Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
68681698 by security tracker role at 2026-03-13T20:13:36+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,4 +1,430 @@
-CVE-2026-4105
+CVE-2026-4111 (A flaw was identified in the RAR5 archive decompression logic
of the l ...)
+ TODO: check
+CVE-2026-4092 (Path Traversal in Clasp impacting versions < 3.2.0 allows a
remote att ...)
+ TODO: check
+CVE-2026-4063 (The Social Icons Widget & Block by WPZOOM plugin for WordPress
is vuln ...)
+ TODO: check
+CVE-2026-3999 (A broken access control may allow an authenticated user to
perform a ...)
+ TODO: check
+CVE-2026-3986 (The Calculated Fields Form plugin for WordPress is vulnerable
to Store ...)
+ TODO: check
+CVE-2026-3873 (Use of Hard-coded Credentials vulnerability in Avantra allows
Accessin ...)
+ TODO: check
+CVE-2026-32746 (telnetd in GNU inetutils through 2.7 allows an out-of-bounds
write in ...)
+ TODO: check
+CVE-2026-32745 (In JetBrains Datalore before 2026.1 session hijacking was
possible due ...)
+ TODO: check
+CVE-2026-32600 (xml-security is a library that implements XML signatures and
encryptio ...)
+ TODO: check
+CVE-2026-32594 (Parse Server is an open source backend that can be deployed to
any inf ...)
+ TODO: check
+CVE-2026-32543 (Missing Authorization vulnerability in CyberChimps Responsive
Blocks r ...)
+ TODO: check
+CVE-2026-32487 (Missing Authorization vulnerability in raratheme Lawyer
Landing Page l ...)
+ TODO: check
+CVE-2026-32486 (Missing Authorization vulnerability in wptravelengine Travel
Booking t ...)
+ TODO: check
+CVE-2026-32462 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32461 (Missing Authorization vulnerability in Really Simple Plugins
Really Si ...)
+ TODO: check
+CVE-2026-32460 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32459 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
+ TODO: check
+CVE-2026-32458 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
+ TODO: check
+CVE-2026-32457 (Missing Authorization vulnerability in Wombat Plugins Advanced
Product ...)
+ TODO: check
+CVE-2026-32456 (Cross-Site Request Forgery (CSRF) vulnerability in Janis Elsts
Admin M ...)
+ TODO: check
+CVE-2026-32455 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32454 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32453 (Missing Authorization vulnerability in ThemeFusion Avada Core
fusion-c ...)
+ TODO: check
+CVE-2026-32452 (Missing Authorization vulnerability in ThemeFusion Fusion
Builder fusi ...)
+ TODO: check
+CVE-2026-32451 (Missing Authorization vulnerability in ThemeFusion Fusion
Builder fusi ...)
+ TODO: check
+CVE-2026-32450 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32449 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32448 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32447 (Missing Authorization vulnerability in Vito Peleg Atarim
atarim-visual ...)
+ TODO: check
+CVE-2026-32446 (Missing Authorization vulnerability in Syed Balkhi Contact
Form by WPF ...)
+ TODO: check
+CVE-2026-32445 (Missing Authorization vulnerability in Elementor Elementor
Website Bui ...)
+ TODO: check
+CVE-2026-32443 (Cross-Site Request Forgery (CSRF) vulnerability in Josh
Kohlbach Produ ...)
+ TODO: check
+CVE-2026-32442 (Missing Authorization vulnerability in E2Pdf e2pdf e2pdf
allows Exploi ...)
+ TODO: check
+CVE-2026-32440 (Missing Authorization vulnerability in Ex-Themes WP Food
wp-food allow ...)
+ TODO: check
+CVE-2026-32439 (Missing Authorization vulnerability in WebGeniusLab BigHearts
bigheart ...)
+ TODO: check
+CVE-2026-32438 (Missing Authorization vulnerability in vowelweb VW School
Education vw ...)
+ TODO: check
+CVE-2026-32437 (Missing Authorization vulnerability in vowelweb VW Portfolio
vw-portfo ...)
+ TODO: check
+CVE-2026-32436 (Missing Authorization vulnerability in vowelweb VW Photography
vw-phot ...)
+ TODO: check
+CVE-2026-32435 (Missing Authorization vulnerability in vowelweb VW Pet Shop
vw-pet-sho ...)
+ TODO: check
+CVE-2026-32434 (Missing Authorization vulnerability in vowelweb VW Fitness
vw-fitness ...)
+ TODO: check
+CVE-2026-32433 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
+ TODO: check
+CVE-2026-32432 (Missing Authorization vulnerability in codepeople WP Time
Slots Bookin ...)
+ TODO: check
+CVE-2026-32431 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32430 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32429 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32428 (Missing Authorization vulnerability in Ays Pro Popup Like box
ays-face ...)
+ TODO: check
+CVE-2026-32427 (Missing Authorization vulnerability in vowelweb VW Education
Lite vw-e ...)
+ TODO: check
+CVE-2026-32426 (Improper Control of Filename for Include/Require Statement in
PHP Prog ...)
+ TODO: check
+CVE-2026-32425 (Missing Authorization vulnerability in linknacional Payment
Gateway Pi ...)
+ TODO: check
+CVE-2026-32424 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32423 (Missing Authorization vulnerability in Bowo Admin and Site
Enhancement ...)
+ TODO: check
+CVE-2026-32422 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
+ TODO: check
+CVE-2026-32421 (Missing Authorization vulnerability in Agile Logix Post
Timeline post- ...)
+ TODO: check
+CVE-2026-32420 (Cross-Site Request Forgery (CSRF) vulnerability in Ruben
Garcia GamiPr ...)
+ TODO: check
+CVE-2026-32419 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32418 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
+ TODO: check
+CVE-2026-32417 (Missing Authorization vulnerability in wppochipp Pochipp
pochipp allow ...)
+ TODO: check
+CVE-2026-32416 (Missing Authorization vulnerability in bPlugins PDF Poster
pdf-poster ...)
+ TODO: check
+CVE-2026-32415 (Path Traversal: '.../...//' vulnerability in Bogdan Bendziukov
Squeeze ...)
+ TODO: check
+CVE-2026-32414 (Improper Control of Generation of Code ('Code Injection')
vulnerabilit ...)
+ TODO: check
+CVE-2026-32413 (Missing Authorization vulnerability in Maciej Bis Permalink
Manager Li ...)
