[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso
carnil at debian.org
Mon Jan 6 20:10:23 GMT 2020
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f57e1666 by security tracker role at 2020-01-06T20:10:16+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,15 +1,883 @@
-CVE-2020-5518
+CVE-2020-5950
RESERVED
-CVE-2020-5517
+CVE-2020-5949
RESERVED
-CVE-2020-5516
+CVE-2020-5948
+ RESERVED
+CVE-2020-5947
+ RESERVED
+CVE-2020-5946
+ RESERVED
+CVE-2020-5945
+ RESERVED
+CVE-2020-5944
+ RESERVED
+CVE-2020-5943
+ RESERVED
+CVE-2020-5942
+ RESERVED
+CVE-2020-5941
+ RESERVED
+CVE-2020-5940
+ RESERVED
+CVE-2020-5939
+ RESERVED
+CVE-2020-5938
+ RESERVED
+CVE-2020-5937
+ RESERVED
+CVE-2020-5936
+ RESERVED
+CVE-2020-5935
+ RESERVED
+CVE-2020-5934
+ RESERVED
+CVE-2020-5933
+ RESERVED
+CVE-2020-5932
+ RESERVED
+CVE-2020-5931
+ RESERVED
+CVE-2020-5930
+ RESERVED
+CVE-2020-5929
+ RESERVED
+CVE-2020-5928
+ RESERVED
+CVE-2020-5927
+ RESERVED
+CVE-2020-5926
+ RESERVED
+CVE-2020-5925
+ RESERVED
+CVE-2020-5924
+ RESERVED
+CVE-2020-5923
+ RESERVED
+CVE-2020-5922
+ RESERVED
+CVE-2020-5921
+ RESERVED
+CVE-2020-5920
+ RESERVED
+CVE-2020-5919
+ RESERVED
+CVE-2020-5918
+ RESERVED
+CVE-2020-5917
+ RESERVED
+CVE-2020-5916
+ RESERVED
+CVE-2020-5915
+ RESERVED
+CVE-2020-5914
+ RESERVED
+CVE-2020-5913
+ RESERVED
+CVE-2020-5912
+ RESERVED
+CVE-2020-5911
+ RESERVED
+CVE-2020-5910
+ RESERVED
+CVE-2020-5909
+ RESERVED
+CVE-2020-5908
+ RESERVED
+CVE-2020-5907
+ RESERVED
+CVE-2020-5906
+ RESERVED
+CVE-2020-5905
+ RESERVED
+CVE-2020-5904
+ RESERVED
+CVE-2020-5903
+ RESERVED
+CVE-2020-5902
+ RESERVED
+CVE-2020-5901
+ RESERVED
+CVE-2020-5900
+ RESERVED
+CVE-2020-5899
+ RESERVED
+CVE-2020-5898
+ RESERVED
+CVE-2020-5897
+ RESERVED
+CVE-2020-5896
+ RESERVED
+CVE-2020-5895
+ RESERVED
+CVE-2020-5894
+ RESERVED
+CVE-2020-5893
+ RESERVED
+CVE-2020-5892
+ RESERVED
+CVE-2020-5891
+ RESERVED
+CVE-2020-5890
+ RESERVED
+CVE-2020-5889
+ RESERVED
+CVE-2020-5888
+ RESERVED
+CVE-2020-5887
+ RESERVED
+CVE-2020-5886
+ RESERVED
+CVE-2020-5885
+ RESERVED
+CVE-2020-5884
+ RESERVED
+CVE-2020-5883
+ RESERVED
+CVE-2020-5882
+ RESERVED
+CVE-2020-5881
+ RESERVED
+CVE-2020-5880
+ RESERVED
+CVE-2020-5879
+ RESERVED
+CVE-2020-5878
+ RESERVED
+CVE-2020-5877
+ RESERVED
+CVE-2020-5876
+ RESERVED
+CVE-2020-5875
+ RESERVED
+CVE-2020-5874
+ RESERVED
+CVE-2020-5873
+ RESERVED
+CVE-2020-5872
+ RESERVED
