[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu May 20 09:10:32 BST 2021
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
b0f6f400 by security tracker role at 2021-05-20T08:10:23+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,549 @@
+CVE-2021-3560
+ RESERVED
+CVE-2021-33476
+ RESERVED
+CVE-2021-33475
+ RESERVED
+CVE-2021-33474
+ RESERVED
+CVE-2021-33473
+ RESERVED
+CVE-2021-33472
+ RESERVED
+CVE-2021-33471
+ RESERVED
+CVE-2021-33470
+ RESERVED
+CVE-2021-33469
+ RESERVED
+CVE-2021-33468
+ RESERVED
+CVE-2021-33467
+ RESERVED
+CVE-2021-33466
+ RESERVED
+CVE-2021-33465
+ RESERVED
+CVE-2021-33464
+ RESERVED
+CVE-2021-33463
+ RESERVED
+CVE-2021-33462
+ RESERVED
+CVE-2021-33461
+ RESERVED
+CVE-2021-33460
+ RESERVED
+CVE-2021-33459
+ RESERVED
+CVE-2021-33458
+ RESERVED
+CVE-2021-33457
+ RESERVED
+CVE-2021-33456
+ RESERVED
+CVE-2021-33455
+ RESERVED
+CVE-2021-33454
+ RESERVED
+CVE-2021-33453
+ RESERVED
+CVE-2021-33452
+ RESERVED
+CVE-2021-33451
+ RESERVED
+CVE-2021-33450
+ RESERVED
+CVE-2021-33449
+ RESERVED
+CVE-2021-33448
+ RESERVED
+CVE-2021-33447
+ RESERVED
+CVE-2021-33446
+ RESERVED
+CVE-2021-33445
+ RESERVED
+CVE-2021-33444
+ RESERVED
+CVE-2021-33443
+ RESERVED
+CVE-2021-33442
+ RESERVED
+CVE-2021-33441
+ RESERVED
+CVE-2021-33440
+ RESERVED
+CVE-2021-33439
+ RESERVED
+CVE-2021-33438
+ RESERVED
+CVE-2021-33437
+ RESERVED
+CVE-2021-33436
+ RESERVED
+CVE-2021-33435
+ RESERVED
+CVE-2021-33434
+ RESERVED
+CVE-2021-33433
+ RESERVED
+CVE-2021-33432
+ RESERVED
+CVE-2021-33431
+ RESERVED
+CVE-2021-33430
+ RESERVED
+CVE-2021-33429
+ RESERVED
+CVE-2021-33428
+ RESERVED
+CVE-2021-33427
+ RESERVED
+CVE-2021-33426
+ RESERVED
+CVE-2021-33425
+ RESERVED
+CVE-2021-33424
+ RESERVED
+CVE-2021-33423
+ RESERVED
+CVE-2021-33422
+ RESERVED
+CVE-2021-33421
+ RESERVED
+CVE-2021-33420
+ RESERVED
+CVE-2021-33419
+ RESERVED
+CVE-2021-33418
+ RESERVED
+CVE-2021-33417
+ RESERVED
+CVE-2021-33416
+ RESERVED
+CVE-2021-33415
+ RESERVED
+CVE-2021-33414
+ RESERVED
+CVE-2021-33413
+ RESERVED
+CVE-2021-33412
+ RESERVED
+CVE-2021-33411
+ RESERVED
+CVE-2021-33410
+ RESERVED
+CVE-2021-33409
+ RESERVED
+CVE-2021-33408
+ RESERVED
+CVE-2021-33407
+ RESERVED
+CVE-2021-33406
+ RESERVED
+CVE-2021-33405
+ RESERVED
+CVE-2021-33404
+ RESERVED
+CVE-2021-33403
+ RESERVED
+CVE-2021-33402
+ RESERVED
+CVE-2021-33401
+ RESERVED
