summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorsecurity tracker role <sectracker@debian.org>2016-12-05 21:10:13 +0000
committersecurity tracker role <sectracker@debian.org>2016-12-05 21:10:13 +0000
commit4ecd4b9e6e6fd2ad564c29dc1edcfaa60a283375 (patch)
treea1dd89350bcd22dadb2173cc0d57748b7aaf60e9
parent039e9afe6232dd22743bdbc00bdfed48cb9718b3 (diff)
automatic update
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@46801 e39458fd-73e7-0310-bf30-c45bca0a0e42
-rw-r--r--data/CVE/2005.list2
-rw-r--r--data/CVE/2012.list1
-rw-r--r--data/CVE/2016.list152
-rw-r--r--data/CVE/2017.list450
4 files changed, 585 insertions, 20 deletions
diff --git a/data/CVE/2005.list b/data/CVE/2005.list
index 8c0843f4fc..968d4459a8 100644
--- a/data/CVE/2005.list
+++ b/data/CVE/2005.list
@@ -415,7 +415,7 @@ CVE-2005-4731 (The Next action in PEAR HTML_QuickForm_Controller 1.0.4 includes
NOT-FOR-US: PEAR HTML_QuickForm_Controller
CVE-2005-4730 (Unspecified vulnerability in PEAR Text_Password 1.0 has unknown impact ...)
NOT-FOR-US: PEAR Text_Password
-CVE-2005-4729 (SQL injection vulnerabilitiy in show.php in VBZooM Forum allows remote ...)
+CVE-2005-4729 (SQL injection vulnerability in show.php in VBZooM Forum allows remote ...)
NOT-FOR-US: VBZooM
CVE-2005-4728 (Untrusted search path vulnerability (RPATH) in amaya 9.2.1 on Debian ...)
- amaya 9.4-1 (bug #341424)
diff --git a/data/CVE/2012.list b/data/CVE/2012.list
index e8787ca717..3bbdd1ed35 100644
--- a/data/CVE/2012.list
+++ b/data/CVE/2012.list
@@ -3,6 +3,7 @@ CVE-2012-XXXX [Option -localhost seems to fail to restrict ipv6 access]
[jessie] - x11vnc <no-dsa> (Minor issue; workaround exits)
[wheezy] - x11vnc <no-dsa> (Minor issue; workaround exits)
CVE-2012-6704 [Linux: signed overflows for SO_SNDBUF and SO_RCVBUF that affects "before 3.5" kernels]
+ RESERVED
- linux 3.8.11-1
NOTE: Fixed by: https://git.kernel.org/linus/82981930125abfd39d7c8378a9cfdf5e1be2002b (v3.5-rc1)
CVE-2012-6703 (Integer overflow in the snd_compr_allocate_buffer function in ...)
diff --git a/data/CVE/2016.list b/data/CVE/2016.list
index 0f957a1719..14874454dc 100644
--- a/data/CVE/2016.list
+++ b/data/CVE/2016.list
@@ -1,3 +1,83 @@
+CVE-2016-9838
+ RESERVED
+CVE-2016-9837
+ RESERVED
+CVE-2016-9836
+ RESERVED
+CVE-2016-9835 (Directory traversal vulnerability in file &quot;jcss.php&quot; in Zikula 1.3.x ...)
+ TODO: check
+CVE-2016-9834
+ RESERVED
+CVE-2016-9833
+ RESERVED
+CVE-2016-9832
+ RESERVED
+CVE-2016-9805
+ RESERVED
+CVE-2016-9796 (Alcatel-Lucent OmniVista 8770 2.0 through 3.0 exposes different ORBs ...)
