)
+	TODO: check
+CVE-2025-14483 (IBM Sterling B2B Integratorand IBM Sterling File Gateway6.1.0.0 throug ...)
+	TODO: check
+CVE-2025-13779 (Missing authentication for critical function vulnerability in ABB AWIN ...)
+	TODO: check
+CVE-2025-13778 (Missing authentication for critical function vulnerability in ABB AWIN ...)
+	TODO: check
+CVE-2025-13777 (Authentication bypass by capture-replay vulnerability in ABB AWIN GW10 ...)
+	TODO: check
+CVE-2025-13726 (IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6. ...)
+	TODO: check
+CVE-2025-13723 (IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6. ...)
+	TODO: check
+CVE-2025-13718 (IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6. ...)
+	TODO: check
+CVE-2025-13702 (IBM Sterling Partner Engagement Manager 6.2.3.0 through 6.2.3.5 and 6. ...)
+	TODO: check
+CVE-2025-13460 (IBM Aspera Console 3.3.0 through 3.4.8 could allow an attacker to enum ...)
+	TODO: check
+CVE-2025-13459 (IBM Aspera Console 3.3.0 through 3.4.8 could allow a privileged user t ...)
+	TODO: check
+CVE-2025-13212 (IBM Aspera Console 3.3.0 through 3.4.8 could allow an authenticated us ...)
+	TODO: check
+CVE-2025-12455 (Observable response discrepancy vulnerability in OpenText\u2122 Vertic ...)
+	TODO: check
+CVE-2025-12454 (Improper neutralization of input during web page generation ('cross-si ...)
+	TODO: check
+CVE-2025-12453 (Improper neutralization of input during web page generation ('cross-si ...)
+	TODO: check
+CVE-2023-40693 (IBM Sterling B2B Integratorand IBM Sterling File Gateway6.1.0.0 throug ...)
+	TODO: check
+CVE-2026-4105 (A flaw was found in systemd. The systemd-machined service contains an  ...)
 	- systemd 260~rc3-1
 	[trixie] - systemd <no-dsa> (Only exloitable with custom polkit policy that allows register-machine access)
 	[bookworm] - systemd <no-dsa> (Only exloitable with custom polkit policy that allows register-machine access)
@@ -6,7 +432,7 @@ CVE-2026-4105
 	NOTE: Introduced with: https://github.com/systemd/systemd/commit/fbe550738d03b178bb004a1390e74115e904118a (v225)
 	NOTE: Fixed by: https://github.com/systemd/systemd/commit/6df5f80bd374be1b45c52d740e88f0236da922c7 (v260-rc3)
 	NOTE: Fixed by: https://github.com/systemd/systemd/commit/497d0172416cbb5b70f96b95399d041407c223bd (v259.4)
-CVE-2026-2673 [openssl: Fix group tuple handling in DEFAULT expansion]
+CVE-2026-2673 (Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the exp ...)
 	- openssl <unfixed>
 	[trixie] - openssl <no-dsa> (Minor issue)
 	[bookworm] - openssl <not-affected> (Only affects 3.5 and later)
@@ -26,7 +452,7 @@ CVE-2026-3611 (The Honeywell IQ4x building management controller, exposes its fu
 	NOT-FOR-US: Honeywell
 CVE-2026-3045 (The Appointment Booking Calendar \u2014 Simply Schedule Appointments p ...)
 	NOT-FOR-US: WordPress plugin
-CVE-2026-32612 (Statmatic is a Laravel and Git powered content management system (CMS) ...)
+CVE-2026-32612 (Statamic is a Laravel and Git powered content management system (CMS). ...)
 	NOT-FOR-US: Statmatic CMS
 CVE-2026-32598 (OneUptime is a solution for monitoring and managing online services. P ...)
 	NOT-FOR-US: OneUptime
@@ -4740,26 +5166,26 @@ CVE-2019-25499 (Simple Job Script contains an SQL injection vulnerability that a
 CVE-2019-25498 (Simple Job Script contains an SQL injection vulnerability that allows  ...)