+ TODO: check
+CVE-2026-32412 (Server-Side Request Forgery (SSRF) vulnerability in Gift Up!
Gift Up G ...)
+ TODO: check
+CVE-2026-32411 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32410 (Missing Authorization vulnerability in WBW Plugins WBW
Currency Switch ...)
+ TODO: check
+CVE-2026-32409 (Missing Authorization vulnerability in WPMU DEV - Your
All-in-One Word ...)
+ TODO: check
+CVE-2026-32408 (Missing Authorization vulnerability in themefusecom Brizy
brizy allows ...)
+ TODO: check
+CVE-2026-32407 (Missing Authorization vulnerability in WPClever WPC Smart
Wishlist for ...)
+ TODO: check
+CVE-2026-32406 (Missing Authorization vulnerability in WPClever WPC Product
Bundles fo ...)
+ TODO: check
+CVE-2026-32405 (Exposure of Sensitive System Information to an Unauthorized
Control Sp ...)
+ TODO: check
+CVE-2026-32404 (Missing Authorization vulnerability in Studio99 Studio99 WP
Monitor st ...)
+ TODO: check
+CVE-2026-32403 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32402 (Missing Authorization vulnerability in Ays Pro Image Slider by
Ays ays ...)
+ TODO: check
+CVE-2026-32401 (Improper Control of Filename for Include/Require Statement in
PHP Prog ...)
+ TODO: check
+CVE-2026-32400 (Improper Control of Filename for Include/Require Statement in
PHP Prog ...)
+ TODO: check
+CVE-2026-32399 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
+ TODO: check
+CVE-2026-32398 (Concurrent Execution using Shared Resource with Improper
Synchronizati ...)
+ TODO: check
+CVE-2026-32397 (Missing Authorization vulnerability in YMC Filter & Grids
ymc-smart-fi ...)
+ TODO: check
+CVE-2026-32396 (Missing Authorization vulnerability in RadiusTheme Team
tlp-team allow ...)
+ TODO: check
+CVE-2026-32395 (Missing Authorization vulnerability in Xpro Xpro Addons For
Beaver Bui ...)
+ TODO: check
+CVE-2026-32394 (Missing Authorization vulnerability in PublishPress
PublishPress Capab ...)
+ TODO: check
+CVE-2026-32393 (Improper Control of Filename for Include/Require Statement in
PHP Prog ...)
+ TODO: check
+CVE-2026-32392 (Improper Control of Filename for Include/Require Statement in
PHP Prog ...)
+ TODO: check
+CVE-2026-32391 (Missing Authorization vulnerability in linethemes SmartFix
smartfix al ...)
+ TODO: check
+CVE-2026-32390 (Missing Authorization vulnerability in linethemes Nanosoft
nanosoft al ...)
+ TODO: check
+CVE-2026-32388 (Missing Authorization vulnerability in linethemes GLB glb
allows Explo ...)
+ TODO: check
+CVE-2026-32387 (Missing Authorization vulnerability in Noor Alam Checkout for
PayPal c ...)
+ TODO: check
+CVE-2026-32386 (Missing Authorization vulnerability in EnvoThemes Envo Extra
envo-extr ...)
+ TODO: check
+CVE-2026-32385 (Missing Authorization vulnerability in Metagauss
RegistrationMagic cus ...)
+ TODO: check
+CVE-2026-32384 (Improper Control of Filename for Include/Require Statement in
PHP Prog ...)
+ TODO: check
+CVE-2026-32383 (Missing Authorization vulnerability in raratheme Ridhi ridhi
allows Ex ...)
+ TODO: check
+CVE-2026-32382 (Missing Authorization vulnerability in raratheme Digital
Download digi ...)
+ TODO: check
+CVE-2026-32381 (Missing Authorization vulnerability in raratheme App Landing
Page app- ...)
+ TODO: check
+CVE-2026-32380 (Missing Authorization vulnerability in raratheme Numinous
numinous all ...)
+ TODO: check
+CVE-2026-32379 (Missing Authorization vulnerability in raratheme Rara Academic
rara-ac ...)
+ TODO: check
+CVE-2026-32378 (Missing Authorization vulnerability in raratheme Book Landing
Page boo ...)
+ TODO: check
+CVE-2026-32377 (Missing Authorization vulnerability in raratheme Pranayama
Yoga pranay ...)
+ TODO: check
+CVE-2026-32376 (Missing Authorization vulnerability in raratheme Kalon kalon
allows Ex ...)
+ TODO: check
+CVE-2026-32375 (Missing Authorization vulnerability in raratheme Travel
Diaries travel ...)
+ TODO: check
+CVE-2026-32374 (Missing Authorization vulnerability in raratheme The Minimal
the-minim ...)
+ TODO: check
+CVE-2026-32373 (Missing Authorization vulnerability in Cozy Vision SMS Alert
Order Not ...)
+ TODO: check
+CVE-2026-32372 (Exposure of Sensitive System Information to an Unauthorized
Control Sp ...)
+ TODO: check
+CVE-2026-32371 (Missing Authorization vulnerability in raratheme Elegant Pink
elegant- ...)
+ TODO: check
+CVE-2026-32370 (Missing Authorization vulnerability in raratheme Influencer
influencer ...)
+ TODO: check
+CVE-2026-32369 (Improper Control of Filename for Include/Require Statement in
PHP Prog ...)
+ TODO: check
+CVE-2026-32368 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
+ TODO: check
+CVE-2026-32367 (Improper Control of Generation of Code ('Code Injection')
vulnerabilit ...)
+ TODO: check
+CVE-2026-32366 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
+ TODO: check
+CVE-2026-32365 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
+ TODO: check
+CVE-2026-32364 (Improper Control of Filename for Include/Require Statement in
PHP Prog ...)
+ TODO: check
+CVE-2026-32363 (Missing Authorization vulnerability in Funlus Oy WPLifeCycle
free-php- ...)
+ TODO: check
+CVE-2026-32362 (Missing Authorization vulnerability in activity-log.com WP
Sessions Ti ...)
+ TODO: check
+CVE-2026-32361 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32360 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32359 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32358 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
+ TODO: check
+CVE-2026-32357 (Server-Side Request Forgery (SSRF) vulnerability in Katsushi
Kawamori ...)
+ TODO: check
+CVE-2026-32356 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32355 (Deserialization of Untrusted Data vulnerability in Crocoblock
JetEngin ...)
+ TODO: check
+CVE-2026-32354 (Insertion of Sensitive Information Into Sent Data
vulnerability in mag ...)
