[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso carnil at debian.org
Fri Mar 29 20:10:42 GMT 2019



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
af7ee517 by security tracker role at 2019-03-29T20:10:34Z
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,709 @@
+CVE-2019-10629
+	RESERVED
+CVE-2019-10628
+	RESERVED
+CVE-2019-10627
+	RESERVED
+CVE-2019-10626
+	RESERVED
+CVE-2019-10625
+	RESERVED
+CVE-2019-10624
+	RESERVED
+CVE-2019-10623
+	RESERVED
+CVE-2019-10622
+	RESERVED
+CVE-2019-10621
+	RESERVED
+CVE-2019-10620
+	RESERVED
+CVE-2019-10619
+	RESERVED
+CVE-2019-10618
+	RESERVED
+CVE-2019-10617
+	RESERVED
+CVE-2019-10616
+	RESERVED
+CVE-2019-10615
+	RESERVED
+CVE-2019-10614
+	RESERVED
+CVE-2019-10613
+	RESERVED
+CVE-2019-10612
+	RESERVED
+CVE-2019-10611
+	RESERVED
+CVE-2019-10610
+	RESERVED
+CVE-2019-10609
+	RESERVED
+CVE-2019-10608
+	RESERVED
+CVE-2019-10607
+	RESERVED
+CVE-2019-10606
+	RESERVED
+CVE-2019-10605
+	RESERVED
+CVE-2019-10604
+	RESERVED
+CVE-2019-10603
+	RESERVED
+CVE-2019-10602
+	RESERVED
+CVE-2019-10601
+	RESERVED
+CVE-2019-10600
+	RESERVED
+CVE-2019-10599
+	RESERVED
+CVE-2019-10598
+	RESERVED
+CVE-2019-10597
+	RESERVED
+CVE-2019-10596
+	RESERVED
+CVE-2019-10595
+	RESERVED
+CVE-2019-10594
+	RESERVED
+CVE-2019-10593
+	RESERVED
+CVE-2019-10592
+	RESERVED
+CVE-2019-10591
+	RESERVED
+CVE-2019-10590
+	RESERVED
+CVE-2019-10589
+	RESERVED
+CVE-2019-10588
+	RESERVED
+CVE-2019-10587
+	RESERVED
+CVE-2019-10586
+	RESERVED
+CVE-2019-10585
+	RESERVED
+CVE-2019-10584
+	RESERVED
+CVE-2019-10583
+	RESERVED
+CVE-2019-10582
+	RESERVED
+CVE-2019-10581
+	RESERVED
+CVE-2019-10580
+	RESERVED
+CVE-2019-10579
+	RESERVED
+CVE-2019-10578
+	RESERVED
+CVE-2019-10577
+	RESERVED
+CVE-2019-10576
+	RESERVED
+CVE-2019-10575
+	RESERVED
+CVE-2019-10574
+	RESERVED
+CVE-2019-10573
+	RESERVED
+CVE-2019-10572
+	RESERVED
+CVE-2019-10571
+	RESERVED
+CVE-2019-10570
+	RESERVED
+CVE-2019-10569
+	RESERVED
+CVE-2019-10568
+	RESERVED
+CVE-2019-10567
+	RESERVED
+CVE-2019-10566
+	RESERVED
+CVE-2019-10565
+	RESERVED
+CVE-2019-10564
+	RESERVED
+CVE-2019-10563
+	RESERVED
+CVE-2019-10562
+	RESERVED
+CVE-2019-10561
+	RESERVED
+CVE-2019-10560
+	RESERVED
+CVE-2019-10559
+	RESERVED
+CVE-2019-10558
+	RESERVED
+CVE-2019-10557