 	NOT-FOR-US: Simple Job Script
 CVE-2026-23238 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
-	{DSA-6163-1 DSA-6162-1}
+	{DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.13-1
 	NOTE: https://git.kernel.org/linus/ab7ad7abb3660c58ffffdf07ff3bb976e7e0afa0 (6.19-rc8)
 CVE-2026-23237 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
-	{DSA-6163-1 DSA-6162-1}
+	{DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.13-1
 	NOTE: https://git.kernel.org/linus/fe747d7112283f47169e9c16e751179a9b38611e (6.19)
 CVE-2026-23232 (In the Linux kernel, the following vulnerability has been resolved:  R ...)
 	- linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3996b70209f145bfcf2afc7d05dd92c27b233b48 (7.0-rc1)
 CVE-2026-23236 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
-	{DSA-6163-1 DSA-6162-1}
+	{DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.13-1
 	NOTE: https://git.kernel.org/linus/120adae7b42faa641179270c067864544a50ab69 (7.0-rc1)
 CVE-2026-23235 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
-	{DSA-6163-1 DSA-6162-1}
+	{DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.13-1
 	NOTE: https://git.kernel.org/linus/98ea0039dbfdd00e5cc1b9a8afa40434476c0955 (7.0-rc1)
 CVE-2026-23234 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
-	{DSA-6163-1 DSA-6162-1}
+	{DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.13-1
 	NOTE: https://git.kernel.org/linus/ce2739e482bce8d2c014d76c4531c877f382aa54 (7.0-rc1)
 CVE-2026-23233 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
@@ -4769,7 +5195,7 @@ CVE-2026-23233 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/5c145c03188bc9ba1c29e0bc4d527a5978fc47f9 (7.0-rc1)
 CVE-2025-71238 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6163-1 DSA-6162-1}
+	{DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.13-1
 	NOTE: https://git.kernel.org/linus/c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0 (7.0-rc1)
 CVE-2026-23231 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
@@ -10596,16 +11022,16 @@ CVE-2025-13602
 CVE-2025-11185 (The Complianz \u2013 GDPR/CCPA Cookie Consent plugin for WordPress is  ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2026-23230 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1}
 	- linux 6.18.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ec306600d5ba7148c9dbf8f5a8f1f5c1a044a241 (7.0-rc1)
 CVE-2026-23229 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.12-1
 	NOTE: https://git.kernel.org/linus/b505047ffc8057555900d2d3a005d033e6967382 (7.0-rc1)
 CVE-2026-23228 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1}
 	- linux 6.18.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/77ffbcac4e569566d0092d5f22627dfc0896b553 (7.0-rc1)
@@ -10632,28 +11058,28 @@ CVE-2026-23223 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/1c253e11225bc5167217897885b85093e17c2217 (7.0-rc1)
 CVE-2026-23222 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.12-1
 	NOTE: https://git.kernel.org/linus/1562b1fb7e17c1b3addb15e125c718b2be7f5512 (7.0-rc1)
 CVE-2026-23221 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
-	{DSA-6163-1 DSA-6162-1}
+	{DSA-6163-1 DSA-6162-1 DLA-4499-1}
 	- linux 6.18.12-1
 	NOTE: https://git.kernel.org/linus/148891e95014b5dc5878acefa57f1940c281c431 (7.0-rc1)
 CVE-2026-23220 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1}
 	- linux 6.18.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/010eb01ce23b34b50531448b0da391c7f05a72af (7.0-rc1)
 CVE-2025-71237 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.12-1
 	NOTE: https://git.kernel.org/linus/ed527ef0c264e4bed6c7b2a158ddf516b17f5f66 (7.0-rc1)
 CVE-2025-71236 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.12-1
 	NOTE: https://git.kernel.org/linus/b6df15aec8c3441357d4da0eaf4339eb20f5999f (7.0-rc1)
 CVE-2025-71235 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.12-1
 	NOTE: https://git.kernel.org/linus/8890bf450e0b6b283f48ac619fca5ac2f14ddd62 (7.0-rc1)
 CVE-2025-71234 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
@@ -10663,12 +11089,12 @@ CVE-2025-71234 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/86c946bcc00f6390ef65e9614ae60a9377e454f8 (7.0-rc1)
