Auto-Update: 2023-11-03T03:00:19.927592+00:00

This commit is contained in:
cad-safe-bot 2023-11-03 03:00:24 +00:00
parent e8774838a1
commit 2a2043582a
69 changed files with 726 additions and 190 deletions

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2017-7252",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T01:15:07.777",
"lastModified": "2023-11-03T01:15:07.777",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "bcrypt password hashing in Botan before 2.1.0 does not correctly handle passwords with a length between 57 and 72 characters, which makes it easier for attackers to determine the cleartext password."
}
],
"metrics": {},
"references": [
{
"url": "https://botan.randombit.net/security.html",
"source": "cve@mitre.org"
},
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1034591",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-21697",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-11-04T17:15:08.927",
"lastModified": "2023-10-25T18:16:53.007",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:35:36.123",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -63,6 +63,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-25318",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-02-18T06:15:10.463",
"lastModified": "2023-10-30T22:15:08.983",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:54:55.067",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -104,7 +104,10 @@
},
{
"url": "https://zigrin.com/advisories/cerebrate-an-incorrect-sharing-group-acl/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28149",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:09.060",
"lastModified": "2023-10-25T18:17:00.887",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:34:33.620",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28150",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:09.517",
"lastModified": "2023-10-25T18:17:00.947",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:34:29.200",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -104,7 +104,10 @@
},
{
"url": "https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20%281%29",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28151",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:09.680",
"lastModified": "2023-10-25T18:17:01.003",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:34:25.537",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -104,7 +104,10 @@
},
{
"url": "https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20%281%29",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28152",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:09.743",
"lastModified": "2023-10-25T18:17:01.063",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:34:21.800",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -104,7 +104,10 @@
},
{
"url": "https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20%282%29",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28153",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:09.953",
"lastModified": "2023-10-25T18:17:01.127",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:34:14.737",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28154",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:10.180",
"lastModified": "2023-10-25T18:17:01.187",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:34:10.873",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28155",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:10.320",
"lastModified": "2023-10-25T18:17:01.253",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:33:05.297",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28156",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:10.383",
"lastModified": "2023-10-25T18:17:01.317",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:34:58.183",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28157",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:10.440",
"lastModified": "2023-10-25T18:17:01.377",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:32:51.690",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28158",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:10.497",
"lastModified": "2023-10-25T18:17:01.447",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:31:56.047",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28159",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:10.550",
"lastModified": "2023-10-25T18:17:01.513",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:31:38.663",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28160",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:10.617",
"lastModified": "2023-10-25T18:17:01.603",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:31:30.100",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-29529",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-20T23:15:08.467",
"lastModified": "2023-10-30T22:15:09.297",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:55:08.753",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -112,7 +112,10 @@
},
{
"url": "https://zigrin.com/advisories/misp-stored-xss-via-the-linotp-login-field/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://zigrin.com/cakephp-application-cybersecurity-research-protect-your-website-from-stored-xss-attacks-understanding-and-preventing-vulnerabilities-in-open-source-applications/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30963",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:10.523",
