[Git][security-tracker-team/security-tracker][master] NFUs
Moritz Muehlenhoff (@jmm)
jmm at debian.org
Tue Jul 27 09:21:09 BST 2021
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
be02040f by Moritz Muehlenhoff at 2021-07-27T10:20:36+02:00
NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -43,7 +43,7 @@ CVE-2021-37557
CVE-2021-37556
RESERVED
CVE-2021-37555 (TX9 Automatic Food Dispenser v3.2.57 devices allow access to a shell a ...)
- TODO: check
+ NOT-FOR-US: TX9 Automatic Food Dispenser
CVE-2021-37554
RESERVED
CVE-2021-37553
@@ -1215,6 +1215,7 @@ CVE-2021-36984
RESERVED
CVE-2021-36983
RESERVED
+ NOT-FOR-US: ReplaySorcery
CVE-2021-36982
RESERVED
CVE-2021-36981
@@ -1746,7 +1747,7 @@ CVE-2021-3652 [CRYPT password hash with asterisk allows any bind attempt to succ
CVE-2021-36767
RESERVED
CVE-2021-36766 (Concrete5 through 8.5.5 deserializes Untrusted Data. The vulnerable co ...)
- TODO: check
+ NOT-FOR-US: Concrete5
CVE-2021-36765
RESERVED
CVE-2021-36764
@@ -2190,7 +2191,7 @@ CVE-2021-36565
CVE-2021-36564
RESERVED
CVE-2021-36563 (The CheckMK management web console (versions 1.5.0 to 2.0.0) does not ...)
- TODO: check
+ - check-mk <removed>
CVE-2021-36562
RESERVED
CVE-2021-36561
@@ -4730,7 +4731,7 @@ CVE-2021-35460
CVE-2021-35459
RESERVED
CVE-2021-35458 (Online Pet Shop We App 1.0 is vulnerable to Union SQL Injection in pro ...)
- TODO: check
+ NOT-FOR-US: Online Pet Shop We App
CVE-2021-35457
RESERVED
CVE-2021-35456 (Online Pet Shop We App 1.0 is vulnerable to remote SQL injection and s ...)
@@ -8860,7 +8861,7 @@ CVE-2021-33631
CVE-2021-33630
RESERVED
CVE-2021-33629 (isula-build before 0.9.5-8 can cause a program crash, when building co ...)
- TODO: check
+ NOT-FOR-US: isula-build
CVE-2021-33628
RESERVED
CVE-2021-33627
@@ -10798,9 +10799,9 @@ CVE-2021-32797
CVE-2021-32796
RESERVED
CVE-2021-32795 (ArchiSteamFarm is a C# application with primary purpose of idling Stea ...)
- TODO: check
+ NOT-FOR-US: ArchiSteamFarm
CVE-2021-32794 (ArchiSteamFarm is a C# application with primary purpose of idling Stea ...)
- TODO: check
+ NOT-FOR-US: ArchiSteamFarm
CVE-2021-32793
RESERVED
CVE-2021-32792 (mod_auth_openidc is an authentication/authorization module for the Apa ...)
@@ -10815,7 +10816,7 @@ CVE-2021-32791 (mod_auth_openidc is an authentication/authorization module for t
CVE-2021-32790 (Woocommerce is an open source eCommerce plugin for WordPress. An SQL i ...)
NOT-FOR-US: Woocommerce
CVE-2021-32789 (woocommerce-gutenberg-products-block is a feature plugin for WooCommer ...)
- TODO: check
+ NOT-FOR-US: woocommerce-gutenberg-products-block
CVE-2021-32788
RESERVED
CVE-2021-32787
@@ -22616,11 +22617,11 @@ CVE-2021-28097
CVE-2021-28096
RESERVED
CVE-2021-28095 (OX Documents before 7.10.5-rev5 has Incorrect Access Control for docum ...)
- TODO: check
+ NOT-FOR-US: OX Documents
CVE-2021-28094 (OX Documents before 7.10.5-rev7 has Incorrect Access Control for conve ...)
- TODO: check
+ NOT-FOR-US: OX Documents
CVE-2021-28093 (OX Documents before 7.10.5-rev5 has Incorrect Access Control of conver ...)
- TODO: check
+ NOT-FOR-US: OX Documents
CVE-2021-28092 (The is-svg package 2.1.0 through 4.2.1 for Node.js uses a regular expr ...)
NOT-FOR-US: Node is-svg
CVE-2021-3424 (A flaw was found in keycloak as shipped in Red Hat Single Sign-On 7.4 ...)
@@ -25584,7 +25585,7 @@ CVE-2021-26825 (An integer overflow issue exists in Godot Engine up to v3.2 that
NOTE: https://github.com/godotengine/godot/commit/403e4fd08b0b212e96f53d926e6273e0745eaa5a (master)
NOTE: https://github.com/godotengine/godot/commit/113b5ab1c45c01b8e6d54d13ac8876d091f883a8 (3.2)
CVE-2021-26824 (DM FingerTool v1.19 in the DM PD065 Secure USB is susceptible to impro ...)
- TODO: check
+ NOT-FOR-US: DM FingerTool
CVE-2021-26823
RESERVED
CVE-2021-26822 (Teachers Record Management System 1.0 is affected by a SQL injection v ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/be02040f23180e14beee7cd67b5cffbe13c129d8
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/be02040f23180e14beee7cd67b5cffbe13c129d8
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210727/14107542/attachment.htm>
More information about the debian-security-tracker-commits
mailing list