[Git][security-tracker-team/security-tracker][master] Process more NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Jul 7 21:38:12 BST 2021



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
782007f4 by Salvatore Bonaccorso at 2021-07-07T22:37:46+02:00
Process more NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -18,7 +18,7 @@ CVE-2021-36214
 CVE-2021-36213
 	RESERVED
 CVE-2021-36212 (app/View/SharingGroups/view.ctp in MISP before 2.4.146 allows stored X ...)
-	TODO: check
+	NOT-FOR-US: MISP
 CVE-2021-3637
 	RESERVED
 	NOT-FOR-US: Keycloak
@@ -1775,7 +1775,7 @@ CVE-2021-35453
 CVE-2021-35452
 	RESERVED
 CVE-2021-35451 (In Teradici PCoIP Management Console-Enterprise 20.07.0, an unauthenti ...)
-	TODO: check
+	NOT-FOR-US: Teradici PCoIP Management Console-Enterprise
 CVE-2021-35450
 	RESERVED
 CVE-2021-35449
@@ -3567,21 +3567,21 @@ CVE-2021-34629
 CVE-2021-34628
 	RESERVED
 CVE-2021-34627 (A vulnerability in the getSelectedMimeTypesByRole function of the WP U ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2021-34626 (A vulnerability in the deleteCustomType function of the WP Upload Rest ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2021-34625 (A vulnerability in the saveCustomType function of the WP Upload Restri ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2021-34624 (A vulnerability in the file uploader component found in the ~/src/Clas ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2021-34623 (A vulnerability in the image uploader component found in the ~/src/Cla ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2021-34622 (A vulnerability in the user profile update component found in the ~/sr ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2021-34621 (A vulnerability in the user registration component found in the ~/src/ ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2021-34620 (The WP Fluent Forms plugin < 3.6.67 for WordPress is vulnerable to  ...)
-	TODO: check
+	NOT-FOR-US: WordPress plugin
 CVE-2021-34619
 	RESERVED
 CVE-2021-34618
@@ -6744,19 +6744,19 @@ CVE-2021-33223
 CVE-2021-33222
 	RESERVED
 CVE-2021-33221 (An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and ...)
-	TODO: check
+	NOT-FOR-US: CommScope Ruckus IoT Controller
 CVE-2021-33220 (An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and ...)
-	TODO: check
+	NOT-FOR-US: CommScope Ruckus IoT Controller
 CVE-2021-33219 (An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and ...)
-	TODO: check
+	NOT-FOR-US: CommScope Ruckus IoT Controller
 CVE-2021-33218 (An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and ...)
-	TODO: check
+	NOT-FOR-US: CommScope Ruckus IoT Controller
 CVE-2021-33217 (An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and ...)
-	TODO: check
+	NOT-FOR-US: CommScope Ruckus IoT Controller
 CVE-2021-33216 (An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and ...)
-	TODO: check
+	NOT-FOR-US: CommScope Ruckus IoT Controller
 CVE-2021-33215 (An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and ...)
-	TODO: check
+	NOT-FOR-US: CommScope Ruckus IoT Controller
 CVE-2021-33214
 	RESERVED
 CVE-2021-33213
@@ -8371,71 +8371,71 @@ CVE-2021-32540 (Add announcement function in the 101EIP system does not filter s
 CVE-2021-32539 (Add event in calendar function in the 101EIP system does not filter sp ...)
 	NOT-FOR-US: 101EIP system
 CVE-2021-32538 (ARTWARE CMS parameter of image upload function does not filter the typ ...)
-	TODO: check
+	NOT-FOR-US: ARTWARE CMS
 CVE-2021-32537 (Realtek HAD contains a driver crashed vulnerability which allows local ...)
 	TODO: check
 CVE-2021-32536 (The login page in the MCUsystem does not filter with special character ...)
 	NOT-FOR-US: MCUsystem
 CVE-2021-32535 (The vulnerability of hard-coded default credentials in QSAN SANOS allo ...)
-	TODO: check
+	NOT-FOR-US: QSAN SANOS
 CVE-2021-32534 (QSAN SANOS factory reset function does not filter special parameters.  ...)
-	TODO: check
+	NOT-FOR-US: QSAN SANOS
 CVE-2021-32533 (The QSAN SANOS setting page does not filter special parameters. Remote ...)
-	TODO: check
+	NOT-FOR-US: QSAN SANOS
 CVE-2021-32532 (Path traversal vulnerability in back-end analysis function in QSAN XEV ...)
-	TODO: check
+	NOT-FOR-US: QSAN XEVO
 CVE-2021-32531 (OS command injection vulnerability in Init function in QSAN XEVO allow ...)
-	TODO: check
+	NOT-FOR-US: QSAN XEVO
 CVE-2021-32530 (OS command injection vulnerability in Array function in QSAN XEVO allo ...)
-	TODO: check
+	NOT-FOR-US: QSAN XEVO
 CVE-2021-32529 (Command injection vulnerability in QSAN XEVO, SANOS allows remote unau ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32528 (Observable behavioral discrepancy vulnerability in QSAN Storage Manage ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32527 (Path traversal vulnerability in QSAN Storage Manager allows remote una ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32526 (Incorrect permission assignment for critical resource vulnerability in ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32525 (The same hard-coded password in QSAN Storage Manager's in the firmware ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32524 (Command injection vulnerability in QSAN Storage Manager allows remote  ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32523 (Improper authorization vulnerability in QSAN Storage Manager allows re ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32522 (Improper restriction of excessive authentication attempts vulnerabilit ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32521 (Use of MAC address as an authenticated password in QSAN Storage Manage ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32520 (Use of hard-coded cryptographic key vulnerability in QSAN Storage Mana ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32519 (Use of password hash with insufficient computational effort vulnerabil ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32518 (A vulnerability in share_link in QSAN Storage Manager allows remote at ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32517 (Improper access control vulnerability in share_link in QSAN Storage Ma ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32516 (Path traversal vulnerability in share_link in QSAN Storage Manager all ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32515 (Directory listing vulnerability in share_link in QSAN Storage Manager  ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32514 (Improper access control vulnerability in FirmwareUpgrade in QSAN Stora ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32513 (QsanTorture in QSAN Storage Manager does not filter special parameters ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32512 (QuickInstall in QSAN Storage Manager does not filter special parameter ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32511 (QSAN Storage Manager through directory listing vulnerability in ViewBr ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32510 (QSAN Storage Manager through directory listing vulnerability in antivi ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32509 (Absolute Path Traversal vulnerability in FileviewDoc in QSAN Storage M ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32508 (Absolute Path Traversal vulnerability in FileStreaming in QSAN Storage ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32507 (Absolute Path Traversal vulnerability in FileDownload in QSAN Storage  ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32506 (Absolute Path Traversal vulnerability in GetImage in QSAN Storage Mana ...)
-	TODO: check
+	NOT-FOR-US: QSAN
 CVE-2021-32505
 	RESERVED
 CVE-2021-32504



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/782007f43c05d6b38c6b7ea7e1dbedbab280ed35

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/782007f43c05d6b38c6b7ea7e1dbedbab280ed35
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210707/97388fe2/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list