Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 61ec016d by security tracker role at 2020-03-06T08:10:14+00:00 automatic update - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,19 @@ +CVE-2020-10187 + RESERVED +CVE-2020-10186 + RESERVED +CVE-2020-10185 (The sync endpoint in YubiKey Validation Server before 2.40 allows remo ...) + TODO: check +CVE-2020-10184 (The verify endpoint in YubiKey Validation Server before 2.40 does not ...) + TODO: check +CVE-2020-10183 + RESERVED +CVE-2020-10182 + RESERVED +CVE-2020-10181 + RESERVED +CVE-2019-20502 (An issue was discovered in EFS Easy Chat Server 3.1. There is a buffer ...) + TODO: check CVE-2020-10180 (The ESET AV parsing engine allows virus-detection bypass via a crafted ...) NOT-FOR-US: ESET AV parsing engine CVE-2020-10179 @@ -1306,16 +1322,19 @@ CVE-2020-9549 (In PDFResurrect 0.12 through 0.19, get_type in pdf.c has an out-o NOTE: https://github.com/enferex/pdfresurrect/issues/8 NOTE: Crash in CLI tool, no security impact CVE-2020-9548 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interact ...) + {DLA-2135-1} - jackson-databind <unfixed> NOTE: https://github.com/FasterXML/jackson-databind/issues/2634 NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by NOTE: but still an issue when Default Typing is enabled. CVE-2020-9547 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interact ...) + {DLA-2135-1} - jackson-databind <unfixed> NOTE: https://github.com/FasterXML/jackson-databind/issues/2634 NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by NOTE: but still an issue when Default Typing is enabled. CVE-2020-9546 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interact ...) + {DLA-2135-1} - jackson-databind <unfixed> NOTE: https://github.com/FasterXML/jackson-databind/issues/2631 NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by @@ -7176,8 +7195,8 @@ CVE-2020-6988 RESERVED CVE-2020-6987 RESERVED -CVE-2020-6986 - RESERVED +CVE-2020-6986 (In all versions of Omron PLC CJ Series, an attacker can send a series ...) + TODO: check CVE-2020-6985 RESERVED CVE-2020-6984 @@ -7206,8 +7225,8 @@ CVE-2020-6973 (Digi International ConnectPort LTS 32 MEI, Firmware Version 1.4.3 NOT-FOR-US: Digi International ConnectPort LTS 32 MEI CVE-2020-6972 RESERVED -CVE-2020-6971 - RESERVED +CVE-2020-6971 (In Emerson ValveLink v12.0.264 to v13.4.118, a vulnerability in the Va ...) + TODO: check CVE-2020-6970 (A Heap-based Buffer Overflow was found in Emerson OpenEnterprise SCADA ...) NOT-FOR-US: Emerson OpenEnterprise SCADA Server CVE-2020-6969 (It is possible to unmask credentials and other sensitive information o ...) @@ -9438,8 +9457,8 @@ CVE-2020-5959 RESERVED CVE-2020-5958 RESERVED -CVE-2020-5957 - RESERVED +CVE-2020-5957 (NVIDIA Windows GPU Display Driver, all versions, contains a vulnerabil ...) + TODO: check CVE-2019-20358 (Trend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below ...) NOT-FOR-US: Trend Micro CVE-2019-20357 (A Persistent Arbitrary Code Execution vulnerability exists in the Tren ...) @@ -28545,10 +28564,10 @@ CVE-2019-17649 RESERVED CVE-2019-17648 RESERVED -CVE-2019-17647 - RESERVED -CVE-2019-17646 - RESERVED +CVE-2019-17647 (An issue was discovered in Centreon before 2.8.30, 18.10.8, 19.04.5, a ...) + TODO: check +CVE-2019-17646 (An issue was discovered in Centreon before 18.10.8, 19.04.5, and 19.10 ...) + TODO: check CVE-2019-17645 (An issue was discovered in Centreon before 2.8.31, 18.10.9, 19.04.6, a ...) - centreon-web <itp> (bug #913903) CVE-2019-17644 (An issue was discovered in Centreon before 2.8-30, 18.10-8, 19.04-5, a ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/61ec016d611b8ec64cd8ebbbae5f948a2785985e -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/61ec016d611b8ec64cd8ebbbae5f948a2785985e You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits