[Git][security-tracker-team/security-tracker][master] Process some NFUs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Jul 13 21:29:53 BST 2021
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
f8d32f18 by Salvatore Bonaccorso at 2021-07-13T22:29:32+02:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1093,7 +1093,7 @@ CVE-2021-36216
CVE-2021-36215
RESERVED
CVE-2021-36214 (LINE client for iOS before 10.16.3 allows cross site script with speci ...)
- TODO: check
+ NOT-FOR-US: LINE client for iOS
CVE-2021-36213
RESERVED
CVE-2021-36212 (app/View/SharingGroups/view.ctp in MISP before 2.4.146 allows stored X ...)
@@ -1213,11 +1213,11 @@ CVE-2021-36157
CVE-2021-36156
RESERVED
CVE-2021-36155 (LengthPrefixedMessageReader in gRPC Swift 1.1.0 and earlier allocates ...)
- TODO: check
+ NOT-FOR-US: gRPC Swift
CVE-2021-36154 (HTTP2ToRawGRPCServerCodec in gRPC Swift 1.1.1 and earlier allows remot ...)
- TODO: check
+ NOT-FOR-US: gRPC Swift
CVE-2021-36153 (Mismanaged state in GRPCWebToHTTP2ServerCodec.swift in gRPC Swift 1.1. ...)
- TODO: check
+ NOT-FOR-US: gRPC Swift
CVE-2021-36152
RESERVED
CVE-2021-36151
@@ -1289,13 +1289,13 @@ CVE-2021-36125 (An issue was discovered in the CentralAuth extension in MediaWik
NOT-FOR-US: CentralAuth MediaWiki extension
NOTE: https://lists.wikimedia.org/hyperkitty/list/wikitech-l@lists.wikimedia.org/thread/M7MVMBYMLNIVLHCWL2KKZGH36HYN4YON/
CVE-2021-36124 (An issue was discovered in Echo ShareCare 8.15.5. It does not perform ...)
- TODO: check
+ NOT-FOR-US: Echo ShareCare
CVE-2021-36123 (An issue was discovered in Echo ShareCare 8.15.5. The TextReader featu ...)
- TODO: check
+ NOT-FOR-US: Echo ShareCare
CVE-2021-36122 (An issue was discovered in Echo ShareCare 8.15.5. The UnzipFile featur ...)
- TODO: check
+ NOT-FOR-US: Echo ShareCare
CVE-2021-36121 (An issue was discovered in Echo ShareCare 8.15.5. The file-upload feat ...)
- TODO: check
+ NOT-FOR-US: Echo ShareCare
CVE-2021-3633
RESERVED
CVE-2021-36120
@@ -1759,7 +1759,7 @@ CVE-2021-35959 (In Plone 5.0 through 5.2.4, Editors are vulnerable to XSS in the
CVE-2021-35958 (** DISPUTED ** TensorFlow through 2.5.0 allows attackers to overwrite ...)
- tensorflow <itp> (bug #804612)
CVE-2021-35957 (Stormshield Endpoint Security Evolution 2.0.0 through 2.0.2 does not a ...)
- TODO: check
+ NOT-FOR-US: Stormshield Endpoint Security Evolution
CVE-2021-35956 (Stored cross-site scripting (XSS) in the embedded webserver of AKCP se ...)
NOT-FOR-US: AKCP sensorProbe
CVE-2021-35955
@@ -5336,91 +5336,91 @@ CVE-2021-34335
CVE-2021-34334
RESERVED
CVE-2021-34333 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34332 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34331 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34330 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34329 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34328 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34327 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34326 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34325 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34324 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34323 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34322 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34321 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34320 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34319 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34318 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34317 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34316 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34315 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34314 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34313 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34312 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34311 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34310 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34309 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34308 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34307 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34306 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34305 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34304 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34303 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34302 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34301 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34300 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34299 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34298 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34297 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34296 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34295 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34294 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34293 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34292 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-34291 (A vulnerability has been identified in JT2Go (All versions < V13.2) ...)
- TODO: check
+ NOT-FOR-US: JT2Go
CVE-2021-3586
RESERVED
NOT-FOR-US: Maistra
@@ -6755,7 +6755,7 @@ CVE-2021-33720
CVE-2021-33719
RESERVED
CVE-2021-33718 (A vulnerability has been identified in Mendix Applications using Mendi ...)
- TODO: check
+ NOT-FOR-US: Mendix Applications
CVE-2021-33717
RESERVED
CVE-2021-33716
@@ -7052,7 +7052,7 @@ CVE-2021-3566
CVE-2021-33579
RESERVED
CVE-2021-33578 (Echo ShareCare 8.15.5 is susceptible to SQL injection vulnerabilities ...)
- TODO: check
+ NOT-FOR-US: Echo ShareCare
CVE-2021-33577 (An issue was discovered in Cleo LexiCom 5.5.0.0. The requirement for t ...)
NOT-FOR-US: Cleo LexiCom
CVE-2021-33576 (An issue was discovered in Cleo LexiCom 5.5.0.0. Within the AS2 messag ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f8d32f186614545d3db5fed94f0576ea8ab1e297
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/f8d32f186614545d3db5fed94f0576ea8ab1e297
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210713/7f8ecfb6/attachment.htm>
More information about the debian-security-tracker-commits
mailing list