[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu May 11 09:12:26 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
696fdda4 by security tracker role at 2023-05-11T08:12:12+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,29 @@
+CVE-2023-32668 (LuaTeX before 1.17.0 enables the socket library by default.)
+	TODO: check
+CVE-2023-32080 (Wings is the server control plane for Pterodactyl Panel. A vulnerabili ...)
+	TODO: check
+CVE-2023-31477 (A path traversal issue was discovered on GL.iNet devices before 3.216. ...)
+	TODO: check
+CVE-2023-31442 (In Lightbend Akka before 2.8.1, the async-dns resolver (used by Discov ...)
+	TODO: check
+CVE-2023-2649 (A vulnerability was found in Tenda AC23 16.03.07.45_cn. It has been de ...)
+	TODO: check
+CVE-2023-2648 (A vulnerability was found in Weaver E-Office 9.5. It has been classifi ...)
+	TODO: check
+CVE-2023-2647 (A vulnerability was found in Weaver E-Office 9.5 and classified as cri ...)
+	TODO: check
+CVE-2023-2646 (A vulnerability has been found in TP-Link Archer C7v2 v2_en_us_180114  ...)
+	TODO: check
+CVE-2023-2645 (A vulnerability, which was classified as critical, was found in USR US ...)
+	TODO: check
+CVE-2023-2644 (A vulnerability, which was classified as problematic, has been found i ...)
+	TODO: check
+CVE-2023-2643 (A vulnerability classified as critical was found in SourceCodester Fil ...)
+	TODO: check
+CVE-2023-2642 (A vulnerability classified as critical has been found in SourceCodeste ...)
+	TODO: check
+CVE-2023-2641 (A vulnerability was found in SourceCodester Online Internship Manageme ...)
+	TODO: check
 CVE-2023-32076 (in-toto is a framework to protect supply chain integrity. The in-toto  ...)
 	TODO: check
 CVE-2023-32070 (XWiki Platform is a generic wiki platform. Prior to version 14.6-rc-1, ...)
@@ -3907,8 +3933,8 @@ CVE-2023-30174
 	RESERVED
 CVE-2023-30173
 	RESERVED
-CVE-2023-30172
-	RESERVED
+CVE-2023-30172 (A directory traversal vulnerability in the /get-artifact API method of ...)
+	TODO: check
 CVE-2023-30171
 	RESERVED
 CVE-2023-30170
@@ -4286,8 +4312,8 @@ CVE-2023-29988
 	RESERVED
 CVE-2023-29987
 	RESERVED
-CVE-2023-29986
-	RESERVED
+CVE-2023-29986 (spring-boot-actuator-logview 0.2.13 allows Directory Traversal to sibl ...)
+	TODO: check
 CVE-2023-29985
 	RESERVED
 CVE-2023-29984
@@ -26059,7 +26085,7 @@ CVE-2023-22815
 	RESERVED
 CVE-2023-22814
 	RESERVED
-CVE-2023-22813 (A device API endpoint was missing access controls onWestern Digital My ...)
+CVE-2023-22813 (A device API endpoint was missing access controls on Western Digital M ...)
 	NOT-FOR-US: Western Digital
 CVE-2023-22812 (SanDisk PrivateAccess versions prior to 6.4.9 support insecure TLS 1.0 ...)
 	NOT-FOR-US: SanDisk PrivateAccess
@@ -83461,12 +83487,12 @@ CVE-2022-29844 (A vulnerability in the FTP service of Western Digital My Cloud O
 	NOT-FOR-US: Western Digital
 CVE-2022-29843 (A command injection vulnerability in the DDNS service configuration of ...)
 	NOT-FOR-US: Western Digital
-CVE-2022-29842
-	RESERVED
-CVE-2022-29841
-	RESERVED
-CVE-2022-29840
-	RESERVED
+CVE-2022-29842 (Improper Neutralization of Special Elements used in a Command ('Comman ...)
+	TODO: check
+CVE-2022-29841 (Improper Neutralization of Special Elements used in an OS Command ('OS ...)
+	TODO: check
+CVE-2022-29840 (Server-Side Request Forgery (SSRF) vulnerability that could allow a ro ...)
+	TODO: check
 CVE-2022-29839 (Insufficiently Protected Credentials vulnerability in the remote backu ...)
 	NOT-FOR-US: Western Digital
 CVE-2022-29838 (Improper Authentication vulnerability in the encrypted volumes and aut ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/696fdda439e591e6c7f266c2eaab460f9f47bbae

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/696fdda439e591e6c7f266c2eaab460f9f47bbae
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230511/5221abd8/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list