Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
5d174aa4 by security tracker role at 2020-08-04T20:10:25+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,471 @@
+CVE-2020-16836
+       RESERVED
+CVE-2020-16835
+       RESERVED
+CVE-2020-16834
+       RESERVED
+CVE-2020-16833
+       RESERVED
+CVE-2020-16832
+       RESERVED
+CVE-2020-16831
+       RESERVED
+CVE-2020-16830
+       RESERVED
+CVE-2020-16829
+       RESERVED
+CVE-2020-16828
+       RESERVED
+CVE-2020-16827
+       RESERVED
+CVE-2020-16826
+       RESERVED
+CVE-2020-16825
+       RESERVED
+CVE-2020-16824
+       RESERVED
+CVE-2020-16823
+       RESERVED
+CVE-2020-16822
+       RESERVED
+CVE-2020-16821
+       RESERVED
+CVE-2020-16820
+       RESERVED
+CVE-2020-16819
+       RESERVED
+CVE-2020-16818
+       RESERVED
+CVE-2020-16817
+       RESERVED
+CVE-2020-16816
+       RESERVED
+CVE-2020-16815
+       RESERVED
+CVE-2020-16814
+       RESERVED
+CVE-2020-16813
+       RESERVED
+CVE-2020-16812
+       RESERVED
+CVE-2020-16811
+       RESERVED
+CVE-2020-16810
+       RESERVED
+CVE-2020-16809
+       RESERVED
+CVE-2020-16808
+       RESERVED
+CVE-2020-16807
+       RESERVED
+CVE-2020-16806
+       RESERVED
+CVE-2020-16805
+       RESERVED
+CVE-2020-16804
+       RESERVED
+CVE-2020-16803
+       RESERVED
+CVE-2020-16802
+       RESERVED
+CVE-2020-16801
+       RESERVED
+CVE-2020-16800
+       RESERVED
+CVE-2020-16799
+       RESERVED
+CVE-2020-16798
+       RESERVED
+CVE-2020-16797
+       RESERVED
+CVE-2020-16796
+       RESERVED
+CVE-2020-16795
+       RESERVED
+CVE-2020-16794
+       RESERVED
+CVE-2020-16793
+       RESERVED
+CVE-2020-16792
+       RESERVED
+CVE-2020-16791
+       RESERVED
+CVE-2020-16790
+       RESERVED
+CVE-2020-16789
+       RESERVED
+CVE-2020-16788
+       RESERVED
+CVE-2020-16787
+       RESERVED
+CVE-2020-16786
+       RESERVED
+CVE-2020-16785
+       RESERVED
+CVE-2020-16784
+       RESERVED
+CVE-2020-16783
+       RESERVED
+CVE-2020-16782
+       RESERVED
+CVE-2020-16781
+       RESERVED
+CVE-2020-16780
+       RESERVED
+CVE-2020-16779
+       RESERVED
+CVE-2020-16778
+       RESERVED
+CVE-2020-16777
+       RESERVED
+CVE-2020-16776
+       RESERVED
+CVE-2020-16775
+       RESERVED
+CVE-2020-16774
+       RESERVED
+CVE-2020-16773
+       RESERVED
+CVE-2020-16772
+       RESERVED
+CVE-2020-16771
+       RESERVED
+CVE-2020-16770
+       RESERVED
+CVE-2020-16769
+       RESERVED
+CVE-2020-16768
+       RESERVED
+CVE-2020-16767
+       RESERVED
+CVE-2020-16766
+       RESERVED
+CVE-2020-16765
+       RESERVED
+CVE-2020-16764
+       RESERVED
+CVE-2020-16763
+       RESERVED
+CVE-2020-16762
+       RESERVED
+CVE-2020-16761
+       RESERVED
+CVE-2020-16760
+       RESERVED
+CVE-2020-16759
+       RESERVED
+CVE-2020-16758
+       RESERVED
+CVE-2020-16757
+       RESERVED
+CVE-2020-16756
+       RESERVED
+CVE-2020-16755
+       RESERVED
+CVE-2020-16754
+       RESERVED
+CVE-2020-16753
+       RESERVED
+CVE-2020-16752
+       RESERVED
+CVE-2020-16751
+       RESERVED
+CVE-2020-16750
+       RESERVED
+CVE-2020-16749
+       RESERVED
+CVE-2020-16748
+       RESERVED
+CVE-2020-16747
+       RESERVED
+CVE-2020-16746