+	RESERVED
+CVE-2019-10556
+	RESERVED
+CVE-2019-10555
+	RESERVED
+CVE-2019-10554
+	RESERVED
+CVE-2019-10553
+	RESERVED
+CVE-2019-10552
+	RESERVED
+CVE-2019-10551
+	RESERVED
+CVE-2019-10550
+	RESERVED
+CVE-2019-10549
+	RESERVED
+CVE-2019-10548
+	RESERVED
+CVE-2019-10547
+	RESERVED
+CVE-2019-10546
+	RESERVED
+CVE-2019-10545
+	RESERVED
+CVE-2019-10544
+	RESERVED
+CVE-2019-10543
+	RESERVED
+CVE-2019-10542
+	RESERVED
+CVE-2019-10541
+	RESERVED
+CVE-2019-10540
+	RESERVED
+CVE-2019-10539
+	RESERVED
+CVE-2019-10538
+	RESERVED
+CVE-2019-10537
+	RESERVED
+CVE-2019-10536
+	RESERVED
+CVE-2019-10535
+	RESERVED
+CVE-2019-10534
+	RESERVED
+CVE-2019-10533
+	RESERVED
+CVE-2019-10532
+	RESERVED
+CVE-2019-10531
+	RESERVED
+CVE-2019-10530
+	RESERVED
+CVE-2019-10529
+	RESERVED
+CVE-2019-10528
+	RESERVED
+CVE-2019-10527
+	RESERVED
+CVE-2019-10526
+	RESERVED
+CVE-2019-10525
+	RESERVED
+CVE-2019-10524
+	RESERVED
+CVE-2019-10523
+	RESERVED
+CVE-2019-10522
+	RESERVED
+CVE-2019-10521
+	RESERVED
+CVE-2019-10520
+	RESERVED
+CVE-2019-10519
+	RESERVED
+CVE-2019-10518
+	RESERVED
+CVE-2019-10517
+	RESERVED
+CVE-2019-10516
+	RESERVED
+CVE-2019-10515
+	RESERVED
+CVE-2019-10514
+	RESERVED
+CVE-2019-10513
+	RESERVED
+CVE-2019-10512
+	RESERVED
+CVE-2019-10511
+	RESERVED
+CVE-2019-10510
+	RESERVED
+CVE-2019-10509
+	RESERVED
+CVE-2019-10508
+	RESERVED
+CVE-2019-10507
+	RESERVED
+CVE-2019-10506
+	RESERVED
+CVE-2019-10505
+	RESERVED
+CVE-2019-10504
+	RESERVED
+CVE-2019-10503
+	RESERVED
+CVE-2019-10502
+	RESERVED
+CVE-2019-10501
+	RESERVED
+CVE-2019-10500
+	RESERVED
+CVE-2019-10499
+	RESERVED
+CVE-2019-10498
+	RESERVED
+CVE-2019-10497
+	RESERVED
+CVE-2019-10496
+	RESERVED
+CVE-2019-10495
+	RESERVED
+CVE-2019-10494
+	RESERVED
+CVE-2019-10493
+	RESERVED
+CVE-2019-10492
+	RESERVED
+CVE-2019-10491
+	RESERVED
+CVE-2019-10490
+	RESERVED
+CVE-2019-10489
+	RESERVED
+CVE-2019-10488
+	RESERVED
+CVE-2019-10487
+	RESERVED
+CVE-2019-10486
+	RESERVED
+CVE-2019-10485
+	RESERVED
+CVE-2019-10484
+	RESERVED
+CVE-2019-10483
+	RESERVED
+CVE-2019-10482
+	RESERVED
+CVE-2019-10481
+	RESERVED
+CVE-2019-10480
+	RESERVED
+CVE-2019-10479
+	RESERVED
+CVE-2019-10478
+	RESERVED
+CVE-2019-10477 (The FusionInventory plugin before 1.4 for GLPI 9.3.x and before 1.1 fo ...)