+ TODO: check
+CVE-2016-9795
+ RESERVED
+CVE-2016-9792
+ RESERVED
+CVE-2016-9791
+ RESERVED
+CVE-2016-9790
+ RESERVED
+CVE-2016-9789
+ RESERVED
+CVE-2016-9788
+ RESERVED
+CVE-2016-9787
+ RESERVED
+CVE-2016-9786
+ RESERVED
+CVE-2016-9785
+ RESERVED
+CVE-2016-9784
+ RESERVED
+CVE-2016-9783
+ RESERVED
+CVE-2016-9782
+ RESERVED
+CVE-2016-9781
+ RESERVED
+CVE-2016-9780
+ RESERVED
+CVE-2016-9779
+ RESERVED
+CVE-2016-9778
+ RESERVED
+CVE-2016-9771
+ RESERVED
+CVE-2016-9770
+ RESERVED
+CVE-2016-9769
+ RESERVED
+CVE-2016-9768
+ RESERVED
+CVE-2016-9767
+ RESERVED
+CVE-2016-9766
+ RESERVED
+CVE-2016-9765
+ RESERVED
+CVE-2016-9764
+ RESERVED
+CVE-2016-9763
+ RESERVED
+CVE-2016-9762
+ RESERVED
+CVE-2016-9761
+ RESERVED
+CVE-2016-9760
+ RESERVED
+CVE-2016-9759
+ RESERVED
+CVE-2016-9758
+ RESERVED
+CVE-2016-9757
+ RESERVED
CVE-2016-XXXX [zipinfo buffer overflow]
- unzip <unfixed>
NOTE: https://launchpad.net/bugs/1643750
@@ -10,74 +90,92 @@ CVE-2016-XXXX [tiffcrop: divide-by-zero in readSeparateStripsIntoBuffer when Bit
[jessie] - tiff <no-dsa> (Minor issue)
NOTE: http://bugzilla.maptools.org/show_bug.cgi?id=2619
CVE-2016-9831 [listswf: heap-based buffer overflow in parseSWF_RGBA (parser.c)]
+ RESERVED
- ming <unfixed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-parseswf_rgba-parser-c
CVE-2016-9830 [memory allocation failure in MagickRealloc]
+ RESERVED
- graphicsmagick <unfixed> (bug #847055)
NOTE: https://blogs.gentoo.org/ago/2016/12/01/graphicsmagick-memory-allocation-failure-in-magickrealloc-memory-c
CVE-2016-9829 [listswf: heap-based buffer overflow in parseSWF_DEFINEFONT (parser.c)]
+ RESERVED
- ming <unfixed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-parseswf_definefont-parser-c
CVE-2016-9828 [listswf: NULL pointer dereference in dumpBuffer (read.c)]
+ RESERVED
- ming <unfixed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-null-pointer-dereference-in-dumpbuffer-read-c
CVE-2016-9827 [listswf: heap-based buffer overflow in _iprintf (outputtxt.c)]
+ RESERVED
- ming <unfixed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libming-listswf-heap-based-buffer-overflow-in-_iprintf-outputtxt-c
CVE-2016-9826
+ RESERVED
- libav <removed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer
NOTE: https://github.com/asarubbo/poc/blob/master/00041-libav-leftshift-ituh263dec_c
CVE-2016-9825
+ RESERVED
- libav <removed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer
NOTE: https://github.com/asarubbo/poc/blob/master/00040-libav-leftshift-utils_c
CVE-2016-9824
+ RESERVED
- libav <removed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer
NOTE: https://github.com/asarubbo/poc/blob/master/00039-libav-signedintoverflow-swscale_c
CVE-2016-9823
+ RESERVED
- libav <removed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer
NOTE: https://github.com/asarubbo/poc/blob/master/00038-libav-uint8_t64-outofbounds-mpegvideo
CVE-2016-9822
+ RESERVED
- libav <removed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer
NOTE: https://github.com/asarubbo/poc/blob/master/00037-libav-signedintoverflow-mpegvideo_parser
CVE-2016-9821
+ RESERVED
- libav <removed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer
NOTE: https://github.com/asarubbo/poc/blob/master/00037-libav-signedintoverflow-mpegvideo_parser
CVE-2016-9820
+ RESERVED
- libav <removed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer
