mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2023-11-03T03:00:19.927592+00:00
This commit is contained in:
parent
e8774838a1
commit
2a2043582a
24
CVE-2017/CVE-2017-72xx/CVE-2017-7252.json
Normal file
24
CVE-2017/CVE-2017-72xx/CVE-2017-7252.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2017-7252",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-03T01:15:07.777",
|
||||
"lastModified": "2023-11-03T01:15:07.777",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "bcrypt password hashing in Botan before 2.1.0 does not correctly handle passwords with a length between 57 and 72 characters, which makes it easier for attackers to determine the cleartext password."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://botan.randombit.net/security.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1034591",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-21697",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2021-11-04T17:15:08.927",
|
||||
"lastModified": "2023-10-25T18:16:53.007",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:35:36.123",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -63,6 +63,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-25318",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-02-18T06:15:10.463",
|
||||
"lastModified": "2023-10-30T22:15:08.983",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:54:55.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -104,7 +104,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://zigrin.com/advisories/cerebrate-an-incorrect-sharing-group-acl/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28149",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-03-29T13:15:09.060",
|
||||
"lastModified": "2023-10-25T18:17:00.887",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:34:33.620",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28150",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-03-29T13:15:09.517",
|
||||
"lastModified": "2023-10-25T18:17:00.947",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:34:29.200",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -104,7 +104,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20%281%29",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28151",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-03-29T13:15:09.680",
|
||||
"lastModified": "2023-10-25T18:17:01.003",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:34:25.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -104,7 +104,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20%281%29",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28152",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-03-29T13:15:09.743",
|
||||
"lastModified": "2023-10-25T18:17:01.063",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:34:21.800",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -104,7 +104,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20%282%29",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28153",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-03-29T13:15:09.953",
|
||||
"lastModified": "2023-10-25T18:17:01.127",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:34:14.737",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28154",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-03-29T13:15:10.180",
|
||||
"lastModified": "2023-10-25T18:17:01.187",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:34:10.873",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28155",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-03-29T13:15:10.320",
|
||||
"lastModified": "2023-10-25T18:17:01.253",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:33:05.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28156",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-03-29T13:15:10.383",
|
||||
"lastModified": "2023-10-25T18:17:01.317",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:34:58.183",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28157",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-03-29T13:15:10.440",
|
||||
"lastModified": "2023-10-25T18:17:01.377",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:32:51.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28158",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-03-29T13:15:10.497",
|
||||
"lastModified": "2023-10-25T18:17:01.447",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:31:56.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28159",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-03-29T13:15:10.550",
|
||||
"lastModified": "2023-10-25T18:17:01.513",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:31:38.663",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-28160",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-03-29T13:15:10.617",
|
||||
"lastModified": "2023-10-25T18:17:01.603",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:31:30.100",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-29529",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-04-20T23:15:08.467",
|
||||
"lastModified": "2023-10-30T22:15:09.297",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:55:08.753",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -112,7 +112,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://zigrin.com/advisories/misp-stored-xss-via-the-linotp-login-field/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://zigrin.com/cakephp-application-cybersecurity-research-protect-your-website-from-stored-xss-attacks-understanding-and-preventing-vulnerabilities-in-open-source-applications/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-30963",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-05-17T15:15:10.523",
|
||||
"lastModified": "2023-10-25T18:17:03.937",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:52:56.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-30964",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-05-17T15:15:10.617",
