[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Mon Dec 20 20:10:26 GMT 2021
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
d2de03ed by security tracker role at 2021-12-20T20:10:18+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,431 @@
+CVE-2021-45442
+ RESERVED
+CVE-2021-45441
+ RESERVED
+CVE-2021-45440
+ RESERVED
+CVE-2021-45439
+ RESERVED
+CVE-2021-45438
+ RESERVED
+CVE-2021-45437
+ RESERVED
+CVE-2021-45436
+ RESERVED
+CVE-2021-45435
+ RESERVED
+CVE-2021-45434
+ RESERVED
+CVE-2021-45433
+ RESERVED
+CVE-2021-45432
+ RESERVED
+CVE-2021-45431
+ RESERVED
+CVE-2021-45430
+ RESERVED
+CVE-2021-45429
+ RESERVED
+CVE-2021-45428
+ RESERVED
+CVE-2021-45427
+ RESERVED
+CVE-2021-45426
+ RESERVED
+CVE-2021-45425
+ RESERVED
+CVE-2021-45424
+ RESERVED
+CVE-2021-45423
+ RESERVED
+CVE-2021-45422
+ RESERVED
+CVE-2021-45421
+ RESERVED
+CVE-2021-45420
+ RESERVED
+CVE-2021-45419
+ RESERVED
+CVE-2021-45418
+ RESERVED
+CVE-2021-45417
+ RESERVED
+CVE-2021-45416
+ RESERVED
+CVE-2021-45415
+ RESERVED
+CVE-2021-45414
+ RESERVED
+CVE-2021-45413
+ RESERVED
+CVE-2021-45412
+ RESERVED
+CVE-2021-45411
+ RESERVED
+CVE-2021-45410
+ RESERVED
+CVE-2021-45409
+ RESERVED
+CVE-2021-45408
+ RESERVED
+CVE-2021-45407
+ RESERVED
+CVE-2021-45406
+ RESERVED
+CVE-2021-45405
+ RESERVED
+CVE-2021-45404
+ RESERVED
+CVE-2021-45403
+ RESERVED
+CVE-2021-45402
+ RESERVED
+CVE-2021-45401
+ RESERVED
+CVE-2021-45400
+ RESERVED
+CVE-2021-45399
+ RESERVED
+CVE-2021-45398
+ RESERVED
+CVE-2021-45397
+ RESERVED
+CVE-2021-45396
+ RESERVED
+CVE-2021-45395
+ RESERVED
+CVE-2021-45394
+ RESERVED
+CVE-2021-45393
+ RESERVED
+CVE-2021-45392
+ RESERVED
+CVE-2021-45391
+ RESERVED
+CVE-2021-45390
+ RESERVED
+CVE-2021-45389
+ RESERVED
+CVE-2021-45388
+ RESERVED
+CVE-2021-45387
+ RESERVED
+CVE-2021-45386
+ RESERVED
+CVE-2021-45385
+ RESERVED
+CVE-2021-45384
+ RESERVED
+CVE-2021-45383
+ RESERVED
+CVE-2021-45382
+ RESERVED
+CVE-2021-45381
+ RESERVED
+CVE-2021-45380
+ RESERVED
+CVE-2021-45379
+ RESERVED
+CVE-2021-45378
+ RESERVED
+CVE-2021-45377
+ RESERVED
+CVE-2021-45376
+ RESERVED
+CVE-2021-45375
+ RESERVED
+CVE-2021-45374
+ RESERVED
+CVE-2021-45373
+ RESERVED
+CVE-2021-45372
+ RESERVED
+CVE-2021-45371
+ RESERVED
+CVE-2021-45370
+ RESERVED
+CVE-2021-45369
+ RESERVED
+CVE-2021-45368
+ RESERVED
+CVE-2021-45367
+ RESERVED
+CVE-2021-45366
+ RESERVED
+CVE-2021-45365
+ RESERVED
+CVE-2021-45364
+ RESERVED
+CVE-2021-45363
+ RESERVED
+CVE-2021-45362
+ RESERVED
+CVE-2021-45361
+ RESERVED
+CVE-2021-45360
+ RESERVED
+CVE-2021-45359
+ RESERVED
+CVE-2021-45358
+ RESERVED
+CVE-2021-45357
+ RESERVED
+CVE-2021-45356
+ RESERVED
+CVE-2021-45355
+ RESERVED
+CVE-2021-45354
+ RESERVED
+CVE-2021-45353