NOTE: https://github.com/asarubbo/poc/blob/master/00036-libav-leftshift-mpegvideo
CVE-2016-9819
+ RESERVED
- libav <removed>
NOTE: https://blogs.gentoo.org/ago/2016/12/01/libav-multiple-crashes-from-the-undefined-behavior-sanitizer
NOTE: https://github.com/asarubbo/poc/blob/master/00036-libav-leftshift-mpegvideo
CVE-2016-9818
+ RESERVED
- xen <unfixed>
[wheezy] - xen <not-affected> (ARM support introduced in 4.4)
NOTE: https://xenbits.xen.org/xsa/advisory-201.html
NOTE: CVE for fix via patch https://xenbits.xen.org/xsa/xsa201-4.patch
CVE-2016-9817
+ RESERVED
- xen <unfixed>
[wheezy] - xen <not-affected> (ARM support introduced in 4.4)
NOTE: https://xenbits.xen.org/xsa/advisory-201.html
NOTE: CVE for fix via patch https://xenbits.xen.org/xsa/xsa201-3.patch
NOTE: or https://xenbits.xen.org/xsa/xsa201-3-4.7.patch
CVE-2016-9816
+ RESERVED
- xen <unfixed>
[wheezy] - xen <not-affected> (ARM support introduced in 4.4)
NOTE: https://xenbits.xen.org/xsa/advisory-201.html
NOTE: CVE for fix via patch https://xenbits.xen.org/xsa/xsa201-2.patch
CVE-2016-9815
+ RESERVED
- xen <unfixed>
[wheezy] - xen <not-affected> (ARM support introduced in 4.4)
NOTE: https://xenbits.xen.org/xsa/advisory-201.html
NOTE: CVE for fix via patch https://xenbits.xen.org/xsa/xsa201-1.patch
CVE-2016-9814 [simplesamlphp signature validation SSPSA 201612-01]
+ RESERVED
- simplesamlphp 1.14.10-1 (low)
[jessie] - simplesamlphp <no-dsa> (Minor issue)
[wheezy] - simplesamlphp <no-dsa> (Minor issue)
@@ -226,39 +324,42 @@ CVE-2016-9687
RESERVED
CVE-2016-9686
RESERVED
-CVE-2016-9804 [buffer overflow in commands_dump()]
+CVE-2016-9804 (In BlueZ 5.42, a buffer overflow was observed in &quot;commands_dump&quot; ...)
- bluez <unfixed>
NOTE: https://www.spinics.net/lists/linux-bluetooth/msg68892.html
-CVE-2016-9803 [out-of-bounds read in le_meta_ev_dump()]
+CVE-2016-9803 (In BlueZ 5.42, an out-of-bounds read was observed in &quot;le_meta_ev_dump&quot; ...)
- bluez <unfixed>
NOTE: https://www.spinics.net/lists/linux-bluetooth/msg68892.html
-CVE-2016-9802 [buffer over-read in l2cap_packet()]
+CVE-2016-9802 (In BlueZ 5.42, a buffer over-read was identified in &quot;l2cap_packet&quot; ...)
- bluez <unfixed>
NOTE: https://www.spinics.net/lists/linux-bluetooth/msg68898.html
-CVE-2016-9801 [buffer overflow in set_ext_ctrl()]
+CVE-2016-9801 (In BlueZ 5.42, a buffer overflow was observed in &quot;set_ext_ctrl&quot; ...)
- bluez <unfixed>
NOTE: https://www.spinics.net/lists/linux-bluetooth/msg68892.html
-CVE-2016-9800 [buffer overflow in pin_code_reply_dump()]
+CVE-2016-9800 (In BlueZ 5.42, a buffer overflow was observed in &quot;pin_code_reply_dump&quot; ...)
- bluez <unfixed>
NOTE: https://www.spinics.net/lists/linux-bluetooth/msg68892.html
-CVE-2016-9799 [buffer overflow in pklg_read_hci()]
+CVE-2016-9799 (In BlueZ 5.42, a buffer overflow was observed in &quot;pklg_read_hci&quot; ...)
- bluez <unfixed>
NOTE: https://www.spinics.net/lists/linux-bluetooth/msg68898.html
-CVE-2016-9798 [use-after-free in conf_opt()]
+CVE-2016-9798 (In BlueZ 5.42, a use-after-free was identified in &quot;conf_opt&quot; function ...)
- bluez <unfixed>
NOTE: https://www.spinics.net/lists/linux-bluetooth/msg68892.html
-CVE-2016-9797 [bluez: buffer over-read in l2cap_dump()]
+CVE-2016-9797 (In BlueZ 5.42, a buffer over-read was observed in &quot;l2cap_dump&quot; function ...)
