[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso carnil at debian.org
Fri Aug 28 09:10:27 BST 2020



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
3af38bdf by security tracker role at 2020-08-28T08:10:19+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,13 +1,299 @@
+CVE-2020-24861
+	RESERVED
+CVE-2020-24860
+	RESERVED
+CVE-2020-24859
+	RESERVED
+CVE-2020-24858
+	RESERVED
+CVE-2020-24857
+	RESERVED
+CVE-2020-24856
+	RESERVED
+CVE-2020-24855
+	RESERVED
+CVE-2020-24854
+	RESERVED
+CVE-2020-24853
+	RESERVED
+CVE-2020-24852
+	RESERVED
+CVE-2020-24851
+	RESERVED
+CVE-2020-24850
+	RESERVED
+CVE-2020-24849
+	RESERVED
+CVE-2020-24848
+	RESERVED
+CVE-2020-24847
+	RESERVED
+CVE-2020-24846
+	RESERVED
+CVE-2020-24845
+	RESERVED
+CVE-2020-24844
+	RESERVED
+CVE-2020-24843
+	RESERVED
+CVE-2020-24842
+	RESERVED
+CVE-2020-24841
+	RESERVED
+CVE-2020-24840
+	RESERVED
+CVE-2020-24839
+	RESERVED
+CVE-2020-24838
+	RESERVED
+CVE-2020-24837
+	RESERVED
+CVE-2020-24836
+	RESERVED
+CVE-2020-24835
+	RESERVED
+CVE-2020-24834
+	RESERVED
+CVE-2020-24833
+	RESERVED
+CVE-2020-24832
+	RESERVED
+CVE-2020-24831
+	RESERVED
+CVE-2020-24830
+	RESERVED
+CVE-2020-24829
+	RESERVED
+CVE-2020-24828
+	RESERVED
+CVE-2020-24827
+	RESERVED
+CVE-2020-24826
+	RESERVED
+CVE-2020-24825
+	RESERVED
+CVE-2020-24824
+	RESERVED
+CVE-2020-24823
+	RESERVED
+CVE-2020-24822
+	RESERVED
+CVE-2020-24821
+	RESERVED
+CVE-2020-24820
+	RESERVED
+CVE-2020-24819
+	RESERVED
+CVE-2020-24818
+	RESERVED
+CVE-2020-24817
+	RESERVED
+CVE-2020-24816
+	RESERVED
+CVE-2020-24815
+	RESERVED
+CVE-2020-24814
+	RESERVED
+CVE-2020-24813
+	RESERVED
+CVE-2020-24812
+	RESERVED
+CVE-2020-24811
+	RESERVED
+CVE-2020-24810
+	RESERVED
+CVE-2020-24809
+	RESERVED
+CVE-2020-24808
+	RESERVED
+CVE-2020-24807
+	RESERVED
+CVE-2020-24806
+	RESERVED
+CVE-2020-24805
+	RESERVED
+CVE-2020-24804
+	RESERVED
+CVE-2020-24803
+	RESERVED
+CVE-2020-24802
+	RESERVED
+CVE-2020-24801
+	RESERVED
+CVE-2020-24800
+	RESERVED
+CVE-2020-24799
+	RESERVED
+CVE-2020-24798
+	RESERVED
+CVE-2020-24797
+	RESERVED
+CVE-2020-24796
+	RESERVED
+CVE-2020-24795
+	RESERVED
+CVE-2020-24794
+	RESERVED
+CVE-2020-24793
+	RESERVED
+CVE-2020-24792
+	RESERVED
+CVE-2020-24791
+	RESERVED
+CVE-2020-24790
+	RESERVED
+CVE-2020-24789
+	RESERVED
+CVE-2020-24788
+	RESERVED
+CVE-2020-24787
+	RESERVED
+CVE-2020-24786
+	RESERVED
+CVE-2020-24785
+	RESERVED
+CVE-2020-24784
+	RESERVED
+CVE-2020-24783
+	RESERVED
+CVE-2020-24782
+	RESERVED
+CVE-2020-24781
+	RESERVED
+CVE-2020-24780
+	RESERVED
+CVE-2020-24779
+	RESERVED
+CVE-2020-24778
+	RESERVED
+CVE-2020-24777
+	RESERVED
+CVE-2020-24776
+	RESERVED
+CVE-2020-24775