+	TODO: check
+CVE-2019-10476
+	RESERVED
+CVE-2019-10475
+	RESERVED
+CVE-2019-10474
+	RESERVED
+CVE-2019-10473
+	RESERVED
+CVE-2019-10472
+	RESERVED
+CVE-2019-10471
+	RESERVED
+CVE-2019-10470
+	RESERVED
+CVE-2019-10469
+	RESERVED
+CVE-2019-10468
+	RESERVED
+CVE-2019-10467
+	RESERVED
+CVE-2019-10466
+	RESERVED
+CVE-2019-10465
+	RESERVED
+CVE-2019-10464
+	RESERVED
+CVE-2019-10463
+	RESERVED
+CVE-2019-10462
+	RESERVED
+CVE-2019-10461
+	RESERVED
+CVE-2019-10460
+	RESERVED
+CVE-2019-10459
+	RESERVED
+CVE-2019-10458
+	RESERVED
+CVE-2019-10457
+	RESERVED
+CVE-2019-10456
+	RESERVED
+CVE-2019-10455
+	RESERVED
+CVE-2019-10454
+	RESERVED
+CVE-2019-10453
+	RESERVED
+CVE-2019-10452
+	RESERVED
+CVE-2019-10451
+	RESERVED
+CVE-2019-10450
+	RESERVED
+CVE-2019-10449
+	RESERVED
+CVE-2019-10448
+	RESERVED
+CVE-2019-10447
+	RESERVED
+CVE-2019-10446
+	RESERVED
+CVE-2019-10445
+	RESERVED
+CVE-2019-10444
+	RESERVED
+CVE-2019-10443
+	RESERVED
+CVE-2019-10442
+	RESERVED
+CVE-2019-10441
+	RESERVED
+CVE-2019-10440
+	RESERVED
+CVE-2019-10439
+	RESERVED
+CVE-2019-10438
+	RESERVED
+CVE-2019-10437
+	RESERVED
+CVE-2019-10436
+	RESERVED
+CVE-2019-10435
+	RESERVED
+CVE-2019-10434
+	RESERVED
+CVE-2019-10433
+	RESERVED
+CVE-2019-10432
+	RESERVED
+CVE-2019-10431
+	RESERVED
+CVE-2019-10430
+	RESERVED
+CVE-2019-10429
+	RESERVED
+CVE-2019-10428
+	RESERVED
+CVE-2019-10427
+	RESERVED
+CVE-2019-10426
+	RESERVED
+CVE-2019-10425
+	RESERVED
+CVE-2019-10424
+	RESERVED
+CVE-2019-10423
+	RESERVED
+CVE-2019-10422
+	RESERVED
+CVE-2019-10421
+	RESERVED
+CVE-2019-10420
+	RESERVED
+CVE-2019-10419
+	RESERVED
+CVE-2019-10418
+	RESERVED
+CVE-2019-10417
+	RESERVED
+CVE-2019-10416
+	RESERVED
+CVE-2019-10415
+	RESERVED
+CVE-2019-10414
+	RESERVED
+CVE-2019-10413
+	RESERVED
+CVE-2019-10412
+	RESERVED
+CVE-2019-10411
+	RESERVED
+CVE-2019-10410
+	RESERVED
+CVE-2019-10409
+	RESERVED
+CVE-2019-10408
+	RESERVED
+CVE-2019-10407
+	RESERVED
+CVE-2019-10406
+	RESERVED
+CVE-2019-10405
+	RESERVED
+CVE-2019-10404
+	RESERVED
+CVE-2019-10403
+	RESERVED
+CVE-2019-10402
+	RESERVED
+CVE-2019-10401
+	RESERVED
+CVE-2019-10400
+	RESERVED
+CVE-2019-10399
+	RESERVED
+CVE-2019-10398
+	RESERVED
+CVE-2019-10397
+	RESERVED
+CVE-2019-10396
+	RESERVED
+CVE-2019-10395
+	RESERVED
+CVE-2019-10394
+	RESERVED
+CVE-2019-10393
+	RESERVED
+CVE-2019-10392
+	RESERVED
+CVE-2019-10391
+	RESERVED
+CVE-2019-10390
+	RESERVED
+CVE-2019-10389
+	RESERVED
+CVE-2019-10388
+	RESERVED
+CVE-2019-10387
+	RESERVED
+CVE-2019-10386
+	RESERVED
+CVE-2019-10385
+	RESERVED
+CVE-2019-10384
+	RESERVED
+CVE-2019-10383
+	RESERVED
+CVE-2019-10382
+	RESERVED
+CVE-2019-10381