- bluez <unfixed>
NOTE: https://www.spinics.net/lists/linux-bluetooth/msg68892.html
CVE-2016-9794 [Linux kernel: ALSA: use-after-free in,kill_fasync]
+ RESERVED
- linux 4.7.2-1
NOTE: https://patchwork.kernel.org/patch/8752621/
NOTE: Fixed by: https://git.kernel.org/linus/3aa02cb664c5fb1042958c8d1aa8c35055a2ebc4 (v4.7-rc1)
NOTE: http://seclists.org/oss-sec/2016/q4/576
CVE-2016-9793 [Linux: signed overflows for SO_{SND|RCV}BUFFORCE]
+ RESERVED
- linux <unfixed>
NOTE: Fixed by: https://git.kernel.org/linus/b98b0bc8c431e3ceb4b26b0dfc8db509518fb290
CVE-2016-9775 [tomcat8: privilege escalation during package removal]
+ RESERVED
{DLA-729-1 DLA-728-1}
- tomcat8 8.5.8-2 (bug #845385)
- tomcat7 7.0.72-3
@@ -267,6 +368,7 @@ CVE-2016-9775 [tomcat8: privilege escalation during package removal]
NOTE: Since 6.0.41-3, src:tomcat6 only builds a servlet and docs in Jessie
NOTE: http://www.openwall.com/lists/oss-security/2016/12/02/5
CVE-2016-9774 [tomcat8: privilege escalation during package upgrade]
+ RESERVED
- tomcat8 <unfixed> (bug #845393)
- tomcat7 7.0.72-3
NOTE: Since 7.0.72-3, src:tomcat7 only builds the Servlet API
@@ -274,6 +376,7 @@ CVE-2016-9774 [tomcat8: privilege escalation during package upgrade]
NOTE: Since 6.0.41-3, src:tomcat6 only builds a servlet and docs in Jessie
NOTE: http://www.openwall.com/lists/oss-security/2016/12/02/5
CVE-2016-9777 [kvm: out of bounds memory access via vcpu_id]
+ RESERVED
- linux <unfixed>
[jessie] - linux <not-affected> (Vulnerable code introduced later)
[wheezy] - linux <not-affected> (Vulnerable code introduced later)
@@ -282,6 +385,7 @@ CVE-2016-9777 [kvm: out of bounds memory access via vcpu_id]
NOTE: Introduced in: https://git.kernel.org/linus/af1bae5497b98cb99d6b0492e6981f060420a00c (v4.8-rc1)
NOTE: http://www.openwall.com/lists/oss-security/2016/12/02/2
CVE-2016-9776 [net: mcf_fec: infinite loop while receiving data in mcf_fec_receive]
+ RESERVED
- qemu <unfixed> (bug #846797)
[jessie] - qemu <no-dsa> (Minor issue)
[wheezy] - qemu <no-dsa> (Minor issue)
@@ -376,6 +480,7 @@ CVE-2016-9650
- chromium-browser 55.0.2883.75-1
[wheezy] - chromium-browser <end-of-life> (Not supported in Wheezy)
CVE-2016-9772 [OPENAFS-SA-2016-003 - directory information leaks]
+ RESERVED
{DLA-733-1}
- openafs 1.6.20-1 (bug #846922)
[jessie] - openafs <no-dsa> (Minor issue; can be fixed in point release)
@@ -405,8 +510,8 @@ CVE-2016-9641
RESERVED
CVE-2016-9640
RESERVED
-CVE-2016-9638
- RESERVED
+CVE-2016-9638 (In BMC Patrol before 9.13.10.02, the binary &quot;listguests64&quot; is ...)
