[Git][security-tracker-team/security-tracker][master] Process NFUs

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Oct 27 09:49:16 BST 2021



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
08ad23c6 by Salvatore Bonaccorso at 2021-10-27T10:48:55+02:00
Process NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -3874,7 +3874,7 @@ CVE-2021-41867 (An information disclosure vulnerability in OnionShare 2.3 before
 	- onionshare <undetermined>
 	TODO: check details, exact fixing commits unclear
 CVE-2021-41866 (MyBB before 1.8.28 allows stored XSS because the displayed Template Na ...)
-	TODO: check
+	NOT-FOR-US: MyBB
 CVE-2021-3853
 	RESERVED
 CVE-2021-3852
@@ -15128,25 +15128,25 @@ CVE-2021-37133
 CVE-2021-37132
 	RESERVED
 CVE-2021-37131 (There is a CSV injection vulnerability in ManageOne, iManager NetEco a ...)
-	TODO: check
+	NOT-FOR-US: Huawei
 CVE-2021-37130 (There is a path traversal vulnerability in Huawei FusionCube 6.0.2.The ...)
-	TODO: check
+	NOT-FOR-US: Huawei
 CVE-2021-37129 (There is an out of bounds write vulnerability in some Huawei products. ...)
-	TODO: check
+	NOT-FOR-US: Huawei
 CVE-2021-37128
 	RESERVED
 CVE-2021-37127 (There is a signature management vulnerability in some huawei products. ...)
-	TODO: check
+	NOT-FOR-US: Huawei
 CVE-2021-37126
 	RESERVED
 CVE-2021-37125
 	RESERVED
 CVE-2021-37124 (There is a path traversal vulnerability in Huawei PC product. Because  ...)
-	TODO: check
+	NOT-FOR-US: Huawei
 CVE-2021-37123 (There is an improper authentication vulnerability in Hero-CT060 before ...)
 	NOT-FOR-US: Hero-CT060
 CVE-2021-37122 (There is a use-after-free (UAF) vulnerability in Huawei products. An a ...)
-	TODO: check
+	NOT-FOR-US: Huawei
 CVE-2021-37121
 	RESERVED
 CVE-2021-37120
@@ -19596,7 +19596,7 @@ CVE-2021-35238 (User with Orion Platform Admin Rights could store XSS through UR
 CVE-2021-35237
 	RESERVED
 CVE-2021-35236 (The Secure flag is not set in the SSL Cookie of Kiwi Syslog Server 9.7 ...)
-	TODO: check
+	NOT-FOR-US: SolarWinds
 CVE-2021-35235 (The ASP.NET debug feature is enabled by default in Kiwi Syslog Server  ...)
 	TODO: check
 CVE-2021-35234
@@ -24981,7 +24981,7 @@ CVE-2021-32953
 CVE-2021-32952 (An out-of-bounds write issue exists in the DGN file-reading procedure  ...)
 	NOT-FOR-US: Open Design Alliance
 CVE-2021-32951 (WebAccess/NMS (Versions prior to v3.0.3_Build6299) has an improper aut ...)
-	TODO: check
+	NOT-FOR-US: WebAccess/NMS
 CVE-2021-32950 (An out-of-bounds read issue exists within the parsing of DXF files in  ...)
 	NOT-FOR-US: Open Design Alliance
 CVE-2021-32949
@@ -47791,7 +47791,7 @@ CVE-2021-23879 (Unquoted service path vulnerability in McAfee Endpoint Product R
 CVE-2021-23878 (Clear text storage of sensitive Information in memory vulnerability in ...)
 	NOT-FOR-US: McAfee
 CVE-2021-23877 (Privilege escalation vulnerability in the Windows trial installer of M ...)
-	TODO: check
+	NOT-FOR-US: McAfee
 CVE-2021-23876 (Bypass Remote Procedure call in McAfee Total Protection (MTP) prior to ...)
 	NOT-FOR-US: McAfee
 CVE-2021-23875
@@ -81104,7 +81104,7 @@ CVE-2020-22866
 CVE-2020-22865
 	RESERVED
 CVE-2020-22864 (A cross site scripting (XSS) vulnerability in the Insert Video functio ...)
-	TODO: check
+	NOT-FOR-US: Froala WYSIWYG Editor
 CVE-2020-22863
 	RESERVED
 CVE-2020-22862
@@ -118903,7 +118903,7 @@ CVE-2020-7869 (An improper input validation vulnerability of ZOOK software (remo
 CVE-2020-7868 (A remote code execution vulnerability exists in helpUS(remote administ ...)
 	NOT-FOR-US: helpUS(remote administration tool)
 CVE-2020-7867 (An improper input validation vulnerability in Helpu solution could all ...)
-	TODO: check
+	NOT-FOR-US: Helpu
 CVE-2020-7866 (When using XPLATFORM 9.2.2.270 or earlier versions ActiveX component,  ...)
 	NOT-FOR-US: XPLATFORM
 CVE-2020-7865 (A vulnerability(improper input validation) in the ExECM CoreB2B soluti ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/08ad23c63d78a81b5875e7638b49044f82fe56f9

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/08ad23c63d78a81b5875e7638b49044f82fe56f9
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20211027/27126ebf/attachment.htm>


More information about the debian-security-tracker-commits mailing list