+CVE-2021-33400
+ RESERVED
+CVE-2021-33399
+ RESERVED
+CVE-2021-33398
+ RESERVED
+CVE-2021-33397
+ RESERVED
+CVE-2021-33396
+ RESERVED
+CVE-2021-33395
+ RESERVED
+CVE-2021-33394
+ RESERVED
+CVE-2021-33393
+ RESERVED
+CVE-2021-33392
+ RESERVED
+CVE-2021-33391
+ RESERVED
+CVE-2021-33390
+ RESERVED
+CVE-2021-33389
+ RESERVED
+CVE-2021-33388
+ RESERVED
+CVE-2021-33387
+ RESERVED
+CVE-2021-33386
+ RESERVED
+CVE-2021-33385
+ RESERVED
+CVE-2021-33384
+ RESERVED
+CVE-2021-33383
+ RESERVED
+CVE-2021-33382
+ RESERVED
+CVE-2021-33381
+ RESERVED
+CVE-2021-33380
+ RESERVED
+CVE-2021-33379
+ RESERVED
+CVE-2021-33378
+ RESERVED
+CVE-2021-33377
+ RESERVED
+CVE-2021-33376
+ RESERVED
+CVE-2021-33375
+ RESERVED
+CVE-2021-33374
+ RESERVED
+CVE-2021-33373
+ RESERVED
+CVE-2021-33372
+ RESERVED
+CVE-2021-33371
+ RESERVED
+CVE-2021-33370
+ RESERVED
+CVE-2021-33369
+ RESERVED
+CVE-2021-33368
+ RESERVED
+CVE-2021-33367
+ RESERVED
+CVE-2021-33366
+ RESERVED
+CVE-2021-33365
+ RESERVED
+CVE-2021-33364
+ RESERVED
+CVE-2021-33363
+ RESERVED
+CVE-2021-33362
+ RESERVED
+CVE-2021-33361
+ RESERVED
+CVE-2021-33360
+ RESERVED
+CVE-2021-33359
+ RESERVED
+CVE-2021-33358
+ RESERVED
+CVE-2021-33357
+ RESERVED
+CVE-2021-33356
+ RESERVED
+CVE-2021-33355
+ RESERVED
+CVE-2021-33354
+ RESERVED
+CVE-2021-33353
+ RESERVED
+CVE-2021-33352
+ RESERVED
+CVE-2021-33351
+ RESERVED
+CVE-2021-33350
+ RESERVED
+CVE-2021-33349
+ RESERVED
+CVE-2021-33348
+ RESERVED
+CVE-2021-33347
+ RESERVED
+CVE-2021-33346
+ RESERVED
+CVE-2021-33345
+ RESERVED
+CVE-2021-33344
+ RESERVED
+CVE-2021-33343
+ RESERVED
+CVE-2021-33342
+ RESERVED
+CVE-2021-33341
+ RESERVED
+CVE-2021-33340
+ RESERVED
+CVE-2021-33339
+ RESERVED
+CVE-2021-33338
+ RESERVED
+CVE-2021-33337
+ RESERVED
+CVE-2021-33336
+ RESERVED
+CVE-2021-33335
+ RESERVED
+CVE-2021-33334
+ RESERVED
+CVE-2021-33333
+ RESERVED
+CVE-2021-33332
+ RESERVED
+CVE-2021-33331
+ RESERVED
+CVE-2021-33330
+ RESERVED
+CVE-2021-33329
+ RESERVED
+CVE-2021-33328
+ RESERVED
+CVE-2021-33327
+ RESERVED
+CVE-2021-33326
+ RESERVED
+CVE-2021-33325
+ RESERVED
+CVE-2021-33324
+ RESERVED
+CVE-2021-33323
+ RESERVED
+CVE-2021-33322
+ RESERVED
+CVE-2021-33321
+ RESERVED
+CVE-2021-33320
+ RESERVED
+CVE-2021-33319
+ RESERVED
+CVE-2021-33318
+ RESERVED
+CVE-2021-33317
+ RESERVED
+CVE-2021-33316
+ RESERVED
+CVE-2021-33315
+ RESERVED