+ TODO: check
+CVE-2026-32353 (Server-Side Request Forgery (SSRF) vulnerability in
MailerPress Team M ...)
+ TODO: check
+CVE-2026-32352 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32351 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-32350 (Missing Authorization vulnerability in wpradiant Chocolate
House choco ...)
+ TODO: check
+CVE-2026-32349 (Server-Side Request Forgery (SSRF) vulnerability in Andy
Fragen Embed ...)
+ TODO: check
+CVE-2026-32348 (Missing Authorization vulnerability in MadrasThemes MAS Videos
masvide ...)
+ TODO: check
+CVE-2026-32347 (Missing Authorization vulnerability in raratheme Restaurant
and Cafe r ...)
+ TODO: check
+CVE-2026-32346 (Missing Authorization vulnerability in raratheme Travel Agency
travel- ...)
+ TODO: check
+CVE-2026-32345 (Missing Authorization vulnerability in raratheme Perfect
Portfolio per ...)
+ TODO: check
+CVE-2026-32344 (Cross-Site Request Forgery (CSRF) vulnerability in
desertthemes Corpiv ...)
+ TODO: check
+CVE-2026-32343 (Cross-Site Request Forgery (CSRF) vulnerability in Magazine3
Easy Tabl ...)
+ TODO: check
+CVE-2026-32342 (Cross-Site Request Forgery (CSRF) vulnerability in Ays Pro
Quiz Maker ...)
+ TODO: check
+CVE-2026-32341 (Missing Authorization vulnerability in raratheme Benevolent
benevolent ...)
+ TODO: check
+CVE-2026-32340 (Missing Authorization vulnerability in raratheme Business One
Page bus ...)
+ TODO: check
+CVE-2026-32339 (Missing Authorization vulnerability in raratheme Bakes And
Cakes bakes ...)
+ TODO: check
+CVE-2026-32338 (Missing Authorization vulnerability in raratheme Construction
Landing ...)
+ TODO: check
+CVE-2026-32337 (Missing Authorization vulnerability in raratheme Preschool and
Kinderg ...)
+ TODO: check
+CVE-2026-32336 (Missing Authorization vulnerability in raratheme Rara Business
rara-bu ...)
+ TODO: check
+CVE-2026-32335 (Missing Authorization vulnerability in raratheme The
Conference the-co ...)
+ TODO: check
+CVE-2026-32334 (Missing Authorization vulnerability in raratheme JobScout
jobscout all ...)
+ TODO: check
+CVE-2026-32332 (Missing Authorization vulnerability in Ays Pro Easy Form
easy-form all ...)
+ TODO: check
+CVE-2026-32331 (Missing Authorization vulnerability in Israpil Textmetrics
webtexttool ...)
+ TODO: check
+CVE-2026-32330 (Cross-Site Request Forgery (CSRF) vulnerability in 10Web Photo
Gallery ...)
+ TODO: check
+CVE-2026-32329 (Missing Authorization vulnerability in Ays Pro Advanced
Related Posts ...)
+ TODO: check
+CVE-2026-32328 (Cross-Site Request Forgery (CSRF) vulnerability in
shufflehound Lemmon ...)
+ TODO: check
+CVE-2026-32314 (Yamux is a stream multiplexer over reliable, ordered
connections such ...)
+ TODO: check
+CVE-2026-32313 (xmlseclibs is a library written in PHP for working with XML
Encryption ...)
+ TODO: check
+CVE-2026-31949 (LibreChat is a ChatGPT clone with additional features. Prior
to 0.8.3- ...)
+ TODO: check
+CVE-2026-31944 (LibreChat is a ChatGPT clone with additional features. From
0.8.2 to 0 ...)
+ TODO: check
+CVE-2026-31922 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
+ TODO: check
+CVE-2026-31919 (Missing Authorization vulnerability in Josh Kohlbach Advanced
Coupons ...)
+ TODO: check
+CVE-2026-31918 (Improper Neutralization of Input During Web Page Generation
('Cross-si ...)
+ TODO: check
+CVE-2026-31917 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
+ TODO: check
+CVE-2026-31916 (Missing Authorization vulnerability in Iulia Cazan Latest Post
Shortco ...)
+ TODO: check
+CVE-2026-31915 (Missing Authorization vulnerability in UX-themes Flatsome
flatsome all ...)
+ TODO: check
+CVE-2026-31899 (CairoSVG is an SVG converter based on Cairo, a 2D graphics
library. Pr ...)
+ TODO: check
+CVE-2026-31897 (FreeRDP is a free implementation of the Remote Desktop
Protocol. Prior ...)
+ TODO: check
+CVE-2026-31886 (Dagu is a workflow engine with a built-in Web user interface.
Prior to ...)
+ TODO: check
+CVE-2026-31885 (FreeRDP is a free implementation of the Remote Desktop
Protocol. Prior ...)
+ TODO: check
+CVE-2026-31884 (FreeRDP is a free implementation of the Remote Desktop
Protocol. Prior ...)
+ TODO: check
+CVE-2026-31883 (FreeRDP is a free implementation of the Remote Desktop
Protocol. Prior ...)
+ TODO: check
+CVE-2026-31882 (Dagu is a workflow engine with a built-in Web user interface.
Prior to ...)
+ TODO: check
+CVE-2026-31864 (JumpServer is an open source bastion host and an operation and
mainten ...)
+ TODO: check
+CVE-2026-31814 (Yamux is a stream multiplexer over reliable, ordered
connections such ...)
+ TODO: check
+CVE-2026-31806 (FreeRDP is a free implementation of the Remote Desktop
Protocol. Prior ...)
+ TODO: check
+CVE-2026-31798 (JumpServer is an open source bastion host and an operation and
mainten ...)
+ TODO: check
+CVE-2026-30961 (Gokapi is a self-hosted file sharing server with automatic
expiration ...)
+ TODO: check
+CVE-2026-30955 (Gokapi is a self-hosted file sharing server with automatic
expiration ...)
+ TODO: check
+CVE-2026-30943 (Gokapi is a self-hosted file sharing server with automatic
expiration ...)
+ TODO: check
+CVE-2026-30915 (SFTPGo is an open source, event-driven file transfer solution.
SFTPGo ...)
+ TODO: check
+CVE-2026-30914 (SFTPGo is an open source, event-driven file transfer solution.
In SFTP ...)
+ TODO: check
+CVE-2026-30853 (calibre is a cross-platform e-book manager for viewing,
converting, ed ...)
