[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sun Feb 15 08:12:54 GMT 2026



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
695dc1de by security tracker role at 2026-02-15T08:12:47+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,9 @@
+CVE-2026-1793 (The Element Pack Addons for Elementor plugin for WordPress is vulnerab ...)
+	TODO: check
+CVE-2026-1750 (The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress i ...)
+	TODO: check
+CVE-2026-1490 (The Spam protection, Anti-Spam, FireWall by CleanTalk plugin for WordP ...)
+	TODO: check
 CVE-2026-2312 (The Media Library Folders plugin for WordPress is vulnerable to Insecu ...)
 	NOT-FOR-US: WordPress plugin
 CVE-2026-1843 (The Super Page Cache plugin for WordPress is vulnerable to Stored Cros ...)
@@ -887,6 +893,7 @@ CVE-2025-1790 (Local privilege escalation in Genetec Sipelia Plugin. An authenti
 CVE-2025-14349 (Privilege Defined With Unsafe Actions, Missing Authentication for Crit ...)
 	NOT-FOR-US: FlexCity/Kiosk
 CVE-2026-2441 (Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed  ...)
+	{DSA-6135-1}
 	- chromium 145.0.7632.75-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-23112 (In the Linux kernel, the following vulnerability has been resolved:  n ...)
@@ -1618,36 +1625,47 @@ CVE-2026-2344 (A vulnerability in Plunet Plunet BusinessManager allows unauthori
 CVE-2026-2337 (A vulnerability in Plunet Plunet BusinessManager allows session hijack ...)
 	NOT-FOR-US: Plunet Plunet BusinessManager
 CVE-2026-2323 (Inappropriate implementation in Downloads in Google Chrome prior to 14 ...)
+	{DSA-6135-1}
 	- chromium 145.0.7632.45-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-2322 (Inappropriate implementation in File input in Google Chrome prior to 1 ...)
+	{DSA-6135-1}
 	- chromium 145.0.7632.45-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-2321 (Use after free in Ozone in Google Chrome prior to 145.0.7632.45 allowe ...)
+	{DSA-6135-1}
 	- chromium 145.0.7632.45-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-2320 (Inappropriate implementation in File input in Google Chrome prior to 1 ...)
+	{DSA-6135-1}
 	- chromium 145.0.7632.45-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-2319 (Race in DevTools in Google Chrome prior to 145.0.7632.45 allowed a rem ...)
+	{DSA-6135-1}
 	- chromium 145.0.7632.45-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-2318 (Inappropriate implementation in PictureInPicture in Google Chrome prio ...)
+	{DSA-6135-1}
 	- chromium 145.0.7632.45-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-2317 (Inappropriate implementation in Animation in Google Chrome prior to 14 ...)
+	{DSA-6135-1}
 	- chromium 145.0.7632.45-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-2316 (Insufficient policy enforcement in Frames in Google Chrome prior to 14 ...)
+	{DSA-6135-1}
 	- chromium 145.0.7632.45-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-2315 (Inappropriate implementation in WebGPU in Google Chrome prior to 145.0 ...)
+	{DSA-6135-1}
 	- chromium 145.0.7632.45-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-2314 (Heap buffer overflow in Codecs in Google Chrome prior to 145.0.7632.45 ...)
+	{DSA-6135-1}
 	- chromium 145.0.7632.45-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-2313 (Use after free in CSS in Google Chrome prior to 145.0.7632.45 allowed  ...)
+	{DSA-6135-1}
 	- chromium 145.0.7632.45-1
 	[bullseye] - chromium <end-of-life> (see #1061268)
 CVE-2026-2295 (The WPZOOM Addons for Elementor \u2013 Starter Templates & Widgets plu ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/695dc1de06c0db7139cbf55d7aeb0ac579d1523a

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/695dc1de06c0db7139cbf55d7aeb0ac579d1523a
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260215/bae4a303/attachment.htm>


More information about the debian-security-tracker-commits mailing list