[Secure-testing-commits] [Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso
carnil at debian.org
Wed Feb 14 21:10:28 UTC 2018
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
104fb8a2 by security tracker role at 2018-02-14T21:10:24+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
--- a/data/CVE/list
+++ b/data/CVE/list
@@ -1,4 +1,192 @@
-CVE-2018-7032 [webcheckout: missing URL sanitization]
+CVE-2018-7049
+ RESERVED
+CVE-2018-7048
+ RESERVED
+CVE-2018-7047
+ RESERVED
+CVE-2018-7046
+ RESERVED
+CVE-2018-7045
+ RESERVED
+CVE-2018-7044
+ RESERVED
+CVE-2018-7043
+ RESERVED
+CVE-2018-7042
+ RESERVED
+CVE-2018-7041
+ RESERVED
+CVE-2018-7040
+ RESERVED
+CVE-2018-7039 (CCN-lite 2.0.0 Beta allows remote attackers to cause a denial of ...)
+ TODO: check
+CVE-2018-7038
+ RESERVED
+CVE-2018-7037
+ RESERVED
+CVE-2018-7036
+ RESERVED
+CVE-2018-7035
+ RESERVED
+CVE-2018-7034 (TRENDnet TEW-751DR v1.03B03, TEW-752DRU v1.03B01, and TEW733GR v1.03B01 ...)
+ TODO: check
+CVE-2018-7033
+ RESERVED
+CVE-2018-7031
+ RESERVED
+CVE-2018-7030
+ RESERVED
+CVE-2018-7029
+ RESERVED
+CVE-2018-7028
+ RESERVED
+CVE-2018-7027
+ RESERVED
+CVE-2018-7026
+ RESERVED
+CVE-2018-7025
+ RESERVED
+CVE-2018-7024
+ RESERVED
+CVE-2018-7023
+ RESERVED
+CVE-2018-7022
+ RESERVED
+CVE-2018-7021
+ RESERVED
+CVE-2018-7020
+ RESERVED
+CVE-2018-7019
+ RESERVED
+CVE-2018-7018
+ RESERVED
+CVE-2018-7017
+ RESERVED
+CVE-2018-7016
+ RESERVED
+CVE-2018-7015
+ RESERVED
+CVE-2018-7014
+ RESERVED
+CVE-2018-7013
+ RESERVED
+CVE-2018-7012
+ RESERVED
+CVE-2018-7011
+ RESERVED
+CVE-2018-7010
+ RESERVED
+CVE-2018-7009
+ RESERVED
+CVE-2018-7008
+ RESERVED
+CVE-2018-7007
+ RESERVED
+CVE-2018-7006
+ RESERVED
+CVE-2018-7005
+ RESERVED
+CVE-2018-7004
+ RESERVED
+CVE-2018-7003
+ RESERVED
+CVE-2018-7002
+ RESERVED
+CVE-2018-7001
+ RESERVED
+CVE-2018-7000
+ RESERVED
+CVE-2018-6999
+ RESERVED
+CVE-2018-6998
+ RESERVED
+CVE-2018-6997
+ RESERVED
+CVE-2018-6996
+ RESERVED
+CVE-2018-6995
+ RESERVED
+CVE-2018-6994
+ RESERVED
+CVE-2018-6993
+ RESERVED
+CVE-2018-6992
+ RESERVED
+CVE-2018-6991
+ RESERVED
+CVE-2018-6990
+ RESERVED
+CVE-2018-6989
+ RESERVED
+CVE-2018-6988
+ RESERVED
+CVE-2018-6987
+ RESERVED
+CVE-2018-6986
+ RESERVED
+CVE-2018-6985
+ RESERVED
+CVE-2018-6984
+ RESERVED
+CVE-2018-6983
+ RESERVED
+CVE-2018-6982
+ RESERVED
+CVE-2018-6981
+ RESERVED
+CVE-2018-6980
+ RESERVED
+CVE-2018-6979
+ RESERVED
+CVE-2018-6978
+ RESERVED
+CVE-2018-6977
+ RESERVED
+CVE-2018-6976
+ RESERVED
+CVE-2018-6975
+ RESERVED
+CVE-2018-6974
+ RESERVED
+CVE-2018-6973
+ RESERVED
+CVE-2018-6972
+ RESERVED
+CVE-2018-6971
+ RESERVED
+CVE-2018-6970
+ RESERVED
+CVE-2018-6969
+ RESERVED
+CVE-2018-6968
+ RESERVED
+CVE-2018-6967
+ RESERVED
+CVE-2018-6966
+ RESERVED
+CVE-2018-6965
+ RESERVED
+CVE-2018-6964
+ RESERVED
+CVE-2018-6963
+ RESERVED
+CVE-2018-6962
+ RESERVED
+CVE-2018-6961
+ RESERVED
+CVE-2018-6960
+ RESERVED
+CVE-2018-6959
+ RESERVED
+CVE-2018-6958
+ RESERVED
+CVE-2018-6957
+ RESERVED
+CVE-2017-18188 (OpenRC opentmpfiles through 0.1.3, when the fs.protected_hardlinks ...)