+ TODO: check
+CVE-2026-2888 (The Formidable Forms plugin for WordPress is vulnerable to an
authoriz ...)
+ TODO: check
+CVE-2026-2879 (The GetGenie plugin for WordPress is vulnerable to Insecure
Direct Obj ...)
+ TODO: check
+CVE-2026-2859 (Improper permission enforcement in Checkmk versions 2.4.0
before 2.4.0 ...)
+ TODO: check
+CVE-2026-2257 (The GetGenie plugin for WordPress is vulnerable to Insecure
Direct Obj ...)
+ TODO: check
+CVE-2026-29776 (FreeRDP is a free implementation of the Remote Desktop
Protocol. Prior ...)
+ TODO: check
+CVE-2026-29775 (FreeRDP is a free implementation of the Remote Desktop
Protocol. Prior ...)
+ TODO: check
+CVE-2026-29774 (FreeRDP is a free implementation of the Remote Desktop
Protocol. Prior ...)
+ TODO: check
+CVE-2026-29079 (Lexbor is a web browser engine library. Prior to 2.7.0, a
type\u2011co ...)
+ TODO: check
+CVE-2026-29078 (Lexbor is a web browser engine library. Prior to 2.7.0, the
ISO\u20112 ...)
+ TODO: check
+CVE-2026-26954 (SandboxJS is a JavaScript sandboxing library. Prior to 0.8.34,
it is p ...)
+ TODO: check
+CVE-2026-24097 (Improper permission enforcement in Checkmk versions 2.4.0
before 2.4.0 ...)
+ TODO: check
+CVE-2026-23943 (Improper Handling of Highly Compressed Data (Compression Bomb)
vulnera ...)
+ TODO: check
+CVE-2026-23942 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2026-23941 (Inconsistent Interpretation of HTTP Requests ('HTTP Request
Smuggling' ...)
+ TODO: check
+CVE-2026-23940 (Uncontrolled Resource Consumption vulnerability in hexpm
hexpm/hexpm a ...)
+ TODO: check
+CVE-2026-1668 (The web interface on multiple Omada switches does not
adequately valid ...)
+ TODO: check
+CVE-2026-0957 (There is a memory corruption vulnerability due to an
out-of-bounds wri ...)
+ TODO: check
+CVE-2026-0956 (There is a memory corruption vulnerability due to an
out-of-bounds rea ...)
+ TODO: check
+CVE-2026-0955 (There is a memory corruption vulnerability due to an
out-of-bounds rea ...)
+ TODO: check
+CVE-2026-0954 (There is a memory corruption vulnerability due to an
out-of-bounds wri ...)
+ TODO: check
+CVE-2026-0835 (IBM Sterling B2B Integrator and IBM Sterling File Gateway
6.1.0.0 thro ...)
+ TODO: check
+CVE-2025-71263 (In UNIX Fourth Research Edition (v4), the su command is
vulnerable to ...)
+ TODO: check
+CVE-2025-66249 (Improper Limitation of a Pathname to a Restricted Directory
('Path Tra ...)
+ TODO: check
+CVE-2025-60012 (Malicious configuration can lead to unauthorized file access
in Apache ...)
+ TODO: check
+CVE-2025-36368 (IBM Sterling B2B Integrator and IBM Sterling File Gateway
6.1.0.0 thro ...)
+ TODO: check
+CVE-2025-14811 (IBM Sterling Partner Engagement Manager 6.2.3.0 through
6.2.3.5 and 6. ...)
+ TODO: check
+CVE-2025-14504 (IBM Sterling B2B Integrator and IBM Sterling File Gateway
6.1.0.0 thro ...)
+ TODO: check
+CVE-2025-14483 (IBM Sterling B2B Integratorand IBM Sterling File
Gateway6.1.0.0 throug ...)
+ TODO: check
+CVE-2025-13779 (Missing authentication for critical function vulnerability in
ABB AWIN ...)
+ TODO: check
+CVE-2025-13778 (Missing authentication for critical function vulnerability in
ABB AWIN ...)
+ TODO: check
+CVE-2025-13777 (Authentication bypass by capture-replay vulnerability in ABB
AWIN GW10 ...)
+ TODO: check
+CVE-2025-13726 (IBM Sterling Partner Engagement Manager 6.2.3.0 through
6.2.3.5 and 6. ...)
+ TODO: check
+CVE-2025-13723 (IBM Sterling Partner Engagement Manager 6.2.3.0 through
6.2.3.5 and 6. ...)
+ TODO: check
+CVE-2025-13718 (IBM Sterling Partner Engagement Manager 6.2.3.0 through
6.2.3.5 and 6. ...)
+ TODO: check
+CVE-2025-13702 (IBM Sterling Partner Engagement Manager 6.2.3.0 through
6.2.3.5 and 6. ...)
+ TODO: check
+CVE-2025-13460 (IBM Aspera Console 3.3.0 through 3.4.8 could allow an attacker
to enum ...)
+ TODO: check
+CVE-2025-13459 (IBM Aspera Console 3.3.0 through 3.4.8 could allow a
privileged user t ...)
+ TODO: check
+CVE-2025-13212 (IBM Aspera Console 3.3.0 through 3.4.8 could allow an
authenticated us ...)
+ TODO: check
+CVE-2025-12455 (Observable response discrepancy vulnerability in
OpenText\u2122 Vertic ...)
+ TODO: check
+CVE-2025-12454 (Improper neutralization of input during web page generation
('cross-si ...)
+ TODO: check
+CVE-2025-12453 (Improper neutralization of input during web page generation
('cross-si ...)
+ TODO: check
+CVE-2023-40693 (IBM Sterling B2B Integratorand IBM Sterling File
Gateway6.1.0.0 throug ...)
+ TODO: check
+CVE-2026-4105 (A flaw was found in systemd. The systemd-machined service
contains an ...)
- systemd 260~rc3-1
[trixie] - systemd <no-dsa> (Only exloitable with custom polkit policy
that allows register-machine access)
[bookworm] - systemd <no-dsa> (Only exloitable with custom polkit
policy that allows register-machine access)
@@ -6,7 +432,7 @@ CVE-2026-4105
NOTE: Introduced with:
https://github.com/systemd/systemd/commit/fbe550738d03b178bb004a1390e74115e904118a
(v225)
NOTE: Fixed by:
https://github.com/systemd/systemd/commit/6df5f80bd374be1b45c52d740e88f0236da922c7
(v260-rc3)
NOTE: Fixed by:
https://github.com/systemd/systemd/commit/497d0172416cbb5b70f96b95399d041407c223bd
(v259.4)
-CVE-2026-2673 [openssl: Fix group tuple handling in DEFAULT expansion]
+CVE-2026-2673 (Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate
the exp ...)
