[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso carnil at debian.org
Thu Jan 24 08:10:30 GMT 2019


Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
054a5fb0 by security tracker role at 2019-01-24T08:10:21Z
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,39 @@
+CVE-2019-6726
+	RESERVED
+CVE-2019-6725
+	RESERVED
+CVE-2019-6724
+	RESERVED
+CVE-2019-6723
+	RESERVED
+CVE-2019-6722
+	RESERVED
+CVE-2019-6721
+	RESERVED
+CVE-2019-6720
+	RESERVED
+CVE-2019-6719 (An issue has been found in libIEC61850 v1.3.1. There is a ...)
+	TODO: check
+CVE-2019-6718
+	RESERVED
+CVE-2019-6717
+	RESERVED
+CVE-2019-6716
+	RESERVED
+CVE-2019-6715
+	RESERVED
+CVE-2019-6714
+	RESERVED
+CVE-2019-6713 (app\admin\controller\RouteController.php in ThinkCMF 5.0.190111 allows ...)
+	TODO: check
+CVE-2019-6712
+	RESERVED
+CVE-2019-6711
+	RESERVED
+CVE-2019-6710
+	RESERVED
+CVE-2018-20742 (An issue was discovered in UC Berkeley RISE Opaque before 2018-12-01. ...)
+	TODO: check
 CVE-2019-6709
 	RESERVED
 CVE-2019-6708 (PHPSHE 1.7 has SQL injection via the admin.php?mod=order state ...)
@@ -43,7 +79,7 @@ CVE-2019-6691 (phpwind 9.0.2.170426 UTF8 allows SQL Injection via the ...)
 	NOT-FOR-US: phpwind
 CVE-2019-6690
 	RESERVED
-CVE-2018-1000997
+CVE-2018-1000997 (A path traversal vulnerability exists in the Stapler web framework ...)
 	NOT-FOR-US: Jenkins
 CVE-2019-6689
 	RESERVED
@@ -490,8 +526,7 @@ CVE-2019-6488 (The string component in the GNU C Library (aka glibc or libc6) th
 	NOTE: x32 not officially supported
 CVE-2019-6487 (TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 ...)
 	NOT-FOR-US: TP-Link
-CVE-2019-6486 [crypto/elliptic implementations of P-521 and P-384 elliptic curves allow for denial of service]
-	RESERVED
+CVE-2019-6486 (Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 ...)
 	- golang-1.12 <undetermined>
 	- golang-1.11 <unfixed>
 	- golang-1.10 <unfixed>
@@ -12899,24 +12934,24 @@ CVE-2019-1646
 	RESERVED
 CVE-2019-1645
 	RESERVED
-CVE-2019-1644
-	RESERVED
-CVE-2019-1643
-	RESERVED
-CVE-2019-1642
-	RESERVED
-CVE-2019-1641
-	RESERVED
-CVE-2019-1640
-	RESERVED
-CVE-2019-1639
-	RESERVED
-CVE-2019-1638
-	RESERVED
-CVE-2019-1637
-	RESERVED
-CVE-2019-1636
-	RESERVED
+CVE-2019-1644 (A vulnerability in the UDP protocol implementation for Cisco IoT Field ...)
+	TODO: check
+CVE-2019-1643 (A vulnerability in the web-based management interface of Cisco Prime ...)
+	TODO: check
+CVE-2019-1642 (A vulnerability in the web-based management interface of Cisco ...)
+	TODO: check
+CVE-2019-1641 (A vulnerability in the Cisco Webex Network Recording Player for ...)
+	TODO: check
+CVE-2019-1640 (A vulnerability in the Cisco Webex Network Recording Player for ...)
+	TODO: check
+CVE-2019-1639 (A vulnerability in the Cisco Webex Network Recording Player for ...)
+	TODO: check
+CVE-2019-1638 (A vulnerability in the Cisco Webex Network Recording Player for ...)
+	TODO: check
+CVE-2019-1637 (A vulnerability in the Cisco Webex Network Recording Player for ...)
+	TODO: check
+CVE-2019-1636 (A vulnerability in the Cisco Webex Teams client, formerly Cisco Spark, ...)
+	TODO: check
 CVE-2019-1635
 	RESERVED
 CVE-2019-1634
@@ -21857,172 +21892,172 @@ CVE-2018-17709
 	RESERVED
 CVE-2018-17708
 	RESERVED
-CVE-2018-17707
-	RESERVED
+CVE-2018-17707 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
 CVE-2018-17706 (This vulnerability allows remote attackers to execute arbitrary code ...)
 	NOT-FOR-US: Foxit PhantomPDF Phantom PDF
-CVE-2018-17705
-	RESERVED
-CVE-2018-17704
-	RESERVED
-CVE-2018-17703
-	RESERVED
-CVE-2018-17702
-	RESERVED
-CVE-2018-17701
-	RESERVED
-CVE-2018-17700
-	RESERVED
-CVE-2018-17699
-	RESERVED
-CVE-2018-17698
-	RESERVED
-CVE-2018-17697
-	RESERVED
-CVE-2018-17696
-	RESERVED
-CVE-2018-17695
-	RESERVED
-CVE-2018-17694
-	RESERVED
-CVE-2018-17693
-	RESERVED
-CVE-2018-17692
-	RESERVED
-CVE-2018-17691
-	RESERVED
-CVE-2018-17690
-	RESERVED
-CVE-2018-17689
-	RESERVED
-CVE-2018-17688
-	RESERVED
-CVE-2018-17687
-	RESERVED
-CVE-2018-17686
-	RESERVED
-CVE-2018-17685
-	RESERVED
-CVE-2018-17684
-	RESERVED
-CVE-2018-17683
-	RESERVED
-CVE-2018-17682
-	RESERVED
-CVE-2018-17681
-	RESERVED
-CVE-2018-17680
-	RESERVED
-CVE-2018-17679
-	RESERVED
-CVE-2018-17678
-	RESERVED
-CVE-2018-17677
-	RESERVED
-CVE-2018-17676
-	RESERVED
-CVE-2018-17675
-	RESERVED
-CVE-2018-17674
-	RESERVED
-CVE-2018-17673
-	RESERVED
-CVE-2018-17672
-	RESERVED
-CVE-2018-17671
-	RESERVED
-CVE-2018-17670
-	RESERVED
-CVE-2018-17669
-	RESERVED
-CVE-2018-17668
-	RESERVED
-CVE-2018-17667
-	RESERVED
-CVE-2018-17666
-	RESERVED
-CVE-2018-17665
-	RESERVED
-CVE-2018-17664
-	RESERVED
-CVE-2018-17663
-	RESERVED
-CVE-2018-17662
-	RESERVED
-CVE-2018-17661
-	RESERVED
-CVE-2018-17660
-	RESERVED
-CVE-2018-17659
-	RESERVED
-CVE-2018-17658
-	RESERVED
-CVE-2018-17657
-	RESERVED
-CVE-2018-17656
-	RESERVED
-CVE-2018-17655
-	RESERVED
-CVE-2018-17654
-	RESERVED
-CVE-2018-17653
-	RESERVED
-CVE-2018-17652
-	RESERVED
-CVE-2018-17651
-	RESERVED
-CVE-2018-17650
-	RESERVED
-CVE-2018-17649
-	RESERVED
-CVE-2018-17648
-	RESERVED
-CVE-2018-17647
-	RESERVED
-CVE-2018-17646
-	RESERVED
-CVE-2018-17645
-	RESERVED
-CVE-2018-17644
-	RESERVED
-CVE-2018-17643
-	RESERVED
-CVE-2018-17642
-	RESERVED
-CVE-2018-17641
-	RESERVED
-CVE-2018-17640
-	RESERVED
-CVE-2018-17639
-	RESERVED
-CVE-2018-17638
-	RESERVED
-CVE-2018-17637
-	RESERVED
-CVE-2018-17636
-	RESERVED
-CVE-2018-17635
-	RESERVED
-CVE-2018-17634
-	RESERVED
-CVE-2018-17633
-	RESERVED
-CVE-2018-17632
-	RESERVED
-CVE-2018-17631
-	RESERVED
-CVE-2018-17630
-	RESERVED
-CVE-2018-17629
-	RESERVED
-CVE-2018-17628
-	RESERVED
-CVE-2018-17627
-	RESERVED
-CVE-2018-17626
-	RESERVED
-CVE-2018-17625
-	RESERVED
+CVE-2018-17705 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17704 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17703 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17702 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17701 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17700 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17699 (This vulnerability allows remote attackers to disclose sensitive ...)