+CVE-2020-5871
+ RESERVED
+CVE-2020-5870
+ RESERVED
+CVE-2020-5869
+ RESERVED
+CVE-2020-5868
+ RESERVED
+CVE-2020-5867
+ RESERVED
+CVE-2020-5866
+ RESERVED
+CVE-2020-5865
+ RESERVED
+CVE-2020-5864
+ RESERVED
+CVE-2020-5863
+ RESERVED
+CVE-2020-5862
+ RESERVED
+CVE-2020-5861
+ RESERVED
+CVE-2020-5860
+ RESERVED
+CVE-2020-5859
+ RESERVED
+CVE-2020-5858
+ RESERVED
+CVE-2020-5857
+ RESERVED
+CVE-2020-5856
+ RESERVED
+CVE-2020-5855
+ RESERVED
+CVE-2020-5854
+ RESERVED
+CVE-2020-5853
+ RESERVED
+CVE-2020-5852
+ RESERVED
+CVE-2020-5851
+ RESERVED
+CVE-2020-5850
+ RESERVED
+CVE-2020-5849
+ RESERVED
+CVE-2020-5848
+ RESERVED
+CVE-2020-5847
+ RESERVED
+CVE-2020-5846
+ RESERVED
+CVE-2020-5845
+ RESERVED
+CVE-2020-5844
+ RESERVED
+CVE-2020-5843
+ RESERVED
+CVE-2020-5842
+ RESERVED
+CVE-2020-5841
+ RESERVED
+CVE-2020-5840 (An issue was discovered in HashBrown CMS before 1.3.2. Server/Entity/R ...)
+ TODO: check
+CVE-2020-5839
+ RESERVED
+CVE-2020-5838
+ RESERVED
+CVE-2020-5837
+ RESERVED
+CVE-2020-5836
+ RESERVED
+CVE-2020-5835
+ RESERVED
+CVE-2020-5834
+ RESERVED
+CVE-2020-5833
+ RESERVED
+CVE-2020-5832
+ RESERVED
+CVE-2020-5831
+ RESERVED
+CVE-2020-5830
+ RESERVED
+CVE-2020-5829
+ RESERVED
+CVE-2020-5828
+ RESERVED
+CVE-2020-5827
+ RESERVED
+CVE-2020-5826
+ RESERVED
+CVE-2020-5825
+ RESERVED
+CVE-2020-5824
+ RESERVED
+CVE-2020-5823
+ RESERVED
+CVE-2020-5822
+ RESERVED
+CVE-2020-5821
+ RESERVED
+CVE-2020-5820
+ RESERVED
+CVE-2020-5819
+ RESERVED
+CVE-2020-5818
+ RESERVED
+CVE-2020-5817
+ RESERVED
+CVE-2020-5816
+ RESERVED
+CVE-2020-5815
+ RESERVED
+CVE-2020-5814
+ RESERVED
+CVE-2020-5813
+ RESERVED
+CVE-2020-5812
+ RESERVED
+CVE-2020-5811
+ RESERVED
+CVE-2020-5810
+ RESERVED
+CVE-2020-5809
+ RESERVED
+CVE-2020-5808
+ RESERVED
+CVE-2020-5807
+ RESERVED
+CVE-2020-5806
+ RESERVED
+CVE-2020-5805
+ RESERVED
+CVE-2020-5804
+ RESERVED
+CVE-2020-5803
+ RESERVED
+CVE-2020-5802
+ RESERVED
+CVE-2020-5801
+ RESERVED
+CVE-2020-5800
+ RESERVED
+CVE-2020-5799
+ RESERVED
+CVE-2020-5798
+ RESERVED
+CVE-2020-5797
+ RESERVED
+CVE-2020-5796
+ RESERVED
+CVE-2020-5795
+ RESERVED
+CVE-2020-5794
+ RESERVED
+CVE-2020-5793
+ RESERVED
+CVE-2020-5792
+ RESERVED
+CVE-2020-5791
+ RESERVED
+CVE-2020-5790
+ RESERVED
+CVE-2020-5789
+ RESERVED
+CVE-2020-5788
+ RESERVED
+CVE-2020-5787
+ RESERVED
+CVE-2020-5786
+ RESERVED
+CVE-2020-5785
+ RESERVED
+CVE-2020-5784
+ RESERVED
