[Git][security-tracker-team/security-tracker][master] Process some NFUs
Neil Williams (@codehelp)
codehelp at debian.org
Tue Apr 5 14:40:35 BST 2022
Neil Williams pushed to branch master at Debian Security Tracker / security-tracker
Commits:
97721617 by Neil Williams at 2022-04-05T14:35:13+01:00
Process some NFUs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -56961,11 +56961,11 @@ CVE-2021-33012 (Rockwell Automation MicroLogix 1100, all versions, allows a remo
CVE-2021-33011 (All versions of the afffected TOYOPUC-PC10 Series,TOYOPUC-Plus Series, ...)
NOT-FOR-US: JTEKT Corporation
CVE-2021-33010 (An exception is thrown from a function in AVEVA System Platform versio ...)
- TODO: check
+ NOT-FOR-US: AVEVA
CVE-2021-33009
RESERVED
CVE-2021-33008 (AVEVA System Platform versions 2017 through 2020 R2 P01 does not perfo ...)
- TODO: check
+ NOT-FOR-US: AVEVA
CVE-2021-33007 (A heap-based buffer overflow in Delta Electronics TPEditor: v1.98.06 a ...)
NOT-FOR-US: Delta Electronics
CVE-2021-33006
@@ -56993,7 +56993,7 @@ CVE-2021-32996 (The FANUC R-30iA and R-30iB series controllers are vulnerable to
CVE-2021-32995 (Cscape (All Versions prior to 9.90 SP5) lacks proper validation of use ...)
NOT-FOR-US: Cscape
CVE-2021-32994 (Softing OPC UA C++ SDK (Software Development Kit) versions from 5.59 t ...)
- TODO: check
+ NOT-FOR-US: Softing OPC UA C++ SDK
CVE-2021-32993 (IntelliBridge EC 40 and 60 Hub (C.00.04 and prior) contains hard-coded ...)
NOT-FOR-US: Philips
CVE-2021-32992 (FATEK Automation WinProladder Versions 3.30 and prior do not properly ...)
@@ -57009,17 +57009,17 @@ CVE-2021-32988 (FATEK Automation WinProladder Versions 3.30 and prior are vulner
CVE-2021-32987 (Null pointer dereference in SuiteLink server while processing command ...)
NOT-FOR-US: Suitelink
CVE-2021-32986 (After Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmwar ...)
- TODO: check
+ NOT-FOR-US: AutomationDirect
CVE-2021-32985 (AVEVA System Platform versions 2017 through 2020 R2 P01 does not prope ...)
- TODO: check
+ NOT-FOR-US: AVEVA
CVE-2021-32984 (All programming connections receive the same unlocked privileges, whic ...)
- TODO: check
+ NOT-FOR-US: AutomationDirect
CVE-2021-32983 (A Blind SQL injection vulnerability exists in the /DataHandler/Handler ...)
NOT-FOR-US: Delta Electronics
CVE-2021-32982 (Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prio ...)
- TODO: check
+ NOT-FOR-US: AutomationDirect
CVE-2021-32981 (AVEVA System Platform versions 2017 through 2020 R2 P01 uses external ...)
- TODO: check
+ NOT-FOR-US: AVEVA
CVE-2021-32980 (Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prio ...)
TODO: check
CVE-2021-32979 (Null pointer dereference in SuiteLink server while processing commands ...)
@@ -57027,7 +57027,7 @@ CVE-2021-32979 (Null pointer dereference in SuiteLink server while processing co
CVE-2021-32978 (The programming protocol allows for a previously entered password and ...)
TODO: check
CVE-2021-32977 (AVEVA System Platform versions 2017 through 2020 R2 P01 does not verif ...)
- TODO: check
+ NOT-FOR-US: AVEVA
CVE-2021-32976 (Five buffer overflows in the built-in web server in Moxa NPort IAW5000 ...)
NOT-FOR-US: Moxa
CVE-2021-32975 (Cscape (All Versions prior to 9.90 SP5) lacks proper validation of use ...)
@@ -57059,9 +57059,9 @@ CVE-2021-32963 (Null pointer dereference in SuiteLink server while processing co
CVE-2021-32962
RESERVED
CVE-2021-32961 (A getfile function in MDT AutoSave versions prior to v6.02.06 enables ...)
- TODO: check
+ NOT-FOR-US: Auvesy-MDT
CVE-2021-32960 (Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, i ...)
- TODO: check
+ NOT-FOR-US: Rockwell Automation FactoryTalk
CVE-2021-32959 (Heap-based buffer overflow in SuiteLink server while processing comman ...)
NOT-FOR-US: Suitelink
CVE-2021-32958
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/977216172e86f4035be31925420720d0f0d1488a
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/977216172e86f4035be31925420720d0f0d1488a
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220405/722fa8f9/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list