+	TODO: check
+CVE-2018-17698 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17697 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17696 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17695 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17694 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17693 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17692 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17691 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17690 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17689 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17688 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17687 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17686 (This vulnerability allows remote attackers to disclose sensitive ...)
+	TODO: check
+CVE-2018-17685 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17684 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17683 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17682 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17681 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17680 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17679 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17678 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17677 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17676 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17675 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17674 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17673 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17672 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17671 (This vulnerability allows remote attackers to disclose sensitive ...)
+	TODO: check
+CVE-2018-17670 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17669 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17668 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17667 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17666 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17665 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17664 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17663 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17662 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17661 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17660 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17659 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17658 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17657 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17656 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17655 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17654 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17653 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17652 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17651 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17650 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17649 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17648 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17647 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17646 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17645 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17644 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17643 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17642 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17641 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17640 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17639 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17638 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17637 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17636 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17635 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17634 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17633 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17632 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17631 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17630 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17629 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17628 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17627 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17626 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
+CVE-2018-17625 (This vulnerability allows remote attackers to execute arbitrary code ...)
+	TODO: check
 CVE-2018-17624 (This vulnerability allows remote attackers to execute arbitrary code ...)
 	NOT-FOR-US: Foxit Reader
 CVE-2018-17623 (This vulnerability allows remote attackers to execute arbitrary code ...)
@@ -27619,16 +27654,16 @@ CVE-2018-15461 (A vulnerability in the MyWebex component of Cisco Webex Business
 	NOT-FOR-US: Cisco
 CVE-2018-15460 (A vulnerability in the email message filtering feature of Cisco ...)
 	NOT-FOR-US: Cisco
-CVE-2018-15459
-	RESERVED
+CVE-2018-15459 (A vulnerability in the administrative web interface of Cisco Identity ...)
+	TODO: check
 CVE-2018-15458 (A vulnerability in the Shell Access Filter feature of Cisco Firepower ...)
 	NOT-FOR-US: Cisco
 CVE-2018-15457 (A vulnerability in the web-based management interface of Cisco Prime ...)
 	NOT-FOR-US: Cisco
 CVE-2018-15456 (A vulnerability in the Admin Portal of Cisco Identity Services Engine ...)
 	NOT-FOR-US: Cisco
-CVE-2018-15455
-	RESERVED
+CVE-2018-15455 (A vulnerability in the logging component of Cisco Identity Services ...)
+	TODO: check
 CVE-2018-15454 (A vulnerability in the Session Initiation Protocol (SIP) inspection ...)
 	NOT-FOR-US: Cisco
 CVE-2018-15453 (A vulnerability in the Secure/Multipurpose Internet Mail Extensions ...)
@@ -70944,8 +70979,8 @@ CVE-2018-0189 (A vulnerability in the Forwarding Information Base (FIB) code of
 	NOT-FOR-US: Cisco
 CVE-2018-0188 (Multiple vulnerabilities in the web-based user interface (web UI) of ...)
 	NOT-FOR-US: Cisco
-CVE-2018-0187
-	RESERVED
+CVE-2018-0187 (A vulnerability in the Admin portal of Cisco Identity Services Engine ...)
+	TODO: check
 CVE-2018-0186 (Multiple vulnerabilities in the web-based user interface (web UI) of ...)
 	NOT-FOR-US: Cisco
 CVE-2018-0185 (Multiple vulnerabilities in the CLI parser of Cisco IOS XE Software ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/054a5fb05748ba52f5342179e57ae9edf6dfdeee

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/054a5fb05748ba52f5342179e57ae9edf6dfdeee
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190124/a771cd2c/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list