+CVE-2020-5783
+ RESERVED
+CVE-2020-5782
+ RESERVED
+CVE-2020-5781
+ RESERVED
+CVE-2020-5780
+ RESERVED
+CVE-2020-5779
+ RESERVED
+CVE-2020-5778
+ RESERVED
+CVE-2020-5777
+ RESERVED
+CVE-2020-5776
+ RESERVED
+CVE-2020-5775
+ RESERVED
+CVE-2020-5774
+ RESERVED
+CVE-2020-5773
+ RESERVED
+CVE-2020-5772
+ RESERVED
+CVE-2020-5771
+ RESERVED
+CVE-2020-5770
+ RESERVED
+CVE-2020-5769
+ RESERVED
+CVE-2020-5768
+ RESERVED
+CVE-2020-5767
+ RESERVED
+CVE-2020-5766
+ RESERVED
+CVE-2020-5765
+ RESERVED
+CVE-2020-5764
+ RESERVED
+CVE-2020-5763
+ RESERVED
+CVE-2020-5762
+ RESERVED
+CVE-2020-5761
+ RESERVED
+CVE-2020-5760
+ RESERVED
+CVE-2020-5759
+ RESERVED
+CVE-2020-5758
+ RESERVED
+CVE-2020-5757
+ RESERVED
+CVE-2020-5756
+ RESERVED
+CVE-2020-5755
+ RESERVED
+CVE-2020-5754
+ RESERVED
+CVE-2020-5753
+ RESERVED
+CVE-2020-5752
+ RESERVED
+CVE-2020-5751
+ RESERVED
+CVE-2020-5750
+ RESERVED
+CVE-2020-5749
+ RESERVED
+CVE-2020-5748
+ RESERVED
+CVE-2020-5747
+ RESERVED
+CVE-2020-5746
+ RESERVED
+CVE-2020-5745
+ RESERVED
+CVE-2020-5744
+ RESERVED
+CVE-2020-5743
+ RESERVED
+CVE-2020-5742
+ RESERVED
+CVE-2020-5741
+ RESERVED
+CVE-2020-5740
+ RESERVED
+CVE-2020-5739
+ RESERVED
+CVE-2020-5738
+ RESERVED
+CVE-2020-5737
+ RESERVED
+CVE-2020-5736
+ RESERVED
+CVE-2020-5735
+ RESERVED
+CVE-2020-5734
+ RESERVED
+CVE-2020-5733
+ RESERVED
+CVE-2020-5732
+ RESERVED
+CVE-2020-5731
+ RESERVED
+CVE-2020-5730
+ RESERVED
+CVE-2020-5729
+ RESERVED
+CVE-2020-5728
+ RESERVED
+CVE-2020-5727
+ RESERVED
+CVE-2020-5726
+ RESERVED
+CVE-2020-5725
+ RESERVED
+CVE-2020-5724
+ RESERVED
+CVE-2020-5723
+ RESERVED
+CVE-2020-5722
+ RESERVED
+CVE-2020-5721
+ RESERVED
+CVE-2020-5720
+ RESERVED
+CVE-2020-5719
+ RESERVED
+CVE-2020-5718
+ RESERVED
+CVE-2020-5717
+ RESERVED
+CVE-2020-5716
+ RESERVED
+CVE-2020-5715
+ RESERVED
+CVE-2020-5714
+ RESERVED
+CVE-2020-5713
+ RESERVED
+CVE-2020-5712
+ RESERVED
+CVE-2020-5711
+ RESERVED
+CVE-2020-5710
+ RESERVED
+CVE-2020-5709
+ RESERVED
+CVE-2020-5708
+ RESERVED
+CVE-2020-5707
+ RESERVED
+CVE-2020-5706
+ RESERVED
+CVE-2020-5705
+ RESERVED
+CVE-2020-5704
+ RESERVED
+CVE-2020-5703
+ RESERVED
+CVE-2020-5702
+ RESERVED
+CVE-2020-5701
+ RESERVED
+CVE-2020-5700
+ RESERVED
+CVE-2020-5699
+ RESERVED
+CVE-2020-5698
+ RESERVED
+CVE-2020-5697
+ RESERVED
+CVE-2020-5696
+ RESERVED
+CVE-2020-5695
RESERVED
-CVE-2020-5515
+CVE-2020-5694
RESERVED
-CVE-2020-5514
+CVE-2020-5693