+ TODO: check
+CVE-2017-18187 (In ARM mbed TLS before 2.7.0, there is a bounds-check bypass through an ...)
+ TODO: check
+CVE-2018-7032 (webcheckout in myrepos through 1.20171231 does not sanitize URLs that ...)
- myrepos <unfixed> (bug #840014)
[stretch] - myrepos <no-dsa> (Minor issue)
[jessie] - myrepos <no-dsa> (Minor issue)
@@ -11915,62 +12103,62 @@ CVE-2018-2398
RESERVED
CVE-2018-2397
RESERVED
-CVE-2018-2396
- RESERVED
-CVE-2018-2395
- RESERVED
-CVE-2018-2394
- RESERVED
-CVE-2018-2393
- RESERVED
-CVE-2018-2392
- RESERVED
-CVE-2018-2391
- RESERVED
-CVE-2018-2390
- RESERVED
-CVE-2018-2389
- RESERVED
-CVE-2018-2388
- RESERVED
-CVE-2018-2387
- RESERVED
-CVE-2018-2386
- RESERVED
-CVE-2018-2385
- RESERVED
-CVE-2018-2384
- RESERVED
-CVE-2018-2383
- RESERVED
-CVE-2018-2382
- RESERVED
-CVE-2018-2381
- RESERVED
+CVE-2018-2396 (Under certain conditions a malicious user can prevent legitimate users ...)
+ TODO: check
+CVE-2018-2395 (Under certain conditions a malicious user may retrieve information on ...)
+ TODO: check
+CVE-2018-2394 (Under certain conditions an unauthenticated malicious user can prevent ...)
+ TODO: check
+CVE-2018-2393 (Under certain conditions SAP Internet Graphics Server (IGS) 7.20, ...)
+ TODO: check
+CVE-2018-2392 (Under certain conditions SAP Internet Graphics Server (IGS) 7.20, ...)
+ TODO: check
+CVE-2018-2391 (Under certain conditions a malicious user can prevent legitimate users ...)
+ TODO: check
+CVE-2018-2390 (Under certain conditions a malicious user can prevent legitimate users ...)
+ TODO: check
+CVE-2018-2389 (Under certain conditions a malicious user can inject log files of SAP ...)
+ TODO: check
+CVE-2018-2388 (Stored cross-site scripting vulnerability in SAP internet Graphics ...)
+ TODO: check
+CVE-2018-2387 (A vulnerability in the SAP internet Graphics Server, 7.20, 7.20EXT, ...)
+ TODO: check
+CVE-2018-2386 (Under certain conditions a malicious user provoking an out of bounds ...)
+ TODO: check
+CVE-2018-2385 (Under certain conditions a malicious user provoking a divide by zero ...)
+ TODO: check
+CVE-2018-2384 (Under certain conditions a malicious user provoking a Null Pointer ...)
+ TODO: check
+CVE-2018-2383 (Reflected cross-site scripting vulnerability in SAP internet Graphics ...)
+ TODO: check
+CVE-2018-2382 (A vulnerability in the SAP internet Graphics Server, 7.20, 7.20EXT, ...)
+ TODO: check
+CVE-2018-2381 (SAP ERP Financials Information System (SAP_APPL 6.00, 6.02, 6.03, ...)
+ TODO: check
CVE-2018-2380
RESERVED
-CVE-2018-2379
- RESERVED
-CVE-2018-2378
- RESERVED
-CVE-2018-2377
- RESERVED
-CVE-2018-2376
- RESERVED
-CVE-2018-2375
- RESERVED
-CVE-2018-2374
- RESERVED
-CVE-2018-2373
- RESERVED
-CVE-2018-2372
- RESERVED
-CVE-2018-2371
- RESERVED
-CVE-2018-2370
- RESERVED
-CVE-2018-2369
- RESERVED
+CVE-2018-2379 (In SAP HANA Extended Application Services, 1.0, an unauthenticated ...)
+ TODO: check
+CVE-2018-2378 (In SAP HANA Extended Application Services, 1.0, unauthorized users can ...)
+ TODO: check
+CVE-2018-2377 (In SAP HANA Extended Application Services, 1.0, some general server ...)
+ TODO: check
+CVE-2018-2376 (In SAP HANA Extended Application Services, 1.0, a controller user who ...)
+ TODO: check
+CVE-2018-2375 (In SAP HANA Extended Application Services, 1.0, a controller user who ...)
+ TODO: check
+CVE-2018-2374 (In SAP HANA Extended Application Services, 1.0, a controller user who ...)
+ TODO: check
+CVE-2018-2373 (Under certain circumstances, a specific endpoint of the Controller's ...)
+ TODO: check
+CVE-2018-2372 (A plain keystore password is written to a system log file in SAP HANA ...)