+ RESERVED
+CVE-2021-45352
+ RESERVED
+CVE-2021-45351
+ RESERVED
+CVE-2021-45350
+ RESERVED
+CVE-2021-45349
+ RESERVED
+CVE-2021-45348
+ RESERVED
+CVE-2021-45347
+ RESERVED
+CVE-2021-45346
+ RESERVED
+CVE-2021-45345
+ RESERVED
+CVE-2021-45344
+ RESERVED
+CVE-2021-45343
+ RESERVED
+CVE-2021-45342
+ RESERVED
+CVE-2021-45341
+ RESERVED
+CVE-2021-45340
+ RESERVED
+CVE-2021-45339
+ RESERVED
+CVE-2021-45338
+ RESERVED
+CVE-2021-45337
+ RESERVED
+CVE-2021-45336
+ RESERVED
+CVE-2021-45335
+ RESERVED
+CVE-2021-45334
+ RESERVED
+CVE-2021-45333
+ RESERVED
+CVE-2021-45332
+ RESERVED
+CVE-2021-45331
+ RESERVED
+CVE-2021-45330
+ RESERVED
+CVE-2021-45329
+ RESERVED
+CVE-2021-45328
+ RESERVED
+CVE-2021-45327
+ RESERVED
+CVE-2021-45326
+ RESERVED
+CVE-2021-45325
+ RESERVED
+CVE-2021-45324
+ RESERVED
+CVE-2021-45323
+ RESERVED
+CVE-2021-45322
+ RESERVED
+CVE-2021-45321
+ RESERVED
+CVE-2021-45320
+ RESERVED
+CVE-2021-45319
+ RESERVED
+CVE-2021-45318
+ RESERVED
+CVE-2021-45317
+ RESERVED
+CVE-2021-45316
+ RESERVED
+CVE-2021-45315
+ RESERVED
+CVE-2021-45314
+ RESERVED
+CVE-2021-45313
+ RESERVED
+CVE-2021-45312
+ RESERVED
+CVE-2021-45311
+ RESERVED
+CVE-2021-45310
+ RESERVED
+CVE-2021-45309
+ RESERVED
+CVE-2021-45308
+ RESERVED
+CVE-2021-45307
+ RESERVED
+CVE-2021-45306
+ RESERVED
+CVE-2021-45305
+ RESERVED
+CVE-2021-45304
+ RESERVED
+CVE-2021-45303
+ RESERVED
+CVE-2021-45302
+ RESERVED
+CVE-2021-45301
+ RESERVED
+CVE-2021-45300
+ RESERVED
+CVE-2021-45299
+ RESERVED
+CVE-2021-45298
+ RESERVED
+CVE-2021-45297
+ RESERVED
+CVE-2021-45296
+ RESERVED
+CVE-2021-45295
+ RESERVED
+CVE-2021-45294
+ RESERVED
+CVE-2021-45293
+ RESERVED
+CVE-2021-45292
+ RESERVED
+CVE-2021-45291
+ RESERVED
+CVE-2021-45290
+ RESERVED
+CVE-2021-45289
+ RESERVED
+CVE-2021-45288
+ RESERVED
+CVE-2021-45287
+ RESERVED
+CVE-2021-45286
+ RESERVED
+CVE-2021-45285
+ RESERVED
+CVE-2021-45284
+ RESERVED
+CVE-2021-45283
+ RESERVED
+CVE-2021-45282
+ RESERVED
+CVE-2021-45281
+ RESERVED
+CVE-2021-45280
+ RESERVED
+CVE-2021-45279
+ RESERVED
+CVE-2021-45278
+ RESERVED
+CVE-2021-45277
+ RESERVED
+CVE-2021-45276
+ RESERVED
+CVE-2021-45275
+ RESERVED
+CVE-2021-45274
+ RESERVED
+CVE-2021-45273
+ RESERVED
+CVE-2021-45272
+ RESERVED
+CVE-2021-45271
+ RESERVED
+CVE-2021-45270
+ RESERVED
+CVE-2021-45269
+ RESERVED
+CVE-2021-45268
+ RESERVED
+CVE-2021-45267
+ RESERVED
+CVE-2021-45266
+ RESERVED
+CVE-2021-45265
+ RESERVED
+CVE-2021-45264
+ RESERVED
+CVE-2021-45263
+ RESERVED
+CVE-2021-45262
+ RESERVED
+CVE-2021-45261
+ RESERVED
+CVE-2021-45260
+ RESERVED
+CVE-2021-45259
+ RESERVED
+CVE-2021-45258
+ RESERVED
+CVE-2021-45257
+ RESERVED
+CVE-2021-45256
+ RESERVED
+CVE-2021-45255
+ RESERVED
+CVE-2021-45254
+ RESERVED