RESERVED
-CVE-2020-5513
+CVE-2020-5692
RESERVED
+CVE-2020-5691
+ RESERVED
+CVE-2020-5690
+ RESERVED
+CVE-2020-5689
+ RESERVED
+CVE-2020-5688
+ RESERVED
+CVE-2020-5687
+ RESERVED
+CVE-2020-5686
+ RESERVED
+CVE-2020-5685
+ RESERVED
+CVE-2020-5684
+ RESERVED
+CVE-2020-5683
+ RESERVED
+CVE-2020-5682
+ RESERVED
+CVE-2020-5681
+ RESERVED
+CVE-2020-5680
+ RESERVED
+CVE-2020-5679
+ RESERVED
+CVE-2020-5678
+ RESERVED
+CVE-2020-5677
+ RESERVED
+CVE-2020-5676
+ RESERVED
+CVE-2020-5675
+ RESERVED
+CVE-2020-5674
+ RESERVED
+CVE-2020-5673
+ RESERVED
+CVE-2020-5672
+ RESERVED
+CVE-2020-5671
+ RESERVED
+CVE-2020-5670
+ RESERVED
+CVE-2020-5669
+ RESERVED
+CVE-2020-5668
+ RESERVED
+CVE-2020-5667
+ RESERVED
+CVE-2020-5666
+ RESERVED
+CVE-2020-5665
+ RESERVED
+CVE-2020-5664
+ RESERVED
+CVE-2020-5663
+ RESERVED
+CVE-2020-5662
+ RESERVED
+CVE-2020-5661
+ RESERVED
+CVE-2020-5660
+ RESERVED
+CVE-2020-5659
+ RESERVED
+CVE-2020-5658
+ RESERVED
+CVE-2020-5657
+ RESERVED
+CVE-2020-5656
+ RESERVED
+CVE-2020-5655
+ RESERVED
+CVE-2020-5654
+ RESERVED
+CVE-2020-5653
+ RESERVED
+CVE-2020-5652
+ RESERVED
+CVE-2020-5651
+ RESERVED
+CVE-2020-5650
+ RESERVED
+CVE-2020-5649
+ RESERVED
+CVE-2020-5648
+ RESERVED
+CVE-2020-5647
+ RESERVED
+CVE-2020-5646
+ RESERVED
+CVE-2020-5645
+ RESERVED
+CVE-2020-5644
+ RESERVED
+CVE-2020-5643
+ RESERVED
+CVE-2020-5642
+ RESERVED
+CVE-2020-5641
+ RESERVED
+CVE-2020-5640
+ RESERVED
+CVE-2020-5639
+ RESERVED
+CVE-2020-5638
+ RESERVED
+CVE-2020-5637
+ RESERVED
+CVE-2020-5636
+ RESERVED
+CVE-2020-5635
+ RESERVED
+CVE-2020-5634
+ RESERVED
+CVE-2020-5633
+ RESERVED
+CVE-2020-5632
+ RESERVED
+CVE-2020-5631
+ RESERVED
+CVE-2020-5630
+ RESERVED
+CVE-2020-5629
+ RESERVED
+CVE-2020-5628
+ RESERVED
+CVE-2020-5627
+ RESERVED
+CVE-2020-5626
+ RESERVED
+CVE-2020-5625
+ RESERVED
+CVE-2020-5624
+ RESERVED
+CVE-2020-5623
+ RESERVED
+CVE-2020-5622
+ RESERVED
+CVE-2020-5621
+ RESERVED
+CVE-2020-5620
+ RESERVED
+CVE-2020-5619
+ RESERVED
+CVE-2020-5618
+ RESERVED
+CVE-2020-5617
+ RESERVED
+CVE-2020-5616
+ RESERVED
+CVE-2020-5615
+ RESERVED
+CVE-2020-5614
+ RESERVED
+CVE-2020-5613
+ RESERVED
+CVE-2020-5612
+ RESERVED
+CVE-2020-5611
+ RESERVED
+CVE-2020-5610
+ RESERVED
+CVE-2020-5609
+ RESERVED
+CVE-2020-5608
+ RESERVED
+CVE-2020-5607
+ RESERVED
+CVE-2020-5606
+ RESERVED
+CVE-2020-5605
+ RESERVED
+CVE-2020-5604
+ RESERVED
+CVE-2020-5603
+ RESERVED
+CVE-2020-5602
