Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b0f6f400 by security tracker role at 2021-05-20T08:10:23+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,549 @@
+CVE-2021-3560
+       RESERVED
+CVE-2021-33476
+       RESERVED
+CVE-2021-33475
+       RESERVED
+CVE-2021-33474
+       RESERVED
+CVE-2021-33473
+       RESERVED
+CVE-2021-33472
+       RESERVED
+CVE-2021-33471
+       RESERVED
+CVE-2021-33470
+       RESERVED
+CVE-2021-33469
+       RESERVED
+CVE-2021-33468
+       RESERVED
+CVE-2021-33467
+       RESERVED
+CVE-2021-33466
+       RESERVED
+CVE-2021-33465
+       RESERVED
+CVE-2021-33464
+       RESERVED
+CVE-2021-33463
+       RESERVED
+CVE-2021-33462
+       RESERVED
+CVE-2021-33461
+       RESERVED
+CVE-2021-33460
+       RESERVED
+CVE-2021-33459
+       RESERVED
+CVE-2021-33458
+       RESERVED
+CVE-2021-33457
+       RESERVED
+CVE-2021-33456
+       RESERVED
+CVE-2021-33455
+       RESERVED
+CVE-2021-33454
+       RESERVED
+CVE-2021-33453
+       RESERVED
+CVE-2021-33452
+       RESERVED
+CVE-2021-33451
+       RESERVED
+CVE-2021-33450
+       RESERVED
+CVE-2021-33449
+       RESERVED
+CVE-2021-33448
+       RESERVED
+CVE-2021-33447
+       RESERVED
+CVE-2021-33446
+       RESERVED
+CVE-2021-33445
+       RESERVED
+CVE-2021-33444
+       RESERVED
+CVE-2021-33443
+       RESERVED
+CVE-2021-33442
+       RESERVED
+CVE-2021-33441
+       RESERVED
+CVE-2021-33440
+       RESERVED
+CVE-2021-33439
+       RESERVED
+CVE-2021-33438
+       RESERVED
+CVE-2021-33437
+       RESERVED
+CVE-2021-33436
+       RESERVED
+CVE-2021-33435
+       RESERVED
+CVE-2021-33434
+       RESERVED
+CVE-2021-33433
+       RESERVED
+CVE-2021-33432
+       RESERVED
+CVE-2021-33431
+       RESERVED
+CVE-2021-33430
+       RESERVED
+CVE-2021-33429
+       RESERVED
+CVE-2021-33428
+       RESERVED
+CVE-2021-33427
+       RESERVED
+CVE-2021-33426
+       RESERVED
+CVE-2021-33425
+       RESERVED
+CVE-2021-33424
+       RESERVED
+CVE-2021-33423
+       RESERVED
+CVE-2021-33422
+       RESERVED
+CVE-2021-33421
+       RESERVED
+CVE-2021-33420
+       RESERVED
+CVE-2021-33419
+       RESERVED
+CVE-2021-33418
+       RESERVED
+CVE-2021-33417
+       RESERVED
+CVE-2021-33416
+       RESERVED
+CVE-2021-33415
+       RESERVED
+CVE-2021-33414
+       RESERVED
+CVE-2021-33413
+       RESERVED
+CVE-2021-33412
+       RESERVED
+CVE-2021-33411
+       RESERVED
+CVE-2021-33410
+       RESERVED
+CVE-2021-33409
+       RESERVED
+CVE-2021-33408
+       RESERVED
+CVE-2021-33407
+       RESERVED
+CVE-2021-33406
+       RESERVED
+CVE-2021-33405
+       RESERVED
+CVE-2021-33404
+       RESERVED
+CVE-2021-33403
+       RESERVED
+CVE-2021-33402
+       RESERVED
+CVE-2021-33401
+       RESERVED
+CVE-2021-33400
+       RESERVED
+CVE-2021-33399
+       RESERVED
+CVE-2021-33398
+       RESERVED
+CVE-2021-33397
+       RESERVED