+ TODO: check
CVE-2016-9637
RESERVED
CVE-2016-9620
@@ -720,18 +825,22 @@ CVE-2016-9639 [salt confidentiality issue]
- salt 2016.3.0+ds-1
NOTE: http://www.openwall.com/lists/oss-security/2016/11/25/2
CVE-2016-9813 [null pointer deref (segfault) in mpegts decoder / _parse_pat]
+ RESERVED
- gst-plugins-bad1.0 1.10.2-1
- gst-plugins-bad0.10 <removed>
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=775120
CVE-2016-9812 [2 byte heap out of bounds read in gst_mpegts_section_new]
+ RESERVED
- gst-plugins-bad1.0 1.10.2-1
- gst-plugins-bad0.10 <removed>
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=775048
CVE-2016-9811 [4 byte heap out of bounds read in windows_icon_typefind]
+ RESERVED
- gst-plugins-base1.0 1.10.2-1
- gst-plugins-base0.10 <removed>
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=774902
CVE-2016-9810 [Invalid memory read in glib caused by one invalid unref call in the flxdec decoder]
+ RESERVED
- gst-plugins-good1.0 1.10.1-2
[jessie] - gst-plugins-good1.0 1.4.4-2+deb8u2
- gst-plugins-good0.10 <removed>
@@ -739,10 +848,12 @@ CVE-2016-9810 [Invalid memory read in glib caused by one invalid unref call in t
[wheezy] - gst-plugins-good0.10 0.10.31-3+nmu1+deb7u1
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=774897
CVE-2016-9809 [h264: one byte heap off by one read in gst_h264_parse_set_caps]
+ RESERVED
- gst-plugins-bad1.0 1.10.2-1
- gst-plugins-bad0.10 <removed>
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=774896
CVE-2016-9808
+ RESERVED
- gst-plugins-good1.0 1.10.1-2
[jessie] - gst-plugins-good1.0 1.4.4-2+deb8u2
- gst-plugins-good0.10 <removed>
@@ -752,6 +863,7 @@ CVE-2016-9808
NOTE: https://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=153a8ae752c90d07190ef45803422a4f71ea8bff
NOTE: https://scarybeastsecurity.blogspot.dk/2016/11/0day-poc-incorrect-fix-for-gstreamer.html
CVE-2016-9807
+ RESERVED
- gst-plugins-good1.0 1.10.1-2
[jessie] - gst-plugins-good1.0 1.4.4-2+deb8u2
- gst-plugins-good0.10 <removed>
@@ -760,6 +872,7 @@ CVE-2016-9807
NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=774859
NOTE: https://cgit.freedesktop.org/gstreamer/gst-plugins-good/commit/?id=153a8ae752c90d07190ef45803422a4f71ea8bff
CVE-2016-9806 [double free in netlink_dump]
+ RESERVED
- linux 4.6.3-1
NOTE: Fixed by: https://git.kernel.org/linus/92964c79b357efd980812c4de5c1fd2ec8bb5520 (v4.7-rc1)
CVE-2016-9636
@@ -903,8 +1016,8 @@ CVE-2016-9480 (libdwarf 2016-10-21 allows context-dependent attackers to obtain
NOTE: The code has substantially changed in libdwarf/dwarf_util.c from older
NOTE: versions, but there seem to be still back then an unchecked dereference
NOTE: of val_ptr.
-CVE-2016-9479
- RESERVED
+CVE-2016-9479 (The &quot;lost password&quot; functionality in b2evolution before 6.7.9 allows ...)
+ TODO: check
CVE-2016-9478
RESERVED
CVE-2016-9477
@@ -998,6 +1111,7 @@ CVE-2016-9559 [null pointer passed as argument 2, which is declared to never be
NOTE: https://github.com/ImageMagick/ImageMagick/commit/b61d35eaccc0a7ddeff8a1c3abfcd0a43ccf210b (master)
NOTE: https://github.com/ImageMagick/ImageMagick/issues/298
CVE-2016-9773 [Incomplete fix for CVE-2016-9556]
+ RESERVED
- imagemagick <undetermined>
NOTE: Fixed by: https://github.com/ImageMagick/ImageMagick/commit/4e8c2ed53fcb54a34b3a6185b2584f26cf6874a3
NOTE: https://blogs.gentoo.org/ago/2016/12/01/imagemagick-heap-based-buffer-overflow-in-ispixelgray-pixel-accessor-h-incomplete-fix-for-cve-2016-9556/
@@ -2024,10 +2138,10 @@ CVE-2016-9159
RESERVED
CVE-2016-9158
RESERVED
-CVE-2016-9157
- RESERVED
-CVE-2016-9156
- RESERVED
+CVE-2016-9157 (A vulnerability in Siemens SICAM PAS (all versions including V8.08) ...)