+       RESERVED
+CVE-2020-16745
+       RESERVED
+CVE-2020-16744
+       RESERVED
+CVE-2020-16743
+       RESERVED
+CVE-2020-16742
+       RESERVED
+CVE-2020-16741
+       RESERVED
+CVE-2020-16740
+       RESERVED
+CVE-2020-16739
+       RESERVED
+CVE-2020-16738
+       RESERVED
+CVE-2020-16737
+       RESERVED
+CVE-2020-16736
+       RESERVED
+CVE-2020-16735
+       RESERVED
+CVE-2020-16734
+       RESERVED
+CVE-2020-16733
+       RESERVED
+CVE-2020-16732
+       RESERVED
+CVE-2020-16731
+       RESERVED
+CVE-2020-16730
+       RESERVED
+CVE-2020-16729
+       RESERVED
+CVE-2020-16728
+       RESERVED
+CVE-2020-16727
+       RESERVED
+CVE-2020-16726
+       RESERVED
+CVE-2020-16725
+       RESERVED
+CVE-2020-16724
+       RESERVED
+CVE-2020-16723
+       RESERVED
+CVE-2020-16722
+       RESERVED
+CVE-2020-16721
+       RESERVED
+CVE-2020-16720
+       RESERVED
+CVE-2020-16719
+       RESERVED
+CVE-2020-16718
+       RESERVED
+CVE-2020-16717
+       RESERVED
+CVE-2020-16716
+       RESERVED
+CVE-2020-16715
+       RESERVED
+CVE-2020-16714
+       RESERVED
+CVE-2020-16713
+       RESERVED
+CVE-2020-16712
+       RESERVED
+CVE-2020-16711
+       RESERVED
+CVE-2020-16710
+       RESERVED
+CVE-2020-16709
+       RESERVED
+CVE-2020-16708
+       RESERVED
+CVE-2020-16707
+       RESERVED
+CVE-2020-16706
+       RESERVED
+CVE-2020-16705
+       RESERVED
+CVE-2020-16704
+       RESERVED
+CVE-2020-16703
+       RESERVED
+CVE-2020-16702
+       RESERVED
+CVE-2020-16701
+       RESERVED
+CVE-2020-16700
+       RESERVED
+CVE-2020-16699
+       RESERVED
+CVE-2020-16698
+       RESERVED
+CVE-2020-16697
+       RESERVED
+CVE-2020-16696
+       RESERVED
+CVE-2020-16695
+       RESERVED
+CVE-2020-16694
+       RESERVED
+CVE-2020-16693
+       RESERVED
+CVE-2020-16692
+       RESERVED
+CVE-2020-16691
+       RESERVED
+CVE-2020-16690
+       RESERVED
+CVE-2020-16689
+       RESERVED
+CVE-2020-16688
+       RESERVED
+CVE-2020-16687
+       RESERVED
+CVE-2020-16686
+       RESERVED
+CVE-2020-16685
+       RESERVED
+CVE-2020-16684
+       RESERVED
+CVE-2020-16683
+       RESERVED
+CVE-2020-16682
+       RESERVED
+CVE-2020-16681
+       RESERVED
+CVE-2020-16680
+       RESERVED
+CVE-2020-16679
+       RESERVED
+CVE-2020-16678
+       RESERVED
+CVE-2020-16677
+       RESERVED
+CVE-2020-16676
+       RESERVED
+CVE-2020-16675
+       RESERVED
+CVE-2020-16674
+       RESERVED
+CVE-2020-16673
+       RESERVED
+CVE-2020-16672
+       RESERVED
+CVE-2020-16671
+       RESERVED
+CVE-2020-16670
+       RESERVED
+CVE-2020-16669
+       RESERVED
+CVE-2020-16668
+       RESERVED
+CVE-2020-16667
+       RESERVED
+CVE-2020-16666
+       RESERVED
+CVE-2020-16665
+       RESERVED
+CVE-2020-16664
+       RESERVED
+CVE-2020-16663
+       RESERVED
+CVE-2020-16662
+       RESERVED
+CVE-2020-16661
+       RESERVED
+CVE-2020-16660
+       RESERVED
+CVE-2020-16659
+       RESERVED
+CVE-2020-16658
+       RESERVED
+CVE-2020-16657
+       RESERVED
+CVE-2020-16656
+       RESERVED
+CVE-2020-16655
+       RESERVED
+CVE-2020-16654
+       RESERVED
+CVE-2020-16653
+       RESERVED
+CVE-2020-16652
+       RESERVED
+CVE-2020-16651
+       RESERVED