+CVE-2021-33314
+ RESERVED
+CVE-2021-33313
+ RESERVED
+CVE-2021-33312
+ RESERVED
+CVE-2021-33311
+ RESERVED
+CVE-2021-33310
+ RESERVED
+CVE-2021-33309
+ RESERVED
+CVE-2021-33308
+ RESERVED
+CVE-2021-33307
+ RESERVED
+CVE-2021-33306
+ RESERVED
+CVE-2021-33305
+ RESERVED
+CVE-2021-33304
+ RESERVED
+CVE-2021-33303
+ RESERVED
+CVE-2021-33302
+ RESERVED
+CVE-2021-33301
+ RESERVED
+CVE-2021-33300
+ RESERVED
+CVE-2021-33299
+ RESERVED
+CVE-2021-33298
+ RESERVED
+CVE-2021-33297
+ RESERVED
+CVE-2021-33296
+ RESERVED
+CVE-2021-33295
+ RESERVED
+CVE-2021-33294
+ RESERVED
+CVE-2021-33293
+ RESERVED
+CVE-2021-33292
+ RESERVED
+CVE-2021-33291
+ RESERVED
+CVE-2021-33290
+ RESERVED
+CVE-2021-33289
+ RESERVED
+CVE-2021-33288
+ RESERVED
+CVE-2021-33287
+ RESERVED
+CVE-2021-33286
+ RESERVED
+CVE-2021-33285
+ RESERVED
+CVE-2021-33284
+ RESERVED
+CVE-2021-33283
+ RESERVED
+CVE-2021-33282
+ RESERVED
+CVE-2021-33281
+ RESERVED
+CVE-2021-33280
+ RESERVED
+CVE-2021-33279
+ RESERVED
+CVE-2021-33278
+ RESERVED
+CVE-2021-33277
+ RESERVED
+CVE-2021-33276
+ RESERVED
+CVE-2021-33275
+ RESERVED
+CVE-2021-33274
+ RESERVED
+CVE-2021-33273
+ RESERVED
+CVE-2021-33272
+ RESERVED
+CVE-2021-33271
+ RESERVED
+CVE-2021-33270
+ RESERVED
+CVE-2021-33269
+ RESERVED
+CVE-2021-33268
+ RESERVED
+CVE-2021-33267
+ RESERVED
+CVE-2021-33266
+ RESERVED
+CVE-2021-33265
+ RESERVED
+CVE-2021-33264
+ RESERVED
+CVE-2021-33263
+ RESERVED
+CVE-2021-33262
+ RESERVED
+CVE-2021-33261
+ RESERVED
+CVE-2021-33260
+ RESERVED
+CVE-2021-33259
+ RESERVED
+CVE-2021-33258
+ RESERVED
+CVE-2021-33257
+ RESERVED
+CVE-2021-33256
+ RESERVED
+CVE-2021-33255
+ RESERVED
+CVE-2021-33254
+ RESERVED
+CVE-2021-33253
+ RESERVED
+CVE-2021-33252
+ RESERVED
+CVE-2021-33251
+ RESERVED
+CVE-2021-33250
+ RESERVED
+CVE-2021-33249
+ RESERVED
+CVE-2021-33248
+ RESERVED
+CVE-2021-33247
+ RESERVED
+CVE-2021-33246
+ RESERVED
+CVE-2021-33245
+ RESERVED
+CVE-2021-33244
+ RESERVED
+CVE-2021-33243
+ RESERVED
+CVE-2021-33242
+ RESERVED
+CVE-2021-33241
+ RESERVED
+CVE-2021-33240
+ RESERVED
+CVE-2021-33239
+ RESERVED
+CVE-2021-33238
+ RESERVED
+CVE-2021-33237
+ RESERVED
+CVE-2021-33236
+ RESERVED
+CVE-2021-33235
+ RESERVED
+CVE-2021-33234
+ RESERVED
+CVE-2021-33233
+ RESERVED
+CVE-2021-33232
+ RESERVED
+CVE-2021-33231
+ RESERVED
+CVE-2021-33230
+ RESERVED
+CVE-2021-33229
+ RESERVED
+CVE-2021-33228
