Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d2701210 by security tracker role at 2019-07-09T08:10:15Z
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,15 @@
+CVE-2019-13450 (In the Zoom Client through 4.4.4 and RingCentral 
7.0.136380.0312 on ma ...)
+       TODO: check
+CVE-2019-13449 (In the Zoom Client before 4.4.2 on macOS, remote attackers can 
cause a ...)
+       TODO: check
+CVE-2019-13448
+       RESERVED
+CVE-2019-13447
+       RESERVED
+CVE-2019-13446
+       RESERVED
+CVE-2019-13445
+       RESERVED
 CVE-2019-13444
        RESERVED
 CVE-2019-13443
@@ -153,11 +165,11 @@ CVE-2019-13371
 CVE-2019-13370 (index.php/admin/permissions in Ignited CMS through 2017-02-19 
allows C ...)
        NOT-FOR-US: Ignited CMS
 CVE-2019-13369
-       RESERVED
+       REJECTED
 CVE-2019-13368
-       RESERVED
+       REJECTED
 CVE-2019-13367
-       RESERVED
+       REJECTED
 CVE-2019-13366
        RESERVED
 CVE-2019-13365
@@ -1290,8 +1302,8 @@ CVE-2019-12932 (A stored XSS vulnerability was found in 
SeedDMS 5.1.11 due to po
        NOT-FOR-US: SeedDMS
 CVE-2019-12931
        RESERVED
-CVE-2019-12930
-       RESERVED
+CVE-2019-12930 (A cross-site scripting (XSS) vulnerability in noMenu() and 
noSubMenu() ...)
+       TODO: check
 CVE-2019-12929 (** DISPUTED ** The QMP guest_exec command in QEMU 4.0.0 and 
earlier is ...)
        - qemu <unfixed> (unimportant)
        - qemu-kvm <removed> (unimportant)
@@ -1304,16 +1316,16 @@ CVE-2019-12928 (** DISPUTED ** The QMP migrate command 
in QEMU version 4.0.0 and
        NOTE: https://fakhrizulkifli.github.io/posts/2019/06/05/CVE-2019-12928/
        NOTE: The QEMU machine protocol (QMP) should not be exposed to 
unprivileged users,
        NOTE: and is only intended for administrative control of QEMU instances.
-CVE-2019-12927
-       RESERVED
-CVE-2019-12926
-       RESERVED
-CVE-2019-12925
-       RESERVED
-CVE-2019-12924
-       RESERVED
-CVE-2019-12923
-       RESERVED
+CVE-2019-12927 (MailEnable Enterprise Premium 10.23 was vulnerable to stored 
and refle ...)
+       TODO: check
+CVE-2019-12926 (MailEnable Enterprise Premium 10.23 did not use appropriate 
access con ...)
+       TODO: check
+CVE-2019-12925 (MailEnable Enterprise Premium 10.23 was vulnerable to multiple 
directo ...)
+       TODO: check
+CVE-2019-12924 (MailEnable Enterprise Premium 10.23 was vulnerable to XML 
External Ent ...)
+       TODO: check
+CVE-2019-12923 (In MailEnable Enterprise Premium 10.23, the potential 
cross-site reque ...)
+       TODO: check
 CVE-2019-12922
        RESERVED
 CVE-2019-12921



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/d270121091faabadc42a627b12e5d0c915bfc247

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/commit/d270121091faabadc42a627b12e5d0c915bfc247
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to