+ TODO: check
+CVE-2016-9156 (A vulnerability in Siemens SICAM PAS (all versions including V8.08) ...)
+ TODO: check
CVE-2016-9155 (The following SIEMENS branded IP Camera Models CCMW3025, CVMW3025-IR, ...)
NOT-FOR-US: Siemens
CVE-2016-9154
@@ -3055,9 +3169,9 @@ CVE-2016-8741
CVE-2016-8740
RESERVED
- apache2 <unfixed> (bug #847124)
- [jessie] - apache2 <not-affected> (Vulnerable code not present)
- [wheezy] - apache2 <not-affected> (Vulnerable code not present)
- NOTE: HTTP/2 support introduced in 2.4.17
+ [jessie] - apache2 <not-affected> (Vulnerable code not present)
+ [wheezy] - apache2 <not-affected> (Vulnerable code not present)
+ NOTE: HTTP/2 support introduced in 2.4.17
CVE-2016-8739
RESERVED
CVE-2016-8738
diff --git a/data/CVE/2017.list b/data/CVE/2017.list
index 49d15454ad..9fe9cdeaac 100644
--- a/data/CVE/2017.list
+++ b/data/CVE/2017.list
@@ -1,3 +1,453 @@
+CVE-2017-3149
+ RESERVED
+CVE-2017-3148
+ RESERVED
+CVE-2017-3147
+ RESERVED
+CVE-2017-3146
+ RESERVED
+CVE-2017-3145
+ RESERVED
+CVE-2017-3144
+ RESERVED
+CVE-2017-3143
+ RESERVED
+CVE-2017-3142
+ RESERVED
+CVE-2017-3141
+ RESERVED
+CVE-2017-3140
+ RESERVED
+CVE-2017-3139
+ RESERVED
+CVE-2017-3138
+ RESERVED
+CVE-2017-3137
+ RESERVED
+CVE-2017-3136
+ RESERVED
+CVE-2017-3135
+ RESERVED
+CVE-2017-3134
+ RESERVED
+CVE-2017-3133
+ RESERVED
+CVE-2017-3132
+ RESERVED
+CVE-2017-3131
+ RESERVED
+CVE-2017-3130
+ RESERVED
+CVE-2017-3129
+ RESERVED
+CVE-2017-3128
+ RESERVED
+CVE-2017-3127
+ RESERVED
+CVE-2017-3126
+ RESERVED
+CVE-2017-3125
+ RESERVED
+CVE-2017-3124
+ RESERVED
+CVE-2017-3123
+ RESERVED
+CVE-2017-3122
+ RESERVED
+CVE-2017-3121
+ RESERVED
+CVE-2017-3120
+ RESERVED
+CVE-2017-3119
+ RESERVED
+CVE-2017-3118
+ RESERVED
+CVE-2017-3117
+ RESERVED
+CVE-2017-3116
+ RESERVED
+CVE-2017-3115
+ RESERVED
+CVE-2017-3114
+ RESERVED
+CVE-2017-3113
+ RESERVED
+CVE-2017-3112
+ RESERVED
+CVE-2017-3111
+ RESERVED
+CVE-2017-3110
+ RESERVED
+CVE-2017-3109
+ RESERVED
+CVE-2017-3108
+ RESERVED
+CVE-2017-3107
+ RESERVED
+CVE-2017-3106
+ RESERVED
+CVE-2017-3105
+ RESERVED
+CVE-2017-3104
+ RESERVED
+CVE-2017-3103
+ RESERVED
+CVE-2017-3102
+ RESERVED
+CVE-2017-3101
+ RESERVED
+CVE-2017-3100
+ RESERVED
+CVE-2017-3099
+ RESERVED
+CVE-2017-3098
+ RESERVED
+CVE-2017-3097
+ RESERVED
+CVE-2017-3096