"lastModified": "2023-10-25T18:17:03.937",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:52:56.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30964",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:10.617",
"lastModified": "2023-10-25T18:17:03.993",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:53:00.880",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30965",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:10.717",
"lastModified": "2023-10-25T18:17:04.050",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:53:06.647",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30966",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:10.827",
"lastModified": "2023-10-25T18:17:04.113",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:53:10.817",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30967",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:10.937",
"lastModified": "2023-10-25T18:17:04.193",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:49:36.377",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30968",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:11.037",
"lastModified": "2023-10-25T18:17:04.270",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:49:42.217",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30970",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-05-17T15:15:11.257",
"lastModified": "2023-10-25T18:17:04.397",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:49:45.927",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34170",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.253",
"lastModified": "2023-10-25T18:17:05.083",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:52:35.667",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -21,19 +21,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34171",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.317",
"lastModified": "2023-10-25T18:17:05.217",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:44:47.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -21,19 +21,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34172",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.383",
"lastModified": "2023-10-25T18:17:05.293",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:46:59.020",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -21,19 +21,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34173",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.447",
"lastModified": "2023-10-25T18:17:05.420",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:47:09.900",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -21,19 +21,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34176",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.620",
"lastModified": "2023-10-25T18:17:05.927",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:47:27.337",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -63,6 +63,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34178",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.737",
"lastModified": "2023-10-25T18:17:06.300",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:41:06.147",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -63,6 +63,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34182",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:15.990",
"lastModified": "2023-10-25T18:17:06.770",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:41:39.790",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -63,6 +63,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34183",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.057",
"lastModified": "2023-10-25T18:17:06.887",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:41:49.433",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -63,6 +63,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34184",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.123",
"lastModified": "2023-10-25T18:17:06.980",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:41:58.117",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -63,6 +63,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34185",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.190",
"lastModified": "2023-10-25T18:17:07.100",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:53:49.573",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -63,6 +63,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34186",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.257",
"lastModified": "2023-10-25T18:17:07.203",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:53:46.053",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -63,6 +63,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34187",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-06-23T17:15:16.327",
"lastModified": "2023-10-25T18:17:07.410",
"vulnStatus": "Modified",
"lastModified": "2023-11-03T02:53:41.337",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -63,6 +63,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43423",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.387",
"lastModified": "2023-10-25T18:17:19.980",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:22:52.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43424",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.440",
"lastModified": "2023-10-25T18:17:20.057",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:24:27.667",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -38,6 +38,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