+ RESERVED
+CVE-2020-5601
+ RESERVED
+CVE-2020-5600
+ RESERVED
+CVE-2020-5599
+ RESERVED
+CVE-2020-5598
+ RESERVED
+CVE-2020-5597
+ RESERVED
+CVE-2020-5596
+ RESERVED
+CVE-2020-5595
+ RESERVED
+CVE-2020-5594
+ RESERVED
+CVE-2020-5593
+ RESERVED
+CVE-2020-5592
+ RESERVED
+CVE-2020-5591
+ RESERVED
+CVE-2020-5590
+ RESERVED
+CVE-2020-5589
+ RESERVED
+CVE-2020-5588
+ RESERVED
+CVE-2020-5587
+ RESERVED
+CVE-2020-5586
+ RESERVED
+CVE-2020-5585
+ RESERVED
+CVE-2020-5584
+ RESERVED
+CVE-2020-5583
+ RESERVED
+CVE-2020-5582
+ RESERVED
+CVE-2020-5581
+ RESERVED
+CVE-2020-5580
+ RESERVED
+CVE-2020-5579
+ RESERVED
+CVE-2020-5578
+ RESERVED
+CVE-2020-5577
+ RESERVED
+CVE-2020-5576
+ RESERVED
+CVE-2020-5575
+ RESERVED
+CVE-2020-5574
+ RESERVED
+CVE-2020-5573
+ RESERVED
+CVE-2020-5572
+ RESERVED
+CVE-2020-5571
+ RESERVED
+CVE-2020-5570
+ RESERVED
+CVE-2020-5569
+ RESERVED
+CVE-2020-5568
+ RESERVED
+CVE-2020-5567
+ RESERVED
+CVE-2020-5566
+ RESERVED
+CVE-2020-5565
+ RESERVED
+CVE-2020-5564
+ RESERVED
+CVE-2020-5563
+ RESERVED
+CVE-2020-5562
+ RESERVED
+CVE-2020-5561
+ RESERVED
+CVE-2020-5560
+ RESERVED
+CVE-2020-5559
+ RESERVED
+CVE-2020-5558
+ RESERVED
+CVE-2020-5557
+ RESERVED
+CVE-2020-5556
+ RESERVED
+CVE-2020-5555
+ RESERVED
+CVE-2020-5554
+ RESERVED
+CVE-2020-5553
+ RESERVED
+CVE-2020-5552
+ RESERVED
+CVE-2020-5551
+ RESERVED
+CVE-2020-5550
+ RESERVED
+CVE-2020-5549
+ RESERVED
+CVE-2020-5548
+ RESERVED
+CVE-2020-5547
+ RESERVED
+CVE-2020-5546
+ RESERVED
+CVE-2020-5545
+ RESERVED
+CVE-2020-5544
+ RESERVED
+CVE-2020-5543
+ RESERVED
+CVE-2020-5542
+ RESERVED
+CVE-2020-5541
+ RESERVED
+CVE-2020-5540
+ RESERVED
+CVE-2020-5539
+ RESERVED
+CVE-2020-5538
+ RESERVED
+CVE-2020-5537
+ RESERVED
+CVE-2020-5536
+ RESERVED
+CVE-2020-5535
+ RESERVED
+CVE-2020-5534
+ RESERVED
+CVE-2020-5533
+ RESERVED
+CVE-2020-5532
+ RESERVED
+CVE-2020-5531
+ RESERVED
+CVE-2020-5530
+ RESERVED
+CVE-2020-5529
+ RESERVED
+CVE-2020-5528
+ RESERVED
+CVE-2020-5527
+ RESERVED
+CVE-2020-5526
+ RESERVED
+CVE-2020-5525
+ RESERVED
+CVE-2020-5524
+ RESERVED
+CVE-2020-5523
+ RESERVED
+CVE-2020-5522
+ RESERVED
+CVE-2020-5521
+ RESERVED
+CVE-2020-5520
+ RESERVED
+CVE-2020-5519 (The WebAdmin Console in OpenLiteSpeed before v1.6.5 does not strictly ...)
+ TODO: check
+CVE-2019-20356
+ RESERVED
+CVE-2016-11017 (The application login page in AKIPS Network Monitor 15.37 through 16.5 ...)