+CVE-2020-16650
+       RESERVED
+CVE-2020-16649
+       RESERVED
+CVE-2020-16648
+       RESERVED
+CVE-2020-16647
+       RESERVED
+CVE-2020-16646
+       RESERVED
+CVE-2020-16645
+       RESERVED
+CVE-2020-16644
+       RESERVED
+CVE-2020-16643
+       RESERVED
+CVE-2020-16642
+       RESERVED
+CVE-2020-16641
+       RESERVED
+CVE-2020-16640
+       RESERVED
+CVE-2020-16639
+       RESERVED
+CVE-2020-16638
+       RESERVED
+CVE-2020-16637
+       RESERVED
+CVE-2020-16636
+       RESERVED
+CVE-2020-16635
+       RESERVED
+CVE-2020-16634
+       RESERVED
+CVE-2020-16633
+       RESERVED
+CVE-2020-16632
+       RESERVED
+CVE-2020-16631
+       RESERVED
+CVE-2020-16630
+       RESERVED
+CVE-2020-16629
+       RESERVED
+CVE-2020-16628
+       RESERVED
+CVE-2020-16627
+       RESERVED
+CVE-2020-16626
+       RESERVED
+CVE-2020-16625
+       RESERVED
+CVE-2020-16624
+       RESERVED
+CVE-2020-16623
+       RESERVED
+CVE-2020-16622
+       RESERVED
+CVE-2020-16621
+       RESERVED
+CVE-2020-16620
+       RESERVED
+CVE-2020-16619
+       RESERVED
+CVE-2020-16618
+       RESERVED
+CVE-2020-16617
+       RESERVED
+CVE-2020-16616
+       RESERVED
+CVE-2020-16615
+       RESERVED
+CVE-2020-16614
+       RESERVED
+CVE-2020-16613
+       RESERVED
+CVE-2020-16612
+       RESERVED
+CVE-2020-16611
+       RESERVED
+CVE-2020-16610
+       RESERVED
+CVE-2020-16609
+       RESERVED
+CVE-2020-16608
+       RESERVED
+CVE-2020-16607
+       RESERVED
+CVE-2020-16606
+       RESERVED
+CVE-2020-16605
+       RESERVED
+CVE-2020-16604
+       RESERVED
+CVE-2020-16603
+       RESERVED
 CVE-2020-16602
        RESERVED
 CVE-2020-16601
@@ -799,16 +1267,16 @@ CVE-2020-16205
        RESERVED
 CVE-2020-16204
        RESERVED
-CVE-2020-16203
-       RESERVED
+CVE-2020-16203 (Delta Industrial Automation CNCSoft ScreenEditor, Versions 
1.01.23 and ...)
+       TODO: check
 CVE-2020-16202
        RESERVED
-CVE-2020-16201
-       RESERVED
+CVE-2020-16201 (Delta Industrial Automation CNCSoft ScreenEditor, Versions 
1.01.23 and ...)
+       TODO: check
 CVE-2020-16200
        RESERVED
-CVE-2020-16199
-       RESERVED
+CVE-2020-16199 (Delta Industrial Automation CNCSoft ScreenEditor, Versions 
1.01.23 and ...)
+       TODO: check
 CVE-2020-16198
        RESERVED
 CVE-2020-16197
@@ -942,8 +1410,8 @@ CVE-2020-16135 (libssh 0.9.4 has a NULL pointer 
dereference in tftpserver.c if s
        NOTE: https://bugs.libssh.org/T232
        NOTE: 
https://bugs.libssh.org/rLIBSSHe631ebb3e2247dd25e9678e6827c20dc73b73238
        NOTE: https://gitlab.com/libssh/libssh-mirror/-/merge_requests/120
-CVE-2020-16134
-       RESERVED
+CVE-2020-16134 (An issue was discovered on Swisscom Internet Box 2, Internet 
Box Stand ...)
+       TODO: check
 CVE-2020-16133
        RESERVED
 CVE-2020-16132
@@ -1317,8 +1785,8 @@ CVE-2020-15958
        RESERVED
 CVE-2020-15957 (An issue was discovered in DP3T-Backend-SDK before 1.1.1 for 
Decentral ...)
        NOT-FOR-US: DP3T-Backend-SDK for Decentralised Privacy-Preserving 
Proximity Tracing (DP3T)
-CVE-2020-15956
-       RESERVED
+CVE-2020-15956 (ActiveMediaServer.exe in ACTi NVR3 Standard Server 3.0.12.42 
allows re ...)