+CVE-2021-33396
+       RESERVED
+CVE-2021-33395
+       RESERVED
+CVE-2021-33394
+       RESERVED
+CVE-2021-33393
+       RESERVED
+CVE-2021-33392
+       RESERVED
+CVE-2021-33391
+       RESERVED
+CVE-2021-33390
+       RESERVED
+CVE-2021-33389
+       RESERVED
+CVE-2021-33388
+       RESERVED
+CVE-2021-33387
+       RESERVED
+CVE-2021-33386
+       RESERVED
+CVE-2021-33385
+       RESERVED
+CVE-2021-33384
+       RESERVED
+CVE-2021-33383
+       RESERVED
+CVE-2021-33382
+       RESERVED
+CVE-2021-33381
+       RESERVED
+CVE-2021-33380
+       RESERVED
+CVE-2021-33379
+       RESERVED
+CVE-2021-33378
+       RESERVED
+CVE-2021-33377
+       RESERVED
+CVE-2021-33376
+       RESERVED
+CVE-2021-33375
+       RESERVED
+CVE-2021-33374
+       RESERVED
+CVE-2021-33373
+       RESERVED
+CVE-2021-33372
+       RESERVED
+CVE-2021-33371
+       RESERVED
+CVE-2021-33370
+       RESERVED
+CVE-2021-33369
+       RESERVED
+CVE-2021-33368
+       RESERVED
+CVE-2021-33367
+       RESERVED
+CVE-2021-33366
+       RESERVED
+CVE-2021-33365
+       RESERVED
+CVE-2021-33364
+       RESERVED
+CVE-2021-33363
+       RESERVED
+CVE-2021-33362
+       RESERVED
+CVE-2021-33361
+       RESERVED
+CVE-2021-33360
+       RESERVED
+CVE-2021-33359
+       RESERVED
+CVE-2021-33358
+       RESERVED
+CVE-2021-33357
+       RESERVED
+CVE-2021-33356
+       RESERVED
+CVE-2021-33355
+       RESERVED
+CVE-2021-33354
+       RESERVED
+CVE-2021-33353
+       RESERVED
+CVE-2021-33352
+       RESERVED
+CVE-2021-33351
+       RESERVED
+CVE-2021-33350
+       RESERVED
+CVE-2021-33349
+       RESERVED
+CVE-2021-33348
+       RESERVED
+CVE-2021-33347
+       RESERVED
+CVE-2021-33346
+       RESERVED
+CVE-2021-33345
+       RESERVED
+CVE-2021-33344
+       RESERVED
+CVE-2021-33343
+       RESERVED
+CVE-2021-33342
+       RESERVED
+CVE-2021-33341
+       RESERVED
+CVE-2021-33340
+       RESERVED
+CVE-2021-33339
+       RESERVED
+CVE-2021-33338
+       RESERVED
+CVE-2021-33337
+       RESERVED
+CVE-2021-33336
+       RESERVED
+CVE-2021-33335
+       RESERVED
+CVE-2021-33334
+       RESERVED
+CVE-2021-33333
+       RESERVED
+CVE-2021-33332
+       RESERVED
+CVE-2021-33331
+       RESERVED
+CVE-2021-33330
+       RESERVED
+CVE-2021-33329
+       RESERVED
+CVE-2021-33328
+       RESERVED
+CVE-2021-33327
+       RESERVED
+CVE-2021-33326
+       RESERVED
+CVE-2021-33325
+       RESERVED
+CVE-2021-33324
+       RESERVED
+CVE-2021-33323
+       RESERVED
+CVE-2021-33322
+       RESERVED
+CVE-2021-33321
+       RESERVED
+CVE-2021-33320
+       RESERVED
+CVE-2021-33319
+       RESERVED
+CVE-2021-33318
+       RESERVED
+CVE-2021-33317
+       RESERVED
+CVE-2021-33316
+       RESERVED
+CVE-2021-33315
+       RESERVED
+CVE-2021-33314
+       RESERVED
+CVE-2021-33313
+       RESERVED
+CVE-2021-33312
+       RESERVED
+CVE-2021-33311
+       RESERVED