|
||||
"lastModified": "2023-10-25T18:17:03.993",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:53:00.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-30965",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-05-17T15:15:10.717",
|
||||
"lastModified": "2023-10-25T18:17:04.050",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:53:06.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-30966",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-05-17T15:15:10.827",
|
||||
"lastModified": "2023-10-25T18:17:04.113",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:53:10.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-30967",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-05-17T15:15:10.937",
|
||||
"lastModified": "2023-10-25T18:17:04.193",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:49:36.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-30968",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-05-17T15:15:11.037",
|
||||
"lastModified": "2023-10-25T18:17:04.270",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:49:42.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-30970",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-05-17T15:15:11.257",
|
||||
"lastModified": "2023-10-25T18:17:04.397",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:49:45.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-34170",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-06-23T17:15:15.253",
|
||||
"lastModified": "2023-10-25T18:17:05.083",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:52:35.667",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -21,19 +21,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-34171",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-06-23T17:15:15.317",
|
||||
"lastModified": "2023-10-25T18:17:05.217",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:44:47.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -21,19 +21,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-34172",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-06-23T17:15:15.383",
|
||||
"lastModified": "2023-10-25T18:17:05.293",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:46:59.020",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -21,19 +21,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-34173",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-06-23T17:15:15.447",
|
||||
"lastModified": "2023-10-25T18:17:05.420",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:47:09.900",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -21,19 +21,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-34176",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-06-23T17:15:15.620",
|
||||
"lastModified": "2023-10-25T18:17:05.927",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:47:27.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -63,6 +63,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-34178",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-06-23T17:15:15.737",
|
||||
"lastModified": "2023-10-25T18:17:06.300",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:41:06.147",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -63,6 +63,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-34182",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-06-23T17:15:15.990",
|
||||
"lastModified": "2023-10-25T18:17:06.770",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:41:39.790",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -63,6 +63,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-34183",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-06-23T17:15:16.057",
|
||||
"lastModified": "2023-10-25T18:17:06.887",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:41:49.433",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -63,6 +63,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-34184",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-06-23T17:15:16.123",
|
||||
"lastModified": "2023-10-25T18:17:06.980",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:41:58.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -63,6 +63,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-34185",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-06-23T17:15:16.190",
|
||||
"lastModified": "2023-10-25T18:17:07.100",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:53:49.573",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -63,6 +63,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-34186",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-06-23T17:15:16.257",
|
||||
"lastModified": "2023-10-25T18:17:07.203",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:53:46.053",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -63,6 +63,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-34187",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-06-23T17:15:16.327",
|
||||
"lastModified": "2023-10-25T18:17:07.410",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-11-03T02:53:41.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -63,6 +63,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43423",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-10-19T16:15:11.387",
|
||||
"lastModified": "2023-10-25T18:17:19.980",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:22:52.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43424",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-10-19T16:15:11.440",
|
||||
"lastModified": "2023-10-25T18:17:20.057",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:24:27.667",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -38,6 +38,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
@ -48,9 +60,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jenkins:compuware_xpediter_code:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0.7",