+CVE-2021-45253
+ RESERVED
+CVE-2021-45252
+ RESERVED
+CVE-2021-45251
+ RESERVED
+CVE-2021-45250
+ RESERVED
+CVE-2021-45249
+ RESERVED
+CVE-2021-45248
+ RESERVED
+CVE-2021-45247
+ RESERVED
+CVE-2021-45246
+ RESERVED
+CVE-2021-45245
+ RESERVED
+CVE-2021-45244
+ RESERVED
+CVE-2021-45243
+ RESERVED
+CVE-2021-45242
+ RESERVED
+CVE-2021-45241
+ RESERVED
+CVE-2021-45240
+ RESERVED
+CVE-2021-45239
+ RESERVED
+CVE-2021-45238
+ RESERVED
+CVE-2021-45237
+ RESERVED
+CVE-2021-45236
+ RESERVED
+CVE-2021-45235
+ RESERVED
+CVE-2021-45234
+ RESERVED
+CVE-2021-4142
+ RESERVED
+CVE-2021-4141
+ RESERVED
+CVE-2021-4140
+ RESERVED
+CVE-2021-4139
+ RESERVED
+CVE-2021-4138
+ RESERVED
CVE-2022-22053
RESERVED
CVE-2022-22052
@@ -1211,8 +1639,8 @@ CVE-2021-44918
RESERVED
CVE-2021-44917
RESERVED
-CVE-2021-44916
- RESERVED
+CVE-2021-44916 (Opmantek Open-AudIT Community 4.2.0 (Fixed in 4.3.0) is affected by a ...)
+ TODO: check
CVE-2021-44915
RESERVED
CVE-2021-44914
@@ -1327,8 +1755,7 @@ CVE-2021-44860
RESERVED
CVE-2021-44859
RESERVED
-CVE-2021-44858 [Unauthorized users can view contents of private wikis using various actions]
- RESERVED
+CVE-2021-44858 (An issue was discovered in MediaWiki before 1.35.5, 1.36.x before 1.36 ...)
{DSA-5021-1 DLA-2847-1}
- mediawiki 1:1.35.5-1
[buster] - mediawiki 1:1.31.16-1+deb10u2
@@ -1586,8 +2013,7 @@ CVE-2021-44792
RESERVED
CVE-2021-44791
RESERVED
-CVE-2021-44790 [Possible buffer overflow when parsing multipart content in mod_lua]
- RESERVED
+CVE-2021-44790 (A carefully crafted request body can cause a buffer overflow in the mo ...)
- apache2 2.4.52-1
NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-44790
NOTE: Fixed by: https://svn.apache.org/r1896039
@@ -1803,8 +2229,8 @@ CVE-2021-44733 [use-after-free in the TEE subsystem]
- linux <unfixed>
[stretch] - linux <not-affected> (Vulnerable code not present)
NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2030747
-CVE-2021-44732
- RESERVED
+CVE-2021-44732 (Mbed TLS before 3.0.1 has a double free in certain out-of-memory condi ...)
+ TODO: check
CVE-2021-44731
RESERVED
CVE-2021-44730
@@ -1957,10 +2383,10 @@ CVE-2021-44678 (An issue (2 of 6) was discovered in Veritas Enterprise Vault thr
NOT-FOR-US: Veritas
CVE-2021-44677 (An issue (1 of 6) was discovered in Veritas Enterprise Vault through 1 ...)
NOT-FOR-US: Veritas
-CVE-2021-44676
- RESERVED
-CVE-2021-44675
- RESERVED
+CVE-2021-44676 (Zoho ManageEngine Access Manager Plus before 4203 allows anyone to vie ...)
+ TODO: check
+CVE-2021-44675 (Zoho ManageEngine ServiceDesk Plus MSP before 10.5 Build 10534 is vuln ...)
+ TODO: check
CVE-2021-4075 (snipe-it is vulnerable to Server-Side Request Forgery (SSRF) ...)
NOT-FOR-US: snipe-it
CVE-2021-4074
@@ -2211,8 +2637,8 @@ CVE-2021-44556 (National Library of the Netherlands digger < 6697d1269d981e35
NOT-FOR-US: National Library of the Netherlands digger
CVE-2021-44555
RESERVED
-CVE-2021-44554
- RESERVED
+CVE-2021-44554 (Thinfinity VirtualUI before 3.0 allows a malicious actor to enumerate ...)
+ TODO: check
CVE-2021-44553
RESERVED
CVE-2021-44552
@@ -2383,8 +2809,8 @@ CVE-2021-44527 (A vulnerability found in UniFi Switch firmware Version 5.43.35 a
NOT-FOR-US: UniFi Switch firmware
CVE-2021-44526
RESERVED
-CVE-2021-44525
- RESERVED
+CVE-2021-44525 (Zoho ManageEngine PAM360 before build 5303 allows attackers to modify ...)
+ TODO: check
CVE-2021-44524 (A vulnerability has been identified in SiPass integrated V2.76 (All ve ...)
NOT-FOR-US: SiPass
CVE-2021-44523 (A vulnerability has been identified in SiPass integrated V2.76 (All ve ...)
@@ -3000,8 +3426,8 @@ CVE-2021-44265
RESERVED
CVE-2021-44264
RESERVED
-CVE-2021-44263
- RESERVED
+CVE-2021-44263 (Gurock TestRail before 7.2.4 mishandles HTML escaping. ...)
+ TODO: check
CVE-2021-44262
RESERVED
CVE-2021-44261
@@ -3233,8 +3659,7 @@ CVE-2021-44225 (In Keepalived through 2.2.4, the D-Bus policy does not sufficien
[stretch] - keepalived <no-dsa> (Minor issue)
NOTE: https://github.com/acassen/keepalived/pull/2063
NOTE: https://github.com/acassen/keepalived/commit/7977fec0be89ae6fe87405b3f8da2f0b5e415e3d
-CVE-2021-44224 [Possible NULL dereference or SSRF in forward proxy configurations]
- RESERVED
+CVE-2021-44224 (A crafted URI sent to httpd configured as a forward proxy (ProxyReques ...)
- apache2 2.4.52-1
NOTE: https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-44224
NOTE: Fixed by: https://svn.apache.org/r1895955
@@ -6309,8 +6734,8 @@ CVE-2021-43442
RESERVED
CVE-2021-43441
RESERVED
-CVE-2021-43440
- RESERVED
+CVE-2021-43440 (Multiple Stored XSS Vulnerabilities in the Source Code of iOrder 1.0 a ...)
+ TODO: check
CVE-2021-43439
RESERVED
CVE-2021-43438
@@ -8576,8 +9001,8 @@ CVE-2021-42915
RESERVED
CVE-2021-42914
RESERVED
-CVE-2021-42913
- RESERVED
+CVE-2021-42913 (The SyncThru Web Service on Samsung SCX-6x55X printers allows an attac ...)
+ TODO: check
CVE-2021-42912 (FiberHome ONU GPON AN5506-04-F RP2617 is affected by an OS command inj ...)
NOT-FOR-US: FiberHome ONU GPON AN5506-04-F RP2617
CVE-2021-42911
@@ -13030,8 +13455,7 @@ CVE-2021-41563 (Tad Book3 editing book function does not filter special characte
NOT-FOR-US: Tad Book3
CVE-2021-41562 (A vulnerability in Snow Snow Agent for Windows allows a non-admin user ...)
NOT-FOR-US: Snow Snow Agent for Windows
-CVE-2021-41561
- RESERVED
+CVE-2021-41561 (Improper Input Validation vulnerability in Parquet-MR of Apache Parque ...)
NOT-FOR-US: Apache Parquet
CVE-2021-3825 (On 2.1.15 version and below of Lider module in LiderAhenk software is ...)
NOT-FOR-US: LiderAhenk
@@ -127295,8 +127719,8 @@ CVE-2020-8107
RESERVED
CVE-2020-8106
REJECTED
-CVE-2020-8105
- RESERVED
+CVE-2020-8105 (OS Command Injection vulnerability in the wirelessConnect handler of A ...)
+ TODO: check
CVE-2020-8104
RESERVED
CVE-2020-8103 (A vulnerability in the improper handling of symbolic links in Bitdefen ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d2de03ed0d8fbf747961ef375729e3591f0133f8
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d2de03ed0d8fbf747961ef375729e3591f0133f8
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20211220/be52b3f0/attachment.htm>
More information about the debian-security-tracker-commits
mailing list