[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu May 20 09:10:32 BST 2021



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
b0f6f400 by security tracker role at 2021-05-20T08:10:23+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,549 @@
+CVE-2021-3560
+	RESERVED
+CVE-2021-33476
+	RESERVED
+CVE-2021-33475
+	RESERVED
+CVE-2021-33474
+	RESERVED
+CVE-2021-33473
+	RESERVED
+CVE-2021-33472
+	RESERVED
+CVE-2021-33471
+	RESERVED
+CVE-2021-33470
+	RESERVED
+CVE-2021-33469
+	RESERVED
+CVE-2021-33468
+	RESERVED
+CVE-2021-33467
+	RESERVED
+CVE-2021-33466
+	RESERVED
+CVE-2021-33465
+	RESERVED
+CVE-2021-33464
+	RESERVED
+CVE-2021-33463
+	RESERVED
+CVE-2021-33462
+	RESERVED
+CVE-2021-33461
+	RESERVED
+CVE-2021-33460
+	RESERVED
+CVE-2021-33459
+	RESERVED
+CVE-2021-33458
+	RESERVED
+CVE-2021-33457
+	RESERVED
+CVE-2021-33456
+	RESERVED
+CVE-2021-33455
+	RESERVED
+CVE-2021-33454
+	RESERVED
+CVE-2021-33453
+	RESERVED
+CVE-2021-33452
+	RESERVED
+CVE-2021-33451
+	RESERVED
+CVE-2021-33450
+	RESERVED
+CVE-2021-33449
+	RESERVED
+CVE-2021-33448
+	RESERVED
+CVE-2021-33447
+	RESERVED
+CVE-2021-33446
+	RESERVED
+CVE-2021-33445
+	RESERVED
+CVE-2021-33444
+	RESERVED
+CVE-2021-33443
+	RESERVED
+CVE-2021-33442
+	RESERVED
+CVE-2021-33441
+	RESERVED
+CVE-2021-33440
+	RESERVED
+CVE-2021-33439
+	RESERVED
+CVE-2021-33438
+	RESERVED
+CVE-2021-33437
+	RESERVED
+CVE-2021-33436
+	RESERVED
+CVE-2021-33435
+	RESERVED
+CVE-2021-33434
+	RESERVED
+CVE-2021-33433
+	RESERVED
+CVE-2021-33432
+	RESERVED
+CVE-2021-33431
+	RESERVED
+CVE-2021-33430
+	RESERVED
+CVE-2021-33429
+	RESERVED
+CVE-2021-33428
+	RESERVED
+CVE-2021-33427
+	RESERVED
+CVE-2021-33426
+	RESERVED
+CVE-2021-33425
+	RESERVED
+CVE-2021-33424
+	RESERVED
+CVE-2021-33423
+	RESERVED
+CVE-2021-33422
+	RESERVED
+CVE-2021-33421
+	RESERVED
+CVE-2021-33420
+	RESERVED
+CVE-2021-33419
+	RESERVED
+CVE-2021-33418
+	RESERVED
+CVE-2021-33417
+	RESERVED
+CVE-2021-33416
+	RESERVED
+CVE-2021-33415
+	RESERVED
+CVE-2021-33414
+	RESERVED
+CVE-2021-33413
+	RESERVED
+CVE-2021-33412
+	RESERVED
+CVE-2021-33411
+	RESERVED
+CVE-2021-33410
+	RESERVED
+CVE-2021-33409
+	RESERVED
+CVE-2021-33408
+	RESERVED
+CVE-2021-33407
+	RESERVED
+CVE-2021-33406
+	RESERVED
+CVE-2021-33405
+	RESERVED
+CVE-2021-33404
+	RESERVED
+CVE-2021-33403
+	RESERVED
+CVE-2021-33402
+	RESERVED
+CVE-2021-33401
+	RESERVED
+CVE-2021-33400
+	RESERVED
+CVE-2021-33399
+	RESERVED
+CVE-2021-33398