+	RESERVED
+CVE-2020-24774
+	RESERVED
+CVE-2020-24773
+	RESERVED
+CVE-2020-24772
+	RESERVED
+CVE-2020-24771
+	RESERVED
+CVE-2020-24770
+	RESERVED
+CVE-2020-24769
+	RESERVED
+CVE-2020-24768
+	RESERVED
+CVE-2020-24767
+	RESERVED
+CVE-2020-24766
+	RESERVED
+CVE-2020-24765
+	RESERVED
+CVE-2020-24764
+	RESERVED
+CVE-2020-24763
+	RESERVED
+CVE-2020-24762
+	RESERVED
+CVE-2020-24761
+	RESERVED
+CVE-2020-24760
+	RESERVED
+CVE-2020-24759
+	RESERVED
+CVE-2020-24758
+	RESERVED
+CVE-2020-24757
+	RESERVED
+CVE-2020-24756
+	RESERVED
+CVE-2020-24755
+	RESERVED
+CVE-2020-24754
+	RESERVED
+CVE-2020-24753
+	RESERVED
+CVE-2020-24752
+	RESERVED
+CVE-2020-24751
+	RESERVED
+CVE-2020-24750
+	RESERVED
+CVE-2020-24749
+	RESERVED
+CVE-2020-24748
+	RESERVED
+CVE-2020-24747
+	RESERVED
+CVE-2020-24746
+	RESERVED
+CVE-2020-24745
+	RESERVED
+CVE-2020-24744
+	RESERVED
+CVE-2020-24743
+	RESERVED
+CVE-2020-24742
+	RESERVED
+CVE-2020-24741
+	RESERVED
+CVE-2020-24740
+	RESERVED
+CVE-2020-24739
+	RESERVED
+CVE-2020-24738
+	RESERVED
+CVE-2020-24737
+	RESERVED
+CVE-2020-24736
+	RESERVED
+CVE-2020-24735
+	RESERVED
+CVE-2020-24734
+	RESERVED
+CVE-2020-24733
+	RESERVED
+CVE-2020-24732
+	RESERVED
+CVE-2020-24731
+	RESERVED
+CVE-2020-24730
+	RESERVED
+CVE-2020-24729
+	RESERVED
+CVE-2020-24728
+	RESERVED
+CVE-2020-24727
+	RESERVED
+CVE-2020-24726
+	RESERVED
+CVE-2020-24725
+	RESERVED
+CVE-2020-24724
+	RESERVED
+CVE-2020-24723
+	RESERVED
+CVE-2020-24722
+	RESERVED
+CVE-2020-24721
+	RESERVED
+CVE-2020-24720
+	RESERVED
+CVE-2020-24719
+	RESERVED
 CVE-2020-24718
 	RESERVED
 CVE-2020-24717 (OpenZFS before 2.0.0-rc1, when used on FreeBSD, misinterprets group pe ...)
 	TODO: check
 CVE-2020-24716 (OpenZFS before 2.0.0-rc1, when used on FreeBSD, allows execute permiss ...)
 	TODO: check
-CVE-2020-24715
-	RESERVED
-CVE-2020-24714
-	RESERVED
+CVE-2020-24715 (The Scalyr Agent before 2.1.10 has Missing SSL Certificate Validation  ...)
+	TODO: check
+CVE-2020-24714 (The Scalyr Agent before 2.1.10 has Missing SSL Certificate Validation  ...)
+	TODO: check
 CVE-2020-24713
 	RESERVED
 CVE-2020-24712
@@ -199,8 +485,8 @@ CVE-2020-24620
 	RESERVED
 CVE-2020-24619
 	RESERVED
-CVE-2020-24618
-	RESERVED
+CVE-2020-24618 (In JetBrains YouTrack versions before 2020.3.4313, 2020.2.11008, 2020. ...)
+	TODO: check
 CVE-2020-24617
 	RESERVED
 CVE-2020-24616 (FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interact ...)
@@ -18708,16 +18994,16 @@ CVE-2020-15607 (This vulnerability allows remote attackers to execute arbitrary
 	NOT-FOR-US: CentOS-WebPanel.com
 CVE-2020-15606 (This vulnerability allows remote attackers to execute arbitrary code o ...)