+ TODO: check
+CVE-2018-2371 (The SAML 2.0 service provider of SAP Netweaver AS Java Web ...)
+ TODO: check
+CVE-2018-2370 (Server Side Request Forgery (SSRF) vulnerability in SAP Central ...)
+ TODO: check
+CVE-2018-2369 (Under certain conditions SAP HANA, 1.00, 2.00, allows an ...)
+ TODO: check
CVE-2018-2368
RESERVED
CVE-2018-2367
@@ -11979,8 +12167,8 @@ CVE-2018-2366
RESERVED
CVE-2018-2365
RESERVED
-CVE-2018-2364
- RESERVED
+CVE-2018-2364 (SAP CRM WebClient UI 7.01, 7.31, 7.46, 7.47, 7.48, 8.00, 8.01, S4FND ...)
+ TODO: check
CVE-2018-2363 (SAP NetWeaver, SAP BASIS from 7.00 to 7.02, from 7.10 to 7.11, 7.30, ...)
NOT-FOR-US: SAP NetWeaver
CVE-2018-2362 (A remote unauthenticated attacker, SAP HANA 1.00 and 2.00, could send ...)
@@ -14828,8 +15016,7 @@ CVE-2018-1289
RESERVED
CVE-2018-1288
RESERVED
-CVE-2018-1287 [Apache JMeter binds RMI server to wildcard in distributed mode (based on RMI)]
- RESERVED
+CVE-2018-1287 (In Apache JMeter 2.X and 3.X, when using Distributed Test only (RMI ...)
- jakarta-jmeter <unfixed>
NOTE: http://www.openwall.com/lists/oss-security/2018/02/11/2
NOTE: https://bz.apache.org/bugzilla/show_bug.cgi?id=62039
@@ -26250,9 +26437,9 @@ CVE-2017-14525 (Multiple open redirect vulnerabilities in OpenText Documentum We
NOT-FOR-US: OpenText Documentum Webtop
CVE-2017-14524 (Multiple open redirect vulnerabilities in OpenText Documentum ...)
NOT-FOR-US: OpenText Documentum Administrator
-CVE-2017-14523 (WonderCMS 2.3.1 is vulnerable to an HTTP Host header injection attack. ...)
+CVE-2017-14523 (** DISPUTED ** ...)
NOT-FOR-US: WonderCMS
-CVE-2017-14522 (In WonderCMS 2.3.1, the application's input fields accept arbitrary ...)
+CVE-2017-14522 (** DISPUTED ** ...)
NOT-FOR-US: WonderCMS
CVE-2017-14521 (In WonderCMS 2.3.1, the upload functionality accepts random ...)
NOT-FOR-US: WonderCMS
@@ -51819,10 +52006,10 @@ CVE-2017-6232
RESERVED
CVE-2017-6231
RESERVED
-CVE-2017-6230
- RESERVED
-CVE-2017-6229
- RESERVED
+CVE-2017-6230 (Ruckus Networks Solo APs firmware releases R110.x or before and Ruckus ...)
+ TODO: check
+CVE-2017-6229 (Ruckus Networks Unleashed AP firmware releases before 200.6.10.1.x and ...)
+ TODO: check
CVE-2017-6228
RESERVED
CVE-2017-6227 (A vulnerability in the IPv6 stack on Brocade Fibre Channel SAN ...)
@@ -65000,8 +65187,8 @@ CVE-2017-1684
RESERVED
CVE-2017-1683 (IBM Connections Engagement Center 6.0 is vulnerable to cross-site ...)
NOT-FOR-US: IBM Connections Engagement Center
-CVE-2017-1682
- RESERVED
+CVE-2017-1682 (IBM Connections 4.0, 4.5, 5.0, 5.5, and 6.0 is vulnerable to ...)
+ TODO: check
CVE-2017-1681 (IBM WebSphere Application Server (IBM Liberty for Java for Bluemix ...)
NOT-FOR-US: IBM WebSphere Application Server
CVE-2017-1680
@@ -65366,8 +65553,8 @@ CVE-2017-1501 (IBM WebSphere Application Server 8.0, 8.5, and 9.0 could provide
NOT-FOR-US: IBM
CVE-2017-1500 (A Reflected Cross Site Scripting (XSS) vulnerability exists in the ...)
NOT-FOR-US: IBM
-CVE-2017-1499
- RESERVED
+CVE-2017-1499 (IBM Maximo Asset Management 7.5 and 7.6 could allow a remote attacker ...)
+ TODO: check
CVE-2017-1498 (IBM Connections 5.5 is vulnerable to cross-site scripting. This ...)
NOT-FOR-US: IBM
CVE-2017-1497 (IBM Sterling File Gateway 2.2 could allow an unauthorized user to view ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/104fb8a21e450b4ff7dc5fc69cda98d43fa8a2db
---
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/104fb8a21e450b4ff7dc5fc69cda98d43fa8a2db
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-commits/attachments/20180214/9adf90a2/attachment-0001.html>
More information about the Secure-testing-commits
mailing list