+       TODO: check
 CVE-2020-15955
        RESERVED
 CVE-2020-15954 (KDE KMail 19.12.3 (aka 5.13.3) engages in unencrypted POP3 
communicati ...)
@@ -1360,10 +1828,10 @@ CVE-2020-15945 (Lua through 5.4.0 has a segmentation 
fault in changedline in lde
        NOTE: 
https://github.com/lua/lua/commit/a2195644d89812e5b157ce7bac35543e06db05e3
        NOTE: http://lua-users.org/lists/lua-l/2020-07/msg00123.html
        NOTE: check 5.3, 5.2, 5.1 and 5.0 lua versions, different code but 
might be affected in similar way on updating oldpc value
-CVE-2020-15944
-       RESERVED
-CVE-2020-15943
-       RESERVED
+CVE-2020-15944 (An issue was discovered in the Gantt-Chart module before 5.5.5 
for Jir ...)
+       TODO: check
+CVE-2020-15943 (An issue was discovered in the Gantt-Chart module before 5.5.4 
for Jir ...)
+       TODO: check
 CVE-2020-15942
        RESERVED
 CVE-2020-15941
@@ -1563,6 +2031,7 @@ CVE-2020-15863 (hw/net/xgmac.c in the XGMAC Ethernet 
controller in QEMU before 0
        NOTE: 
https://git.qemu.org/?p=qemu.git;a=commit;h=5519724a13664b43e225ca05351c60b4468e4555
 CVE-2020-15861 [Elevation of Privileges due to symlink handling]
        RESERVED
+       {DLA-2313-1}
        - net-snmp 5.8+dfsg-5 (bug #966599)
        NOTE: https://github.com/net-snmp/net-snmp/issues/145
        NOTE: 
https://github.com/net-snmp/net-snmp/commit/4fd9a450444a434a993bc72f7c3486ccce41f602
@@ -2576,8 +3045,8 @@ CVE-2020-15469 (In QEMU 4.2.0, a MemoryRegionOps object 
may lack read/write call
        NOTE: Proposed patch(es): 
https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg09961.html
 CVE-2020-15468 (Persian VIP Download Script 1.0 allows SQL Injection via the 
cart_edit ...)
        NOT-FOR-US: Persian VIP Download Script
-CVE-2020-15467
-       RESERVED
+CVE-2020-15467 (The administrative interface of Cohesive Networks vns3:vpn 
appliances  ...)
+       TODO: check
 CVE-2020-15466 (In Wireshark 3.2.0 to 3.2.4, the GVCP dissector could go into 
an infin ...)
        - wireshark 3.2.5-1 (low)
        [buster] - wireshark <postponed> (Can be fixed along in next 3.0.x DSA)
@@ -7552,10 +8021,10 @@ CVE-2020-13525
        RESERVED
 CVE-2020-13524
        RESERVED
-CVE-2020-13523
-       RESERVED
-CVE-2020-13522
-       RESERVED
+CVE-2020-13523 (An exploitable information disclosure vulnerability exists in 
SoftPerf ...)
+       TODO: check
+CVE-2020-13522 (An exploitable arbitrary file delete vulnerability exists in 
SoftPerfe ...)
+       TODO: check
 CVE-2020-13521
        RESERVED
 CVE-2020-13520
@@ -23180,10 +23649,10 @@ CVE-2020-7825 (A vulnerability exists that could 
allow the execution of operatin
        NOT-FOR-US: MiPlatform
 CVE-2020-7824
        RESERVED
-CVE-2020-7823
-       RESERVED
-CVE-2020-7822
-       RESERVED
+CVE-2020-7823 (DaviewIndy has a Memory corruption vulnerability, triggered 
when the u ...)
+       TODO: check
+CVE-2020-7822 (DaviewIndy has a Heap-based overflow vulnerability, triggered 
when the ...)
+       TODO: check
 CVE-2020-7821 (Nexacro14/17 ExtCommonApiV13 Library under 2019.9.6 version 
contain a  ...)
        NOT-FOR-US: Nexacro14/17 ExtCommonApiV13 Library
 CVE-2020-7820 (Nexacro14/17 ExtCommonApiV13 Library under 2019.9.6 version 
contain a  ...)
@@ -27685,8 +28154,8 @@ CVE-2020-6014
        RESERVED
 CVE-2020-6013 (ZoneAlarm Firewall and Antivirus products before version 
15.8.109.1843 ...)