+ RESERVED
+CVE-2021-33227
+ RESERVED
+CVE-2021-33226
+ RESERVED
+CVE-2021-33225
+ RESERVED
+CVE-2021-33224
+ RESERVED
+CVE-2021-33223
+ RESERVED
+CVE-2021-33222
+ RESERVED
+CVE-2021-33221
+ RESERVED
+CVE-2021-33220
+ RESERVED
+CVE-2021-33219
+ RESERVED
+CVE-2021-33218
+ RESERVED
+CVE-2021-33217
+ RESERVED
+CVE-2021-33216
+ RESERVED
+CVE-2021-33215
+ RESERVED
+CVE-2021-33214
+ RESERVED
+CVE-2021-33213
+ RESERVED
+CVE-2021-33212
+ RESERVED
+CVE-2021-33211
+ RESERVED
+CVE-2021-33210
+ RESERVED
+CVE-2021-33209
+ RESERVED
+CVE-2021-33208
+ RESERVED
+CVE-2021-33207
+ RESERVED
+CVE-2021-33206
+ RESERVED
+CVE-2021-33205
+ RESERVED
CVE-2021-3559 [nodedev-list command may cause libvirt to crash on hosts with GRID driver installed]
RESERVED
- libvirt <not-affected> (Vulnerable code never in a released version)
@@ -8346,16 +8892,15 @@ CVE-2021-29627 (In FreeBSD 13.0-STABLE before n245050, 12.2-STABLE before r36952
NOT-FOR-US: FreeBSD
CVE-2021-29626 (In FreeBSD 13.0-STABLE before n245117, 12.2-STABLE before r369551, 11. ...)
- kfreebsd-10 <unfixed> (unimportant)
-CVE-2021-29625
- RESERVED
-CVE-2021-29624
- RESERVED
+CVE-2021-29625 (Adminer is open-source database management software. A cross-site scri ...)
+ TODO: check
+CVE-2021-29624 (fastify-csrf is an open-source plugin helps developers protect their F ...)
+ TODO: check
CVE-2021-29623 (Exiv2 is a C++ library and a command-line utility to read, write, dele ...)
- exiv2 <unfixed> (bug #988481)
NOTE: https://github.com/Exiv2/exiv2/security/advisories/GHSA-6253-qjwm-3q4v
NOTE: https://github.com/Exiv2/exiv2/pull/1627
-CVE-2021-29622
- RESERVED
+CVE-2021-29622 (Prometheus is an open-source monitoring system and time series databas ...)
- prometheus <not-affected> (Vulnerable code disabled in Debian packaging)
NOTE: https://www.openwall.com/lists/oss-security/2021/05/19/1
NOTE: https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7
@@ -8604,8 +9149,8 @@ CVE-2021-29505
RESERVED
CVE-2021-29504
RESERVED
-CVE-2021-29503
- RESERVED
+CVE-2021-29503 (HedgeDoc is a platform to write and share markdown. HedgeDoc before ve ...)
+ TODO: check
CVE-2021-29502 (WarnSystem is a cog (plugin) for the Red discord bot. A vulnerability ...)
NOT-FOR-US: Red discord bot addon
CVE-2021-29501 (Ticketer is a command based ticket system cog (plugin) for the red dis ...)