+	RESERVED
+CVE-2019-10380
+	RESERVED
+CVE-2019-10379
+	RESERVED
+CVE-2019-10378
+	RESERVED
+CVE-2019-10377
+	RESERVED
+CVE-2019-10376
+	RESERVED
+CVE-2019-10375
+	RESERVED
+CVE-2019-10374
+	RESERVED
+CVE-2019-10373
+	RESERVED
+CVE-2019-10372
+	RESERVED
+CVE-2019-10371
+	RESERVED
+CVE-2019-10370
+	RESERVED
+CVE-2019-10369
+	RESERVED
+CVE-2019-10368
+	RESERVED
+CVE-2019-10367
+	RESERVED
+CVE-2019-10366
+	RESERVED
+CVE-2019-10365
+	RESERVED
+CVE-2019-10364
+	RESERVED
+CVE-2019-10363
+	RESERVED
+CVE-2019-10362
+	RESERVED
+CVE-2019-10361
+	RESERVED
+CVE-2019-10360
+	RESERVED
+CVE-2019-10359
+	RESERVED
+CVE-2019-10358
+	RESERVED
+CVE-2019-10357
+	RESERVED
+CVE-2019-10356
+	RESERVED
+CVE-2019-10355
+	RESERVED
+CVE-2019-10354
+	RESERVED
+CVE-2019-10353
+	RESERVED
+CVE-2019-10352
+	RESERVED
+CVE-2019-10351
+	RESERVED
+CVE-2019-10350
+	RESERVED
+CVE-2019-10349
+	RESERVED
+CVE-2019-10348
+	RESERVED
+CVE-2019-10347
+	RESERVED
+CVE-2019-10346
+	RESERVED
+CVE-2019-10345
+	RESERVED
+CVE-2019-10344
+	RESERVED
+CVE-2019-10343
+	RESERVED
+CVE-2019-10342
+	RESERVED
+CVE-2019-10341
+	RESERVED
+CVE-2019-10340
+	RESERVED
+CVE-2019-10339
+	RESERVED
+CVE-2019-10338
+	RESERVED
+CVE-2019-10337
+	RESERVED
+CVE-2019-10336
+	RESERVED
+CVE-2019-10335
+	RESERVED
+CVE-2019-10334
+	RESERVED
+CVE-2019-10333
+	RESERVED
+CVE-2019-10332
+	RESERVED
+CVE-2019-10331
+	RESERVED
+CVE-2019-10330
+	RESERVED
+CVE-2019-10329
+	RESERVED
+CVE-2019-10328
+	RESERVED
+CVE-2019-10327
+	RESERVED
+CVE-2019-10326
+	RESERVED
+CVE-2019-10325
+	RESERVED
+CVE-2019-10324
+	RESERVED
+CVE-2019-10323
+	RESERVED
+CVE-2019-10322
+	RESERVED
+CVE-2019-10321
+	RESERVED
+CVE-2019-10320
+	RESERVED
+CVE-2019-10319
+	RESERVED
+CVE-2019-10318
+	RESERVED
+CVE-2019-10317
+	RESERVED
+CVE-2019-10316
+	RESERVED
+CVE-2019-10315
+	RESERVED
+CVE-2019-10314
+	RESERVED
+CVE-2019-10313
+	RESERVED
+CVE-2019-10312
+	RESERVED
+CVE-2019-10311
+	RESERVED
+CVE-2019-10310
+	RESERVED
+CVE-2019-10309
+	RESERVED
+CVE-2019-10308
+	RESERVED
+CVE-2019-10307
+	RESERVED
+CVE-2019-10306
+	RESERVED
+CVE-2019-10305
+	RESERVED
+CVE-2019-10304
+	RESERVED
+CVE-2019-10303
+	RESERVED
+CVE-2019-10302
+	RESERVED
+CVE-2019-10301
+	RESERVED
+CVE-2019-10300
+	RESERVED
+CVE-2019-10299
+	RESERVED
+CVE-2019-10298
+	RESERVED
+CVE-2019-10297
+	RESERVED
+CVE-2019-10296
+	RESERVED
+CVE-2019-10295
+	RESERVED
+CVE-2019-10294
+	RESERVED
+CVE-2019-10293
+	RESERVED
+CVE-2019-10292
+	RESERVED
+CVE-2019-10291
+	RESERVED
+CVE-2019-10290
+	RESERVED
+CVE-2019-10289
+	RESERVED
+CVE-2019-10288
+	RESERVED
+CVE-2019-10287
+	RESERVED
+CVE-2019-10286
+	RESERVED
+CVE-2019-10285