@ -48,9 +60,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:compuware_xpediter_code:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.7",
"matchCriteriaId": "AA9F910E-95CE-43AF-AD37-341F04123DC9"
"criteria": "cpe:2.3:a:jenkins:compuware_xpediter_code_coverage:*:*:*:*:*:jenkins:*:*",
"versionEndExcluding": "1.0.8",
"matchCriteriaId": "40CF8A84-DDEA-47E8-A80E-5AA09209F189"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43425",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.500",
"lastModified": "2023-10-25T18:17:20.140",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:28:28.093",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -38,6 +38,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43426",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.553",
"lastModified": "2023-10-25T18:17:20.197",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:31:29.647",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -38,6 +38,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43427",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.613",
"lastModified": "2023-10-25T18:17:20.257",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:33:29.297",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -38,6 +38,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
@ -47,9 +59,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:compuware_topaz_for_total_test:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.4.8",
"matchCriteriaId": "905A53D8-F45C-408E-B996-90AD7D539519"
"criteria": "cpe:2.3:a:jenkins:compuware_topaz_for_total_test:*:*:*:*:*:jenkins:*:*",
"versionEndExcluding": "2.4.8",
"matchCriteriaId": "EE8AA4CD-8F56-4BFF-BF1E-11C120770EDB"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43428",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.673",
"lastModified": "2023-10-25T18:17:20.313",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:39:41.243",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -38,6 +38,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43429",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.730",
"lastModified": "2023-10-25T18:17:20.383",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:41:51.027",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -38,6 +38,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
@ -48,9 +60,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:compuware_topaz_for_total_test:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:jenkins:compuware_topaz_for_total_test:*:*:*:*:*:jenkins:*:*",
"versionEndIncluding": "2.4.8",
"matchCriteriaId": "905A53D8-F45C-408E-B996-90AD7D539519"
"matchCriteriaId": "9BBA3703-E550-492C-B952-BA184EE2C37E"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24429",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-01-26T21:18:17.110",
"lastModified": "2023-10-25T18:17:23.990",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:49:40.803",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -67,7 +67,10 @@
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2973%20%281%29",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24430",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-01-26T21:18:17.170",
"lastModified": "2023-10-25T18:17:24.057",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:45:22.703",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -67,7 +67,10 @@
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2973%20%282%29",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24431",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-01-26T21:18:17.240",
"lastModified": "2023-10-25T18:17:24.110",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:50:55.897",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -67,7 +67,10 @@
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%281%29",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24432",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-01-26T21:18:17.307",
"lastModified": "2023-10-25T18:17:24.167",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:43:10.883",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -67,7 +67,10 @@
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%282%29",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24433",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-01-26T21:18:17.387",
"lastModified": "2023-10-25T18:17:24.233",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:51:35.530",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -67,7 +67,10 @@
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%282%29",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24434",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-01-26T21:18:17.457",
"lastModified": "2023-10-25T18:17:24.300",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:52:57.313",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -67,7 +67,10 @@
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24435",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-01-26T21:18:17.537",
"lastModified": "2023-10-25T18:17:24.357",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:53:24.537",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -67,7 +67,10 @@
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24436",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-01-26T21:18:17.600",
"lastModified": "2023-10-25T18:17:24.417",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:55:43.407",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -67,7 +67,10 @@
