[Git][security-tracker-team/security-tracker][master] Process more NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Jul 7 21:38:12 BST 2021
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
782007f4 by Salvatore Bonaccorso at 2021-07-07T22:37:46+02:00
Process more NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -18,7 +18,7 @@ CVE-2021-36214
CVE-2021-36213
RESERVED
CVE-2021-36212 (app/View/SharingGroups/view.ctp in MISP before 2.4.146 allows stored X ...)
- TODO: check
+ NOT-FOR-US: MISP
CVE-2021-3637
RESERVED
NOT-FOR-US: Keycloak
@@ -1775,7 +1775,7 @@ CVE-2021-35453
CVE-2021-35452
RESERVED
CVE-2021-35451 (In Teradici PCoIP Management Console-Enterprise 20.07.0, an unauthenti ...)
- TODO: check
+ NOT-FOR-US: Teradici PCoIP Management Console-Enterprise
CVE-2021-35450
RESERVED
CVE-2021-35449
@@ -3567,21 +3567,21 @@ CVE-2021-34629
CVE-2021-34628
RESERVED
CVE-2021-34627 (A vulnerability in the getSelectedMimeTypesByRole function of the WP U ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2021-34626 (A vulnerability in the deleteCustomType function of the WP Upload Rest ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2021-34625 (A vulnerability in the saveCustomType function of the WP Upload Restri ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2021-34624 (A vulnerability in the file uploader component found in the ~/src/Clas ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2021-34623 (A vulnerability in the image uploader component found in the ~/src/Cla ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2021-34622 (A vulnerability in the user profile update component found in the ~/sr ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2021-34621 (A vulnerability in the user registration component found in the ~/src/ ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2021-34620 (The WP Fluent Forms plugin < 3.6.67 for WordPress is vulnerable to ...)
- TODO: check
+ NOT-FOR-US: WordPress plugin
CVE-2021-34619
RESERVED
CVE-2021-34618
@@ -6744,19 +6744,19 @@ CVE-2021-33223
CVE-2021-33222
RESERVED
CVE-2021-33221 (An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and ...)
- TODO: check
+ NOT-FOR-US: CommScope Ruckus IoT Controller
CVE-2021-33220 (An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and ...)
- TODO: check
+ NOT-FOR-US: CommScope Ruckus IoT Controller
CVE-2021-33219 (An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and ...)
- TODO: check
+ NOT-FOR-US: CommScope Ruckus IoT Controller
CVE-2021-33218 (An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and ...)
- TODO: check
+ NOT-FOR-US: CommScope Ruckus IoT Controller
CVE-2021-33217 (An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and ...)
- TODO: check
+ NOT-FOR-US: CommScope Ruckus IoT Controller
CVE-2021-33216 (An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and ...)
- TODO: check
+ NOT-FOR-US: CommScope Ruckus IoT Controller
CVE-2021-33215 (An issue was discovered in CommScope Ruckus IoT Controller 1.7.1.0 and ...)
- TODO: check
+ NOT-FOR-US: CommScope Ruckus IoT Controller
CVE-2021-33214
RESERVED
CVE-2021-33213
@@ -8371,71 +8371,71 @@ CVE-2021-32540 (Add announcement function in the 101EIP system does not filter s
CVE-2021-32539 (Add event in calendar function in the 101EIP system does not filter sp ...)
NOT-FOR-US: 101EIP system
CVE-2021-32538 (ARTWARE CMS parameter of image upload function does not filter the typ ...)
- TODO: check
+ NOT-FOR-US: ARTWARE CMS
CVE-2021-32537 (Realtek HAD contains a driver crashed vulnerability which allows local ...)
TODO: check
CVE-2021-32536 (The login page in the MCUsystem does not filter with special character ...)
NOT-FOR-US: MCUsystem
CVE-2021-32535 (The vulnerability of hard-coded default credentials in QSAN SANOS allo ...)
- TODO: check
+ NOT-FOR-US: QSAN SANOS
CVE-2021-32534 (QSAN SANOS factory reset function does not filter special parameters. ...)
- TODO: check
+ NOT-FOR-US: QSAN SANOS
CVE-2021-32533 (The QSAN SANOS setting page does not filter special parameters. Remote ...)
- TODO: check
+ NOT-FOR-US: QSAN SANOS
CVE-2021-32532 (Path traversal vulnerability in back-end analysis function in QSAN XEV ...)
- TODO: check
+ NOT-FOR-US: QSAN XEVO
CVE-2021-32531 (OS command injection vulnerability in Init function in QSAN XEVO allow ...)
- TODO: check
+ NOT-FOR-US: QSAN XEVO
CVE-2021-32530 (OS command injection vulnerability in Array function in QSAN XEVO allo ...)
- TODO: check
+ NOT-FOR-US: QSAN XEVO
CVE-2021-32529 (Command injection vulnerability in QSAN XEVO, SANOS allows remote unau ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32528 (Observable behavioral discrepancy vulnerability in QSAN Storage Manage ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32527 (Path traversal vulnerability in QSAN Storage Manager allows remote una ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32526 (Incorrect permission assignment for critical resource vulnerability in ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32525 (The same hard-coded password in QSAN Storage Manager's in the firmware ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32524 (Command injection vulnerability in QSAN Storage Manager allows remote ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32523 (Improper authorization vulnerability in QSAN Storage Manager allows re ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32522 (Improper restriction of excessive authentication attempts vulnerabilit ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32521 (Use of MAC address as an authenticated password in QSAN Storage Manage ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32520 (Use of hard-coded cryptographic key vulnerability in QSAN Storage Mana ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32519 (Use of password hash with insufficient computational effort vulnerabil ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32518 (A vulnerability in share_link in QSAN Storage Manager allows remote at ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32517 (Improper access control vulnerability in share_link in QSAN Storage Ma ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32516 (Path traversal vulnerability in share_link in QSAN Storage Manager all ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32515 (Directory listing vulnerability in share_link in QSAN Storage Manager ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32514 (Improper access control vulnerability in FirmwareUpgrade in QSAN Stora ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32513 (QsanTorture in QSAN Storage Manager does not filter special parameters ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32512 (QuickInstall in QSAN Storage Manager does not filter special parameter ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32511 (QSAN Storage Manager through directory listing vulnerability in ViewBr ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32510 (QSAN Storage Manager through directory listing vulnerability in antivi ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32509 (Absolute Path Traversal vulnerability in FileviewDoc in QSAN Storage M ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32508 (Absolute Path Traversal vulnerability in FileStreaming in QSAN Storage ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32507 (Absolute Path Traversal vulnerability in FileDownload in QSAN Storage ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32506 (Absolute Path Traversal vulnerability in GetImage in QSAN Storage Mana ...)
- TODO: check
+ NOT-FOR-US: QSAN
CVE-2021-32505
RESERVED
CVE-2021-32504
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/782007f43c05d6b38c6b7ea7e1dbedbab280ed35
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/782007f43c05d6b38c6b7ea7e1dbedbab280ed35
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210707/97388fe2/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list