|
||||
"matchCriteriaId": "AA9F910E-95CE-43AF-AD37-341F04123DC9"
|
||||
"criteria": "cpe:2.3:a:jenkins:compuware_xpediter_code_coverage:*:*:*:*:*:jenkins:*:*",
|
||||
"versionEndExcluding": "1.0.8",
|
||||
"matchCriteriaId": "40CF8A84-DDEA-47E8-A80E-5AA09209F189"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43425",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-10-19T16:15:11.500",
|
||||
"lastModified": "2023-10-25T18:17:20.140",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:28:28.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -38,6 +38,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43426",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-10-19T16:15:11.553",
|
||||
"lastModified": "2023-10-25T18:17:20.197",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:31:29.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -38,6 +38,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43427",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-10-19T16:15:11.613",
|
||||
"lastModified": "2023-10-25T18:17:20.257",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:33:29.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -38,6 +38,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
@ -47,9 +59,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jenkins:compuware_topaz_for_total_test:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.4.8",
|
||||
"matchCriteriaId": "905A53D8-F45C-408E-B996-90AD7D539519"
|
||||
"criteria": "cpe:2.3:a:jenkins:compuware_topaz_for_total_test:*:*:*:*:*:jenkins:*:*",
|
||||
"versionEndExcluding": "2.4.8",
|
||||
"matchCriteriaId": "EE8AA4CD-8F56-4BFF-BF1E-11C120770EDB"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43428",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-10-19T16:15:11.673",
|
||||
"lastModified": "2023-10-25T18:17:20.313",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:39:41.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -38,6 +38,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43429",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-10-19T16:15:11.730",
|
||||
"lastModified": "2023-10-25T18:17:20.383",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:41:51.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -38,6 +38,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
@ -48,9 +60,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jenkins:compuware_topaz_for_total_test:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:jenkins:compuware_topaz_for_total_test:*:*:*:*:*:jenkins:*:*",
|
||||
"versionEndIncluding": "2.4.8",
|
||||
"matchCriteriaId": "905A53D8-F45C-408E-B996-90AD7D539519"
|
||||
"matchCriteriaId": "9BBA3703-E550-492C-B952-BA184EE2C37E"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24429",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-01-26T21:18:17.110",
|
||||
"lastModified": "2023-10-25T18:17:23.990",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:49:40.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -67,7 +67,10 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2973%20%281%29",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24430",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-01-26T21:18:17.170",
|
||||
"lastModified": "2023-10-25T18:17:24.057",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:45:22.703",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -67,7 +67,10 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2973%20%282%29",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24431",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-01-26T21:18:17.240",
|
||||
"lastModified": "2023-10-25T18:17:24.110",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:50:55.897",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -67,7 +67,10 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%281%29",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24432",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-01-26T21:18:17.307",
|
||||
"lastModified": "2023-10-25T18:17:24.167",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:43:10.883",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -67,7 +67,10 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%282%29",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24433",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-01-26T21:18:17.387",
|
||||
"lastModified": "2023-10-25T18:17:24.233",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:51:35.530",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -67,7 +67,10 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%282%29",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24434",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-01-26T21:18:17.457",
|
||||
"lastModified": "2023-10-25T18:17:24.300",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:52:57.313",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -67,7 +67,10 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24435",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-01-26T21:18:17.537",
|
||||
"lastModified": "2023-10-25T18:17:24.357",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:53:24.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -67,7 +67,10 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24436",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-01-26T21:18:17.600",
|
||||
"lastModified": "2023-10-25T18:17:24.417",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:55:43.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -67,7 +67,10 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%281%29",
|
||||
"source": "jenkinsci-cert@googlegroups.com"
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25761",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-02-15T14:15:13.387",
|
||||