+ RESERVED
+CVE-2017-3095
+ RESERVED
+CVE-2017-3094
+ RESERVED
+CVE-2017-3093
+ RESERVED
+CVE-2017-3092
+ RESERVED
+CVE-2017-3091
+ RESERVED
+CVE-2017-3090
+ RESERVED
+CVE-2017-3089
+ RESERVED
+CVE-2017-3088
+ RESERVED
+CVE-2017-3087
+ RESERVED
+CVE-2017-3086
+ RESERVED
+CVE-2017-3085
+ RESERVED
+CVE-2017-3084
+ RESERVED
+CVE-2017-3083
+ RESERVED
+CVE-2017-3082
+ RESERVED
+CVE-2017-3081
+ RESERVED
+CVE-2017-3080
+ RESERVED
+CVE-2017-3079
+ RESERVED
+CVE-2017-3078
+ RESERVED
+CVE-2017-3077
+ RESERVED
+CVE-2017-3076
+ RESERVED
+CVE-2017-3075
+ RESERVED
+CVE-2017-3074
+ RESERVED
+CVE-2017-3073
+ RESERVED
+CVE-2017-3072
+ RESERVED
+CVE-2017-3071
+ RESERVED
+CVE-2017-3070
+ RESERVED
+CVE-2017-3069
+ RESERVED
+CVE-2017-3068
+ RESERVED
+CVE-2017-3067
+ RESERVED
+CVE-2017-3066
+ RESERVED
+CVE-2017-3065
+ RESERVED
+CVE-2017-3064
+ RESERVED
+CVE-2017-3063
+ RESERVED
+CVE-2017-3062
+ RESERVED
+CVE-2017-3061
+ RESERVED
+CVE-2017-3060
+ RESERVED
+CVE-2017-3059
+ RESERVED
+CVE-2017-3058
+ RESERVED
+CVE-2017-3057
+ RESERVED
+CVE-2017-3056
+ RESERVED
+CVE-2017-3055
+ RESERVED
+CVE-2017-3054
+ RESERVED
+CVE-2017-3053
+ RESERVED
+CVE-2017-3052
+ RESERVED
+CVE-2017-3051
+ RESERVED
+CVE-2017-3050
+ RESERVED
+CVE-2017-3049
+ RESERVED
+CVE-2017-3048
+ RESERVED
+CVE-2017-3047
+ RESERVED
+CVE-2017-3046
+ RESERVED
+CVE-2017-3045
+ RESERVED
+CVE-2017-3044
+ RESERVED
+CVE-2017-3043
+ RESERVED
+CVE-2017-3042
+ RESERVED
+CVE-2017-3041
+ RESERVED
+CVE-2017-3040
+ RESERVED
+CVE-2017-3039
+ RESERVED
+CVE-2017-3038
+ RESERVED
+CVE-2017-3037
+ RESERVED
+CVE-2017-3036
+ RESERVED
+CVE-2017-3035
+ RESERVED
+CVE-2017-3034
+ RESERVED
+CVE-2017-3033
+ RESERVED
+CVE-2017-3032
+ RESERVED
+CVE-2017-3031
+ RESERVED
+CVE-2017-3030
+ RESERVED
+CVE-2017-3029
+ RESERVED
+CVE-2017-3028
+ RESERVED
+CVE-2017-3027
+ RESERVED
+CVE-2017-3026
+ RESERVED
+CVE-2017-3025
+ RESERVED
+CVE-2017-3024
+ RESERVED
+CVE-2017-3023
+ RESERVED
+CVE-2017-3022
+ RESERVED
+CVE-2017-3021
+ RESERVED
+CVE-2017-3020
+ RESERVED
+CVE-2017-3019
+ RESERVED
+CVE-2017-3018
+ RESERVED
+CVE-2017-3017
+ RESERVED
+CVE-2017-3016
+ RESERVED
+CVE-2017-3015
+ RESERVED
+CVE-2017-3014
+ RESERVED
+CVE-2017-3013
+ RESERVED
+CVE-2017-3012
+ RESERVED
+CVE-2017-3011
+ RESERVED
+CVE-2017-3010
+ RESERVED
+CVE-2017-3009
+ RESERVED