+	RESERVED
+CVE-2019-10284
+	RESERVED
+CVE-2019-10283
+	RESERVED
+CVE-2019-10282
+	RESERVED
+CVE-2019-10281
+	RESERVED
+CVE-2019-10280
+	RESERVED
+CVE-2019-10279
+	RESERVED
+CVE-2019-10278
+	RESERVED
+CVE-2019-10277
+	RESERVED
 CVE-2019-XXXX [insecure handling of /tmp/VMwareDnD]
 	- open-vm-tools 2:10.3.10-1 (bug #925959)
 	NOTE: https://github.com/vmware/open-vm-tools/commit/e88f91b00a715b79255de6576506d80ecfdb064c
@@ -743,6 +1449,7 @@ CVE-2016-10743 (hostapd before 2.6 does not prevent use of the low-quality PRNG
 	NOTE: There was already a 2.6 upload late in 2016 but then reverted to a 2.4 based
 	NOTE: version and only reuploaded as 2:2.6-7 to unstable.
 CVE-2019-9942 (A sandbox information disclosure exists in Twig before 1.38.0 and 2.x  ...)
+	{DSA-4419-1}
 	[experimental] - twig 2.7.1-1
 	- twig 2.6.2-2
 	[jessie] - twig <no-dsa> (low priority, sandbox disabled by default)
@@ -798,16 +1505,16 @@ CVE-2019-9923 (pax_decode_header in sparse.c in GNU Tar before 1.32 had a NULL p
 	NOTE: http://savannah.gnu.org/bugs/?55369 (private)
 	NOTE: https://bugs.launchpad.net/ubuntu/+source/tar/+bug/1810241
 	NOTE: Crash in CLI tool, no security impact
-CVE-2019-9922
-	RESERVED
-CVE-2019-9921
-	RESERVED
-CVE-2019-9920
-	RESERVED
-CVE-2019-9919
-	RESERVED
-CVE-2019-9918
-	RESERVED
+CVE-2019-9922 (An issue was discovered in the Harmis JE Messenger component 1.2.2 for ...)
+	TODO: check
+CVE-2019-9921 (An issue was discovered in the Harmis JE Messenger component 1.2.2 for ...)
+	TODO: check
+CVE-2019-9920 (An issue was discovered in the Harmis JE Messenger component 1.2.2 for ...)
+	TODO: check
+CVE-2019-9919 (An issue was discovered in the Harmis JE Messenger component 1.2.2 for ...)
+	TODO: check
+CVE-2019-9918 (An issue was discovered in the Harmis JE Messenger component 1.2.2 for ...)
+	TODO: check
 CVE-2019-9917 (ZNC before 1.7.3-rc1 allows an existing remote user to cause a Denial  ...)
 	- znc 1.7.2-2 (bug #925285)
 	[jessie] - znc <not-affected> (The vulnerable code is not present)
@@ -2115,8 +2822,8 @@ CVE-2019-9697
 	RESERVED
 CVE-2019-9696
 	RESERVED
-CVE-2019-9695
-	RESERVED
+CVE-2019-9695 (Norton Core prior to v278 may be susceptible to an arbitrary code exec ...)
+	TODO: check
 CVE-2019-9694
 	RESERVED
 CVE-2019-9693 (In CMS Made Simple (CMSMS) before 2.2.10, an authenticated user can ac ...)
@@ -2386,10 +3093,10 @@ CVE-2019-9607 (PHP Scripts Mall Medical Store Script 3.0.3 allows Path Traversal
 	NOT-FOR-US: PHP Scripts Mall Medical Store Script
 CVE-2019-9606 (PHP Scripts Mall Personal Video Collection Script 4.0.4 has Stored XSS ...)