+CVE-2021-33310
+       RESERVED
+CVE-2021-33309
+       RESERVED
+CVE-2021-33308
+       RESERVED
+CVE-2021-33307
+       RESERVED
+CVE-2021-33306
+       RESERVED
+CVE-2021-33305
+       RESERVED
+CVE-2021-33304
+       RESERVED
+CVE-2021-33303
+       RESERVED
+CVE-2021-33302
+       RESERVED
+CVE-2021-33301
+       RESERVED
+CVE-2021-33300
+       RESERVED
+CVE-2021-33299
+       RESERVED
+CVE-2021-33298
+       RESERVED
+CVE-2021-33297
+       RESERVED
+CVE-2021-33296
+       RESERVED
+CVE-2021-33295
+       RESERVED
+CVE-2021-33294
+       RESERVED
+CVE-2021-33293
+       RESERVED
+CVE-2021-33292
+       RESERVED
+CVE-2021-33291
+       RESERVED
+CVE-2021-33290
+       RESERVED
+CVE-2021-33289
+       RESERVED
+CVE-2021-33288
+       RESERVED
+CVE-2021-33287
+       RESERVED
+CVE-2021-33286
+       RESERVED
+CVE-2021-33285
+       RESERVED
+CVE-2021-33284
+       RESERVED
+CVE-2021-33283
+       RESERVED
+CVE-2021-33282
+       RESERVED
+CVE-2021-33281
+       RESERVED
+CVE-2021-33280
+       RESERVED
+CVE-2021-33279
+       RESERVED
+CVE-2021-33278
+       RESERVED
+CVE-2021-33277
+       RESERVED
+CVE-2021-33276
+       RESERVED
+CVE-2021-33275
+       RESERVED
+CVE-2021-33274
+       RESERVED
+CVE-2021-33273
+       RESERVED
+CVE-2021-33272
+       RESERVED
+CVE-2021-33271
+       RESERVED
+CVE-2021-33270
+       RESERVED
+CVE-2021-33269
+       RESERVED
+CVE-2021-33268
+       RESERVED
+CVE-2021-33267
+       RESERVED
+CVE-2021-33266
+       RESERVED
+CVE-2021-33265
+       RESERVED
+CVE-2021-33264
+       RESERVED
+CVE-2021-33263
+       RESERVED
+CVE-2021-33262
+       RESERVED
+CVE-2021-33261
+       RESERVED
+CVE-2021-33260
+       RESERVED
+CVE-2021-33259
+       RESERVED
+CVE-2021-33258
+       RESERVED
+CVE-2021-33257
+       RESERVED
+CVE-2021-33256
+       RESERVED
+CVE-2021-33255
+       RESERVED
+CVE-2021-33254
+       RESERVED
+CVE-2021-33253
+       RESERVED
+CVE-2021-33252
+       RESERVED
+CVE-2021-33251
+       RESERVED
+CVE-2021-33250
+       RESERVED
+CVE-2021-33249
+       RESERVED
+CVE-2021-33248
+       RESERVED
+CVE-2021-33247
+       RESERVED
+CVE-2021-33246
+       RESERVED
+CVE-2021-33245
+       RESERVED
+CVE-2021-33244
+       RESERVED
+CVE-2021-33243
+       RESERVED
+CVE-2021-33242
+       RESERVED
+CVE-2021-33241
+       RESERVED
+CVE-2021-33240
+       RESERVED
+CVE-2021-33239
+       RESERVED
+CVE-2021-33238
+       RESERVED
+CVE-2021-33237
+       RESERVED
+CVE-2021-33236
+       RESERVED
+CVE-2021-33235
+       RESERVED
+CVE-2021-33234
+       RESERVED
+CVE-2021-33233
+       RESERVED
+CVE-2021-33232
+       RESERVED
+CVE-2021-33231
+       RESERVED
+CVE-2021-33230
+       RESERVED
+CVE-2021-33229
+       RESERVED
+CVE-2021-33228
+       RESERVED
+CVE-2021-33227
+       RESERVED
+CVE-2021-33226
+       RESERVED
+CVE-2021-33225
+       RESERVED
