Author: sectracker
Date: 2017-12-28 09:10:14 +0000 (Thu, 28 Dec 2017)
New Revision: 58987

Modified:
   data/CVE/list
Log:
automatic update

Modified: data/CVE/list
===================================================================
--- data/CVE/list       2017-12-28 09:06:37 UTC (rev 58986)
+++ data/CVE/list       2017-12-28 09:10:14 UTC (rev 58987)
@@ -1,3 +1,25 @@
+CVE-2017-17946
+       RESERVED
+CVE-2017-17945
+       RESERVED
+CVE-2017-17944
+       RESERVED
+CVE-2017-17943
+       RESERVED
+CVE-2017-17942 (In LibTIFF 4.0.9, there is a heap-based buffer over-read in 
the ...)
+       TODO: check
+CVE-2017-17941 (PHP Scripts Mall Single Theater Booking has SQL Injection via 
the ...)
+       TODO: check
+CVE-2017-17940 (PHP Scripts Mall Single Theater Booking has XSS via the title 
parameter ...)
+       TODO: check
+CVE-2017-17939 (PHP Scripts Mall Single Theater Booking has CSRF via ...)
+       TODO: check
+CVE-2017-17938 (PHP Scripts Mall Single Theater Booking has XSS via the ...)
+       TODO: check
+CVE-2017-17937 (Vanguard Marketplace Digital Products PHP has XSS via the 
phps_query ...)
+       TODO: check
+CVE-2017-17936 (Vanguard Marketplace Digital Products PHP has CSRF via 
/search. ...)
+       TODO: check
 CVE-2018-3609
        RESERVED
 CVE-2018-3608
@@ -32,8 +54,8 @@
        NOTE: ImageMagick-6: 
https://github.com/ImageMagick/ImageMagick/commit/08278c7cf1c0b4f1da4cdcfaa857ff6b2373a1b2
 CVE-2017-17933
        RESERVED
-CVE-2017-17932
-       RESERVED
+CVE-2017-17932 (A buffer overflow vulnerability exists in MediaServer.exe in 
ALLPlayer ...)
+       TODO: check
 CVE-2017-17931 (PHP Scripts Mall Resume Clone Script has SQL Injection via the 
...)
        NOT-FOR-US: PHP Scripts Mall Resume Clone Script
 CVE-2017-17930 (PHP Scripts Mall Professional Service Script has CSRF via ...)


_______________________________________________
Secure-testing-commits mailing list
Secure-testing-commits@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-commits

Reply via email to