+CVE-2017-3008
+ RESERVED
+CVE-2017-3007
+ RESERVED
+CVE-2017-3006
+ RESERVED
+CVE-2017-3005
+ RESERVED
+CVE-2017-3004
+ RESERVED
+CVE-2017-3003
+ RESERVED
+CVE-2017-3002
+ RESERVED
+CVE-2017-3001
+ RESERVED
+CVE-2017-3000
+ RESERVED
+CVE-2017-2999
+ RESERVED
+CVE-2017-2998
+ RESERVED
+CVE-2017-2997
+ RESERVED
+CVE-2017-2996
+ RESERVED
+CVE-2017-2995
+ RESERVED
+CVE-2017-2994
+ RESERVED
+CVE-2017-2993
+ RESERVED
+CVE-2017-2992
+ RESERVED
+CVE-2017-2991
+ RESERVED
+CVE-2017-2990
+ RESERVED
+CVE-2017-2989
+ RESERVED
+CVE-2017-2988
+ RESERVED
+CVE-2017-2987
+ RESERVED
+CVE-2017-2986
+ RESERVED
+CVE-2017-2985
+ RESERVED
+CVE-2017-2984
+ RESERVED
+CVE-2017-2983
+ RESERVED
+CVE-2017-2982
+ RESERVED
+CVE-2017-2981
+ RESERVED
+CVE-2017-2980
+ RESERVED
+CVE-2017-2979
+ RESERVED
+CVE-2017-2978
+ RESERVED
+CVE-2017-2977
+ RESERVED
+CVE-2017-2976
+ RESERVED
+CVE-2017-2975
+ RESERVED
+CVE-2017-2974
+ RESERVED
+CVE-2017-2973
+ RESERVED
+CVE-2017-2972
+ RESERVED
+CVE-2017-2971
+ RESERVED
+CVE-2017-2970
+ RESERVED
+CVE-2017-2969
+ RESERVED
+CVE-2017-2968
+ RESERVED
+CVE-2017-2967
+ RESERVED
+CVE-2017-2966
+ RESERVED
+CVE-2017-2965
+ RESERVED
+CVE-2017-2964
+ RESERVED
+CVE-2017-2963
+ RESERVED
+CVE-2017-2962
+ RESERVED
+CVE-2017-2961
+ RESERVED
+CVE-2017-2960
+ RESERVED
+CVE-2017-2959
+ RESERVED
+CVE-2017-2958
+ RESERVED
+CVE-2017-2957
+ RESERVED
+CVE-2017-2956
+ RESERVED
+CVE-2017-2955
+ RESERVED
+CVE-2017-2954
+ RESERVED
+CVE-2017-2953
+ RESERVED
+CVE-2017-2952
+ RESERVED
+CVE-2017-2951
+ RESERVED
+CVE-2017-2950
+ RESERVED
+CVE-2017-2949
+ RESERVED
+CVE-2017-2948
+ RESERVED
+CVE-2017-2947
+ RESERVED
+CVE-2017-2946
+ RESERVED
+CVE-2017-2945
+ RESERVED
+CVE-2017-2944
+ RESERVED
+CVE-2017-2943
+ RESERVED
+CVE-2017-2942
+ RESERVED
+CVE-2017-2941
+ RESERVED
+CVE-2017-2940
+ RESERVED
+CVE-2017-2939
+ RESERVED
+CVE-2017-2938
+ RESERVED
+CVE-2017-2937
+ RESERVED
+CVE-2017-2936
+ RESERVED
+CVE-2017-2935
+ RESERVED
+CVE-2017-2934
+ RESERVED
+CVE-2017-2933
+ RESERVED
+CVE-2017-2932
+ RESERVED
+CVE-2017-2931
+ RESERVED
+CVE-2017-2930
+ RESERVED
+CVE-2017-2929
+ RESERVED
+CVE-2017-2928
+ RESERVED
+CVE-2017-2927
+ RESERVED
+CVE-2017-2926
+ RESERVED
+CVE-2017-2925
+ RESERVED
CVE-2017-2924
RESERVED
CVE-2017-2923

© 2014-2024 Faster IT GmbH | imprint | privacy policy