+ TODO: check
+CVE-2020-5518
+ RESERVED
+CVE-2020-5517
+ RESERVED
+CVE-2020-5516
+ RESERVED
+CVE-2020-5515 (Gila CMS 1.11.8 allows /admin/sql?query= SQL Injection. ...)
+ TODO: check
+CVE-2020-5514 (Gila CMS 1.11.8 allows Unrestricted Upload of a File with a Dangerous ...)
+ TODO: check
+CVE-2020-5513 (Gila CMS 1.11.8 allows /cm/delete?t=../ Directory Traversal. ...)
+ TODO: check
CVE-2020-5512
RESERVED
CVE-2020-5511
@@ -44,8 +912,8 @@ CVE-2019-20345
RESERVED
CVE-2019-20344
RESERVED
-CVE-2019-20343
- RESERVED
+CVE-2019-20343 (The MojoHaus Exec Maven plugin 1.1.1 for Maven allows code execution v ...)
+ TODO: check
CVE-2019-20342
RESERVED
CVE-2019-20341
@@ -474,9 +1342,11 @@ CVE-2019-20331
CVE-2020-5314
RESERVED
CVE-2020-5313 (libImaging/FliDecode.c in Pillow before 6.2.2 has an FLI buffer overfl ...)
+ {DLA-2057-1}
- pillow 7.0.0-1 (bug #948224)
NOTE: https://github.com/python-pillow/Pillow/commit/a09acd0decd8a87ccce939d5ff65dab59e7d365b (6.2.2)
CVE-2020-5312 (libImaging/PcxDecode.c in Pillow before 6.2.2 has a PCX P mode buffer ...)
+ {DLA-2057-1}
- pillow 7.0.0-1 (bug #948224)
NOTE: https://github.com/python-pillow/Pillow/commit/93b22b846e0269ee9594ff71a72bec02d2bea8fd (6.2.2)
CVE-2020-5311 (libImaging/SgiRleDecode.c in Pillow before 6.2.2 has an SGI buffer ove ...)
@@ -4308,6 +5178,7 @@ CVE-2019-19913
CVE-2019-19912
RESERVED
CVE-2019-19911 (There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImage ...)
+ {DLA-2057-1}
- pillow 7.0.0-1 (bug #948224)
NOTE: https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d (6.2.2)
CVE-2019-19910 (The MinervaNeue Skin in MediaWiki from 2019-11-05 to 2019-12-13 (1.35 ...)
@@ -5046,13 +5917,13 @@ CVE-2020-3611
CVE-2020-3610
RESERVED
CVE-2019-19864
- RESERVED
+ REJECTED
CVE-2019-19863
- RESERVED
+ REJECTED
CVE-2019-19862
- RESERVED
+ REJECTED
CVE-2019-19861
- RESERVED
+ REJECTED
CVE-2019-19860
RESERVED
CVE-2019-19859
@@ -11662,8 +12533,8 @@ CVE-2019-18793 (Parallels Plesk Panel 9.5 allows XSS in target/locales/tr-TR/hel
NOT-FOR-US: Parallels Plesk Panel
CVE-2017-18639 (Progress Sitefinity CMS before 10.1 allows XSS via /Pages Parameter : ...)
NOT-FOR-US: Progress Sitefinity CMS
-CVE-2019-18792
- RESERVED
+CVE-2019-18792 (An issue was discovered in Suricata 5.0.0. It is possible to bypass/ev ...)
+ TODO: check
CVE-2019-18791
RESERVED
CVE-2019-18790 (An issue was discovered in channels/chan_sip.c in Sangoma Asterisk 13. ...)
@@ -17761,7 +18632,7 @@ CVE-2019-17570
CVE-2019-17569
RESERVED
CVE-2019-17568
- RESERVED
+ REJECTED
CVE-2019-17567
RESERVED
CVE-2019-17566
@@ -22157,8 +23028,8 @@ CVE-2019-16001 (A vulnerability in the loading mechanism of specific dynamic lin
NOT-FOR-US: Cisco
CVE-2019-16000
RESERVED
-CVE-2019-15999
- RESERVED
+CVE-2019-15999 (A vulnerability in the application environment of Cisco Data Center Ne ...)
+ TODO: check
CVE-2019-15998 (A vulnerability in the access-control logic of the NETCONF over Secure ...)