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%281%29",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25761",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-02-15T14:15:13.387",
"lastModified": "2023-10-25T18:17:24.680",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:59:17.893",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,6 +34,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25762",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-02-15T14:15:13.470",
"lastModified": "2023-10-25T18:17:24.743",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:58:18.033",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,6 +34,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25763",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-02-15T14:15:13.543",
"lastModified": "2023-10-25T18:17:24.803",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:59:48.757",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,6 +34,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
@ -44,8 +56,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:email_extension:*:*:*:*:*:jenkins:*:*",
"versionEndIncluding": "2.93",
"matchCriteriaId": "01DE9D8E-739F-40C4-B7B2-5A89343A1E62"
"versionEndExcluding": "2.93.1",
"matchCriteriaId": "0EAD1FED-8A76-46BE-BA9A-4407E1368FE4"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25764",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-02-15T14:15:13.617",
"lastModified": "2023-10-25T18:17:24.857",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T01:57:13.527",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -56,8 +56,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:email_extension:*:*:*:*:*:jenkins:*:*",
"versionEndIncluding": "2.93",
"matchCriteriaId": "01DE9D8E-739F-40C4-B7B2-5A89343A1E62"
"versionEndExcluding": "2.93.1",
"matchCriteriaId": "0EAD1FED-8A76-46BE-BA9A-4407E1368FE4"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25765",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-02-15T14:15:13.700",
"lastModified": "2023-10-25T18:17:24.917",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:00:58.373",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,6 +34,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
@ -44,8 +56,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:email_extension:*:*:*:*:*:jenkins:*:*",
"versionEndIncluding": "2.93",
"matchCriteriaId": "01DE9D8E-739F-40C4-B7B2-5A89343A1E62"
"versionEndExcluding": "2.93.1",
"matchCriteriaId": "0EAD1FED-8A76-46BE-BA9A-4407E1368FE4"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25766",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-02-15T14:15:13.773",
"lastModified": "2023-10-25T18:17:24.967",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:06:20.837",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25767",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-02-15T14:15:13.847",
"lastModified": "2023-10-25T18:17:25.027",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:02:37.800",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,6 +34,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25768",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-02-15T14:15:13.947",
"lastModified": "2023-10-25T18:17:25.083",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:04:03.650",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-36022",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-11-03T01:15:07.907",
"lastModified": "2023-11-03T01:15:07.907",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36022",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-36029",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-11-03T01:15:07.980",
"lastModified": "2023-11-03T01:15:07.980",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36029",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-36034",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-11-03T01:15:08.047",
"lastModified": "2023-11-03T01:15:08.047",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36034",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40592",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-08-30T17:15:09.763",
"lastModified": "2023-10-18T21:15:08.740",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:12:20.743",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -113,7 +113,10 @@
},
{
"url": "https://research.splunk.com/application/182f9080-4137-4629-94ac-cb1083ac981a/",
"source": "prodsec@splunk.com"
"source": "prodsec@splunk.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40593",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-08-30T17:15:09.853",
"lastModified": "2023-10-18T21:15:08.833",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:13:51.010",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -108,7 +108,10 @@
},
{
"url": "https://research.splunk.com/application/8e8a86d5-f323-4567-95be-8e817e2baee6/",
"source": "prodsec@splunk.com"
"source": "prodsec@splunk.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40594",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-08-30T17:15:09.940",
"lastModified": "2023-10-18T21:15:08.897",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:16:11.283",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -113,7 +113,10 @@
},
{
"url": "https://research.splunk.com/application/78b48d08-075c-4eac-bd07-e364c3780867/",
"source": "prodsec@splunk.com"
"source": "prodsec@splunk.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40595",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-08-30T17:15:10.027",
