diff options
author | security tracker role <sectracker@soriano.debian.org> | 2020-09-24 08:10:17 +0000 |
---|---|---|
committer | security tracker role <sectracker@soriano.debian.org> | 2020-09-24 08:10:17 +0000 |
commit | 92a7b9eea9c0b4035291cac142de69bc72a5849d (patch) | |
tree | 3910257b91e7cba6f087ee5f697ab25b8d0c9ae9 /data/CVE | |
parent | 281889456f72bccb3ab5611c24a48ff33c2f3a34 (diff) |
automatic update
Diffstat (limited to 'data/CVE')
-rw-r--r-- | data/CVE/2015.list | 4 | ||||
-rw-r--r-- | data/CVE/2020.list | 460 |
2 files changed, 438 insertions, 26 deletions
diff --git a/data/CVE/2015.list b/data/CVE/2015.list index 4e4781d964..53b18e4963 100644 --- a/data/CVE/2015.list +++ b/data/CVE/2015.list @@ -13884,8 +13884,8 @@ CVE-2015-4721 (Multiple cross-site scripting (XSS) vulnerabilities in Concrete5 NOT-FOR-US: Concrete5 CVE-2015-4720 REJECTED -CVE-2015-4719 - RESERVED +CVE-2015-4719 (The client API authentication mechanism in Pexip Infinity before 10 al ...) + TODO: check CVE-2015-4718 (The external SMB storage driver in ownCloud Server before 6.0.8, 7.0.x ...) {DSA-3373-1} - owncloud 7.0.6+dfsg-1 diff --git a/data/CVE/2020.list b/data/CVE/2020.list index 292048e768..2b2ed91479 100644 --- a/data/CVE/2020.list +++ b/data/CVE/2020.list @@ -1,3 +1,425 @@ +CVE-2020-26061 + RESERVED +CVE-2020-26060 + RESERVED +CVE-2020-26059 + RESERVED +CVE-2020-26058 + RESERVED +CVE-2020-26057 + RESERVED +CVE-2020-26056 + RESERVED +CVE-2020-26055 + RESERVED +CVE-2020-26054 + RESERVED +CVE-2020-26053 + RESERVED +CVE-2020-26052 + RESERVED +CVE-2020-26051 + RESERVED +CVE-2020-26050 + RESERVED +CVE-2020-26049 + RESERVED +CVE-2020-26048 + RESERVED +CVE-2020-26047 + RESERVED +CVE-2020-26046 + RESERVED +CVE-2020-26045 + RESERVED +CVE-2020-26044 + RESERVED +CVE-2020-26043 + RESERVED +CVE-2020-26042 + RESERVED +CVE-2020-26041 + RESERVED +CVE-2020-26040 + RESERVED +CVE-2020-26039 + RESERVED +CVE-2020-26038 + RESERVED +CVE-2020-26037 + RESERVED +CVE-2020-26036 + RESERVED +CVE-2020-26035 + RESERVED +CVE-2020-26034 + RESERVED +CVE-2020-26033 + RESERVED +CVE-2020-26032 + RESERVED +CVE-2020-26031 + RESERVED +CVE-2020-26030 + RESERVED +CVE-2020-26029 + RESERVED +CVE-2020-26028 + RESERVED +CVE-2020-26027 + RESERVED +CVE-2020-26026 + RESERVED +CVE-2020-26025 + RESERVED +CVE-2020-26024 + RESERVED +CVE-2020-26023 + RESERVED +CVE-2020-26022 + RESERVED +CVE-2020-26021 + RESERVED +CVE-2020-26020 + RESERVED +CVE-2020-26019 + RESERVED +CVE-2020-26018 + RESERVED +CVE-2020-26017 + RESERVED +CVE-2020-26016 + RESERVED +CVE-2020-26015 + RESERVED +CVE-2020-26014 + RESERVED +CVE-2020-26013 + RESERVED +CVE-2020-26012 + RESERVED +CVE-2020-26011 + RESERVED +CVE-2020-26010 + RESERVED +CVE-2020-26009 + RESERVED +CVE-2020-26008 + RESERVED +CVE-2020-26007 + RESERVED +CVE-2020-26006 + RESERVED +CVE-2020-26005 + RESERVED +CVE-2020-26004 + RESERVED +CVE-2020-26003 + RESERVED +CVE-2020-26002 + RESERVED +CVE-2020-26001 + RESERVED +CVE-2020-26000 + RESERVED +CVE-2020-25999 + RESERVED +CVE-2020-25998 + RESERVED +CVE-2020-25997 + RESERVED +CVE-2020-25996 + RESERVED +CVE-2020-25995 + RESERVED +CVE-2020-25994 + RESERVED +CVE-2020-25993 + RESERVED +CVE-2020-25992 + RESERVED +CVE-2020-25991 + RESERVED +CVE-2020-25990 + RESERVED +CVE-2020-25989 + RESERVED +CVE-2020-25988 + RESERVED +CVE-2020-25987 + RESERVED +CVE-2020-25986 + RESERVED +CVE-2020-25985 + RESERVED +CVE-2020-25984 + RESERVED +CVE-2020-25983 + RESERVED +CVE-2020-25982 + RESERVED +CVE-2020-25981 + RESERVED +CVE-2020-25980 + RESERVED +CVE-2020-25979 + RESERVED +CVE-2020-25978 + RESERVED +CVE-2020-25977 + RESERVED +CVE-2020-25976 + RESERVED +CVE-2020-25975 + RESERVED +CVE-2020-25974 + RESERVED +CVE-2020-25973 + RESERVED +CVE-2020-25972 + RESERVED +CVE-2020-25971 + RESERVED +CVE-2020-25970 + RESERVED +CVE-2020-25969 + RESERVED +CVE-2020-25968 + RESERVED +CVE-2020-25967 + RESERVED +CVE-2020-25966 + RESERVED +CVE-2020-25965 + RESERVED +CVE-2020-25964 + RESERVED +CVE-2020-25963 + RESERVED +CVE-2020-25962 + RESERVED +CVE-2020-25961 + RESERVED +CVE-2020-25960 + RESERVED +CVE-2020-25959 + RESERVED +CVE-2020-25958 + RESERVED +CVE-2020-25957 + RESERVED +CVE-2020-25956 + RESERVED +CVE-2020-25955 + RESERVED +CVE-2020-25954 + RESERVED +CVE-2020-25953 + RESERVED +CVE-2020-25952 + RESERVED +CVE-2020-25951 + RESERVED +CVE-2020-25950 + RESERVED +CVE-2020-25949 + RESERVED +CVE-2020-25948 + RESERVED +CVE-2020-25947 + RESERVED +CVE-2020-25946 + RESERVED +CVE-2020-25945 + RESERVED +CVE-2020-25944 + RESERVED +CVE-2020-25943 + RESERVED +CVE-2020-25942 + RESERVED +CVE-2020-25941 + RESERVED +CVE-2020-25940 + RESERVED +CVE-2020-25939 + RESERVED +CVE-2020-25938 + RESERVED +CVE-2020-25937 + RESERVED +CVE-2020-25936 + RESERVED +CVE-2020-25935 + RESERVED +CVE-2020-25934 + RESERVED +CVE-2020-25933 + RESERVED +CVE-2020-25932 + RESERVED +CVE-2020-25931 + RESERVED +CVE-2020-25930 + RESERVED +CVE-2020-25929 + RESERVED +CVE-2020-25928 + RESERVED +CVE-2020-25927 + RESERVED +CVE-2020-25926 + RESERVED +CVE-2020-25925 + RESERVED +CVE-2020-25924 + RESERVED +CVE-2020-25923 + RESERVED +CVE-2020-25922 + RESERVED +CVE-2020-25921 + RESERVED +CVE-2020-25920 + RESERVED +CVE-2020-25919 + RESERVED +CVE-2020-25918 + RESERVED +CVE-2020-25917 + RESERVED +CVE-2020-25916 + RESERVED +CVE-2020-25915 + RESERVED +CVE-2020-25914 + RESERVED +CVE-2020-25913 + RESERVED +CVE-2020-25912 + RESERVED +CVE-2020-25911 + RESERVED +CVE-2020-25910 + RESERVED +CVE-2020-25909 + RESERVED +CVE-2020-25908 + RESERVED +CVE-2020-25907 + RESERVED +CVE-2020-25906 + RESERVED +CVE-2020-25905 + RESERVED +CVE-2020-25904 + RESERVED +CVE-2020-25903 + RESERVED +CVE-2020-25902 + RESERVED +CVE-2020-25901 + RESERVED +CVE-2020-25900 + RESERVED +CVE-2020-25899 + RESERVED +CVE-2020-25898 + RESERVED +CVE-2020-25897 + RESERVED +CVE-2020-25896 + RESERVED +CVE-2020-25895 + RESERVED +CVE-2020-25894 + RESERVED +CVE-2020-25893 + RESERVED +CVE-2020-25892 + RESERVED +CVE-2020-25891 + RESERVED +CVE-2020-25890 + RESERVED +CVE-2020-25889 + RESERVED +CVE-2020-25888 + RESERVED +CVE-2020-25887 + RESERVED +CVE-2020-25886 + RESERVED +CVE-2020-25885 + RESERVED +CVE-2020-25884 + RESERVED +CVE-2020-25883 + RESERVED +CVE-2020-25882 + RESERVED +CVE-2020-25881 + RESERVED +CVE-2020-25880 + RESERVED +CVE-2020-25879 + RESERVED +CVE-2020-25878 + RESERVED +CVE-2020-25877 + RESERVED +CVE-2020-25876 + RESERVED +CVE-2020-25875 + RESERVED +CVE-2020-25874 + RESERVED +CVE-2020-25873 + RESERVED +CVE-2020-25872 + RESERVED +CVE-2020-25871 + RESERVED +CVE-2020-25870 + RESERVED +CVE-2020-25869 + RESERVED +CVE-2020-25868 + RESERVED +CVE-2020-25867 + RESERVED +CVE-2020-25866 + RESERVED +CVE-2020-25865 + RESERVED +CVE-2020-25864 + RESERVED +CVE-2020-25863 + RESERVED +CVE-2020-25862 + RESERVED +CVE-2020-25861 + RESERVED +CVE-2020-25860 + RESERVED +CVE-2020-25859 + RESERVED +CVE-2020-25858 + RESERVED +CVE-2020-25857 + RESERVED +CVE-2020-25856 + RESERVED +CVE-2020-25855 + RESERVED +CVE-2020-25854 + RESERVED +CVE-2020-25853 + RESERVED +CVE-2020-25852 + RESERVED +CVE-2020-25851 + RESERVED CVE-2020-25850 RESERVED CVE-2020-25849 @@ -535,53 +957,43 @@ CVE-2020-25606 RESERVED CVE-2020-25605 RESERVED -CVE-2020-25604 [race when migrating timers between x86 HVM vCPU-s] - RESERVED +CVE-2020-25604 (An issue was discovered in Xen through 4.14.x. There is a race conditi ...) - xen <unfixed> [stretch] - xen <end-of-life> (DSA 4602-1) NOTE: https://xenbits.xen.org/xsa/advisory-336.html -CVE-2020-25603 [Missing memory barriers when accessing/allocating an event channel] - RESERVED +CVE-2020-25603 (An issue was discovered in Xen through 4.14.x. There are missing memor ...) - xen <unfixed> [stretch] - xen <end-of-life> (DSA 4602-1) NOTE: https://xenbits.xen.org/xsa/advisory-340.html -CVE-2020-25602 [x86 pv: Crash when handling guest access to MSR_MISC_ENABLE] - RESERVED +CVE-2020-25602 (An issue was discovered in Xen through 4.14.x. An x86 PV guest can tri ...) - xen <unfixed> [stretch] - xen <end-of-life> (DSA 4602-1) NOTE: https://xenbits.xen.org/xsa/advisory-333.html -CVE-2020-25601 [lack of preemption in evtchn_reset() / evtchn_destroy()] - RESERVED +CVE-2020-25601 (An issue was discovered in Xen through 4.14.x. There is a lack of pree ...) - xen <unfixed> [stretch] - xen <end-of-life> (DSA 4602-1) NOTE: https://xenbits.xen.org/xsa/advisory-344.html -CVE-2020-25600 [out of bounds event channels available to 