NOT-FOR-US: Cisco
CVE-2019-15997 (A vulnerability in Cisco DNA Spaces: Connector could allow an authenti ...)
@@ -22185,28 +23056,28 @@ CVE-2019-15987 (A vulnerability in web interface of the Cisco Webex Event Center
NOT-FOR-US: Cisco
CVE-2019-15986 (A vulnerability in the CLI of Cisco Unity Express could allow an authe ...)
NOT-FOR-US: Cisco
-CVE-2019-15985
- RESERVED
-CVE-2019-15984
- RESERVED
-CVE-2019-15983
- RESERVED
-CVE-2019-15982
- RESERVED
-CVE-2019-15981
- RESERVED
-CVE-2019-15980
- RESERVED
-CVE-2019-15979
- RESERVED
-CVE-2019-15978
- RESERVED
-CVE-2019-15977
- RESERVED
-CVE-2019-15976
- RESERVED
-CVE-2019-15975
- RESERVED
+CVE-2019-15985 (Multiple vulnerabilities in the REST and SOAP API endpoints of Cisco D ...)
+ TODO: check
+CVE-2019-15984 (Multiple vulnerabilities in the REST and SOAP API endpoints of Cisco D ...)
+ TODO: check
+CVE-2019-15983 (A vulnerability in the SOAP API of Cisco Data Center Network Manager ( ...)
+ TODO: check
+CVE-2019-15982 (Multiple vulnerabilities in the REST and SOAP API endpoints and the Ap ...)
+ TODO: check
+CVE-2019-15981 (Multiple vulnerabilities in the REST and SOAP API endpoints and the Ap ...)
+ TODO: check
+CVE-2019-15980 (Multiple vulnerabilities in the REST and SOAP API endpoints and the Ap ...)
+ TODO: check
+CVE-2019-15979 (Multiple vulnerabilities in the REST and SOAP API endpoints of Cisco D ...)
+ TODO: check
+CVE-2019-15978 (Multiple vulnerabilities in the REST and SOAP API endpoints of Cisco D ...)
+ TODO: check
+CVE-2019-15977 (Multiple vulnerabilities in the authentication mechanisms of Cisco Dat ...)
+ TODO: check
+CVE-2019-15976 (Multiple vulnerabilities in the authentication mechanisms of Cisco Dat ...)
+ TODO: check
+CVE-2019-15975 (Multiple vulnerabilities in the authentication mechanisms of Cisco Dat ...)
+ TODO: check
CVE-2019-15974
RESERVED
CVE-2019-15973 (A vulnerability in the web-based management interface of Cisco Industr ...)
@@ -23347,12 +24218,12 @@ CVE-2019-15605
RESERVED
CVE-2019-15604
RESERVED
-CVE-2019-15603
- RESERVED
-CVE-2019-15602
- RESERVED
-CVE-2019-15601
- RESERVED
+CVE-2019-15603 (The seefl package v0.1.1 is vulnerable to a stored Cross-Site Scriptin ...)
+ TODO: check
+CVE-2019-15602 (The fileview package v0.1.6 has inadequate output encoding and escapin ...)
+ TODO: check
+CVE-2019-15601 (CURL before 7.68.0 lacks proper input validation, which allows users t ...)
+ TODO: check
CVE-2019-15600 (A Path traversal exists in http_server which allows an attacker to rea ...)
NOT-FOR-US: Node module http_server
CVE-2019-15599 (A Code Injection exists in tree-kill on Windows which allows a remote ...)
@@ -32896,7 +33767,7 @@ CVE-2019-12838 (SchedMD Slurm 17.11.x, 18.08.0 through 18.08.7, and 19.05.0 allo
- slurm-llnl 19.05.3.2-1 (bug #931880)
[stretch] - slurm-llnl <no-dsa> (Too intrusive to backport)
NOTE: https://lists.schedmd.com/pipermail/slurm-announce/2019/000025.html
-CVE-2019-12837 (The Java API in Generalitat de Catalunya accesuniversitat.gencat.cat 1 ...)
+CVE-2019-12837 (The Java API in accesuniversitat.gencat.cat 1.7.5 allows remote attack ...)
NOT-FOR-US: Java API in Generalitat de Catalunya accesuniversitat.gencat.cat
CVE-2019-12836 (The Bobronix JEditor editor before 3.0.6 for Jira allows an attacker t ...)