- openssl <unfixed>
[trixie] - openssl <no-dsa> (Minor issue)
[bookworm] - openssl <not-affected> (Only affects 3.5 and later)
@@ -26,7 +452,7 @@ CVE-2026-3611 (The Honeywell IQ4x building management
controller, exposes its fu
NOT-FOR-US: Honeywell
CVE-2026-3045 (The Appointment Booking Calendar \u2014 Simply Schedule
Appointments p ...)
NOT-FOR-US: WordPress plugin
-CVE-2026-32612 (Statmatic is a Laravel and Git powered content management
system (CMS) ...)
+CVE-2026-32612 (Statamic is a Laravel and Git powered content management
system (CMS). ...)
NOT-FOR-US: Statmatic CMS
CVE-2026-32598 (OneUptime is a solution for monitoring and managing online
services. P ...)
NOT-FOR-US: OneUptime
@@ -4740,26 +5166,26 @@ CVE-2019-25499 (Simple Job Script contains an SQL
injection vulnerability that a
CVE-2019-25498 (Simple Job Script contains an SQL injection vulnerability that
allows ...)
NOT-FOR-US: Simple Job Script
CVE-2026-23238 (In the Linux kernel, the following vulnerability has been
resolved: r ...)
- {DSA-6163-1 DSA-6162-1}
+ {DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.13-1
NOTE:
https://git.kernel.org/linus/ab7ad7abb3660c58ffffdf07ff3bb976e7e0afa0 (6.19-rc8)
CVE-2026-23237 (In the Linux kernel, the following vulnerability has been
resolved: p ...)
- {DSA-6163-1 DSA-6162-1}
+ {DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.13-1
NOTE:
https://git.kernel.org/linus/fe747d7112283f47169e9c16e751179a9b38611e (6.19)
CVE-2026-23232 (In the Linux kernel, the following vulnerability has been
resolved: R ...)
- linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/3996b70209f145bfcf2afc7d05dd92c27b233b48 (7.0-rc1)
CVE-2026-23236 (In the Linux kernel, the following vulnerability has been
resolved: f ...)
- {DSA-6163-1 DSA-6162-1}
+ {DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.13-1
NOTE:
https://git.kernel.org/linus/120adae7b42faa641179270c067864544a50ab69 (7.0-rc1)
CVE-2026-23235 (In the Linux kernel, the following vulnerability has been
resolved: f ...)
- {DSA-6163-1 DSA-6162-1}
+ {DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.13-1
NOTE:
https://git.kernel.org/linus/98ea0039dbfdd00e5cc1b9a8afa40434476c0955 (7.0-rc1)
CVE-2026-23234 (In the Linux kernel, the following vulnerability has been
resolved: f ...)
- {DSA-6163-1 DSA-6162-1}
+ {DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.13-1
NOTE:
https://git.kernel.org/linus/ce2739e482bce8d2c014d76c4531c877f382aa54 (7.0-rc1)
CVE-2026-23233 (In the Linux kernel, the following vulnerability has been
resolved: f ...)
@@ -4769,7 +5195,7 @@ CVE-2026-23233 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/5c145c03188bc9ba1c29e0bc4d527a5978fc47f9 (7.0-rc1)
CVE-2025-71238 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
- {DSA-6163-1 DSA-6162-1}
+ {DSA-6163-1 DSA-6162-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.13-1
NOTE:
https://git.kernel.org/linus/c2c68225b1456f4d0d393b5a8778d51bb0d5b1d0 (7.0-rc1)
CVE-2026-23231 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
@@ -10596,16 +11022,16 @@ CVE-2025-13602
CVE-2025-11185 (The Complianz \u2013 GDPR/CCPA Cookie Consent plugin for
WordPress is ...)
NOT-FOR-US: WordPress plugin
CVE-2026-23230 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1}
- linux 6.18.12-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/ec306600d5ba7148c9dbf8f5a8f1f5c1a044a241 (7.0-rc1)
CVE-2026-23229 (In the Linux kernel, the following vulnerability has been
resolved: c ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.12-1
NOTE:
https://git.kernel.org/linus/b505047ffc8057555900d2d3a005d033e6967382 (7.0-rc1)
CVE-2026-23228 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1}
- linux 6.18.12-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/77ffbcac4e569566d0092d5f22627dfc0896b553 (7.0-rc1)
@@ -10632,28 +11058,28 @@ CVE-2026-23223 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/1c253e11225bc5167217897885b85093e17c2217 (7.0-rc1)
CVE-2026-23222 (In the Linux kernel, the following vulnerability has been
resolved: c ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.12-1
NOTE:
https://git.kernel.org/linus/1562b1fb7e17c1b3addb15e125c718b2be7f5512 (7.0-rc1)
CVE-2026-23221 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
- {DSA-6163-1 DSA-6162-1}
+ {DSA-6163-1 DSA-6162-1 DLA-4499-1}
- linux 6.18.12-1
NOTE:
https://git.kernel.org/linus/148891e95014b5dc5878acefa57f1940c281c431 (7.0-rc1)
CVE-2026-23220 (In the Linux kernel, the following vulnerability has been
resolved: k ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1}
- linux 6.18.12-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/010eb01ce23b34b50531448b0da391c7f05a72af (7.0-rc1)
CVE-2025-71237 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.12-1
NOTE:
https://git.kernel.org/linus/ed527ef0c264e4bed6c7b2a158ddf516b17f5f66 (7.0-rc1)
CVE-2025-71236 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.12-1
NOTE:
https://git.kernel.org/linus/b6df15aec8c3441357d4da0eaf4339eb20f5999f (7.0-rc1)
CVE-2025-71235 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.12-1
NOTE:
https://git.kernel.org/linus/8890bf450e0b6b283f48ac619fca5ac2f14ddd62 (7.0-rc1)
CVE-2025-71234 (In the Linux kernel, the following vulnerability has been
resolved: w ...)