32-bit x86 domains] - RESERVED +CVE-2020-25600 (An issue was discovered in Xen through 4.14.x. Out of bounds event cha ...) - xen <unfixed> [stretch] - xen <end-of-life> (DSA 4602-1) NOTE: https://xenbits.xen.org/xsa/advisory-342.html -CVE-2020-25599 [races with evtchn_reset()] - RESERVED +CVE-2020-25599 (An issue was discovered in Xen through 4.14.x. There are evtchn_reset( ...) - xen <unfixed> [stretch] - xen <end-of-life> (DSA 4602-1) NOTE: https://xenbits.xen.org/xsa/advisory-343.html -CVE-2020-25598 [Missing unlock in XENMEM_acquire_resource error path] - RESERVED +CVE-2020-25598 (An issue was discovered in Xen 4.14.x. There is a missing unlock in th ...) [experimental] - xen <unfixed> - xen <not-affected> (No affected version (only > 4.12) ever uploaded to unstable) NOTE: https://xenbits.xen.org/xsa/advisory-334.html -CVE-2020-25597 [once valid event channels may not turn invalid] - RESERVED +CVE-2020-25597 (An issue was discovered in Xen through 4.14.x. There is mishandling of ...) - xen <unfixed> [stretch] - xen <end-of-life> (DSA 4602-1) NOTE: https://xenbits.xen.org/xsa/advisory-338.html -CVE-2020-25596 [x86 pv guest kernel DoS via SYSENTER] - RESERVED +CVE-2020-25596 (An issue was discovered in Xen through 4.14.x. x86 PV guest kernels ca ...) - xen <unfixed> [stretch] - xen <end-of-life> (DSA 4602-1) NOTE: https://xenbits.xen.org/xsa/advisory-339.html -CVE-2020-25595 [PCI passthrough code reading back hardware registers] - RESERVED +CVE-2020-25595 (An issue was discovered in Xen through 4.14.x. The PCI passthrough cod ...) - xen <unfixed> [stretch] - xen <end-of-life> (DSA 4602-1) NOTE: https://xenbits.xen.org/xsa/advisory-337.html @@ -2787,8 +3199,8 @@ CVE-2020-24562 RESERVED CVE-2020-24561 (A command injection vulnerability in Trend Micro ServerProtect for Lin ...) NOT-FOR-US: Trend Micro -CVE-2020-24560 - RESERVED +CVE-2020-24560 (An incomplete SSL server certification validation vulnerability in the ...) + TODO: check CVE-2020-24559 (A vulnerability in Trend Micro Apex One on macOS may allow an attacker ...) NOT-FOR-US: Trend Micro CVE-2020-24558 (A vulnerability in an Trend Micro Apex One dll may allow an attacker t ...) @@ -21195,8 +21607,8 @@ CVE-2020-15606 (This vulnerability allows remote attackers to execute arbitrary NOT-FOR-US: CentOS-WebPanel.com CVE-2020-15605 (If LDAP authentication is enabled, an LDAP authentication bypass vulne ...) NOT-FOR-US: Trend Micro -CVE-2020-15604 - RESERVED +CVE-2020-15604 (An incomplete SSL server certification validation vulnerability in the ...) + TODO: check CVE-2020-15603 (An invalid memory read vulnerability in a Trend Micro Secuity 2020 (v1 ...) NOT-FOR-US: Trend Micro CVE-2020-15602 (An untrusted search path remote code execution (RCE) vulnerability in ...) |