Neil Williams pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
97721617 by Neil Williams at 2022-04-05T14:35:13+01:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -56961,11 +56961,11 @@ CVE-2021-33012 (Rockwell Automation MicroLogix 1100,
all versions, allows a remo
CVE-2021-33011 (All versions of the afffected TOYOPUC-PC10 Series,TOYOPUC-Plus
Series, ...)
NOT-FOR-US: JTEKT Corporation
CVE-2021-33010 (An exception is thrown from a function in AVEVA System
Platform versio ...)
- TODO: check
+ NOT-FOR-US: AVEVA
CVE-2021-33009
RESERVED
CVE-2021-33008 (AVEVA System Platform versions 2017 through 2020 R2 P01 does
not perfo ...)
- TODO: check
+ NOT-FOR-US: AVEVA
CVE-2021-33007 (A heap-based buffer overflow in Delta Electronics TPEditor:
v1.98.06 a ...)
NOT-FOR-US: Delta Electronics
CVE-2021-33006
@@ -56993,7 +56993,7 @@ CVE-2021-32996 (The FANUC R-30iA and R-30iB series
controllers are vulnerable to
CVE-2021-32995 (Cscape (All Versions prior to 9.90 SP5) lacks proper
validation of use ...)
NOT-FOR-US: Cscape
CVE-2021-32994 (Softing OPC UA C++ SDK (Software Development Kit) versions
from 5.59 t ...)
- TODO: check
+ NOT-FOR-US: Softing OPC UA C++ SDK
CVE-2021-32993 (IntelliBridge EC 40 and 60 Hub (C.00.04 and prior) contains
hard-coded ...)
NOT-FOR-US: Philips
CVE-2021-32992 (FATEK Automation WinProladder Versions 3.30 and prior do not
properly ...)
@@ -57009,17 +57009,17 @@ CVE-2021-32988 (FATEK Automation WinProladder
Versions 3.30 and prior are vulner
CVE-2021-32987 (Null pointer dereference in SuiteLink server while processing
command ...)
NOT-FOR-US: Suitelink
CVE-2021-32986 (After Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with
firmwar ...)
- TODO: check
+ NOT-FOR-US: AutomationDirect
CVE-2021-32985 (AVEVA System Platform versions 2017 through 2020 R2 P01 does
not prope ...)
- TODO: check
+ NOT-FOR-US: AVEVA
CVE-2021-32984 (All programming connections receive the same unlocked
privileges, whic ...)
- TODO: check
+ NOT-FOR-US: AutomationDirect
CVE-2021-32983 (A Blind SQL injection vulnerability exists in the
/DataHandler/Handler ...)
NOT-FOR-US: Delta Electronics
CVE-2021-32982 (Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with
firmware prio ...)
- TODO: check
+ NOT-FOR-US: AutomationDirect
CVE-2021-32981 (AVEVA System Platform versions 2017 through 2020 R2 P01 uses
external ...)
- TODO: check
+ NOT-FOR-US: AVEVA
CVE-2021-32980 (Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with
firmware prio ...)
TODO: check
CVE-2021-32979 (Null pointer dereference in SuiteLink server while processing
commands ...)
@@ -57027,7 +57027,7 @@ CVE-2021-32979 (Null pointer dereference in SuiteLink
server while processing co
CVE-2021-32978 (The programming protocol allows for a previously entered
password and ...)
TODO: check
CVE-2021-32977 (AVEVA System Platform versions 2017 through 2020 R2 P01 does
not verif ...)
- TODO: check
+ NOT-FOR-US: AVEVA
CVE-2021-32976 (Five buffer overflows in the built-in web server in Moxa NPort
IAW5000 ...)
NOT-FOR-US: Moxa
CVE-2021-32975 (Cscape (All Versions prior to 9.90 SP5) lacks proper
validation of use ...)
@@ -57059,9 +57059,9 @@ CVE-2021-32963 (Null pointer dereference in SuiteLink
server while processing co
CVE-2021-32962
RESERVED
CVE-2021-32961 (A getfile function in MDT AutoSave versions prior to v6.02.06
enables ...)
- TODO: check
+ NOT-FOR-US: Auvesy-MDT
CVE-2021-32960 (Rockwell Automation FactoryTalk Services Platform v6.11 and
earlier, i ...)
- TODO: check
+ NOT-FOR-US: Rockwell Automation FactoryTalk
CVE-2021-32959 (Heap-based buffer overflow in SuiteLink server while
processing comman ...)
NOT-FOR-US: Suitelink
CVE-2021-32958
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/977216172e86f4035be31925420720d0f0d1488a
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/977216172e86f4035be31925420720d0f0d1488a
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits