[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso
carnil at debian.org
Fri Aug 28 09:10:27 BST 2020
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
3af38bdf by security tracker role at 2020-08-28T08:10:19+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,13 +1,299 @@
+CVE-2020-24861
+ RESERVED
+CVE-2020-24860
+ RESERVED
+CVE-2020-24859
+ RESERVED
+CVE-2020-24858
+ RESERVED
+CVE-2020-24857
+ RESERVED
+CVE-2020-24856
+ RESERVED
+CVE-2020-24855
+ RESERVED
+CVE-2020-24854
+ RESERVED
+CVE-2020-24853
+ RESERVED
+CVE-2020-24852
+ RESERVED
+CVE-2020-24851
+ RESERVED
+CVE-2020-24850
+ RESERVED
+CVE-2020-24849
+ RESERVED
+CVE-2020-24848
+ RESERVED
+CVE-2020-24847
+ RESERVED
+CVE-2020-24846
+ RESERVED
+CVE-2020-24845
+ RESERVED
+CVE-2020-24844
+ RESERVED
+CVE-2020-24843
+ RESERVED
+CVE-2020-24842
+ RESERVED
+CVE-2020-24841
+ RESERVED
+CVE-2020-24840
+ RESERVED
+CVE-2020-24839
+ RESERVED
+CVE-2020-24838
+ RESERVED
+CVE-2020-24837
+ RESERVED
+CVE-2020-24836
+ RESERVED
+CVE-2020-24835
+ RESERVED
+CVE-2020-24834
+ RESERVED
+CVE-2020-24833
+ RESERVED
+CVE-2020-24832
+ RESERVED
+CVE-2020-24831
+ RESERVED
+CVE-2020-24830
+ RESERVED
+CVE-2020-24829
+ RESERVED
+CVE-2020-24828
+ RESERVED
+CVE-2020-24827
+ RESERVED
+CVE-2020-24826
+ RESERVED
+CVE-2020-24825
+ RESERVED
+CVE-2020-24824
+ RESERVED
+CVE-2020-24823
+ RESERVED
+CVE-2020-24822
+ RESERVED
+CVE-2020-24821
+ RESERVED
+CVE-2020-24820
+ RESERVED
+CVE-2020-24819
+ RESERVED
+CVE-2020-24818
+ RESERVED
+CVE-2020-24817
+ RESERVED
+CVE-2020-24816
+ RESERVED
+CVE-2020-24815
+ RESERVED
+CVE-2020-24814
+ RESERVED
+CVE-2020-24813
+ RESERVED
+CVE-2020-24812
+ RESERVED
+CVE-2020-24811
+ RESERVED
+CVE-2020-24810
+ RESERVED
+CVE-2020-24809
+ RESERVED
+CVE-2020-24808
+ RESERVED
+CVE-2020-24807
+ RESERVED
+CVE-2020-24806
+ RESERVED
+CVE-2020-24805
+ RESERVED
+CVE-2020-24804
+ RESERVED
+CVE-2020-24803
+ RESERVED
+CVE-2020-24802
+ RESERVED
+CVE-2020-24801
+ RESERVED
+CVE-2020-24800
+ RESERVED
+CVE-2020-24799
+ RESERVED
+CVE-2020-24798
+ RESERVED
+CVE-2020-24797
+ RESERVED
+CVE-2020-24796
+ RESERVED
+CVE-2020-24795
+ RESERVED
+CVE-2020-24794
+ RESERVED
+CVE-2020-24793
+ RESERVED
+CVE-2020-24792
+ RESERVED
+CVE-2020-24791
+ RESERVED
+CVE-2020-24790
+ RESERVED
+CVE-2020-24789
+ RESERVED
+CVE-2020-24788
+ RESERVED
+CVE-2020-24787
+ RESERVED
+CVE-2020-24786
+ RESERVED
+CVE-2020-24785
+ RESERVED
+CVE-2020-24784
+ RESERVED
+CVE-2020-24783
+ RESERVED
+CVE-2020-24782
+ RESERVED
+CVE-2020-24781
+ RESERVED
+CVE-2020-24780
+ RESERVED
