Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
98bbb6e4 by Salvatore Bonaccorso at 2021-02-24T21:39:36+01:00
Process NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -2547,7 +2547,7 @@ CVE-2021-3357
 CVE-2021-3356
        RESERVED
 CVE-2021-3355 (A stored-self XSS exists in LightCMS v1.3.4, allowing an 
attacker to e ...)
-       TODO: check
+       NOT-FOR-US: LightCMS
 CVE-2021-3354
        RESERVED
 CVE-2021-3353
@@ -11351,7 +11351,7 @@ CVE-2021-22669
 CVE-2021-22668
        RESERVED
 CVE-2021-22667 (BB-ESWGP506-2SFP-T versions 1.01.09 and prior is vulnerable 
due to the ...)
-       TODO: check
+       NOT-FOR-US: BB-ESWGP506-2SFP-T
 CVE-2021-22666
        RESERVED
 CVE-2021-22665
@@ -12765,9 +12765,9 @@ CVE-2021-21975
 CVE-2021-21974 (OpenSLP as used in ESXi (7.0 before ESXi70U1c-17325551, 6.7 
before ESX ...)
        TODO: check
 CVE-2021-21973 (The vSphere Client (HTML5) contains an SSRF (Server Side 
Request Forge ...)
-       TODO: check
+       NOT-FOR-US: VMware
 CVE-2021-21972 (The vSphere Client (HTML5) contains a remote code execution 
vulnerabil ...)
-       TODO: check
+       NOT-FOR-US: VMware
 CVE-2021-3014 (In MikroTik RouterOS through 2021-01-04, the hotspot login page 
is vul ...)
        NOT-FOR-US: MikroTik RouterOS
 CVE-2021-3013
@@ -63293,7 +63293,7 @@ CVE-2020-12704 (UliCMS before 2020.2 has PageController 
stored XSS. ...)
 CVE-2020-12703 (UliCMS before 2020.2 has XSS during PackageController 
uninstall. ...)
        NOT-FOR-US: UliCMS
 CVE-2020-12702 (Weak encryption in the Quick Pairing mode in the eWeLink 
mobile applic ...)
-       TODO: check
+       NOT-FOR-US: eWeLink mobile application
 CVE-2020-12701
        RESERVED
 CVE-2020-12700 (The direct_mail extension through 5.2.3 for TYPO3 allows 
Information D ...)
@@ -77348,9 +77348,9 @@ CVE-2020-7849 (A vulnerability of uPrism.io CURIX(Video 
conferecing solution) co
 CVE-2020-7848 (The EFM ipTIME C200 IP Camera is affected by a Command 
Injection vulne ...)
        NOT-FOR-US: EFM ipTIME C200 IP Camera
 CVE-2020-7847 (The ipTIME NAS product allows an arbitrary file upload 
vulnerability i ...)
-       TODO: check
+       NOT-FOR-US: ipTIME NAS product
 CVE-2020-7846 (Helpcom before v10.0 contains a file download and execution 
vulnerabil ...)
-       TODO: check
+       NOT-FOR-US: Helpcom
 CVE-2020-7845 (Spamsniper 5.0 ~ 5.2.7 contain a stack-based buffer overflow 
vulnerabi ...)
        NOT-FOR-US: Spamsniper
 CVE-2020-7844
@@ -77370,7 +77370,7 @@ CVE-2020-7838 (A arbitrary code execution vulnerability 
exists in the way that t
 CVE-2020-7837 (An issue was discovered in ML Report Program. There is a 
stack-based b ...)
        NOT-FOR-US: ML Report Program
 CVE-2020-7836 (VOICEYE WSActiveBridgeES versions prior to 2.1.0.3 contains a 
stack-ba ...)
-       TODO: check
+       NOT-FOR-US: VOICEYE WSActiveBridgeES
 CVE-2020-7835
        RESERVED
 CVE-2020-7834
@@ -78967,7 +78967,7 @@ CVE-2020-7122 (Two memory corruption vulnerabilities in 
the Aruba CX Switches Se
 CVE-2020-7121 (Two memory corruption vulnerabilities in the Aruba CX Switches 
Series  ...)
        NOT-FOR-US: Aruba
 CVE-2020-7120 (A local authenticated buffer overflow vulnerability was 
discovered in  ...)
-       TODO: check
+       NOT-FOR-US: Aruba
 CVE-2020-7119 (A vulnerability exists in the Aruba Analytics and Location 
Engine (ALE ...)
        NOT-FOR-US: Aruba
 CVE-2020-7118



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/98bbb6e4d9f32f2d56c4598de517347f62d85110

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/98bbb6e4d9f32f2d56c4598de517347f62d85110
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to