 CVE-2025-71233 (In the Linux kernel, the following vulnerability has been resolved:  P ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1}
 	- linux 6.18.12-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7c5c7d06bd1f86d2c3ebe62be903a4ba42db4d2c (7.0-rc1)
 CVE-2025-71232 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.12-1
 	NOTE: https://git.kernel.org/linus/7adbd2b7809066c75f0433e5e2a8e114b429f30f (7.0-rc1)
 CVE-2025-71231 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
@@ -10707,7 +11133,7 @@ CVE-2026-23217 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b0d7f5f0c9f05f1b6d4ee7110f15bef9c11f9df0 (6.19-rc5)
 CVE-2026-23216 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/9411a89e9e7135cc459178fa77a3f1d6191ae903 (6.19-rc7)
 CVE-2026-23215 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
@@ -11464,7 +11890,7 @@ CVE-2026-23210 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/fc6f36eaaedcf4b81af6fe1a568f018ffd530660 (6.19)
 CVE-2026-23209 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/f8db6475a83649689c087a8f52486fcc53e627e9 (6.19)
 CVE-2026-23208 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
@@ -11475,12 +11901,12 @@ CVE-2026-23207 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/edf9088b6e1d6d88982db7eb5e736a0e4fbcc09e (6.19)
 CVE-2026-23206 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1}
 	- linux 6.18.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/ed48a84a72fefb20a82dd90a7caa7807e90c6f66 (6.19)
 CVE-2026-23205 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1}
 	- linux 6.18.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e3a43633023e3cacaca60d4b8972d084a2b06236 (6.19)
@@ -11489,7 +11915,7 @@ CVE-2026-23204 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/cabd1a976375780dabab888784e356f574bbaed8 (6.19)
 CVE-2026-23202 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1}
 	- linux 6.18.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/bf4528ab28e2bf112c3a2cdef44fd13f007781cd (6.19)
@@ -11512,7 +11938,7 @@ CVE-2026-23199 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/b5cbacd7f86f4f62b8813688c8e73be94e8e1951 (6.19)
 CVE-2026-23198 (In the Linux kernel, the following vulnerability has been resolved:  K ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/b4d37cdb77a0015f51fee083598fa227cc07aaf1 (6.19)
 CVE-2026-23196 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
@@ -11522,7 +11948,7 @@ CVE-2026-23196 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/a9a917998d172ec117f9e9de1919174153c0ace4 (6.19-rc5)
 CVE-2026-23193 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/84dc6037390b8607c5551047d3970336cb51ba9a (6.19-rc7)
 CVE-2026-23191 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
@@ -11530,7 +11956,7 @@ CVE-2026-23191 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/826af7fa62e347464b1b4e0ba2fe19a92438084f (6.19)
 CVE-2026-23190 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/7f67ba5413f98d93116a756e7f17cd2c1d6c2bd6 (6.19)
 CVE-2026-23189 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
@@ -11546,12 +11972,12 @@ CVE-2026-23188 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6d06bc83a5ae8777a5f7a81c32dd75b8d9b2fe04 (6.19)
 CVE-2026-23187 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1}
 	- linux 6.18.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/6bd8b4a92a901fae1a422e6f914801063c345e8d (6.19)
 CVE-2026-23182 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1}
 	- linux 6.18.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/41d9a6795b95d6ea28439ac1e9ce8c95bbca20fc (6.19)
@@ -11562,7 +11988,7 @@ CVE-2026-23181 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3f29d661e5686f3aa14e6f11537ff5c49846f2e2 (6.19-rc7)
 CVE-2026-23180 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1}
 	- linux 6.18.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/31a7a0bbeb006bac2d9c81a2874825025214b6d8 (6.19)
@@ -11573,7 +11999,7 @@ CVE-2026-23179 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2fa8961d3a6a1c2395d8d560ffed2c782681bade (6.19-rc6)
 CVE-2026-23178 (In the Linux kernel, the following vulnerability has been resolved:  H ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1}