 	NOT-FOR-US: PHP Scripts Mall Personal Video Collection Script
-CVE-2019-9605
-	RESERVED
-CVE-2019-9604
-	RESERVED
+CVE-2019-9605 (PHP Scripts Mall Online Lottery PHP Readymade Script 1.7.0 has Reflect ...)
+	TODO: check
+CVE-2019-9604 (PHP Scripts Mall Online Lottery PHP Readymade Script 1.7.0 has Cross-S ...)
+	TODO: check
 CVE-2019-9603 (MiniCMS 1.10 allows mc-admin/post.php?state=publish&delete= CSRF t ...)
 	NOT-FOR-US: MiniCMS
 CVE-2019-9602
@@ -5425,6 +6132,7 @@ CVE-2019-8326
 	RESERVED
 CVE-2019-8325 [Escape sequence injection vulnerability in errors]
 	RESERVED
+	{DLA-1735-1}
 	- ruby2.5 2.5.5-1
 	- ruby2.3 <removed>
 	- ruby2.1 <removed>
@@ -5436,6 +6144,7 @@ CVE-2019-8325 [Escape sequence injection vulnerability in errors]
 	NOTE: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
 CVE-2019-8324 [Installing a malicious gem may lead to arbitrary code execution]
 	RESERVED
+	{DLA-1735-1}
 	- ruby2.5 2.5.5-1
 	- ruby2.3 <removed>
 	- ruby2.1 <removed>
@@ -5447,6 +6156,7 @@ CVE-2019-8324 [Installing a malicious gem may lead to arbitrary code execution]
 	NOTE: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
 CVE-2019-8323 [Escape sequence injection vulnerability in API response handling]
 	RESERVED
+	{DLA-1735-1}
 	- ruby2.5 2.5.5-1
 	- ruby2.3 <removed>
 	- ruby2.1 <removed>
@@ -5458,6 +6168,7 @@ CVE-2019-8323 [Escape sequence injection vulnerability in API response handling]
 	NOTE: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
 CVE-2019-8322 [Escape sequence injection vulnerability in gem owner]
 	RESERVED
+	{DLA-1735-1}
 	- ruby2.5 2.5.5-1
 	- ruby2.3 <removed>
 	- ruby2.1 <removed>
@@ -5481,6 +6192,7 @@ CVE-2019-8321 [Escape sequence injection vulnerability in verbose]
 	NOTE: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
 CVE-2019-8320 [Delete directory using symlink when decompressing tar]
 	RESERVED
+	{DLA-1735-1}
 	- ruby2.5 2.5.5-1
 	- ruby2.3 <removed>
 	- ruby2.1 <removed>
@@ -7289,7 +8001,7 @@ CVE-2019-7526
 CVE-2019-7525
 	RESERVED
 CVE-2019-7524 (In Dovecot before 2.2.36.3 and 2.3.x before 2.3.5.1, a local attacker  ...)
-	{DSA-4418-1}
+	{DSA-4418-1 DLA-1736-1}
 	- dovecot 1:2.3.4.1-3
 	NOTE: https://github.com/dovecot/core/commit/37eeaef1587a3b99be97cb090094de19e374905c
 	NOTE: https://github.com/dovecot/core/commit/a02c16889f1f3411e9a16b96221c2795d5fdb974
@@ -9870,8 +10582,8 @@ CVE-2019-6483
 	RESERVED
 CVE-2019-6482
 	RESERVED
-CVE-2019-6481
-	RESERVED
+CVE-2019-6481 (Abine Blur 7.8.2431 allows remote attackers to conduct "Second-Factor  ...)
+	TODO: check
 CVE-2019-6480
 	RESERVED
 CVE-2019-6479
@@ -15677,6 +16389,7 @@ CVE-2019-3873
 CVE-2019-3872
 	RESERVED
 CVE-2019-3871 (A vulnerability was found in PowerDNS Authoritative Server before 4.0. ...)