"lastModified": "2023-10-18T21:15:08.967",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:21:10.870",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,19 +17,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
@ -61,7 +61,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-502"
}
]
}
@ -113,7 +113,10 @@
},
{
"url": "https://research.splunk.com/application/d1d8fda6-874a-400f-82cf-dcbb59d8e4db/",
"source": "prodsec@splunk.com"
"source": "prodsec@splunk.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40597",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-08-30T17:15:10.180",
"lastModified": "2023-10-18T21:15:09.033",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:22:28.370",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -113,7 +113,10 @@
},
{
"url": "https://research.splunk.com/application/356bd3fe-f59b-4f64-baa1-51495411b7ad/",
"source": "prodsec@splunk.com"
"source": "prodsec@splunk.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40598",
"sourceIdentifier": "prodsec@splunk.com",
"published": "2023-08-30T17:15:10.267",
"lastModified": "2023-10-18T21:15:09.107",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-03T02:23:14.207",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -114,7 +114,10 @@
},
{
"url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd/",
"source": "prodsec@splunk.com"
"source": "prodsec@splunk.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-46176",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-11-03T01:15:08.117",
"lastModified": "2023-11-03T01:15:08.117",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM MQ Appliance 9.3 CD could allow a local attacker to gain elevated privileges on the system, caused by improper validation of security keys. IBM X-Force ID: 269535."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-424"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269535",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7060769",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-03T00:55:18.928976+00:00
2023-11-03T03:00:19.927592+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-03T00:15:12.757000+00:00
2023-11-03T02:55:08.753000+00:00
```
### Last Data Feed Release
@ -23,28 +23,55 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2023-11-01T01:00:13.544214+00:00
2023-11-03T01:00:13.595060+00:00
```
### Total Number of included CVEs
```plain
229675
229680
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `5`
* [CVE-2023-42027](CVE-2023/CVE-2023-420xx/CVE-2023-42027.json) (`2023-11-03T00:15:12.593`)
* [CVE-2023-42029](CVE-2023/CVE-2023-420xx/CVE-2023-42029.json) (`2023-11-03T00:15:12.683`)
* [CVE-2023-43018](CVE-2023/CVE-2023-430xx/CVE-2023-43018.json) (`2023-11-03T00:15:12.757`)
* [CVE-2017-7252](CVE-2017/CVE-2017-72xx/CVE-2017-7252.json) (`2023-11-03T01:15:07.777`)
* [CVE-2023-36022](CVE-2023/CVE-2023-360xx/CVE-2023-36022.json) (`2023-11-03T01:15:07.907`)
* [CVE-2023-36029](CVE-2023/CVE-2023-360xx/CVE-2023-36029.json) (`2023-11-03T01:15:07.980`)
* [CVE-2023-36034](CVE-2023/CVE-2023-360xx/CVE-2023-36034.json) (`2023-11-03T01:15:08.047`)
* [CVE-2023-46176](CVE-2023/CVE-2023-461xx/CVE-2023-46176.json) (`2023-11-03T01:15:08.117`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `63`
* [CVE-2022-34185](CVE-2022/CVE-2022-341xx/CVE-2022-34185.json) (`2023-11-03T02:53:49.573`)
* [CVE-2022-25318](CVE-2022/CVE-2022-253xx/CVE-2022-25318.json) (`2023-11-03T02:54:55.067`)
* [CVE-2022-29529](CVE-2022/CVE-2022-295xx/CVE-2022-29529.json) (`2023-11-03T02:55:08.753`)
* [CVE-2023-24432](CVE-2023/CVE-2023-244xx/CVE-2023-24432.json) (`2023-11-03T01:43:10.883`)
* [CVE-2023-24430](CVE-2023/CVE-2023-244xx/CVE-2023-24430.json) (`2023-11-03T01:45:22.703`)
* [CVE-2023-24429](CVE-2023/CVE-2023-244xx/CVE-2023-24429.json) (`2023-11-03T01:49:40.803`)
* [CVE-2023-24431](CVE-2023/CVE-2023-244xx/CVE-2023-24431.json) (`2023-11-03T01:50:55.897`)
* [CVE-2023-24433](CVE-2023/CVE-2023-244xx/CVE-2023-24433.json) (`2023-11-03T01:51:35.530`)
* [CVE-2023-24434](CVE-2023/CVE-2023-244xx/CVE-2023-24434.json) (`2023-11-03T01:52:57.313`)
* [CVE-2023-24435](CVE-2023/CVE-2023-244xx/CVE-2023-24435.json) (`2023-11-03T01:53:24.537`)
* [CVE-2023-24436](CVE-2023/CVE-2023-244xx/CVE-2023-24436.json) (`2023-11-03T01:55:43.407`)
* [CVE-2023-25764](CVE-2023/CVE-2023-257xx/CVE-2023-25764.json) (`2023-11-03T01:57:13.527`)
* [CVE-2023-25762](CVE-2023/CVE-2023-257xx/CVE-2023-25762.json) (`2023-11-03T01:58:18.033`)
* [CVE-2023-25761](CVE-2023/CVE-2023-257xx/CVE-2023-25761.json) (`2023-11-03T01:59:17.893`)
* [CVE-2023-25763](CVE-2023/CVE-2023-257xx/CVE-2023-25763.json) (`2023-11-03T01:59:48.757`)
* [CVE-2023-25765](CVE-2023/CVE-2023-257xx/CVE-2023-25765.json) (`2023-11-03T02:00:58.373`)
* [CVE-2023-25767](CVE-2023/CVE-2023-257xx/CVE-2023-25767.json) (`2023-11-03T02:02:37.800`)
* [CVE-2023-25768](CVE-2023/CVE-2023-257xx/CVE-2023-25768.json) (`2023-11-03T02:04:03.650`)
* [CVE-2023-25766](CVE-2023/CVE-2023-257xx/CVE-2023-25766.json) (`2023-11-03T02:06:20.837`)
* [CVE-2023-40592](CVE-2023/CVE-2023-405xx/CVE-2023-40592.json) (`2023-11-03T02:12:20.743`)
* [CVE-2023-40593](CVE-2023/CVE-2023-405xx/CVE-2023-40593.json) (`2023-11-03T02:13:51.010`)
* [CVE-2023-40594](CVE-2023/CVE-2023-405xx/CVE-2023-40594.json) (`2023-11-03T02:16:11.283`)
* [CVE-2023-40595](CVE-2023/CVE-2023-405xx/CVE-2023-40595.json) (`2023-11-03T02:21:10.870`)
* [CVE-2023-40597](CVE-2023/CVE-2023-405xx/CVE-2023-40597.json) (`2023-11-03T02:22:28.370`)
* [CVE-2023-40598](CVE-2023/CVE-2023-405xx/CVE-2023-40598.json) (`2023-11-03T02:23:14.207`)
## Download and Usage