Neil Williams pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
97721617 by Neil Williams at 2022-04-05T14:35:13+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -56961,11 +56961,11 @@ CVE-2021-33012 (Rockwell Automation MicroLogix 1100, 
all versions, allows a remo
 CVE-2021-33011 (All versions of the afffected TOYOPUC-PC10 Series,TOYOPUC-Plus 
Series, ...)
        NOT-FOR-US: JTEKT Corporation
 CVE-2021-33010 (An exception is thrown from a function in AVEVA System 
Platform versio ...)
-       TODO: check
+       NOT-FOR-US: AVEVA
 CVE-2021-33009
        RESERVED
 CVE-2021-33008 (AVEVA System Platform versions 2017 through 2020 R2 P01 does 
not perfo ...)
-       TODO: check
+       NOT-FOR-US: AVEVA
 CVE-2021-33007 (A heap-based buffer overflow in Delta Electronics TPEditor: 
v1.98.06 a ...)
        NOT-FOR-US: Delta Electronics
 CVE-2021-33006
@@ -56993,7 +56993,7 @@ CVE-2021-32996 (The FANUC R-30iA and R-30iB series 
controllers are vulnerable to
 CVE-2021-32995 (Cscape (All Versions prior to 9.90 SP5) lacks proper 
validation of use ...)
        NOT-FOR-US: Cscape
 CVE-2021-32994 (Softing OPC UA C++ SDK (Software Development Kit) versions 
from 5.59 t ...)
-       TODO: check
+       NOT-FOR-US: Softing OPC UA C++ SDK
 CVE-2021-32993 (IntelliBridge EC 40 and 60 Hub (C.00.04 and prior) contains 
hard-coded ...)
        NOT-FOR-US: Philips
 CVE-2021-32992 (FATEK Automation WinProladder Versions 3.30 and prior do not 
properly  ...)
@@ -57009,17 +57009,17 @@ CVE-2021-32988 (FATEK Automation WinProladder 
Versions 3.30 and prior are vulner
 CVE-2021-32987 (Null pointer dereference in SuiteLink server while processing 
command  ...)
        NOT-FOR-US: Suitelink
 CVE-2021-32986 (After Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with 
firmwar ...)
-       TODO: check
+       NOT-FOR-US: AutomationDirect
 CVE-2021-32985 (AVEVA System Platform versions 2017 through 2020 R2 P01 does 
not prope ...)
-       TODO: check
+       NOT-FOR-US: AVEVA
 CVE-2021-32984 (All programming connections receive the same unlocked 
privileges, whic ...)
-       TODO: check
+       NOT-FOR-US: AutomationDirect
 CVE-2021-32983 (A Blind SQL injection vulnerability exists in the 
/DataHandler/Handler ...)
        NOT-FOR-US: Delta Electronics
 CVE-2021-32982 (Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with 
firmware prio ...)
-       TODO: check
+       NOT-FOR-US: AutomationDirect
 CVE-2021-32981 (AVEVA System Platform versions 2017 through 2020 R2 P01 uses 
external  ...)
-       TODO: check
+       NOT-FOR-US: AVEVA
 CVE-2021-32980 (Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with 
firmware prio ...)
        TODO: check
 CVE-2021-32979 (Null pointer dereference in SuiteLink server while processing 
commands ...)
@@ -57027,7 +57027,7 @@ CVE-2021-32979 (Null pointer dereference in SuiteLink 
server while processing co
 CVE-2021-32978 (The programming protocol allows for a previously entered 
password and  ...)
        TODO: check
 CVE-2021-32977 (AVEVA System Platform versions 2017 through 2020 R2 P01 does 
not verif ...)
-       TODO: check
+       NOT-FOR-US: AVEVA
 CVE-2021-32976 (Five buffer overflows in the built-in web server in Moxa NPort 
IAW5000 ...)
        NOT-FOR-US: Moxa
 CVE-2021-32975 (Cscape (All Versions prior to 9.90 SP5) lacks proper 
validation of use ...)
@@ -57059,9 +57059,9 @@ CVE-2021-32963 (Null pointer dereference in SuiteLink 
server while processing co
 CVE-2021-32962
        RESERVED
 CVE-2021-32961 (A getfile function in MDT AutoSave versions prior to v6.02.06 
enables  ...)
-       TODO: check
+       NOT-FOR-US: Auvesy-MDT
 CVE-2021-32960 (Rockwell Automation FactoryTalk Services Platform v6.11 and 
earlier, i ...)
-       TODO: check
+       NOT-FOR-US: Rockwell Automation FactoryTalk
 CVE-2021-32959 (Heap-based buffer overflow in SuiteLink server while 
processing comman ...)
        NOT-FOR-US: Suitelink
 CVE-2021-32958



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/977216172e86f4035be31925420720d0f0d1488a

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/977216172e86f4035be31925420720d0f0d1488a
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to