 	NOT-FOR-US: CentOS-WebPanel.com
-CVE-2020-15605
-	RESERVED
+CVE-2020-15605 (If LDAP authentication is enabled, an LDAP authentication bypass vulne ...)
+	TODO: check
 CVE-2020-15604
 	RESERVED
 CVE-2020-15603 (An invalid memory read vulnerability in a Trend Micro Secuity 2020 (v1 ...)
 	NOT-FOR-US: Trend Micro
 CVE-2020-15602 (An untrusted search path remote code execution (RCE) vulnerability in  ...)
 	NOT-FOR-US: Trend Micro
-CVE-2020-15601
-	RESERVED
+CVE-2020-15601 (If LDAP authentication is enabled, an LDAP authentication bypass vulne ...)
+	TODO: check
 CVE-2020-15600 (An issue was discovered in CMSUno before 1.6.1. uno.php allows CSRF to ...)
 	NOT-FOR-US: CMSUno
 CVE-2020-15599 (Victor CMS through 2019-02-28 allows XSS via the register.php user_fir ...)
@@ -33396,10 +33682,10 @@ CVE-2020-10520
 	RESERVED
 CVE-2020-10519
 	RESERVED
-CVE-2020-10518
-	RESERVED
-CVE-2020-10517
-	RESERVED
+CVE-2020-10518 (A remote code execution vulnerability was identified in GitHub Enterpr ...)
+	TODO: check
+CVE-2020-10517 (An improper access control vulnerability was identified in GitHub Ente ...)
+	TODO: check
 CVE-2020-10516 (An improper access control vulnerability was identified in the GitHub  ...)
 	NOT-FOR-US: GitHub Enterprise Server API
 CVE-2020-10515 (STARFACE UCC Client before 6.7.1.204 on WIndows allows binary planting ...)
@@ -37961,8 +38247,8 @@ CVE-2020-8604 (A vulnerability in Trend Micro InterScan Web Security Virtual App
 	NOT-FOR-US: Trend Micro
 CVE-2020-8603 (A cross-site scripting vulnerability (XSS) in Trend Micro InterScan We ...)
 	NOT-FOR-US: Trend Micro
-CVE-2020-8602
-	RESERVED
+CVE-2020-8602 (A vulnerability in the management consoles of Trend Micro Deep Securit ...)
+	TODO: check
 CVE-2020-8601 (Trend Micro Vulnerability Protection 2.0 is affected by a vulnerabilit ...)
 	NOT-FOR-US: Trend Micro
 CVE-2020-8600 (Trend Micro Worry-Free Business Security (9.0, 9.5, 10.0) is affected  ...)
@@ -45325,16 +45611,16 @@ CVE-2020-5627
 	RESERVED
 CVE-2020-5626
 	RESERVED
-CVE-2020-5625
-	RESERVED
-CVE-2020-5624
-	RESERVED
-CVE-2020-5623
-	RESERVED
+CVE-2020-5625 (Cross-site scripting vulnerability in XooNIps 3.48 and earlier allows  ...)
+	TODO: check
+CVE-2020-5624 (SQL injection vulnerability in the XooNIps 3.48 and earlier allows rem ...)
+	TODO: check
+CVE-2020-5623 (NITORI App for Android versions 6.0.4 and earlier and NITORI App for i ...)
+	TODO: check
 CVE-2020-5622
 	RESERVED
-CVE-2020-5621
-	RESERVED
+CVE-2020-5621 (Cross-site request forgery (CSRF) vulnerability in NETGEAR switching h ...)
+	TODO: check
 CVE-2020-5620 (Cross-site scripting vulnerability in Exment prior to v3.6.0 allows re ...)
 	NOT-FOR-US: Exment
 CVE-2020-5619 (Cross-site scripting vulnerability in Exment prior to v3.6.0 allows re ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3af38bdfa3156b44bbe1ba75b4845c52cc8aa273

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3af38bdfa3156b44bbe1ba75b4845c52cc8aa273
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200828/85c0e48e/attachment.html>


More information about the debian-security-tracker-commits mailing list