+CVE-2020-24779
+ RESERVED
+CVE-2020-24778
+ RESERVED
+CVE-2020-24777
+ RESERVED
+CVE-2020-24776
+ RESERVED
+CVE-2020-24775
+ RESERVED
+CVE-2020-24774
+ RESERVED
+CVE-2020-24773
+ RESERVED
+CVE-2020-24772
+ RESERVED
+CVE-2020-24771
+ RESERVED
+CVE-2020-24770
+ RESERVED
+CVE-2020-24769
+ RESERVED
+CVE-2020-24768
+ RESERVED
+CVE-2020-24767
+ RESERVED
+CVE-2020-24766
+ RESERVED
+CVE-2020-24765
+ RESERVED
+CVE-2020-24764
+ RESERVED
+CVE-2020-24763
+ RESERVED
+CVE-2020-24762
+ RESERVED
+CVE-2020-24761
+ RESERVED
+CVE-2020-24760
+ RESERVED
+CVE-2020-24759
+ RESERVED
+CVE-2020-24758
+ RESERVED
+CVE-2020-24757
+ RESERVED
+CVE-2020-24756
+ RESERVED
+CVE-2020-24755
+ RESERVED
+CVE-2020-24754
+ RESERVED
+CVE-2020-24753
+ RESERVED
+CVE-2020-24752
+ RESERVED
+CVE-2020-24751
+ RESERVED
+CVE-2020-24750
+ RESERVED
+CVE-2020-24749
+ RESERVED
+CVE-2020-24748
+ RESERVED
+CVE-2020-24747
+ RESERVED
+CVE-2020-24746
+ RESERVED
+CVE-2020-24745
+ RESERVED
+CVE-2020-24744
+ RESERVED
+CVE-2020-24743
+ RESERVED
+CVE-2020-24742
+ RESERVED
+CVE-2020-24741
+ RESERVED
+CVE-2020-24740
+ RESERVED
+CVE-2020-24739
+ RESERVED
+CVE-2020-24738
+ RESERVED
+CVE-2020-24737
+ RESERVED
+CVE-2020-24736
+ RESERVED
+CVE-2020-24735
+ RESERVED
+CVE-2020-24734
+ RESERVED
+CVE-2020-24733
+ RESERVED
+CVE-2020-24732
+ RESERVED
+CVE-2020-24731
+ RESERVED
+CVE-2020-24730
+ RESERVED
+CVE-2020-24729
+ RESERVED
+CVE-2020-24728
+ RESERVED
+CVE-2020-24727
+ RESERVED
+CVE-2020-24726
+ RESERVED
+CVE-2020-24725
+ RESERVED
+CVE-2020-24724
+ RESERVED
+CVE-2020-24723
+ RESERVED
+CVE-2020-24722
+ RESERVED
+CVE-2020-24721
+ RESERVED
+CVE-2020-24720
+ RESERVED
+CVE-2020-24719
+ RESERVED
CVE-2020-24718
RESERVED
CVE-2020-24717 (OpenZFS before 2.0.0-rc1, when used on FreeBSD, misinterprets group pe ...)
TODO: check
CVE-2020-24716 (OpenZFS before 2.0.0-rc1, when used on FreeBSD, allows execute permiss ...)
TODO: check
-CVE-2020-24715
- RESERVED
-CVE-2020-24714
- RESERVED
+CVE-2020-24715 (The Scalyr Agent before 2.1.10 has Missing SSL Certificate Validation ...)
+ TODO: check
+CVE-2020-24714 (The Scalyr Agent before 2.1.10 has Missing SSL Certificate Validation ...)
+ TODO: check
CVE-2020-24713
RESERVED
CVE-2020-24712
@@ -199,8 +485,8 @@ CVE-2020-24620
RESERVED
CVE-2020-24619
RESERVED
-CVE-2020-24618
- RESERVED
+CVE-2020-24618 (In JetBrains YouTrack versions before 2020.3.4313, 2020.2.11008, 2020. ...)
+ TODO: check
CVE-2020-24617
RESERVED
CVE-2020-24616 (FasterXML jackson-databind 2.x before 2.9.10.6 mishandles the interact ...)