@@ -10663,12 +11089,12 @@ CVE-2025-71234 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/86c946bcc00f6390ef65e9614ae60a9377e454f8 (7.0-rc1)
CVE-2025-71233 (In the Linux kernel, the following vulnerability has been
resolved: P ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1}
- linux 6.18.12-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/7c5c7d06bd1f86d2c3ebe62be903a4ba42db4d2c (7.0-rc1)
CVE-2025-71232 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.12-1
NOTE:
https://git.kernel.org/linus/7adbd2b7809066c75f0433e5e2a8e114b429f30f (7.0-rc1)
CVE-2025-71231 (In the Linux kernel, the following vulnerability has been
resolved: c ...)
@@ -10707,7 +11133,7 @@ CVE-2026-23217 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/b0d7f5f0c9f05f1b6d4ee7110f15bef9c11f9df0 (6.19-rc5)
CVE-2026-23216 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.10-1
NOTE:
https://git.kernel.org/linus/9411a89e9e7135cc459178fa77a3f1d6191ae903 (6.19-rc7)
CVE-2026-23215 (In the Linux kernel, the following vulnerability has been
resolved: x ...)
@@ -11464,7 +11890,7 @@ CVE-2026-23210 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/fc6f36eaaedcf4b81af6fe1a568f018ffd530660 (6.19)
CVE-2026-23209 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.10-1
NOTE:
https://git.kernel.org/linus/f8db6475a83649689c087a8f52486fcc53e627e9 (6.19)
CVE-2026-23208 (In the Linux kernel, the following vulnerability has been
resolved: A ...)
@@ -11475,12 +11901,12 @@ CVE-2026-23207 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/edf9088b6e1d6d88982db7eb5e736a0e4fbcc09e (6.19)
CVE-2026-23206 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1}
- linux 6.18.10-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/ed48a84a72fefb20a82dd90a7caa7807e90c6f66 (6.19)
CVE-2026-23205 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1}
- linux 6.18.10-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/e3a43633023e3cacaca60d4b8972d084a2b06236 (6.19)
@@ -11489,7 +11915,7 @@ CVE-2026-23204 (In the Linux kernel, the following
vulnerability has been resolv
- linux 6.18.10-1
NOTE:
https://git.kernel.org/linus/cabd1a976375780dabab888784e356f574bbaed8 (6.19)
CVE-2026-23202 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1}
- linux 6.18.10-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/bf4528ab28e2bf112c3a2cdef44fd13f007781cd (6.19)
@@ -11512,7 +11938,7 @@ CVE-2026-23199 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/b5cbacd7f86f4f62b8813688c8e73be94e8e1951 (6.19)
CVE-2026-23198 (In the Linux kernel, the following vulnerability has been
resolved: K ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.10-1
NOTE:
https://git.kernel.org/linus/b4d37cdb77a0015f51fee083598fa227cc07aaf1 (6.19)
CVE-2026-23196 (In the Linux kernel, the following vulnerability has been
resolved: H ...)
@@ -11522,7 +11948,7 @@ CVE-2026-23196 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/a9a917998d172ec117f9e9de1919174153c0ace4 (6.19-rc5)
CVE-2026-23193 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.10-1
NOTE:
https://git.kernel.org/linus/84dc6037390b8607c5551047d3970336cb51ba9a (6.19-rc7)
CVE-2026-23191 (In the Linux kernel, the following vulnerability has been
resolved: A ...)
@@ -11530,7 +11956,7 @@ CVE-2026-23191 (In the Linux kernel, the following
vulnerability has been resolv
- linux 6.18.10-1
NOTE:
https://git.kernel.org/linus/826af7fa62e347464b1b4e0ba2fe19a92438084f (6.19)
CVE-2026-23190 (In the Linux kernel, the following vulnerability has been
resolved: A ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.10-1
NOTE:
https://git.kernel.org/linus/7f67ba5413f98d93116a756e7f17cd2c1d6c2bd6 (6.19)
CVE-2026-23189 (In the Linux kernel, the following vulnerability has been
resolved: c ...)
@@ -11546,12 +11972,12 @@ CVE-2026-23188 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/6d06bc83a5ae8777a5f7a81c32dd75b8d9b2fe04 (6.19)
CVE-2026-23187 (In the Linux kernel, the following vulnerability has been
resolved: p ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1}
- linux 6.18.10-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/6bd8b4a92a901fae1a422e6f914801063c345e8d (6.19)
CVE-2026-23182 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1}
- linux 6.18.10-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/41d9a6795b95d6ea28439ac1e9ce8c95bbca20fc (6.19)
@@ -11562,7 +11988,7 @@ CVE-2026-23181 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/3f29d661e5686f3aa14e6f11537ff5c49846f2e2 (6.19-rc7)
CVE-2026-23180 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1}
- linux 6.18.10-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/31a7a0bbeb006bac2d9c81a2874825025214b6d8 (6.19)
@@ -11573,7 +11999,7 @@ CVE-2026-23179 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/2fa8961d3a6a1c2395d8d560ffed2c782681bade (6.19-rc6)
CVE-2026-23178 (In the Linux kernel, the following vulnerability has been
resolved: H ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1}
- linux 6.18.10-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/2497ff38c530b1af0df5130ca9f5ab22c5e92f29 (6.19-rc5)
@@ -11584,11 +12010,11 @@ CVE-2026-23177 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/2030dddf95451b4e7a389f052091e7c4b7b274c6 (6.19)
CVE-2026-23176 (In the Linux kernel, the following vulnerability has been
resolved: p ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.10-1
NOTE:
https://git.kernel.org/linus/128497456756e1b952bd5a912cd073836465109d (6.19)
CVE-2025-71224 (In the Linux kernel, the following vulnerability has been
resolved: w ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.10-1
NOTE:
https://git.kernel.org/linus/ff4071c60018a668249dc6a2df7d16330543540e (6.19-rc4)
CVE-2025-71223 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
@@ -11598,14 +12024,14 @@ CVE-2025-71223 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/f416c556997aa56ec4384c6b6efd6a0e6ac70aa7 (6.19-rc4)
CVE-2025-71222 (In the Linux kernel, the following vulnerability has been
resolved: w ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.10-1
NOTE:
https://git.kernel.org/linus/e75665dd096819b1184087ba5718bd93beafff51 (6.19-rc4)
CVE-2025-71221 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
- linux 6.18.10-1
NOTE:
https://git.kernel.org/linus/a143545855bc2c6e1330f6f57ae375ac44af00a7 (6.19-rc6)
CVE-2025-71220 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1}
- linux 6.18.10-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/7c28f8eef5ac5312794d8a52918076dcd787e53b (6.19-rc4)
@@ -11764,7 +12190,7 @@ CVE-2026-23171 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/e9acda52fd2ee0cdca332f996da7a95c5fd25294 (6.19-rc8)
CVE-2026-23169 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1}
- linux 6.18.9-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/e2a9eeb69f7d4ca4cf4c70463af77664fdb6ab1d (6.19-rc8)
@@ -12324,11 +12750,11 @@ CVE-2026-2441 (Use after free in CSS in Google Chrome
prior to 145.0.7632.75 all
- chromium 145.0.7632.75-1
[bullseye] - chromium <end-of-life> (see #1061268)
CVE-2026-23112 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1 DLA-4498-1}
- linux 6.18.10-1
NOTE:
https://git.kernel.org/linus/52a0a98549344ca20ad81a4176d68d28e3c05a5c (6.19)
CVE-2026-23111 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1}
- linux 6.18.10-1
NOTE:
https://git.kernel.org/linus/f41c5d151078c5348271ffaf8e7410d96f2d82f8 (6.19)
CVE-2026-26257
@@ -13815,11 +14241,11 @@ CVE-2026-1603 (An authentication bypass in Ivanti
Endpoint Manager before versio
NOT-FOR-US: Ivanti
CVE-2026-1602 (SQL injection in Ivanti Endpoint Manager before version 2024
SU5 allow ...)