+	{DLA-1737-1}
 	- pdns <unfixed> (bug #924966)
 	NOTE: https://github.com/PowerDNS/pdns/issues/7573
 	NOTE: https://docs.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html
@@ -17623,8 +18336,8 @@ CVE-2018-20380 (Ambit DDW2600 5.100.1009, DDW2602 5.105.1003, T60C926 4.64.1012,
 	NOT-FOR-US: Ambit devices
 CVE-2018-20379 (Technicolor DPC3928SL D3928SL-PSIP-13-A010-c3420r55105-160428a devices ...)
 	NOT-FOR-US: Technicolor devices
-CVE-2018-20378
-	RESERVED
+CVE-2018-20378 (The L2CAP signaling channel implementation and SDP server implementati ...)
+	TODO: check
 CVE-2018-20377 (Orange Livebox 00.96.320S devices allow remote attackers to discover W ...)
 	NOT-FOR-US: Orange Livebox
 CVE-2018-20376 (An issue was discovered in Tiny C Compiler (aka TinyCC or TCC) 0.9.27. ...)
@@ -27816,8 +28529,8 @@ CVE-2018-19203 (PRTG Network Monitor before 18.2.41.1652 allows remote unauthent
 	NOT-FOR-US: PRTG Network Monitor
 CVE-2018-19202
 	RESERVED
-CVE-2018-19201
-	RESERVED
+CVE-2018-19201 (A reflected XSS vulnerability in the ModCP Profile Editor in MyBB befo ...)
+	TODO: check
 CVE-2018-19200 (An issue was discovered in uriparser before 0.9.0. UriCommon.c allows  ...)
 	{DLA-1581-1}
 	- uriparser 0.9.0-1 (bug #913817)
@@ -36636,8 +37349,8 @@ CVE-2018-15842 (WolfCMS 0.8.3.1 has XSS via the /?/admin/page/add slug parameter
 	NOT-FOR-US: WolfCMS
 CVE-2018-15841
 	RESERVED
-CVE-2018-15840
-	RESERVED
+CVE-2018-15840 (TP-Link TL-WR840N devices allow remote attackers to cause a denial of  ...)
+	TODO: check
 CVE-2018-15839 (D-Link DIR-615 devices have a buffer overflow via a long Authorization ...)
 	NOT-FOR-US: D-Link DIR-615 devices
 CVE-2018-15838
@@ -62038,20 +62751,20 @@ CVE-2017-18113
 	RESERVED
 CVE-2017-18112
 	RESERVED
-CVE-2017-18111
-	RESERVED
-CVE-2017-18110
-	RESERVED
-CVE-2017-18109
-	RESERVED
-CVE-2017-18108
-	RESERVED
+CVE-2017-18111 (The OAuthHelper in Atlassian Application Links before version 5.0.10,  ...)
+	TODO: check
+CVE-2017-18110 (The administration backup restore resource in Atlassian Crowd before v ...)
+	TODO: check
+CVE-2017-18109 (The login resource of CrowdId in Atlassian Crowd before version 3.0.2  ...)
+	TODO: check
+CVE-2017-18108 (The administration SMTP configuration resource in Atlassian Crowd befo ...)
+	TODO: check
 CVE-2017-18107
 	RESERVED
-CVE-2017-18106
-	RESERVED
-CVE-2017-18105
-	RESERVED
+CVE-2017-18106 (The identifier_hash for a session token in Atlassian Crowd before vers ...)
+	TODO: check
+CVE-2017-18105 (The console login resource in Atlassian Crowd before version 3.0.2 and ...)
+	TODO: check
 CVE-2017-18104 (The Webhooks component of Atlassian Jira before version 7.6.7 and from ...)
 	NOT-FOR-US: Atlassian Jira
 CVE-2017-18103 (The atlassian-http library, as used in various Atlassian products, bef ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/af7ee517efa1baeef3effe10e1d62472a3d264d7

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/af7ee517efa1baeef3effe10e1d62472a3d264d7
You're receiving this email because of your account on salsa.debian.org.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20190329/e1db8d88/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list