+	RESERVED
+CVE-2021-33397
+	RESERVED
+CVE-2021-33396
+	RESERVED
+CVE-2021-33395
+	RESERVED
+CVE-2021-33394
+	RESERVED
+CVE-2021-33393
+	RESERVED
+CVE-2021-33392
+	RESERVED
+CVE-2021-33391
+	RESERVED
+CVE-2021-33390
+	RESERVED
+CVE-2021-33389
+	RESERVED
+CVE-2021-33388
+	RESERVED
+CVE-2021-33387
+	RESERVED
+CVE-2021-33386
+	RESERVED
+CVE-2021-33385
+	RESERVED
+CVE-2021-33384
+	RESERVED
+CVE-2021-33383
+	RESERVED
+CVE-2021-33382
+	RESERVED
+CVE-2021-33381
+	RESERVED
+CVE-2021-33380
+	RESERVED
+CVE-2021-33379
+	RESERVED
+CVE-2021-33378
+	RESERVED
+CVE-2021-33377
+	RESERVED
+CVE-2021-33376
+	RESERVED
+CVE-2021-33375
+	RESERVED
+CVE-2021-33374
+	RESERVED
+CVE-2021-33373
+	RESERVED
+CVE-2021-33372
+	RESERVED
+CVE-2021-33371
+	RESERVED
+CVE-2021-33370
+	RESERVED
+CVE-2021-33369
+	RESERVED
+CVE-2021-33368
+	RESERVED
+CVE-2021-33367
+	RESERVED
+CVE-2021-33366
+	RESERVED
+CVE-2021-33365
+	RESERVED
+CVE-2021-33364
+	RESERVED
+CVE-2021-33363
+	RESERVED
+CVE-2021-33362
+	RESERVED
+CVE-2021-33361
+	RESERVED
+CVE-2021-33360
+	RESERVED
+CVE-2021-33359
+	RESERVED
+CVE-2021-33358
+	RESERVED
+CVE-2021-33357
+	RESERVED
+CVE-2021-33356
+	RESERVED
+CVE-2021-33355
+	RESERVED
+CVE-2021-33354
+	RESERVED
+CVE-2021-33353
+	RESERVED
+CVE-2021-33352
+	RESERVED
+CVE-2021-33351
+	RESERVED
+CVE-2021-33350
+	RESERVED
+CVE-2021-33349
+	RESERVED
+CVE-2021-33348
+	RESERVED
+CVE-2021-33347
+	RESERVED
+CVE-2021-33346
+	RESERVED
+CVE-2021-33345
+	RESERVED
+CVE-2021-33344
+	RESERVED
+CVE-2021-33343
+	RESERVED
+CVE-2021-33342
+	RESERVED
+CVE-2021-33341
+	RESERVED
+CVE-2021-33340
+	RESERVED
+CVE-2021-33339
+	RESERVED
+CVE-2021-33338
+	RESERVED
+CVE-2021-33337
+	RESERVED
+CVE-2021-33336
+	RESERVED
+CVE-2021-33335
+	RESERVED
+CVE-2021-33334
+	RESERVED
+CVE-2021-33333
+	RESERVED
+CVE-2021-33332
+	RESERVED
+CVE-2021-33331
+	RESERVED
+CVE-2021-33330
+	RESERVED
+CVE-2021-33329
+	RESERVED
+CVE-2021-33328
+	RESERVED
+CVE-2021-33327
+	RESERVED
+CVE-2021-33326
+	RESERVED
+CVE-2021-33325
+	RESERVED
+CVE-2021-33324
+	RESERVED
+CVE-2021-33323
+	RESERVED
+CVE-2021-33322
+	RESERVED
+CVE-2021-33321
+	RESERVED
+CVE-2021-33320
+	RESERVED
+CVE-2021-33319
+	RESERVED
+CVE-2021-33318
+	RESERVED
+CVE-2021-33317
+	RESERVED
+CVE-2021-33316
+	RESERVED
+CVE-2021-33315
+	RESERVED
+CVE-2021-33314
+	RESERVED
+CVE-2021-33313
+	RESERVED
+CVE-2021-33312
+	RESERVED
+CVE-2021-33311
+	RESERVED
+CVE-2021-33310
+	RESERVED
+CVE-2021-33309
+	RESERVED