        NOT-FOR-US: ZoneAlarm
-CVE-2020-6012
-       RESERVED
+CVE-2020-6012 (ZoneAlarm Anti-Ransomware before version 1.0.713 copies files 
for the  ...)
+       TODO: check
 CVE-2020-6011
        RESERVED
 CVE-2020-6010 (LearnPress Wordpress plugin version prior and including 3.2.6.7 
is vul ...)
@@ -31167,8 +31636,8 @@ CVE-2020-4633
        RESERVED
 CVE-2020-4632
        RESERVED
-CVE-2020-4631
-       RESERVED
+CVE-2020-4631 (IBM Spectrum Protect Plus 10.1.0 through 10.1.6 agent files, in 
non-de ...)
+       TODO: check
 CVE-2020-4630
        RESERVED
 CVE-2020-4629
@@ -31345,8 +31814,8 @@ CVE-2020-4544
        RESERVED
 CVE-2020-4543
        RESERVED
-CVE-2020-4542
-       RESERVED
+CVE-2020-4542 (IBM Jazz Foundation and IBM Engineering products are vulnerable 
to cro ...)
+       TODO: check
 CVE-2020-4541
        RESERVED
 CVE-2020-4540
@@ -31379,8 +31848,8 @@ CVE-2020-4527 (IBM Planning Analytics 2.0 could allow a 
remote attacker to obtai
        NOT-FOR-US: IBM
 CVE-2020-4526
        RESERVED
-CVE-2020-4525
-       RESERVED
+CVE-2020-4525 (IBM Jazz Foundation and IBM Engineering products are vulnerable 
to cro ...)
+       TODO: check
 CVE-2020-4524
        RESERVED
 CVE-2020-4523
@@ -31511,8 +31980,8 @@ CVE-2020-4461 (IBM Security Access Manager Appliance 
9.0.7.1 could allow an auth
        NOT-FOR-US: IBM
 CVE-2020-4460
        RESERVED
-CVE-2020-4459
-       RESERVED
+CVE-2020-4459 (IBM Security Verify Access 10.7 contains hard-coded 
credentials, such  ...)
+       TODO: check
 CVE-2020-4458
        RESERVED
 CVE-2020-4457
@@ -31609,8 +32078,8 @@ CVE-2020-4412 (The Spectrum Scale 4.2.0.0 through 
4.2.3.21 and 5.0.0.0 through 5
        NOT-FOR-US: IBM
 CVE-2020-4411 (The Spectrum Scale 4.2.0.0 through 4.2.3.21 and 5.0.0.0 through 
5.0.4. ...)
        NOT-FOR-US: IBM
-CVE-2020-4410
-       RESERVED
+CVE-2020-4410 (IBM Jazz Foundation and IBM Engineering products could allow an 
authen ...)
+       TODO: check
 CVE-2020-4409
        RESERVED
 CVE-2020-4408 (The IBM QRadar Advisor 1.1 through 2.5.2 with Watson App for 
IBM QRada ...)
@@ -31637,8 +32106,8 @@ CVE-2020-4398
        RESERVED
 CVE-2020-4397 (IBM Verify Gateway (IVG) 1.0.0 and 1.0.1 transmits sensitive 
informati ...)
        NOT-FOR-US: IBM
-CVE-2020-4396
-       RESERVED
+CVE-2020-4396 (IBM Jazz Foundation and IBM Engineering products are vulnerable 
to cro ...)
+       TODO: check
 CVE-2020-4395
        RESERVED
 CVE-2020-4394
@@ -32972,8 +33441,8 @@ CVE-2019-20003 (Feldtech easescreen Crystal 9.0 
Web-Services 9.0.1.16265 allows
        NOT-FOR-US: Feldtech easescreen Crystal 9.0 Web-Services
 CVE-2019-20002 (Formula Injection exists in the export feature in SolarWinds 
WebHelpDe ...)
        NOT-FOR-US: SolarWinds WebHelpDesk
-CVE-2019-20001
-       RESERVED
+CVE-2019-20001 (An issue was discovered in RICOH Streamline NX Client Tool and 
RICOH S ...)
+       TODO: check
 CVE-2019-20000 (The malware scan function in BullGuard Premium Protection 
20.0.371.8 h ...)
        NOT-FOR-US: BullGuard Premium Protection
 CVE-2019-19999 (Halo before 1.2.0-beta.1 allows Server Side Template Injection 
(SSTI)  ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5d174aa49771668314aca87c29c14ce213b0b399

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/5d174aa49771668314aca87c29c14ce213b0b399
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to