"lastModified": "2023-10-25T18:17:24.680",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:59:17.893",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -34,6 +34,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25762",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-02-15T14:15:13.470",
|
||||
"lastModified": "2023-10-25T18:17:24.743",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:58:18.033",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -34,6 +34,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25763",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-02-15T14:15:13.543",
|
||||
"lastModified": "2023-10-25T18:17:24.803",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:59:48.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -34,6 +34,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
@ -44,8 +56,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jenkins:email_extension:*:*:*:*:*:jenkins:*:*",
|
||||
"versionEndIncluding": "2.93",
|
||||
"matchCriteriaId": "01DE9D8E-739F-40C4-B7B2-5A89343A1E62"
|
||||
"versionEndExcluding": "2.93.1",
|
||||
"matchCriteriaId": "0EAD1FED-8A76-46BE-BA9A-4407E1368FE4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25764",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-02-15T14:15:13.617",
|
||||
"lastModified": "2023-10-25T18:17:24.857",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T01:57:13.527",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -56,8 +56,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jenkins:email_extension:*:*:*:*:*:jenkins:*:*",
|
||||
"versionEndIncluding": "2.93",
|
||||
"matchCriteriaId": "01DE9D8E-739F-40C4-B7B2-5A89343A1E62"
|
||||
"versionEndExcluding": "2.93.1",
|
||||
"matchCriteriaId": "0EAD1FED-8A76-46BE-BA9A-4407E1368FE4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25765",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-02-15T14:15:13.700",
|
||||
"lastModified": "2023-10-25T18:17:24.917",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:00:58.373",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -34,6 +34,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
@ -44,8 +56,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jenkins:email_extension:*:*:*:*:*:jenkins:*:*",
|
||||
"versionEndIncluding": "2.93",
|
||||
"matchCriteriaId": "01DE9D8E-739F-40C4-B7B2-5A89343A1E62"
|
||||
"versionEndExcluding": "2.93.1",
|
||||
"matchCriteriaId": "0EAD1FED-8A76-46BE-BA9A-4407E1368FE4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25766",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-02-15T14:15:13.773",
|
||||
"lastModified": "2023-10-25T18:17:24.967",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:06:20.837",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25767",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-02-15T14:15:13.847",
|
||||
"lastModified": "2023-10-25T18:17:25.027",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:02:37.800",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -34,6 +34,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25768",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2023-02-15T14:15:13.947",
|
||||
"lastModified": "2023-10-25T18:17:25.083",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:04:03.650",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
43
CVE-2023/CVE-2023-360xx/CVE-2023-36022.json
Normal file
43
CVE-2023/CVE-2023-360xx/CVE-2023-36022.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-36022",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-11-03T01:15:07.907",
|
||||
"lastModified": "2023-11-03T01:15:07.907",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36022",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-360xx/CVE-2023-36029.json
Normal file
43
CVE-2023/CVE-2023-360xx/CVE-2023-36029.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-36029",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-11-03T01:15:07.980",
|
||||
"lastModified": "2023-11-03T01:15:07.980",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36029",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-360xx/CVE-2023-36034.json
Normal file
43
CVE-2023/CVE-2023-360xx/CVE-2023-36034.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-36034",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-11-03T01:15:08.047",
|
||||
"lastModified": "2023-11-03T01:15:08.047",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36034",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40592",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2023-08-30T17:15:09.763",
|
||||
"lastModified": "2023-10-18T21:15:08.740",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:12:20.743",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -113,7 +113,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/182f9080-4137-4629-94ac-cb1083ac981a/",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40593",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2023-08-30T17:15:09.853",
|
||||
"lastModified": "2023-10-18T21:15:08.833",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:13:51.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -108,7 +108,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/8e8a86d5-f323-4567-95be-8e817e2baee6/",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40594",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2023-08-30T17:15:09.940",
|
||||
"lastModified": "2023-10-18T21:15:08.897",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:16:11.283",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -113,7 +113,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/78b48d08-075c-4eac-bd07-e364c3780867/",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40595",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2023-08-30T17:15:10.027",
|
||||