+CVE-2021-33308
+	RESERVED
+CVE-2021-33307
+	RESERVED
+CVE-2021-33306
+	RESERVED
+CVE-2021-33305
+	RESERVED
+CVE-2021-33304
+	RESERVED
+CVE-2021-33303
+	RESERVED
+CVE-2021-33302
+	RESERVED
+CVE-2021-33301
+	RESERVED
+CVE-2021-33300
+	RESERVED
+CVE-2021-33299
+	RESERVED
+CVE-2021-33298
+	RESERVED
+CVE-2021-33297
+	RESERVED
+CVE-2021-33296
+	RESERVED
+CVE-2021-33295
+	RESERVED
+CVE-2021-33294
+	RESERVED
+CVE-2021-33293
+	RESERVED
+CVE-2021-33292
+	RESERVED
+CVE-2021-33291
+	RESERVED
+CVE-2021-33290
+	RESERVED
+CVE-2021-33289
+	RESERVED
+CVE-2021-33288
+	RESERVED
+CVE-2021-33287
+	RESERVED
+CVE-2021-33286
+	RESERVED
+CVE-2021-33285
+	RESERVED
+CVE-2021-33284
+	RESERVED
+CVE-2021-33283
+	RESERVED
+CVE-2021-33282
+	RESERVED
+CVE-2021-33281
+	RESERVED
+CVE-2021-33280
+	RESERVED
+CVE-2021-33279
+	RESERVED
+CVE-2021-33278
+	RESERVED
+CVE-2021-33277
+	RESERVED
+CVE-2021-33276
+	RESERVED
+CVE-2021-33275
+	RESERVED
+CVE-2021-33274
+	RESERVED
+CVE-2021-33273
+	RESERVED
+CVE-2021-33272
+	RESERVED
+CVE-2021-33271
+	RESERVED
+CVE-2021-33270
+	RESERVED
+CVE-2021-33269
+	RESERVED
+CVE-2021-33268
+	RESERVED
+CVE-2021-33267
+	RESERVED
+CVE-2021-33266
+	RESERVED
+CVE-2021-33265
+	RESERVED
+CVE-2021-33264
+	RESERVED
+CVE-2021-33263
+	RESERVED
+CVE-2021-33262
+	RESERVED
+CVE-2021-33261
+	RESERVED
+CVE-2021-33260
+	RESERVED
+CVE-2021-33259
+	RESERVED
+CVE-2021-33258
+	RESERVED
+CVE-2021-33257
+	RESERVED
+CVE-2021-33256
+	RESERVED
+CVE-2021-33255
+	RESERVED
+CVE-2021-33254
+	RESERVED
+CVE-2021-33253
+	RESERVED
+CVE-2021-33252
+	RESERVED
+CVE-2021-33251
+	RESERVED
+CVE-2021-33250
+	RESERVED
+CVE-2021-33249
+	RESERVED
+CVE-2021-33248
+	RESERVED
+CVE-2021-33247
+	RESERVED
+CVE-2021-33246
+	RESERVED
+CVE-2021-33245
+	RESERVED
+CVE-2021-33244
+	RESERVED
+CVE-2021-33243
+	RESERVED
+CVE-2021-33242
+	RESERVED
+CVE-2021-33241
+	RESERVED
+CVE-2021-33240
+	RESERVED
+CVE-2021-33239
+	RESERVED
+CVE-2021-33238
+	RESERVED
+CVE-2021-33237
+	RESERVED
+CVE-2021-33236
+	RESERVED
+CVE-2021-33235
+	RESERVED
+CVE-2021-33234
+	RESERVED
+CVE-2021-33233
+	RESERVED
+CVE-2021-33232
+	RESERVED
+CVE-2021-33231
+	RESERVED
+CVE-2021-33230
+	RESERVED
+CVE-2021-33229
+	RESERVED
+CVE-2021-33228
+	RESERVED
+CVE-2021-33227
+	RESERVED
+CVE-2021-33226
+	RESERVED
+CVE-2021-33225
+	RESERVED
+CVE-2021-33224
+	RESERVED
+CVE-2021-33223
+	RESERVED
+CVE-2021-33222
+	RESERVED
+CVE-2021-33221
+	RESERVED
+CVE-2021-33220
+	RESERVED