 	- linux 6.18.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2497ff38c530b1af0df5130ca9f5ab22c5e92f29 (6.19-rc5)
@@ -11584,11 +12010,11 @@ CVE-2026-23177 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/2030dddf95451b4e7a389f052091e7c4b7b274c6 (6.19)
 CVE-2026-23176 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/128497456756e1b952bd5a912cd073836465109d (6.19)
 CVE-2025-71224 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/ff4071c60018a668249dc6a2df7d16330543540e (6.19-rc4)
 CVE-2025-71223 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
@@ -11598,14 +12024,14 @@ CVE-2025-71223 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/f416c556997aa56ec4384c6b6efd6a0e6ac70aa7 (6.19-rc4)
 CVE-2025-71222 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/e75665dd096819b1184087ba5718bd93beafff51 (6.19-rc4)
 CVE-2025-71221 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/a143545855bc2c6e1330f6f57ae375ac44af00a7 (6.19-rc6)
 CVE-2025-71220 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1}
 	- linux 6.18.10-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7c28f8eef5ac5312794d8a52918076dcd787e53b (6.19-rc4)
@@ -11764,7 +12190,7 @@ CVE-2026-23171 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e9acda52fd2ee0cdca332f996da7a95c5fd25294 (6.19-rc8)
 CVE-2026-23169 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1}
 	- linux 6.18.9-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/e2a9eeb69f7d4ca4cf4c70463af77664fdb6ab1d (6.19-rc8)
@@ -12324,11 +12750,11 @@ CVE-2026-2441 (Use after free in CSS in Google Chrome prior to 145.0.7632.75 all
 	- chromium 145.0.7632.75-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-23112 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/52a0a98549344ca20ad81a4176d68d28e3c05a5c (6.19)
 CVE-2026-23111 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1}
 	- linux 6.18.10-1
 	NOTE: https://git.kernel.org/linus/f41c5d151078c5348271ffaf8e7410d96f2d82f8 (6.19)
 CVE-2026-26257
@@ -13815,11 +14241,11 @@ CVE-2026-1603 (An authentication bypass in Ivanti Endpoint Manager before versio
 	NOT-FOR-US: Ivanti
 CVE-2026-1602 (SQL injection in Ivanti Endpoint Manager before version 2024 SU5 allow ...)
 	NOT-FOR-US: Ivanti
-CVE-2026-0653 (On TP-Link Tapo C260 v1, aguest\u2011level authenticated user can bypa ...)
+CVE-2026-0653 (On TP-Link Tapo C260 v1 and D235 v1, aguest\u2011level authenticated u ...)
 	NOT-FOR-US: TP-Link
 CVE-2026-0652 (On TP-Link Tapo C260 v1, command injection vulnerability exists due to ...)
 	NOT-FOR-US: TP-Link
-CVE-2026-0651 (On TP-Link Tapo C260 v1, path traversal is possible due to improper ha ...)
+CVE-2026-0651 (On TP-Link Tapo C260 v1 and D235 v1, path traversal is possible due to ...)
 	NOT-FOR-US: TP-Link
 CVE-2025-7636 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
 	NOT-FOR-US: ZEUS PDKS
@@ -23923,7 +24349,7 @@ CVE-2025-13175 (Y Soft SafeQ 6 renders the Workflow Connector password field in
 CVE-2025-0647 (In certain Arm CPUs, a CPP RCTX instruction executed on one Processing ...)
 	NOT-FOR-US: Arm
 CVE-2025-71144 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
-	{DSA-6163-1 DSA-6126-1}
+	{DSA-6163-1 DSA-6126-1 DLA-4499-1}
 	- linux 6.18.5-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/86730ac255b0497a272704de9a1df559f5d6602e (6.19-rc4)
@@ -24995,7 +25421,7 @@ CVE-2025-71090 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8072e34e1387d03102b788677d491e2bcceef6f5 (6.19-rc4)
 CVE-2025-71089 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
-	{DSA-6163-1 DSA-6126-1}
+	{DSA-6163-1 DSA-6126-1 DLA-4499-1}
 	- linux 6.18.5-1
 	NOTE: https://git.kernel.org/linus/72f98ef9a4be30d2a60136dd6faee376f780d06c (6.19-rc1)
 CVE-2025-71088 (In the Linux kernel, the following vulnerability has been resolved:  m ...)
@@ -33892,7 +34318,7 @@ CVE-2025-68357 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7fd8720dff2d9c70cf5a1a13b7513af01952ec02 (6.19-rc1)
 CVE-2025-68358 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
-	{DSA-6163-1 DSA-6126-1}
+	{DSA-6163-1 DSA-6126-1 DLA-4499-1}
 	- linux 6.17.13-1
 	NOTE: https://git.kernel.org/linus/38e818718c5e04961eea0fa8feff3f100ce40408 (6.19-rc1)
 CVE-2025-68359 (In the Linux kernel, the following vulnerability has been resolved:  b ...)