"lastModified": "2023-10-18T21:15:08.967",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:21:10.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -17,19 +17,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
@ -61,7 +61,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -113,7 +113,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/d1d8fda6-874a-400f-82cf-dcbb59d8e4db/",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40597",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2023-08-30T17:15:10.180",
|
||||
"lastModified": "2023-10-18T21:15:09.033",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:22:28.370",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -113,7 +113,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/356bd3fe-f59b-4f64-baa1-51495411b7ad/",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40598",
|
||||
"sourceIdentifier": "prodsec@splunk.com",
|
||||
"published": "2023-08-30T17:15:10.267",
|
||||
"lastModified": "2023-10-18T21:15:09.107",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-03T02:23:14.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -114,7 +114,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd/",
|
||||
"source": "prodsec@splunk.com"
|
||||
"source": "prodsec@splunk.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-461xx/CVE-2023-46176.json
Normal file
59
CVE-2023/CVE-2023-461xx/CVE-2023-46176.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-46176",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-11-03T01:15:08.117",
|
||||
"lastModified": "2023-11-03T01:15:08.117",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM MQ Appliance 9.3 CD could allow a local attacker to gain elevated privileges on the system, caused by improper validation of security keys. IBM X-Force ID: 269535."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-424"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269535",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7060769",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
45
README.md
45
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-11-03T00:55:18.928976+00:00
|
||||
2023-11-03T03:00:19.927592+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-11-03T00:15:12.757000+00:00
|
||||
2023-11-03T02:55:08.753000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -23,28 +23,55 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2023-11-01T01:00:13.544214+00:00
|
||||
2023-11-03T01:00:13.595060+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
229675
|
||||
229680
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
* [CVE-2023-42027](CVE-2023/CVE-2023-420xx/CVE-2023-42027.json) (`2023-11-03T00:15:12.593`)
|
||||
* [CVE-2023-42029](CVE-2023/CVE-2023-420xx/CVE-2023-42029.json) (`2023-11-03T00:15:12.683`)
|
||||
* [CVE-2023-43018](CVE-2023/CVE-2023-430xx/CVE-2023-43018.json) (`2023-11-03T00:15:12.757`)
|
||||
* [CVE-2017-7252](CVE-2017/CVE-2017-72xx/CVE-2017-7252.json) (`2023-11-03T01:15:07.777`)
|
||||
* [CVE-2023-36022](CVE-2023/CVE-2023-360xx/CVE-2023-36022.json) (`2023-11-03T01:15:07.907`)
|
||||
* [CVE-2023-36029](CVE-2023/CVE-2023-360xx/CVE-2023-36029.json) (`2023-11-03T01:15:07.980`)
|
||||
* [CVE-2023-36034](CVE-2023/CVE-2023-360xx/CVE-2023-36034.json) (`2023-11-03T01:15:08.047`)
|
||||
* [CVE-2023-46176](CVE-2023/CVE-2023-461xx/CVE-2023-46176.json) (`2023-11-03T01:15:08.117`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `63`
|
||||
|
||||
* [CVE-2022-34185](CVE-2022/CVE-2022-341xx/CVE-2022-34185.json) (`2023-11-03T02:53:49.573`)
|
||||
* [CVE-2022-25318](CVE-2022/CVE-2022-253xx/CVE-2022-25318.json) (`2023-11-03T02:54:55.067`)
|
||||
* [CVE-2022-29529](CVE-2022/CVE-2022-295xx/CVE-2022-29529.json) (`2023-11-03T02:55:08.753`)
|
||||
* [CVE-2023-24432](CVE-2023/CVE-2023-244xx/CVE-2023-24432.json) (`2023-11-03T01:43:10.883`)
|
||||
* [CVE-2023-24430](CVE-2023/CVE-2023-244xx/CVE-2023-24430.json) (`2023-11-03T01:45:22.703`)
|
||||
* [CVE-2023-24429](CVE-2023/CVE-2023-244xx/CVE-2023-24429.json) (`2023-11-03T01:49:40.803`)
|
||||
* [CVE-2023-24431](CVE-2023/CVE-2023-244xx/CVE-2023-24431.json) (`2023-11-03T01:50:55.897`)
|
||||
* [CVE-2023-24433](CVE-2023/CVE-2023-244xx/CVE-2023-24433.json) (`2023-11-03T01:51:35.530`)
|
||||
* [CVE-2023-24434](CVE-2023/CVE-2023-244xx/CVE-2023-24434.json) (`2023-11-03T01:52:57.313`)
|
||||
* [CVE-2023-24435](CVE-2023/CVE-2023-244xx/CVE-2023-24435.json) (`2023-11-03T01:53:24.537`)
|
||||
* [CVE-2023-24436](CVE-2023/CVE-2023-244xx/CVE-2023-24436.json) (`2023-11-03T01:55:43.407`)
|
||||
* [CVE-2023-25764](CVE-2023/CVE-2023-257xx/CVE-2023-25764.json) (`2023-11-03T01:57:13.527`)
|
||||
* [CVE-2023-25762](CVE-2023/CVE-2023-257xx/CVE-2023-25762.json) (`2023-11-03T01:58:18.033`)
|
||||
* [CVE-2023-25761](CVE-2023/CVE-2023-257xx/CVE-2023-25761.json) (`2023-11-03T01:59:17.893`)
|
||||
* [CVE-2023-25763](CVE-2023/CVE-2023-257xx/CVE-2023-25763.json) (`2023-11-03T01:59:48.757`)
|
||||
* [CVE-2023-25765](CVE-2023/CVE-2023-257xx/CVE-2023-25765.json) (`2023-11-03T02:00:58.373`)
|
||||
* [CVE-2023-25767](CVE-2023/CVE-2023-257xx/CVE-2023-25767.json) (`2023-11-03T02:02:37.800`)
|
||||
* [CVE-2023-25768](CVE-2023/CVE-2023-257xx/CVE-2023-25768.json) (`2023-11-03T02:04:03.650`)
|
||||
* [CVE-2023-25766](CVE-2023/CVE-2023-257xx/CVE-2023-25766.json) (`2023-11-03T02:06:20.837`)
|
||||
* [CVE-2023-40592](CVE-2023/CVE-2023-405xx/CVE-2023-40592.json) (`2023-11-03T02:12:20.743`)
|
||||
* [CVE-2023-40593](CVE-2023/CVE-2023-405xx/CVE-2023-40593.json) (`2023-11-03T02:13:51.010`)
|
||||
* [CVE-2023-40594](CVE-2023/CVE-2023-405xx/CVE-2023-40594.json) (`2023-11-03T02:16:11.283`)
|
||||
* [CVE-2023-40595](CVE-2023/CVE-2023-405xx/CVE-2023-40595.json) (`2023-11-03T02:21:10.870`)
|
||||
* [CVE-2023-40597](CVE-2023/CVE-2023-405xx/CVE-2023-40597.json) (`2023-11-03T02:22:28.370`)
|
||||
* [CVE-2023-40598](CVE-2023/CVE-2023-405xx/CVE-2023-40598.json) (`2023-11-03T02:23:14.207`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user