+CVE-2021-33219
+	RESERVED
+CVE-2021-33218
+	RESERVED
+CVE-2021-33217
+	RESERVED
+CVE-2021-33216
+	RESERVED
+CVE-2021-33215
+	RESERVED
+CVE-2021-33214
+	RESERVED
+CVE-2021-33213
+	RESERVED
+CVE-2021-33212
+	RESERVED
+CVE-2021-33211
+	RESERVED
+CVE-2021-33210
+	RESERVED
+CVE-2021-33209
+	RESERVED
+CVE-2021-33208
+	RESERVED
+CVE-2021-33207
+	RESERVED
+CVE-2021-33206
+	RESERVED
+CVE-2021-33205
+	RESERVED
 CVE-2021-3559 [nodedev-list command may cause libvirt to crash on hosts with GRID driver installed]
 	RESERVED
 	- libvirt <not-affected> (Vulnerable code never in a released version)
@@ -8346,16 +8892,15 @@ CVE-2021-29627 (In FreeBSD 13.0-STABLE before n245050, 12.2-STABLE before r36952
 	NOT-FOR-US: FreeBSD
 CVE-2021-29626 (In FreeBSD 13.0-STABLE before n245117, 12.2-STABLE before r369551, 11. ...)
 	- kfreebsd-10 <unfixed> (unimportant)
-CVE-2021-29625
-	RESERVED
-CVE-2021-29624
-	RESERVED
+CVE-2021-29625 (Adminer is open-source database management software. A cross-site scri ...)
+	TODO: check
+CVE-2021-29624 (fastify-csrf is an open-source plugin helps developers protect their F ...)
+	TODO: check
 CVE-2021-29623 (Exiv2 is a C++ library and a command-line utility to read, write, dele ...)
 	- exiv2 <unfixed> (bug #988481)
 	NOTE: https://github.com/Exiv2/exiv2/security/advisories/GHSA-6253-qjwm-3q4v
 	NOTE: https://github.com/Exiv2/exiv2/pull/1627
-CVE-2021-29622
-	RESERVED
+CVE-2021-29622 (Prometheus is an open-source monitoring system and time series databas ...)
 	- prometheus <not-affected> (Vulnerable code disabled in Debian packaging)
 	NOTE: https://www.openwall.com/lists/oss-security/2021/05/19/1
 	NOTE: https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7
@@ -8604,8 +9149,8 @@ CVE-2021-29505
 	RESERVED
 CVE-2021-29504
 	RESERVED
-CVE-2021-29503
-	RESERVED
+CVE-2021-29503 (HedgeDoc is a platform to write and share markdown. HedgeDoc before ve ...)
+	TODO: check
 CVE-2021-29502 (WarnSystem is a cog (plugin) for the Red discord bot. A vulnerability  ...)
 	NOT-FOR-US: Red discord bot addon
 CVE-2021-29501 (Ticketer is a command based ticket system cog (plugin) for the red dis ...)
@@ -30583,14 +31128,14 @@ CVE-2021-20723
 	RESERVED
 CVE-2021-20722
 	RESERVED
-CVE-2021-20721
-	RESERVED
-CVE-2021-20720
-	RESERVED
-CVE-2021-20719
-	RESERVED
-CVE-2021-20718
-	RESERVED
+CVE-2021-20721 (KonaWiki2 versions prior to 2.2.4 allows a remote attacker to upload a ...)