+CVE-2021-33224
+       RESERVED
+CVE-2021-33223
+       RESERVED
+CVE-2021-33222
+       RESERVED
+CVE-2021-33221
+       RESERVED
+CVE-2021-33220
+       RESERVED
+CVE-2021-33219
+       RESERVED
+CVE-2021-33218
+       RESERVED
+CVE-2021-33217
+       RESERVED
+CVE-2021-33216
+       RESERVED
+CVE-2021-33215
+       RESERVED
+CVE-2021-33214
+       RESERVED
+CVE-2021-33213
+       RESERVED
+CVE-2021-33212
+       RESERVED
+CVE-2021-33211
+       RESERVED
+CVE-2021-33210
+       RESERVED
+CVE-2021-33209
+       RESERVED
+CVE-2021-33208
+       RESERVED
+CVE-2021-33207
+       RESERVED
+CVE-2021-33206
+       RESERVED
+CVE-2021-33205
+       RESERVED
 CVE-2021-3559 [nodedev-list command may cause libvirt to crash on hosts with 
GRID driver installed]
        RESERVED
        - libvirt <not-affected> (Vulnerable code never in a released version)
@@ -8346,16 +8892,15 @@ CVE-2021-29627 (In FreeBSD 13.0-STABLE before n245050, 
12.2-STABLE before r36952
        NOT-FOR-US: FreeBSD
 CVE-2021-29626 (In FreeBSD 13.0-STABLE before n245117, 12.2-STABLE before 
r369551, 11. ...)
        - kfreebsd-10 <unfixed> (unimportant)
-CVE-2021-29625
-       RESERVED
-CVE-2021-29624
-       RESERVED
+CVE-2021-29625 (Adminer is open-source database management software. A 
cross-site scri ...)
+       TODO: check
+CVE-2021-29624 (fastify-csrf is an open-source plugin helps developers protect 
their F ...)
+       TODO: check
 CVE-2021-29623 (Exiv2 is a C++ library and a command-line utility to read, 
write, dele ...)
        - exiv2 <unfixed> (bug #988481)
        NOTE: 
https://github.com/Exiv2/exiv2/security/advisories/GHSA-6253-qjwm-3q4v
        NOTE: https://github.com/Exiv2/exiv2/pull/1627
-CVE-2021-29622
-       RESERVED
+CVE-2021-29622 (Prometheus is an open-source monitoring system and time series 
databas ...)
        - prometheus <not-affected> (Vulnerable code disabled in Debian 
packaging)
        NOTE: https://www.openwall.com/lists/oss-security/2021/05/19/1
        NOTE: 
https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7
@@ -8604,8 +9149,8 @@ CVE-2021-29505
        RESERVED
 CVE-2021-29504
        RESERVED
-CVE-2021-29503
-       RESERVED
+CVE-2021-29503 (HedgeDoc is a platform to write and share markdown. HedgeDoc 
before ve ...)
+       TODO: check
 CVE-2021-29502 (WarnSystem is a cog (plugin) for the Red discord bot. A 
vulnerability  ...)
        NOT-FOR-US: Red discord bot addon
 CVE-2021-29501 (Ticketer is a command based ticket system cog (plugin) for the 
red dis ...)
@@ -30583,14 +31128,14 @@ CVE-2021-20723
        RESERVED
 CVE-2021-20722
        RESERVED
-CVE-2021-20721
-       RESERVED
-CVE-2021-20720
-       RESERVED
-CVE-2021-20719
-       RESERVED
-CVE-2021-20718
-       RESERVED
+CVE-2021-20721 (KonaWiki2 versions prior to 2.2.4 allows a remote attacker to 
upload a ...)