NOT-FOR-US: Ivanti
-CVE-2026-0653 (On TP-Link Tapo C260 v1, aguest\u2011level authenticated user
can bypa ...)
+CVE-2026-0653 (On TP-Link Tapo C260 v1 and D235 v1, aguest\u2011level
authenticated u ...)
NOT-FOR-US: TP-Link
CVE-2026-0652 (On TP-Link Tapo C260 v1, command injection vulnerability exists
due to ...)
NOT-FOR-US: TP-Link
-CVE-2026-0651 (On TP-Link Tapo C260 v1, path traversal is possible due to
improper ha ...)
+CVE-2026-0651 (On TP-Link Tapo C260 v1 and D235 v1, path traversal is possible
due to ...)
NOT-FOR-US: TP-Link
CVE-2025-7636 (Improper Neutralization of Special Elements used in an SQL
Command ('S ...)
NOT-FOR-US: ZEUS PDKS
@@ -23923,7 +24349,7 @@ CVE-2025-13175 (Y Soft SafeQ 6 renders the Workflow
Connector password field in
CVE-2025-0647 (In certain Arm CPUs, a CPP RCTX instruction executed on one
Processing ...)
NOT-FOR-US: Arm
CVE-2025-71144 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
- {DSA-6163-1 DSA-6126-1}
+ {DSA-6163-1 DSA-6126-1 DLA-4499-1}
- linux 6.18.5-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/86730ac255b0497a272704de9a1df559f5d6602e (6.19-rc4)
@@ -24995,7 +25421,7 @@ CVE-2025-71090 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/8072e34e1387d03102b788677d491e2bcceef6f5 (6.19-rc4)
CVE-2025-71089 (In the Linux kernel, the following vulnerability has been
resolved: i ...)
- {DSA-6163-1 DSA-6126-1}
+ {DSA-6163-1 DSA-6126-1 DLA-4499-1}
- linux 6.18.5-1
NOTE:
https://git.kernel.org/linus/72f98ef9a4be30d2a60136dd6faee376f780d06c (6.19-rc1)
CVE-2025-71088 (In the Linux kernel, the following vulnerability has been
resolved: m ...)
@@ -33892,7 +34318,7 @@ CVE-2025-68357 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/7fd8720dff2d9c70cf5a1a13b7513af01952ec02 (6.19-rc1)
CVE-2025-68358 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
- {DSA-6163-1 DSA-6126-1}
+ {DSA-6163-1 DSA-6126-1 DLA-4499-1}
- linux 6.17.13-1
NOTE:
https://git.kernel.org/linus/38e818718c5e04961eea0fa8feff3f100ce40408 (6.19-rc1)
CVE-2025-68359 (In the Linux kernel, the following vulnerability has been
resolved: b ...)
@@ -43772,7 +44198,7 @@ CVE-2025-40252 (In the Linux kernel, the following
vulnerability has been resolv
[bookworm] - linux 6.1.159-1
NOTE:
https://git.kernel.org/linus/896f1a2493b59beb2b5ccdf990503dbb16cb2256 (6.18-rc7)
CVE-2025-40251 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
- {DSA-6163-1}
+ {DSA-6163-1 DLA-4499-1}
- linux 6.17.10-1
[trixie] - linux 6.12.63-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
@@ -53853,7 +54279,7 @@ CVE-2025-12380 (Starting with Firefox 142, it was
possible for a compromised chi
CVE-2025-12103 (A flaw was found in Red Hat Openshift AI Service. The TrustyAI
compone ...)
NOT-FOR-US: Red Hat Openshift AI Service
CVE-2025-40082 (In the Linux kernel, the following vulnerability has been
resolved: h ...)
- {DSA-6163-1 DSA-6141-1}
+ {DSA-6163-1 DSA-6141-1 DLA-4499-1}
- linux 6.17.6-1
NOTE:
https://git.kernel.org/linus/bea3e1d4467bcf292c8e54f080353d556d355e26 (6.18-rc1)
CVE-2025-40081 (In the Linux kernel, the following vulnerability has been
resolved: p ...)
@@ -61478,6 +61904,7 @@ CVE-2022-50517 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/71e2d666ef85d51834d658830f823560c402b8b6 (6.1-rc2)
CVE-2022-50516 (In the Linux kernel, the following vulnerability has been
resolved: f ...)
+ {DLA-4498-1}
- linux 6.0.3-1
NOTE:
https://git.kernel.org/linus/7175e131ebba47afef47e6ac4d5bab474d1e6e49 (6.1-rc1)
CVE-2022-50515 (In the Linux kernel, the following vulnerability has been
resolved: d ...)
@@ -68309,7 +68736,7 @@ CVE-2023-53425 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux 5.10.197-1
NOTE:
https://git.kernel.org/linus/3df55cd773e8603b623425cc97b05e542854ad27 (6.5-rc1)
CVE-2023-53424 (In the Linux kernel, the following vulnerability has been
resolved: c ...)