+	TODO: check
+CVE-2021-20720 (SQL injection vulnerability in the KonaWiki2 versions prior to 2.2.4 a ...)
+	TODO: check
+CVE-2021-20719 (RFNTPS firmware versions System_01000004 and earlier, and Web_01000004 ...)
+	TODO: check
+CVE-2021-20718 (mod_auth_openidc 2.4.0 to 2.4.7 allows a remote attacker to cause a de ...)
+	TODO: check
 CVE-2021-20717 (Cross-site scripting vulnerability in EC-CUBE 4.0.0 to 4.0.5 allows a  ...)
 	NOT-FOR-US: EC-CUBE
 CVE-2021-20716 (Hidden functionality in multiple Buffalo network devices (BHR-4RV firm ...)
@@ -30967,10 +31512,10 @@ CVE-2021-20531
 	RESERVED
 CVE-2021-20530
 	RESERVED
-CVE-2021-20529
-	RESERVED
-CVE-2021-20528
-	RESERVED
+CVE-2021-20529 (IBM Control Center 6.2.0.0 could allow a user to obtain sensitive vers ...)
+	TODO: check
+CVE-2021-20528 (IBM Control Center 6.2.0.0 is vulnerable to cross-site scripting. This ...)
+	TODO: check
 CVE-2021-20527 (IBM Resilient SOAR V38.0 could allow a privileged user to create creat ...)
 	NOT-FOR-US: IBM
 CVE-2021-20526
@@ -31277,8 +31822,8 @@ CVE-2021-20376
 	RESERVED
 CVE-2021-20375
 	RESERVED
-CVE-2021-20374
-	RESERVED
+CVE-2021-20374 (IBM Maximo Asset Management 7.6.0 and 7.6.1 is vulnerable to stored cr ...)
+	TODO: check
 CVE-2021-20373
 	RESERVED
 CVE-2021-20372
@@ -99777,8 +100322,8 @@ CVE-2020-4767 (IBM Sterling Connect Direct for Microsoft Windows 4.7, 4.8, 6.0,
 	NOT-FOR-US: IBM
 CVE-2020-4766 (IBM MQ Internet Pass-Thru 2.1 and 9.2 could allow a remote user to cau ...)
 	NOT-FOR-US: IBM
-CVE-2020-4765
-	RESERVED
+CVE-2020-4765 (IBM Cloud Pak for Multicloud Management prior to 2.3 allows web pages  ...)
+	TODO: check
 CVE-2020-4764 (IBM Planning Analytics 2.0 is vulnerable to cross-site request forgery ...)
 	NOT-FOR-US: IBM
 CVE-2020-4763 (IBM Sterling File Gateway 6.0.0.0 through 6.0.3.2 and 2.2.0.0 through  ...)
@@ -100015,8 +100560,8 @@ CVE-2020-4648 (A vulnerability exsists in IBM Planning Analytics 2.0 whereby ava
 	NOT-FOR-US: IBM
 CVE-2020-4647 (IBM Sterling File Gateway 2.2.0.0 through 2.2.6.5 and 6.0.0.0 through  ...)
 	NOT-FOR-US: IBM
-CVE-2020-4646
-	RESERVED
+CVE-2020-4646 (IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5,  ...)
+	TODO: check
 CVE-2020-4645 (IBM Planning Analytics Local 2.0.0 through 2.0.9.1 is vulnerable to cr ...)
 	NOT-FOR-US: IBM
 CVE-2020-4644 (IBM Planning Analytics Local 2.0.0 through 2.0.9.1 could allow a remot ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b0f6f400139aa9b0875e1fe441c7d1722c72ab2e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b0f6f400139aa9b0875e1fe441c7d1722c72ab2e
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210520/08299fcc/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list