Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: b0f6f400 by security tracker role at 2021-05-20T08:10:23+00:00 automatic update - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,3 +1,549 @@ +CVE-2021-3560 + RESERVED +CVE-2021-33476 + RESERVED +CVE-2021-33475 + RESERVED +CVE-2021-33474 + RESERVED +CVE-2021-33473 + RESERVED +CVE-2021-33472 + RESERVED +CVE-2021-33471 + RESERVED +CVE-2021-33470 + RESERVED +CVE-2021-33469 + RESERVED +CVE-2021-33468 + RESERVED +CVE-2021-33467 + RESERVED +CVE-2021-33466 + RESERVED +CVE-2021-33465 + RESERVED +CVE-2021-33464 + RESERVED +CVE-2021-33463 + RESERVED +CVE-2021-33462 + RESERVED +CVE-2021-33461 + RESERVED +CVE-2021-33460 + RESERVED +CVE-2021-33459 + RESERVED +CVE-2021-33458 + RESERVED +CVE-2021-33457 + RESERVED +CVE-2021-33456 + RESERVED +CVE-2021-33455 + RESERVED +CVE-2021-33454 + RESERVED +CVE-2021-33453 + RESERVED +CVE-2021-33452 + RESERVED +CVE-2021-33451 + RESERVED +CVE-2021-33450 + RESERVED +CVE-2021-33449 + RESERVED +CVE-2021-33448 + RESERVED +CVE-2021-33447 + RESERVED +CVE-2021-33446 + RESERVED +CVE-2021-33445 + RESERVED +CVE-2021-33444 + RESERVED +CVE-2021-33443 + RESERVED +CVE-2021-33442 + RESERVED +CVE-2021-33441 + RESERVED +CVE-2021-33440 + RESERVED +CVE-2021-33439 + RESERVED +CVE-2021-33438 + RESERVED +CVE-2021-33437 + RESERVED +CVE-2021-33436 + RESERVED +CVE-2021-33435 + RESERVED +CVE-2021-33434 + RESERVED +CVE-2021-33433 + RESERVED +CVE-2021-33432 + RESERVED +CVE-2021-33431 + RESERVED +CVE-2021-33430 + RESERVED +CVE-2021-33429 + RESERVED +CVE-2021-33428 + RESERVED +CVE-2021-33427 + RESERVED +CVE-2021-33426 + RESERVED +CVE-2021-33425 + RESERVED +CVE-2021-33424 + RESERVED +CVE-2021-33423 + RESERVED +CVE-2021-33422 + RESERVED +CVE-2021-33421 + RESERVED +CVE-2021-33420 + RESERVED +CVE-2021-33419 + RESERVED +CVE-2021-33418 + RESERVED +CVE-2021-33417 + RESERVED +CVE-2021-33416 + RESERVED +CVE-2021-33415 + RESERVED +CVE-2021-33414 + RESERVED +CVE-2021-33413 + RESERVED +CVE-2021-33412 + RESERVED +CVE-2021-33411 + RESERVED +CVE-2021-33410 + RESERVED +CVE-2021-33409 + RESERVED +CVE-2021-33408 + RESERVED +CVE-2021-33407 + RESERVED +CVE-2021-33406 + RESERVED +CVE-2021-33405 + RESERVED +CVE-2021-33404 + RESERVED +CVE-2021-33403 + RESERVED +CVE-2021-33402 + RESERVED +CVE-2021-33401 + RESERVED +CVE-2021-33400 + RESERVED +CVE-2021-33399 + RESERVED +CVE-2021-33398 + RESERVED +CVE-2021-33397 + RESERVED +CVE-2021-33396 + RESERVED +CVE-2021-33395 + RESERVED +CVE-2021-33394 + RESERVED +CVE-2021-33393 + RESERVED +CVE-2021-33392 + RESERVED +CVE-2021-33391 + RESERVED +CVE-2021-33390 + RESERVED +CVE-2021-33389 + RESERVED +CVE-2021-33388 + RESERVED +CVE-2021-33387 + RESERVED +CVE-2021-33386 + RESERVED +CVE-2021-33385 + RESERVED +CVE-2021-33384 + RESERVED +CVE-2021-33383 + RESERVED +CVE-2021-33382 + RESERVED +CVE-2021-33381 + RESERVED +CVE-2021-33380 + RESERVED +CVE-2021-33379 + RESERVED +CVE-2021-33378 + RESERVED +CVE-2021-33377 + RESERVED +CVE-2021-33376 + RESERVED +CVE-2021-33375 + RESERVED +CVE-2021-33374 + RESERVED +CVE-2021-33373 + RESERVED +CVE-2021-33372 + RESERVED +CVE-2021-33371 + RESERVED +CVE-2021-33370 + RESERVED +CVE-2021-33369 + RESERVED +CVE-2021-33368 + RESERVED +CVE-2021-33367 + RESERVED +CVE-2021-33366 + RESERVED +CVE-2021-33365 + RESERVED +CVE-2021-33364 + RESERVED +CVE-2021-33363 + RESERVED +CVE-2021-33362 + RESERVED +CVE-2021-33361 + RESERVED +CVE-2021-33360 + RESERVED +CVE-2021-33359 + RESERVED +CVE-2021-33358 + RESERVED +CVE-2021-33357 + RESERVED +CVE-2021-33356 + RESERVED +CVE-2021-33355 + RESERVED +CVE-2021-33354 + RESERVED +CVE-2021-33353 + RESERVED +CVE-2021-33352 + RESERVED +CVE-2021-33351 + RESERVED +CVE-2021-33350 + RESERVED +CVE-2021-33349 + RESERVED +CVE-2021-33348 + RESERVED +CVE-2021-33347 + RESERVED +CVE-2021-33346 + RESERVED +CVE-2021-33345 + RESERVED +CVE-2021-33344 + RESERVED +CVE-2021-33343 + RESERVED +CVE-2021-33342 + RESERVED +CVE-2021-33341 + RESERVED +CVE-2021-33340 + RESERVED +CVE-2021-33339 + RESERVED +CVE-2021-33338 + RESERVED +CVE-2021-33337 + RESERVED +CVE-2021-33336 + RESERVED +CVE-2021-33335 + RESERVED +CVE-2021-33334 + RESERVED +CVE-2021-33333 + RESERVED +CVE-2021-33332 + RESERVED +CVE-2021-33331 + RESERVED +CVE-2021-33330 + RESERVED +CVE-2021-33329 + RESERVED +CVE-2021-33328 + RESERVED +CVE-2021-33327 + RESERVED +CVE-2021-33326 + RESERVED +CVE-2021-33325 + RESERVED +CVE-2021-33324 + RESERVED +CVE-2021-33323 + RESERVED +CVE-2021-33322 + RESERVED +CVE-2021-33321 + RESERVED +CVE-2021-33320 + RESERVED +CVE-2021-33319 + RESERVED +CVE-2021-33318 + RESERVED +CVE-2021-33317 + RESERVED +CVE-2021-33316 + RESERVED +CVE-2021-33315 + RESERVED +CVE-2021-33314 + RESERVED +CVE-2021-33313 + RESERVED +CVE-2021-33312 + RESERVED +CVE-2021-33311 + RESERVED +CVE-2021-33310 + RESERVED +CVE-2021-33309 + RESERVED +CVE-2021-33308 + RESERVED +CVE-2021-33307 + RESERVED +CVE-2021-33306 + RESERVED +CVE-2021-33305 + RESERVED +CVE-2021-33304 + RESERVED +CVE-2021-33303 + RESERVED +CVE-2021-33302 + RESERVED +CVE-2021-33301 + RESERVED +CVE-2021-33300 + RESERVED +CVE-2021-33299 + RESERVED +CVE-2021-33298 + RESERVED +CVE-2021-33297 + RESERVED +CVE-2021-33296 + RESERVED +CVE-2021-33295 + RESERVED +CVE-2021-33294 + RESERVED +CVE-2021-33293 + RESERVED +CVE-2021-33292 + RESERVED +CVE-2021-33291 + RESERVED +CVE-2021-33290 + RESERVED +CVE-2021-33289 + RESERVED +CVE-2021-33288 + RESERVED +CVE-2021-33287 + RESERVED +CVE-2021-33286 + RESERVED +CVE-2021-33285 + RESERVED +CVE-2021-33284 + RESERVED +CVE-2021-33283 + RESERVED +CVE-2021-33282 + RESERVED +CVE-2021-33281 + RESERVED +CVE-2021-33280 + RESERVED +CVE-2021-33279 + RESERVED +CVE-2021-33278 + RESERVED +CVE-2021-33277 + RESERVED +CVE-2021-33276 + RESERVED +CVE-2021-33275 + RESERVED +CVE-2021-33274 + RESERVED +CVE-2021-33273 + RESERVED +CVE-2021-33272 + RESERVED +CVE-2021-33271 + RESERVED +CVE-2021-33270 + RESERVED +CVE-2021-33269 + RESERVED +CVE-2021-33268 + RESERVED +CVE-2021-33267 + RESERVED +CVE-2021-33266 + RESERVED +CVE-2021-33265 + RESERVED +CVE-2021-33264 + RESERVED +CVE-2021-33263 + RESERVED +CVE-2021-33262 + RESERVED +CVE-2021-33261 + RESERVED +CVE-2021-33260 + RESERVED +CVE-2021-33259 + RESERVED +CVE-2021-33258 + RESERVED +CVE-2021-33257 + RESERVED +CVE-2021-33256 + RESERVED +CVE-2021-33255 + RESERVED +CVE-2021-33254 + RESERVED +CVE-2021-33253 + RESERVED +CVE-2021-33252 + RESERVED +CVE-2021-33251 + RESERVED +CVE-2021-33250 + RESERVED +CVE-2021-33249 + RESERVED +CVE-2021-33248 + RESERVED +CVE-2021-33247 + RESERVED +CVE-2021-33246 + RESERVED +CVE-2021-33245 + RESERVED +CVE-2021-33244 + RESERVED +CVE-2021-33243 + RESERVED +CVE-2021-33242 + RESERVED +CVE-2021-33241 + RESERVED +CVE-2021-33240 + RESERVED +CVE-2021-33239 + RESERVED +CVE-2021-33238 + RESERVED +CVE-2021-33237 + RESERVED +CVE-2021-33236 + RESERVED +CVE-2021-33235 + RESERVED +CVE-2021-33234 + RESERVED +CVE-2021-33233 + RESERVED +CVE-2021-33232 + RESERVED +CVE-2021-33231 + RESERVED +CVE-2021-33230 + RESERVED +CVE-2021-33229 + RESERVED +CVE-2021-33228 + RESERVED +CVE-2021-33227 + RESERVED +CVE-2021-33226 + RESERVED +CVE-2021-33225 + RESERVED +CVE-2021-33224 + RESERVED +CVE-2021-33223 + RESERVED +CVE-2021-33222 + RESERVED +CVE-2021-33221 + RESERVED +CVE-2021-33220 + RESERVED +CVE-2021-33219 + RESERVED +CVE-2021-33218 + RESERVED +CVE-2021-33217 + RESERVED +CVE-2021-33216 + RESERVED +CVE-2021-33215 + RESERVED +CVE-2021-33214 + RESERVED +CVE-2021-33213 + RESERVED +CVE-2021-33212 + RESERVED +CVE-2021-33211 + RESERVED +CVE-2021-33210 + RESERVED +CVE-2021-33209 + RESERVED +CVE-2021-33208 + RESERVED +CVE-2021-33207 + RESERVED +CVE-2021-33206 + RESERVED +CVE-2021-33205 + RESERVED CVE-2021-3559 [nodedev-list command may cause libvirt to crash on hosts with GRID driver installed] RESERVED - libvirt <not-affected> (Vulnerable code never in a released version) @@ -8346,16 +8892,15 @@ CVE-2021-29627 (In FreeBSD 13.0-STABLE before n245050, 12.2-STABLE before r36952 NOT-FOR-US: FreeBSD CVE-2021-29626 (In FreeBSD 13.0-STABLE before n245117, 12.2-STABLE before r369551, 11. ...) - kfreebsd-10 <unfixed> (unimportant) -CVE-2021-29625 - RESERVED -CVE-2021-29624 - RESERVED +CVE-2021-29625 (Adminer is open-source database management software. A cross-site scri ...) + TODO: check +CVE-2021-29624 (fastify-csrf is an open-source plugin helps developers protect their F ...) + TODO: check CVE-2021-29623 (Exiv2 is a C++ library and a command-line utility to read, write, dele ...) - exiv2 <unfixed> (bug #988481) NOTE: https://github.com/Exiv2/exiv2/security/advisories/GHSA-6253-qjwm-3q4v NOTE: https://github.com/Exiv2/exiv2/pull/1627 -CVE-2021-29622 - RESERVED +CVE-2021-29622 (Prometheus is an open-source monitoring system and time series databas ...) - prometheus <not-affected> (Vulnerable code disabled in Debian packaging) NOTE: https://www.openwall.com/lists/oss-security/2021/05/19/1 NOTE: https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7 @@ -8604,8 +9149,8 @@ CVE-2021-29505 RESERVED CVE-2021-29504 RESERVED -CVE-2021-29503 - RESERVED +CVE-2021-29503 (HedgeDoc is a platform to write and share markdown. HedgeDoc before ve ...) + TODO: check CVE-2021-29502 (WarnSystem is a cog (plugin) for the Red discord bot. A vulnerability ...) NOT-FOR-US: Red discord bot addon CVE-2021-29501 (Ticketer is a command based ticket system cog (plugin) for the red dis ...) @@ -30583,14 +31128,14 @@ CVE-2021-20723 RESERVED CVE-2021-20722 RESERVED -CVE-2021-20721 - RESERVED -CVE-2021-20720 - RESERVED -CVE-2021-20719 - RESERVED -CVE-2021-20718 - RESERVED +CVE-2021-20721 (KonaWiki2 versions prior to 2.2.4 allows a remote attacker to upload a ...) + TODO: check +CVE-2021-20720 (SQL injection vulnerability in the KonaWiki2 versions prior to 2.2.4 a ...) + TODO: check +CVE-2021-20719 (RFNTPS firmware versions System_01000004 and earlier, and Web_01000004 ...) + TODO: check +CVE-2021-20718 (mod_auth_openidc 2.4.0 to 2.4.7 allows a remote attacker to cause a de ...) + TODO: check CVE-2021-20717 (Cross-site scripting vulnerability in EC-CUBE 4.0.0 to 4.0.5 allows a ...) NOT-FOR-US: EC-CUBE CVE-2021-20716 (Hidden functionality in multiple Buffalo network devices (BHR-4RV firm ...) @@ -30967,10 +31512,10 @@ CVE-2021-20531 RESERVED CVE-2021-20530 RESERVED -CVE-2021-20529 - RESERVED -CVE-2021-20528 - RESERVED +CVE-2021-20529 (IBM Control Center 6.2.0.0 could allow a user to obtain sensitive vers ...) + TODO: check +CVE-2021-20528 (IBM Control Center 6.2.0.0 is vulnerable to cross-site scripting. This ...) + TODO: check CVE-2021-20527 (IBM Resilient SOAR V38.0 could allow a privileged user to create creat ...) NOT-FOR-US: IBM CVE-2021-20526 @@ -31277,8 +31822,8 @@ CVE-2021-20376 RESERVED CVE-2021-20375 RESERVED -CVE-2021-20374 - RESERVED +CVE-2021-20374 (IBM Maximo Asset Management 7.6.0 and 7.6.1 is vulnerable to stored cr ...) + TODO: check CVE-2021-20373 RESERVED CVE-2021-20372 @@ -99777,8 +100322,8 @@ CVE-2020-4767 (IBM Sterling Connect Direct for Microsoft Windows 4.7, 4.8, 6.0, NOT-FOR-US: IBM CVE-2020-4766 (IBM MQ Internet Pass-Thru 2.1 and 9.2 could allow a remote user to cau ...) NOT-FOR-US: IBM -CVE-2020-4765 - RESERVED +CVE-2020-4765 (IBM Cloud Pak for Multicloud Management prior to 2.3 allows web pages ...) + TODO: check CVE-2020-4764 (IBM Planning Analytics 2.0 is vulnerable to cross-site request forgery ...) NOT-FOR-US: IBM CVE-2020-4763 (IBM Sterling File Gateway 6.0.0.0 through 6.0.3.2 and 2.2.0.0 through ...) @@ -100015,8 +100560,8 @@ CVE-2020-4648 (A vulnerability exsists in IBM Planning Analytics 2.0 whereby ava NOT-FOR-US: IBM CVE-2020-4647 (IBM Sterling File Gateway 2.2.0.0 through 2.2.6.5 and 6.0.0.0 through ...) NOT-FOR-US: IBM -CVE-2020-4646 - RESERVED +CVE-2020-4646 (IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 5.2.6.5, ...) + TODO: check CVE-2020-4645 (IBM Planning Analytics Local 2.0.0 through 2.0.9.1 is vulnerable to cr ...) NOT-FOR-US: IBM CVE-2020-4644 (IBM Planning Analytics Local 2.0.0 through 2.0.9.1 could allow a remot ...) View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b0f6f400139aa9b0875e1fe441c7d1722c72ab2e -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b0f6f400139aa9b0875e1fe441c7d1722c72ab2e You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits