[Git][security-tracker-team/security-tracker][master] Process some NFUs

Neil Williams (@codehelp) codehelp at debian.org
Tue Apr 5 14:40:35 BST 2022



Neil Williams pushed to branch master at Debian Security Tracker / security-tracker


Commits:
97721617 by Neil Williams at 2022-04-05T14:35:13+01:00
Process some NFUs

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -56961,11 +56961,11 @@ CVE-2021-33012 (Rockwell Automation MicroLogix 1100, all versions, allows a remo
 CVE-2021-33011 (All versions of the afffected TOYOPUC-PC10 Series,TOYOPUC-Plus Series, ...)
 	NOT-FOR-US: JTEKT Corporation
 CVE-2021-33010 (An exception is thrown from a function in AVEVA System Platform versio ...)
-	TODO: check
+	NOT-FOR-US: AVEVA
 CVE-2021-33009
 	RESERVED
 CVE-2021-33008 (AVEVA System Platform versions 2017 through 2020 R2 P01 does not perfo ...)
-	TODO: check
+	NOT-FOR-US: AVEVA
 CVE-2021-33007 (A heap-based buffer overflow in Delta Electronics TPEditor: v1.98.06 a ...)
 	NOT-FOR-US: Delta Electronics
 CVE-2021-33006
@@ -56993,7 +56993,7 @@ CVE-2021-32996 (The FANUC R-30iA and R-30iB series controllers are vulnerable to
 CVE-2021-32995 (Cscape (All Versions prior to 9.90 SP5) lacks proper validation of use ...)
 	NOT-FOR-US: Cscape
 CVE-2021-32994 (Softing OPC UA C++ SDK (Software Development Kit) versions from 5.59 t ...)
-	TODO: check
+	NOT-FOR-US: Softing OPC UA C++ SDK
 CVE-2021-32993 (IntelliBridge EC 40 and 60 Hub (C.00.04 and prior) contains hard-coded ...)
 	NOT-FOR-US: Philips
 CVE-2021-32992 (FATEK Automation WinProladder Versions 3.30 and prior do not properly  ...)
@@ -57009,17 +57009,17 @@ CVE-2021-32988 (FATEK Automation WinProladder Versions 3.30 and prior are vulner
 CVE-2021-32987 (Null pointer dereference in SuiteLink server while processing command  ...)
 	NOT-FOR-US: Suitelink
 CVE-2021-32986 (After Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmwar ...)
-	TODO: check
+	NOT-FOR-US: AutomationDirect
 CVE-2021-32985 (AVEVA System Platform versions 2017 through 2020 R2 P01 does not prope ...)
-	TODO: check
+	NOT-FOR-US: AVEVA
 CVE-2021-32984 (All programming connections receive the same unlocked privileges, whic ...)
-	TODO: check
+	NOT-FOR-US: AutomationDirect
 CVE-2021-32983 (A Blind SQL injection vulnerability exists in the /DataHandler/Handler ...)
 	NOT-FOR-US: Delta Electronics
 CVE-2021-32982 (Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prio ...)
-	TODO: check
+	NOT-FOR-US: AutomationDirect
 CVE-2021-32981 (AVEVA System Platform versions 2017 through 2020 R2 P01 uses external  ...)
-	TODO: check
+	NOT-FOR-US: AVEVA
 CVE-2021-32980 (Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prio ...)
 	TODO: check
 CVE-2021-32979 (Null pointer dereference in SuiteLink server while processing commands ...)
@@ -57027,7 +57027,7 @@ CVE-2021-32979 (Null pointer dereference in SuiteLink server while processing co
 CVE-2021-32978 (The programming protocol allows for a previously entered password and  ...)
 	TODO: check
 CVE-2021-32977 (AVEVA System Platform versions 2017 through 2020 R2 P01 does not verif ...)
-	TODO: check
+	NOT-FOR-US: AVEVA
 CVE-2021-32976 (Five buffer overflows in the built-in web server in Moxa NPort IAW5000 ...)
 	NOT-FOR-US: Moxa
 CVE-2021-32975 (Cscape (All Versions prior to 9.90 SP5) lacks proper validation of use ...)
@@ -57059,9 +57059,9 @@ CVE-2021-32963 (Null pointer dereference in SuiteLink server while processing co
 CVE-2021-32962
 	RESERVED
 CVE-2021-32961 (A getfile function in MDT AutoSave versions prior to v6.02.06 enables  ...)
-	TODO: check
+	NOT-FOR-US: Auvesy-MDT
 CVE-2021-32960 (Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, i ...)
-	TODO: check
+	NOT-FOR-US: Rockwell Automation FactoryTalk
 CVE-2021-32959 (Heap-based buffer overflow in SuiteLink server while processing comman ...)
 	NOT-FOR-US: Suitelink
 CVE-2021-32958



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/977216172e86f4035be31925420720d0f0d1488a

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/977216172e86f4035be31925420720d0f0d1488a
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220405/722fa8f9/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list