[Git][security-tracker-team/security-tracker][master] Process more NFUs

Salvatore Bonaccorso carnil at debian.org
Fri Jan 15 20:30:43 GMT 2021



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
0db30db5 by Salvatore Bonaccorso at 2021-01-15T21:30:23+01:00
Process more NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -8847,7 +8847,7 @@ CVE-2020-35751
 CVE-2020-35750
 	RESERVED
 CVE-2020-35749 (Directory traversal vulnerability in class-simple_job_board_resume_dow ...)
-	TODO: check
+	NOT-FOR-US: Simple Board Job plugin for WordPress
 CVE-2020-35748 (Cross-site scripting (XSS) vulnerability in models/list-table.php in t ...)
 	NOT-FOR-US: FV Flowplayer Video Player plugin for WordPress
 CVE-2020-35747
@@ -14970,7 +14970,7 @@ CVE-2020-29589
 CVE-2020-29588
 	RESERVED
 CVE-2020-29587 (SimplCommerce 1.0.0-rc uses the Bootbox.js library, which allows creat ...)
-	TODO: check
+	NOT-FOR-US: SimplCommerce
 CVE-2020-29586
 	RESERVED
 CVE-2020-29585
@@ -21825,7 +21825,7 @@ CVE-2021-0222 (A vulnerability in Juniper Networks Junos OS allows an attacker t
 CVE-2021-0221 (In an EVPN/VXLAN scenario, if an IRB interface with a virtual gateway  ...)
 	NOT-FOR-US: Juniper
 CVE-2021-0220 (The Junos Space Network Management Platform has been found to store sh ...)
-	TODO: check
+	NOT-FOR-US: Junos Space Network Management Platform
 CVE-2021-0219 (A command injection vulnerability in install package validation subsys ...)
 	NOT-FOR-US: Juniper
 CVE-2021-0218 (A command injection vulnerability in the license-check daemon of Junip ...)
@@ -24410,39 +24410,39 @@ CVE-2020-26998
 CVE-2020-26997
 	RESERVED
 CVE-2020-26996 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26995 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26994 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26993 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26992 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26991 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26990 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26989 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26988 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26987 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26986 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26985 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26984 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26983 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26982 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26981 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26980 (A vulnerability has been identified in JT2Go (All Versions < V13.1. ...)
-	TODO: check
+	NOT-FOR-US: JT2Go
 CVE-2020-26979 (When a user typed a URL in the address bar or the search bar and quick ...)
 	- firefox 84.0-1
 	NOTE: https://www.mozilla.org/en-US/security/advisories/mfsa2020-54/#CVE-2020-26979
@@ -28666,7 +28666,7 @@ CVE-2020-25228 (A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS
 CVE-2020-25227
 	RESERVED
 CVE-2020-25226 (A vulnerability has been identified in SCALANCE X-200 switch family (i ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2019-20919 (An issue was discovered in the DBI module before 1.643 for Perl. The h ...)
 	{DLA-2386-1}
 	- libdbi-perl 1.643-1
@@ -29979,13 +29979,13 @@ CVE-2020-24643
 CVE-2020-24642
 	RESERVED
 CVE-2020-24641 (In Aruba AirWave Glass before 1.3.3, there is a Server-Side Request Fo ...)
-	TODO: check
+	NOT-FOR-US: Aruba
 CVE-2020-24640 (There is a vulnerability caused by insufficient input validation that  ...)
-	TODO: check
+	NOT-FOR-US: Aruba
 CVE-2020-24639 (There is a vulnerability caused by unsafe Java deserialization that al ...)
-	TODO: check
+	NOT-FOR-US: Aruba
 CVE-2020-24638 (Multiple authenticated remote command executions are possible in Airwa ...)
-	TODO: check
+	NOT-FOR-US: Aruba
 CVE-2020-24637 (Two vulnerabilities in ArubaOS GRUB2 implementation allows for an atta ...)
 	NOT-FOR-US: ArubaOS GRUB2 implementation (CVE specific to ArubaOS)
 CVE-2020-24636
@@ -31461,7 +31461,7 @@ CVE-2020-23962
 CVE-2020-23961
 	RESERVED
 CVE-2020-23960 (Multiple cross-site request forgery (CSRF) vulnerabilities in the Admi ...)
-	TODO: check
+	NOT-FOR-US: Fork CMS
 CVE-2020-23959
 	RESERVED
 CVE-2020-23958
@@ -48368,9 +48368,9 @@ CVE-2020-15852 (An issue was discovered in the Linux kernel 5.5 through 5.7.9, a
 	[stretch] - linux <not-affected> (Only affects 5.5 and later)
 	NOTE: https://www.openwall.com/lists/oss-security/2020/07/16/1
 CVE-2020-15800 (A vulnerability has been identified in SCALANCE X-200 switch family (i ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2020-15799 (A vulnerability has been identified in SCALANCE X-200 switch family (i ...)
-	TODO: check
+	NOT-FOR-US: Siemens
 CVE-2020-15798
 	RESERVED
 CVE-2020-15797 (A vulnerability has been identified in DCA Vantage Analyzer (All versi ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0db30db5f48cb4cfd260f6a30650a425c14eed28

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0db30db5f48cb4cfd260f6a30650a425c14eed28
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210115/b22a220b/attachment.html>


More information about the debian-security-tracker-commits mailing list