@@ -43772,7 +44198,7 @@ CVE-2025-40252 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.159-1
 	NOTE: https://git.kernel.org/linus/896f1a2493b59beb2b5ccdf990503dbb16cb2256 (6.18-rc7)
 CVE-2025-40251 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
-	{DSA-6163-1}
+	{DSA-6163-1 DLA-4499-1}
 	- linux 6.17.10-1
 	[trixie] - linux 6.12.63-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -53853,7 +54279,7 @@ CVE-2025-12380 (Starting with Firefox 142, it was possible for a compromised chi
 CVE-2025-12103 (A flaw was found in Red Hat Openshift AI Service. The TrustyAI compone ...)
 	NOT-FOR-US: Red Hat Openshift AI Service
 CVE-2025-40082 (In the Linux kernel, the following vulnerability has been resolved:  h ...)
-	{DSA-6163-1 DSA-6141-1}
+	{DSA-6163-1 DSA-6141-1 DLA-4499-1}
 	- linux 6.17.6-1
 	NOTE: https://git.kernel.org/linus/bea3e1d4467bcf292c8e54f080353d556d355e26 (6.18-rc1)
 CVE-2025-40081 (In the Linux kernel, the following vulnerability has been resolved:  p ...)
@@ -61478,6 +61904,7 @@ CVE-2022-50517 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/71e2d666ef85d51834d658830f823560c402b8b6 (6.1-rc2)
 CVE-2022-50516 (In the Linux kernel, the following vulnerability has been resolved:  f ...)
+	{DLA-4498-1}
 	- linux 6.0.3-1
 	NOTE: https://git.kernel.org/linus/7175e131ebba47afef47e6ac4d5bab474d1e6e49 (6.1-rc1)
 CVE-2022-50515 (In the Linux kernel, the following vulnerability has been resolved:  d ...)
@@ -68309,7 +68736,7 @@ CVE-2023-53425 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux 5.10.197-1
 	NOTE: https://git.kernel.org/linus/3df55cd773e8603b623425cc97b05e542854ad27 (6.5-rc1)
 CVE-2023-53424 (In the Linux kernel, the following vulnerability has been resolved:  c ...)
-	{DSA-6163-1}
+	{DSA-6163-1 DLA-4499-1}
 	- linux 6.4.4-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/3db7285e044144fd88a356f5b641b9cd4b231a77 (6.5-rc1)
@@ -72359,7 +72786,7 @@ CVE-2025-39764 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.16.3-1
 	NOTE: https://git.kernel.org/linus/1492e3dcb2be3aa46d1963da96aa9593e4e4db5a (6.17-rc2)
 CVE-2025-39763 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
-	{DSA-6163-1}
+	{DSA-6163-1 DLA-4499-1}
 	- linux 6.16.3-1
 	[trixie] - linux 6.12.43-1
 	NOTE: https://git.kernel.org/linus/79a5ae3c4c5eb7e38e0ebe4d6bf602d296080060 (6.17-rc1)
@@ -78681,7 +79108,7 @@ CVE-2025-38644 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.148-1
 	NOTE: https://git.kernel.org/linus/16ecdab5446f15a61ec88eb0d23d25d009821db0 (6.17-rc1)
 CVE-2025-38643 (In the Linux kernel, the following vulnerability has been resolved:  w ...)
-	{DSA-6163-1}
+	{DSA-6163-1 DLA-4499-1}
 	- linux 6.16.3-1
 	[trixie] - linux 6.12.57-1
 	NOTE: https://git.kernel.org/linus/2c5dee15239f3f3e31aa5c8808f18996c039e2c1 (6.17-rc1)
@@ -93914,7 +94341,7 @@ CVE-2025-38202 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/d4965578267e2e81f67c86e2608481e77e9c8569 (6.16-rc1)
 CVE-2025-38201 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-6163-1}
+	{DSA-6163-1 DLA-4499-1 DLA-4498-1}
 	- linux 6.12.35-1
 	NOTE: https://git.kernel.org/linus/b85e3367a5716ed3662a4fe266525190d2af76df (6.16-rc1)
 CVE-2025-38200 (In the Linux kernel, the following vulnerability has been resolved:  i ...)