NOT-FOR-US: Bobronix JEditor editor for Jira
@@ -43383,16 +44254,16 @@ CVE-2019-9474
RESERVED
CVE-2019-9473
RESERVED
-CVE-2019-9472
- RESERVED
-CVE-2019-9471
- RESERVED
-CVE-2019-9470
- RESERVED
-CVE-2019-9469
- RESERVED
-CVE-2019-9468
- RESERVED
+CVE-2019-9472 (In DCRYPTO_equals of compare.c, there is a possible timing attack due ...)
+ TODO: check
+CVE-2019-9471 (In set_outbound_iatu of abc-pcie.c, there is a possible out of bounds ...)
+ TODO: check
+CVE-2019-9470 (In dma_sblk_start of abc-pcie.c, there is a possible out of bounds wri ...)
+ TODO: check
+CVE-2019-9469 (In km_compute_shared_hmac of km4.c, there is a possible out of bounds ...)
+ TODO: check
+CVE-2019-9468 (In export_key_der of export_key.cpp, there is possible memory corrupti ...)
+ TODO: check
CVE-2019-9467 (In the Bootloader, there is a possible kernel command injection due to ...)
NOT-FOR-US: LG components for Android
CVE-2019-9466
@@ -58358,17 +59229,17 @@ CVE-2019-3475 (A local privilege escalation vulnerability in the famtd component
CVE-2019-3474 (A path traversal vulnerability in the web application component of Mic ...)
NOT-FOR-US: Micro Focus Filr
CVE-2019-3473
- RESERVED
+ REJECTED
CVE-2019-3472
- RESERVED
+ REJECTED
CVE-2019-3471
- RESERVED
+ REJECTED
CVE-2019-3470
- RESERVED
+ REJECTED
CVE-2019-3469
- RESERVED
+ REJECTED
CVE-2019-3468
- RESERVED
+ REJECTED
CVE-2019-3466 (The pg_ctlcluster script in postgresql-common in versions prior to 210 ...)
{DSA-4568-1 DLA-1994-1}
- postgresql-common 210
@@ -119512,7 +120383,7 @@ CVE-2018-1327 (The Apache Struts REST Plugin is using XStream library which is v
- libstruts1.2-java <not-affected> (Specific to 2.x)
NOTE: https://cwiki.apache.org/confluence/display/WW/S2-056
CVE-2018-1326
- RESERVED
+ REJECTED
CVE-2018-1325 (In Apache wicket-jquery-ui <= 6.29.0, <= 7.10.1, <= 8.0.0-M9. ...)
NOT-FOR-US: Wicket jQuery UI
CVE-2018-1324 (A specially crafted ZIP archive can be used to cause an infinite loop ...)
@@ -119624,7 +120495,7 @@ CVE-2018-1301 (A specially crafted request could have crashed the Apache HTTP Se
- apache2 2.4.33-1
NOTE: http://www.openwall.com/lists/oss-security/2018/03/24/2
CVE-2018-1300
- RESERVED
+ REJECTED
CVE-2018-1299 (In Apache Allura before 1.8.0, unauthenticated attackers may retrieve ...)
NOT-FOR-US: Apache Allura
CVE-2018-1298 (A Denial of Service vulnerability was found in Apache Qpid Broker-J 7. ...)
@@ -218384,8 +219255,7 @@ CVE-2015-4043 (SQL injection vulnerability in ConnX ESP HR Management 4.4.0 allo
NOT-FOR-US: ConnX ESP
CVE-2015-4040 (Directory traversal vulnerability in the configuration utility in F5 B ...)
NOT-FOR-US: F5 BIG-IP
-CVE-2015-4039
- RESERVED
+CVE-2015-4039 (Multiple cross-site scripting (XSS) vulnerabilities in the WP Membersh ...)
NOT-FOR-US: WordPress plugin WP Membership
CVE-2015-4038 (The WP Membership plugin 1.2.3 for WordPress allows remote authenticat ...)
NOT-FOR-US: WordPress plugin WP Membership
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f57e16669f6b76765d020fc43850b400371260ae
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/commit/f57e16669f6b76765d020fc43850b400371260ae
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200106/e8881236/attachment-0001.html>
More information about the debian-security-tracker-commits
mailing list