@@ -30583,14 +31128,14 @@ CVE-2021-20723
RESERVED
CVE-2021-20722
RESERVED
-CVE-2021-20721
- RESERVED
-CVE-2021-20720
- RESERVED
-CVE-2021-20719
- RESERVED
-CVE-2021-20718
- RESERVED
+CVE-2021-20721 (KonaWiki2 versions prior to 2.2.4 allows a remote attacker to upload a ...)
+ TODO: check
+CVE-2021-20720 (SQL injection vulnerability in the KonaWiki2 versions prior to 2.2.4 a ...)
+ TODO: check
+CVE-2021-20719 (RFNTPS firmware versions System_01000004 and earlier, and Web_01000004 ...)
+ TODO: check
+CVE-2021-20718 (mod_auth_openidc 2.4.0 to 2.4.7 allows a remote attacker to cause a de ...)
+ TODO: check
CVE-2021-20717 (Cross-site scripting vulnerability in EC-CUBE 4.0.0 to 4.0.5 allows a ...)
NOT-FOR-US: EC-CUBE
CVE-2021-20716 (Hidden functionality in multiple Buffalo network devices (BHR-4RV firm ...)
@@ -30967,10 +31512,10 @@ CVE-2021-20531
RESERVED
CVE-2021-20530
RESERVED
-CVE-2021-20529
- RESERVED
-CVE-2021-20528
- RESERVED
+CVE-2021-20529 (IBM Control Center 6.2.0.0 could allow a user to obtain sensitive vers ...)
+ TODO: check
+CVE-2021-20528 (IBM Control Center 6.2.0.0 is vulnerable to cross-site scripting. This ...)
+ TODO: check
CVE-2021-20527 (IBM Resilient SOAR V38.0 could allow a privileged user to create creat ...)
NOT-FOR-US: IBM
CVE-2021-20526
@@ -31277,8 +31822,8 @@ CVE-2021-20376
RESERVED
CVE-2021-20375
RESERVED
-CVE-2021-20374
- RESERVED
+CVE-2021-20374 (IBM Maximo Asset Management 7.6.0 and 7.6.1 is vulnerable to stored cr ...)
+ TODO: check
CVE-2021-20373
RESERVED
CVE-2021-20372
@@ -99777,8 +100322,8 @@ CVE-2020-4767 (IBM Sterling Connect Direct for Microsoft Windows 4.7, 4.8, 6.0,
NOT-FOR-US: IBM
CVE-2020-4766 (IBM MQ Internet Pass-Thru 2.1 and 9.2 could allow a remote user to cau ...)
NOT-FOR-US: IBM
-CVE-2020-4765
- RESERVED
+CVE-2020-4765 (IBM Cloud Pak for Multicloud Management prior to 2.3 allows web pages ...)
+ TODO: check
CVE-2020-4764 (IBM Planning Analytics 2.0 is vulnerable to cross-site request forgery ...)
NOT-FOR-US: IBM
CVE-2020-4763 (IBM Sterling File Gateway 6.0.0.0 through 6.0.3.2 and 2.2.0.0 through ...)
@@ -100015,8 +100560,8 @@ CVE-2020-4648 (A vulnerability exsists in IBM Planning Analytics 2.0 whereby ava
NOT-FOR-US: IBM
CVE-2020-4647 (IBM Sterling File Gateway 2.2.0.0 through 2.2.6.5 and 6.0.0.0 through ...)
NOT-FOR-US: IBM
-CVE-2020-4646
- RESERVED
+CVE-2020-4646 (IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5, ...)
+ TODO: check
CVE-2020-4645 (IBM Planning Analytics Local 2.0.0 through 2.0.9.1 is vulnerable to cr ...)
NOT-FOR-US: IBM
CVE-2020-4644 (IBM Planning Analytics Local 2.0.0 through 2.0.9.1 could allow a remot ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b0f6f400139aa9b0875e1fe441c7d1722c72ab2e
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b0f6f400139aa9b0875e1fe441c7d1722c72ab2e
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210520/08299fcc/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list