@@ -107023,7 +107450,7 @@ CVE-2025-37921 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/087a9eb9e5978e3ba362e1163691e41097e8ca20 (6.15-rc5)
 CVE-2025-37920 (In the Linux kernel, the following vulnerability has been resolved:  x ...)
-	{DSA-6163-1}
+	{DSA-6163-1 DLA-4499-1}
 	- linux 6.12.29-1
 	NOTE: https://git.kernel.org/linus/a1356ac7749cafc4e27aa62c0c4604b5dca4983e (6.15-rc5)
 CVE-2025-37919 (In the Linux kernel, the following vulnerability has been resolved:  A ...)
@@ -111192,7 +111619,7 @@ CVE-2025-37823 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.137-1
 	NOTE: https://git.kernel.org/linus/6ccbda44e2cc3d26fd22af54c650d6d5d801addf (6.15-rc4)
 CVE-2025-37822 (In the Linux kernel, the following vulnerability has been resolved:  r ...)
-	{DSA-6163-1}
+	{DSA-6163-1 DLA-4499-1}
 	- linux 6.12.27-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/7d1d19a11cfbfd8bae1d89cc010b2cc397cd0c48 (6.15-rc4)
@@ -114153,7 +114580,7 @@ CVE-2025-37787 (In the Linux kernel, the following vulnerability has been resolv
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c84f6ce918a9e6f4996597cbc62536bbf2247c96 (6.15-rc3)
 CVE-2025-37786 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-6163-1}
+	{DSA-6163-1 DLA-4499-1}
 	- linux 6.12.25-1
 	NOTE: https://git.kernel.org/linus/8bf108d7161ffc6880ad13a0cc109de3cf631727 (6.15-rc3)
 CVE-2025-37784 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
@@ -114421,7 +114848,7 @@ CVE-2025-23156 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.135-1
 	NOTE: https://git.kernel.org/linus/9edaaa8e3e15aab1ca413ab50556de1975bcb329 (6.15-rc1)
 CVE-2025-23155 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-6163-1}
+	{DSA-6163-1 DLA-4499-1}
 	- linux 6.12.37-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/c60d101a226f18e9a8f01bb4c6ca2b47dfcb15ef (6.15-rc1)
@@ -118705,7 +119132,7 @@ CVE-2025-22027 (In the Linux kernel, the following vulnerability has been resolv
 	- linux 6.12.25-1
 	NOTE: https://git.kernel.org/linus/f656cfbc7a293a039d6a0c7100e1c846845148c1 (6.15-rc1)
 CVE-2025-22026 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
-	{DSA-6163-1}
+	{DSA-6163-1 DLA-4499-1}
 	- linux 6.12.25-1
 	NOTE: https://git.kernel.org/linus/930b64ca0c511521f0abdd1d57ce52b2a6e3476b (6.15-rc1)
 CVE-2025-22025 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
@@ -149304,7 +149731,7 @@ CVE-2024-57896 (In the Linux kernel, the following vulnerability has been resolv
 	[bookworm] - linux 6.1.124-1
 	NOTE: https://git.kernel.org/linus/f10bef73fb355e3fc85e63a50386798be68ff486 (6.13-rc3)
 CVE-2024-57895 (In the Linux kernel, the following vulnerability has been resolved:  k ...)
-	{DSA-6163-1}
+	{DSA-6163-1 DLA-4499-1}
 	- linux 6.12.9-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/21e46a79bbe6c4e1aa73b3ed998130f2ff07b128 (6.13-rc3)
@@ -228176,7 +228603,7 @@ CVE-2024-26823 (In the Linux kernel, the following vulnerability has been resolv
 	[buster] - linux <not-affected> (Vulnerable code not present)
 	NOTE: https://git.kernel.org/linus/8b02da04ad978827e5ccd675acf170198f747a7a (6.8-rc5)
 CVE-2024-26822 (In the Linux kernel, the following vulnerability has been resolved:  s ...)
-	{DSA-6163-1}
+	{DSA-6163-1 DLA-4499-1}
 	- linux 6.7.7-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/68681698b24becb63c5e7c63a897364fcd827e03

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/68681698b24becb63c5e7c63a897364fcd827e03
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260313/0a2e34d0/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list