Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
49a31087 by Moritz Muehlenhoff at 2021-03-23T09:32:55+01:00
NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -5,41 +5,41 @@ CVE-2021-3459
 CVE-2021-3458
        RESERVED
 CVE-2021-29082 (Certain NETGEAR devices are affected by disclosure of 
sensitive inform ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29081 (Certain NETGEAR devices are affected by a stack-based buffer 
overflow  ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29080 (Certain NETGEAR devices are affected by password reset by an 
unauthent ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29079 (Certain NETGEAR devices are affected by command injection by 
an unauth ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29078 (Certain NETGEAR devices are affected by command injection by 
an unauth ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29077 (Certain NETGEAR devices are affected by command injection by 
an unauth ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29076 (Certain NETGEAR devices are affected by command injection by 
an unauth ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29075 (Certain NETGEAR devices are affected by a stack-based buffer 
overflow  ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29074 (Certain NETGEAR devices are affected by a stack-based buffer 
overflow  ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29073 (Certain NETGEAR devices are affected by a stack-based buffer 
overflow  ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29072 (Certain NETGEAR devices are affected by command injection by 
an authen ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29071 (Certain NETGEAR devices are affected by command injection by 
an authen ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29070 (Certain NETGEAR devices are affected by command injection by 
an authen ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29069 (Certain NETGEAR devices are affected by command injection by 
an authen ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29068 (Certain NETGEAR devices are affected by a buffer overflow by 
an authen ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29067 (Certain NETGEAR devices are affected by authentication bypass. 
This af ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29066 (Certain NETGEAR devices are affected by authentication bypass. 
This af ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29065 (NETGEAR RBR850 devices before 3.2.10.11 are affected by 
authentication ...)
-       TODO: check
+       NOT-FOR-US: NETGEAR
 CVE-2021-29064
        RESERVED
 CVE-2021-29063
@@ -7300,17 +7300,17 @@ CVE-2021-25924
 CVE-2021-25923
        RESERVED
 CVE-2021-25922 (In OpenEMR, versions 4.2.0 to 6.0.0 are vulnerable to 
Reflected Cross- ...)
-       TODO: check
+       NOT-FOR-US: OpenEMR
 CVE-2021-25921 (In OpenEMR, versions 2.7.3-rc1 to 6.0.0 are vulnerable to 
Stored Cross ...)
-       TODO: check
+       NOT-FOR-US: OpenEMR
 CVE-2021-25920 (In OpenEMR, versions v2.7.2-rc1 to 6.0.0 are vulnerable to 
Improper Ac ...)
-       TODO: check
+       NOT-FOR-US: OpenEMR
 CVE-2021-25919 (In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored 
Cross-Sit ...)
-       TODO: check
+       NOT-FOR-US: OpenEMR
 CVE-2021-25918 (In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored 
Cross-Sit ...)
-       TODO: check
+       NOT-FOR-US: OpenEMR
 CVE-2021-25917 (In OpenEMR, versions 5.0.2 to 6.0.0 are vulnerable to Stored 
Cross-Sit ...)
-       TODO: check
+       NOT-FOR-US: OpenEMR
 CVE-2021-25916 (Prototype pollution vulnerability in 'patchmerge' versions 
1.0.0 throu ...)
        NOT-FOR-US: Node patchmerge
 CVE-2021-25915 (Prototype pollution vulnerability in 'changeset' versions 
0.0.1 throug ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/49a310878e13b4adcf9db7c697929eecd6b47e33

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/49a310878e13b4adcf9db7c697929eecd6b47e33
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to