@@ -18708,16 +18994,16 @@ CVE-2020-15607 (This vulnerability allows remote attackers to execute arbitrary
NOT-FOR-US: CentOS-WebPanel.com
CVE-2020-15606 (This vulnerability allows remote attackers to execute arbitrary code o ...)
NOT-FOR-US: CentOS-WebPanel.com
-CVE-2020-15605
- RESERVED
+CVE-2020-15605 (If LDAP authentication is enabled, an LDAP authentication bypass vulne ...)
+ TODO: check
CVE-2020-15604
RESERVED
CVE-2020-15603 (An invalid memory read vulnerability in a Trend Micro Secuity 2020 (v1 ...)
NOT-FOR-US: Trend Micro
CVE-2020-15602 (An untrusted search path remote code execution (RCE) vulnerability in ...)
NOT-FOR-US: Trend Micro
-CVE-2020-15601
- RESERVED
+CVE-2020-15601 (If LDAP authentication is enabled, an LDAP authentication bypass vulne ...)
+ TODO: check
CVE-2020-15600 (An issue was discovered in CMSUno before 1.6.1. uno.php allows CSRF to ...)
NOT-FOR-US: CMSUno
CVE-2020-15599 (Victor CMS through 2019-02-28 allows XSS via the register.php user_fir ...)
@@ -33396,10 +33682,10 @@ CVE-2020-10520
RESERVED
CVE-2020-10519
RESERVED
-CVE-2020-10518
- RESERVED
-CVE-2020-10517
- RESERVED
+CVE-2020-10518 (A remote code execution vulnerability was identified in GitHub Enterpr ...)
+ TODO: check
+CVE-2020-10517 (An improper access control vulnerability was identified in GitHub Ente ...)
+ TODO: check
CVE-2020-10516 (An improper access control vulnerability was identified in the GitHub ...)
NOT-FOR-US: GitHub Enterprise Server API
CVE-2020-10515 (STARFACE UCC Client before 6.7.1.204 on WIndows allows binary planting ...)
@@ -37961,8 +38247,8 @@ CVE-2020-8604 (A vulnerability in Trend Micro InterScan Web Security Virtual App
NOT-FOR-US: Trend Micro
CVE-2020-8603 (A cross-site scripting vulnerability (XSS) in Trend Micro InterScan We ...)
NOT-FOR-US: Trend Micro
-CVE-2020-8602
- RESERVED
+CVE-2020-8602 (A vulnerability in the management consoles of Trend Micro Deep Securit ...)
+ TODO: check
CVE-2020-8601 (Trend Micro Vulnerability Protection 2.0 is affected by a vulnerabilit ...)
NOT-FOR-US: Trend Micro
CVE-2020-8600 (Trend Micro Worry-Free Business Security (9.0, 9.5, 10.0) is affected ...)
@@ -45325,16 +45611,16 @@ CVE-2020-5627
RESERVED
CVE-2020-5626
RESERVED
-CVE-2020-5625
- RESERVED
-CVE-2020-5624
- RESERVED
-CVE-2020-5623
- RESERVED
+CVE-2020-5625 (Cross-site scripting vulnerability in XooNIps 3.48 and earlier allows ...)
+ TODO: check
+CVE-2020-5624 (SQL injection vulnerability in the XooNIps 3.48 and earlier allows rem ...)
+ TODO: check
+CVE-2020-5623 (NITORI App for Android versions 6.0.4 and earlier and NITORI App for i ...)
+ TODO: check
CVE-2020-5622
RESERVED
-CVE-2020-5621
- RESERVED
+CVE-2020-5621 (Cross-site request forgery (CSRF) vulnerability in NETGEAR switching h ...)
+ TODO: check
CVE-2020-5620 (Cross-site scripting vulnerability in Exment prior to v3.6.0 allows re ...)
NOT-FOR-US: Exment
CVE-2020-5619 (Cross-site scripting vulnerability in Exment prior to v3.6.0 allows re ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3af38bdfa3156b44bbe1ba75b4845c52cc8aa273
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3af38bdfa3156b44bbe1ba75b4845c52cc8aa273
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200828/85c0e48e/attachment.html>
More information about the debian-security-tracker-commits
mailing list