+       TODO: check
+CVE-2021-20720 (SQL injection vulnerability in the KonaWiki2 versions prior to 
2.2.4 a ...)
+       TODO: check
+CVE-2021-20719 (RFNTPS firmware versions System_01000004 and earlier, and 
Web_01000004 ...)
+       TODO: check
+CVE-2021-20718 (mod_auth_openidc 2.4.0 to 2.4.7 allows a remote attacker to 
cause a de ...)
+       TODO: check
 CVE-2021-20717 (Cross-site scripting vulnerability in EC-CUBE 4.0.0 to 4.0.5 
allows a  ...)
        NOT-FOR-US: EC-CUBE
 CVE-2021-20716 (Hidden functionality in multiple Buffalo network devices 
(BHR-4RV firm ...)
@@ -30967,10 +31512,10 @@ CVE-2021-20531
        RESERVED
 CVE-2021-20530
        RESERVED
-CVE-2021-20529
-       RESERVED
-CVE-2021-20528
-       RESERVED
+CVE-2021-20529 (IBM Control Center 6.2.0.0 could allow a user to obtain 
sensitive vers ...)
+       TODO: check
+CVE-2021-20528 (IBM Control Center 6.2.0.0 is vulnerable to cross-site 
scripting. This ...)
+       TODO: check
 CVE-2021-20527 (IBM Resilient SOAR V38.0 could allow a privileged user to 
create creat ...)
        NOT-FOR-US: IBM
 CVE-2021-20526
@@ -31277,8 +31822,8 @@ CVE-2021-20376
        RESERVED
 CVE-2021-20375
        RESERVED
-CVE-2021-20374
-       RESERVED
+CVE-2021-20374 (IBM Maximo Asset Management 7.6.0 and 7.6.1 is vulnerable to 
stored cr ...)
+       TODO: check
 CVE-2021-20373
        RESERVED
 CVE-2021-20372
@@ -99777,8 +100322,8 @@ CVE-2020-4767 (IBM Sterling Connect Direct for 
Microsoft Windows 4.7, 4.8, 6.0,
        NOT-FOR-US: IBM
 CVE-2020-4766 (IBM MQ Internet Pass-Thru 2.1 and 9.2 could allow a remote user 
to cau ...)
        NOT-FOR-US: IBM
-CVE-2020-4765
-       RESERVED
+CVE-2020-4765 (IBM Cloud Pak for Multicloud Management prior to 2.3 allows web 
pages  ...)
+       TODO: check
 CVE-2020-4764 (IBM Planning Analytics 2.0 is vulnerable to cross-site request 
forgery ...)
        NOT-FOR-US: IBM
 CVE-2020-4763 (IBM Sterling File Gateway 6.0.0.0 through 6.0.3.2 and 2.2.0.0 
through  ...)
@@ -100015,8 +100560,8 @@ CVE-2020-4648 (A vulnerability exsists in IBM 
Planning Analytics 2.0 whereby ava
        NOT-FOR-US: IBM
 CVE-2020-4647 (IBM Sterling File Gateway 2.2.0.0 through 2.2.6.5 and 6.0.0.0 
through  ...)
        NOT-FOR-US: IBM
-CVE-2020-4646
-       RESERVED
+CVE-2020-4646 (IBM Sterling B2B Integrator Standard Edition 5.2.0.0 through 
5.2.6.5,  ...)
+       TODO: check
 CVE-2020-4645 (IBM Planning Analytics Local 2.0.0 through 2.0.9.1 is 
vulnerable to cr ...)
        NOT-FOR-US: IBM
 CVE-2020-4644 (IBM Planning Analytics Local 2.0.0 through 2.0.9.1 could allow 
a remot ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b0f6f400139aa9b0875e1fe441c7d1722c72ab2e

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b0f6f400139aa9b0875e1fe441c7d1722c72ab2e
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to