- {DSA-6163-1}
+ {DSA-6163-1 DLA-4499-1}
- linux 6.4.4-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/3db7285e044144fd88a356f5b641b9cd4b231a77 (6.5-rc1)
@@ -72359,7 +72786,7 @@ CVE-2025-39764 (In the Linux kernel, the following
vulnerability has been resolv
- linux 6.16.3-1
NOTE:
https://git.kernel.org/linus/1492e3dcb2be3aa46d1963da96aa9593e4e4db5a (6.17-rc2)
CVE-2025-39763 (In the Linux kernel, the following vulnerability has been
resolved: A ...)
- {DSA-6163-1}
+ {DSA-6163-1 DLA-4499-1}
- linux 6.16.3-1
[trixie] - linux 6.12.43-1
NOTE:
https://git.kernel.org/linus/79a5ae3c4c5eb7e38e0ebe4d6bf602d296080060 (6.17-rc1)
@@ -78681,7 +79108,7 @@ CVE-2025-38644 (In the Linux kernel, the following
vulnerability has been resolv
[bookworm] - linux 6.1.148-1
NOTE:
https://git.kernel.org/linus/16ecdab5446f15a61ec88eb0d23d25d009821db0 (6.17-rc1)
CVE-2025-38643 (In the Linux kernel, the following vulnerability has been
resolved: w ...)
- {DSA-6163-1}
+ {DSA-6163-1 DLA-4499-1}
- linux 6.16.3-1
[trixie] - linux 6.12.57-1
NOTE:
https://git.kernel.org/linus/2c5dee15239f3f3e31aa5c8808f18996c039e2c1 (6.17-rc1)
@@ -93914,7 +94341,7 @@ CVE-2025-38202 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/d4965578267e2e81f67c86e2608481e77e9c8569 (6.16-rc1)
CVE-2025-38201 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
- {DSA-6163-1}
+ {DSA-6163-1 DLA-4499-1 DLA-4498-1}
- linux 6.12.35-1
NOTE:
https://git.kernel.org/linus/b85e3367a5716ed3662a4fe266525190d2af76df (6.16-rc1)
CVE-2025-38200 (In the Linux kernel, the following vulnerability has been
resolved: i ...)
@@ -107023,7 +107450,7 @@ CVE-2025-37921 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/087a9eb9e5978e3ba362e1163691e41097e8ca20 (6.15-rc5)
CVE-2025-37920 (In the Linux kernel, the following vulnerability has been
resolved: x ...)
- {DSA-6163-1}
+ {DSA-6163-1 DLA-4499-1}
- linux 6.12.29-1
NOTE:
https://git.kernel.org/linus/a1356ac7749cafc4e27aa62c0c4604b5dca4983e (6.15-rc5)
CVE-2025-37919 (In the Linux kernel, the following vulnerability has been
resolved: A ...)
@@ -111192,7 +111619,7 @@ CVE-2025-37823 (In the Linux kernel, the following
vulnerability has been resolv
[bookworm] - linux 6.1.137-1
NOTE:
https://git.kernel.org/linus/6ccbda44e2cc3d26fd22af54c650d6d5d801addf (6.15-rc4)
CVE-2025-37822 (In the Linux kernel, the following vulnerability has been
resolved: r ...)
- {DSA-6163-1}
+ {DSA-6163-1 DLA-4499-1}
- linux 6.12.27-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/7d1d19a11cfbfd8bae1d89cc010b2cc397cd0c48 (6.15-rc4)
@@ -114153,7 +114580,7 @@ CVE-2025-37787 (In the Linux kernel, the following
vulnerability has been resolv
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/c84f6ce918a9e6f4996597cbc62536bbf2247c96 (6.15-rc3)
CVE-2025-37786 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
- {DSA-6163-1}
+ {DSA-6163-1 DLA-4499-1}
- linux 6.12.25-1
NOTE:
https://git.kernel.org/linus/8bf108d7161ffc6880ad13a0cc109de3cf631727 (6.15-rc3)
CVE-2025-37784 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
@@ -114421,7 +114848,7 @@ CVE-2025-23156 (In the Linux kernel, the following
vulnerability has been resolv
[bookworm] - linux 6.1.135-1
NOTE:
https://git.kernel.org/linus/9edaaa8e3e15aab1ca413ab50556de1975bcb329 (6.15-rc1)
CVE-2025-23155 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
- {DSA-6163-1}
+ {DSA-6163-1 DLA-4499-1}
- linux 6.12.37-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/c60d101a226f18e9a8f01bb4c6ca2b47dfcb15ef (6.15-rc1)
@@ -118705,7 +119132,7 @@ CVE-2025-22027 (In the Linux kernel, the following
vulnerability has been resolv
- linux 6.12.25-1
NOTE:
https://git.kernel.org/linus/f656cfbc7a293a039d6a0c7100e1c846845148c1 (6.15-rc1)
CVE-2025-22026 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
- {DSA-6163-1}
+ {DSA-6163-1 DLA-4499-1}
- linux 6.12.25-1
NOTE:
https://git.kernel.org/linus/930b64ca0c511521f0abdd1d57ce52b2a6e3476b (6.15-rc1)
CVE-2025-22025 (In the Linux kernel, the following vulnerability has been
resolved: n ...)
@@ -149304,7 +149731,7 @@ CVE-2024-57896 (In the Linux kernel, the following
vulnerability has been resolv
[bookworm] - linux 6.1.124-1
NOTE:
https://git.kernel.org/linus/f10bef73fb355e3fc85e63a50386798be68ff486 (6.13-rc3)
CVE-2024-57895 (In the Linux kernel, the following vulnerability has been
resolved: k ...)
- {DSA-6163-1}
+ {DSA-6163-1 DLA-4499-1}
- linux 6.12.9-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/21e46a79bbe6c4e1aa73b3ed998130f2ff07b128 (6.13-rc3)
@@ -228176,7 +228603,7 @@ CVE-2024-26823 (In the Linux kernel, the following
vulnerability has been resolv
[buster] - linux <not-affected> (Vulnerable code not present)
NOTE:
https://git.kernel.org/linus/8b02da04ad978827e5ccd675acf170198f747a7a (6.8-rc5)
CVE-2024-26822 (In the Linux kernel, the following vulnerability has been
resolved: s ...)
- {DSA-6163-1}
+ {DSA-6163-1 DLA-4499-1}
- linux 6.7.7-1
[bullseye] - linux <not-affected> (Vulnerable code not present)
[buster] - linux <not-affected> (Vulnerable code not present)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/68681698b24becb63c5e7c63a897364fcd827e03
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/68681698b24becb63c5e7c63a897364fcd827e03
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits