From 2a2043582a3a87e1f9a93a05f9beb2040a599a33 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 3 Nov 2023 03:00:24 +0000 Subject: [PATCH] Auto-Update: 2023-11-03T03:00:19.927592+00:00 --- CVE-2017/CVE-2017-72xx/CVE-2017-7252.json | 24 +++++++++ CVE-2021/CVE-2021-216xx/CVE-2021-21697.json | 16 +++++- CVE-2022/CVE-2022-253xx/CVE-2022-25318.json | 9 ++-- CVE-2022/CVE-2022-281xx/CVE-2022-28149.json | 4 +- CVE-2022/CVE-2022-281xx/CVE-2022-28150.json | 9 ++-- CVE-2022/CVE-2022-281xx/CVE-2022-28151.json | 9 ++-- CVE-2022/CVE-2022-281xx/CVE-2022-28152.json | 9 ++-- CVE-2022/CVE-2022-281xx/CVE-2022-28153.json | 4 +- CVE-2022/CVE-2022-281xx/CVE-2022-28154.json | 4 +- CVE-2022/CVE-2022-281xx/CVE-2022-28155.json | 4 +- CVE-2022/CVE-2022-281xx/CVE-2022-28156.json | 4 +- CVE-2022/CVE-2022-281xx/CVE-2022-28157.json | 4 +- CVE-2022/CVE-2022-281xx/CVE-2022-28158.json | 4 +- CVE-2022/CVE-2022-281xx/CVE-2022-28159.json | 4 +- CVE-2022/CVE-2022-281xx/CVE-2022-28160.json | 4 +- CVE-2022/CVE-2022-295xx/CVE-2022-29529.json | 9 ++-- CVE-2022/CVE-2022-309xx/CVE-2022-30963.json | 4 +- CVE-2022/CVE-2022-309xx/CVE-2022-30964.json | 4 +- CVE-2022/CVE-2022-309xx/CVE-2022-30965.json | 4 +- CVE-2022/CVE-2022-309xx/CVE-2022-30966.json | 4 +- CVE-2022/CVE-2022-309xx/CVE-2022-30967.json | 4 +- CVE-2022/CVE-2022-309xx/CVE-2022-30968.json | 4 +- CVE-2022/CVE-2022-309xx/CVE-2022-30970.json | 4 +- CVE-2022/CVE-2022-341xx/CVE-2022-34170.json | 12 ++--- CVE-2022/CVE-2022-341xx/CVE-2022-34171.json | 12 ++--- CVE-2022/CVE-2022-341xx/CVE-2022-34172.json | 12 ++--- CVE-2022/CVE-2022-341xx/CVE-2022-34173.json | 12 ++--- CVE-2022/CVE-2022-341xx/CVE-2022-34176.json | 16 +++++- CVE-2022/CVE-2022-341xx/CVE-2022-34178.json | 16 +++++- CVE-2022/CVE-2022-341xx/CVE-2022-34182.json | 16 +++++- CVE-2022/CVE-2022-341xx/CVE-2022-34183.json | 16 +++++- CVE-2022/CVE-2022-341xx/CVE-2022-34184.json | 16 +++++- CVE-2022/CVE-2022-341xx/CVE-2022-34185.json | 16 +++++- CVE-2022/CVE-2022-341xx/CVE-2022-34186.json | 16 +++++- CVE-2022/CVE-2022-341xx/CVE-2022-34187.json | 16 +++++- CVE-2022/CVE-2022-434xx/CVE-2022-43423.json | 4 +- CVE-2022/CVE-2022-434xx/CVE-2022-43424.json | 22 ++++++-- CVE-2022/CVE-2022-434xx/CVE-2022-43425.json | 16 +++++- CVE-2022/CVE-2022-434xx/CVE-2022-43426.json | 16 +++++- CVE-2022/CVE-2022-434xx/CVE-2022-43427.json | 22 ++++++-- CVE-2022/CVE-2022-434xx/CVE-2022-43428.json | 16 +++++- CVE-2022/CVE-2022-434xx/CVE-2022-43429.json | 20 +++++-- CVE-2023/CVE-2023-244xx/CVE-2023-24429.json | 9 ++-- CVE-2023/CVE-2023-244xx/CVE-2023-24430.json | 9 ++-- CVE-2023/CVE-2023-244xx/CVE-2023-24431.json | 9 ++-- CVE-2023/CVE-2023-244xx/CVE-2023-24432.json | 9 ++-- CVE-2023/CVE-2023-244xx/CVE-2023-24433.json | 9 ++-- CVE-2023/CVE-2023-244xx/CVE-2023-24434.json | 9 ++-- CVE-2023/CVE-2023-244xx/CVE-2023-24435.json | 9 ++-- CVE-2023/CVE-2023-244xx/CVE-2023-24436.json | 9 ++-- CVE-2023/CVE-2023-257xx/CVE-2023-25761.json | 16 +++++- CVE-2023/CVE-2023-257xx/CVE-2023-25762.json | 16 +++++- CVE-2023/CVE-2023-257xx/CVE-2023-25763.json | 20 +++++-- CVE-2023/CVE-2023-257xx/CVE-2023-25764.json | 8 +-- CVE-2023/CVE-2023-257xx/CVE-2023-25765.json | 20 +++++-- CVE-2023/CVE-2023-257xx/CVE-2023-25766.json | 4 +- CVE-2023/CVE-2023-257xx/CVE-2023-25767.json | 16 +++++- CVE-2023/CVE-2023-257xx/CVE-2023-25768.json | 4 +- CVE-2023/CVE-2023-360xx/CVE-2023-36022.json | 43 +++++++++++++++ CVE-2023/CVE-2023-360xx/CVE-2023-36029.json | 43 +++++++++++++++ CVE-2023/CVE-2023-360xx/CVE-2023-36034.json | 43 +++++++++++++++ CVE-2023/CVE-2023-405xx/CVE-2023-40592.json | 9 ++-- CVE-2023/CVE-2023-405xx/CVE-2023-40593.json | 9 ++-- CVE-2023/CVE-2023-405xx/CVE-2023-40594.json | 9 ++-- CVE-2023/CVE-2023-405xx/CVE-2023-40595.json | 21 ++++---- CVE-2023/CVE-2023-405xx/CVE-2023-40597.json | 9 ++-- CVE-2023/CVE-2023-405xx/CVE-2023-40598.json | 9 ++-- CVE-2023/CVE-2023-461xx/CVE-2023-46176.json | 59 +++++++++++++++++++++ README.md | 45 ++++++++++++---- 69 files changed, 726 insertions(+), 190 deletions(-) create mode 100644 CVE-2017/CVE-2017-72xx/CVE-2017-7252.json create mode 100644 CVE-2023/CVE-2023-360xx/CVE-2023-36022.json create mode 100644 CVE-2023/CVE-2023-360xx/CVE-2023-36029.json create mode 100644 CVE-2023/CVE-2023-360xx/CVE-2023-36034.json create mode 100644 CVE-2023/CVE-2023-461xx/CVE-2023-46176.json diff --git a/CVE-2017/CVE-2017-72xx/CVE-2017-7252.json b/CVE-2017/CVE-2017-72xx/CVE-2017-7252.json new file mode 100644 index 00000000000..ac5a2abdba1 --- /dev/null +++ b/CVE-2017/CVE-2017-72xx/CVE-2017-7252.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2017-7252", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-03T01:15:07.777", + "lastModified": "2023-11-03T01:15:07.777", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "bcrypt password hashing in Botan before 2.1.0 does not correctly handle passwords with a length between 57 and 72 characters, which makes it easier for attackers to determine the cleartext password." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://botan.randombit.net/security.html", + "source": "cve@mitre.org" + }, + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1034591", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21697.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21697.json index 78ca24adb75..dac322efb0d 100644 --- a/CVE-2021/CVE-2021-216xx/CVE-2021-21697.json +++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21697.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21697", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2021-11-04T17:15:08.927", - "lastModified": "2023-10-25T18:16:53.007", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:35:36.123", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,6 +63,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-253xx/CVE-2022-25318.json b/CVE-2022/CVE-2022-253xx/CVE-2022-25318.json index 4341ec81877..82f24a7fa87 100644 --- a/CVE-2022/CVE-2022-253xx/CVE-2022-25318.json +++ b/CVE-2022/CVE-2022-253xx/CVE-2022-25318.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25318", "sourceIdentifier": "cve@mitre.org", "published": "2022-02-18T06:15:10.463", - "lastModified": "2023-10-30T22:15:08.983", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:54:55.067", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -104,7 +104,10 @@ }, { "url": "https://zigrin.com/advisories/cerebrate-an-incorrect-sharing-group-acl/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28149.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28149.json index e79de373e12..e0b019f75ab 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28149.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28149.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28149", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-03-29T13:15:09.060", - "lastModified": "2023-10-25T18:17:00.887", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:34:33.620", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28150.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28150.json index d6d9418439a..4598db9bd46 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28150.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28150.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28150", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-03-29T13:15:09.517", - "lastModified": "2023-10-25T18:17:00.947", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:34:29.200", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -104,7 +104,10 @@ }, { "url": "https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20%281%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28151.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28151.json index a60b5a7d5ac..a0272d3de86 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28151.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28151.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28151", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-03-29T13:15:09.680", - "lastModified": "2023-10-25T18:17:01.003", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:34:25.537", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -104,7 +104,10 @@ }, { "url": "https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20%281%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28152.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28152.json index ee3ed928db6..4f0879be183 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28152.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28152.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28152", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-03-29T13:15:09.743", - "lastModified": "2023-10-25T18:17:01.063", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:34:21.800", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -104,7 +104,10 @@ }, { "url": "https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20%282%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28153.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28153.json index 31b80978261..67e32104901 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28153.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28153.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28153", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-03-29T13:15:09.953", - "lastModified": "2023-10-25T18:17:01.127", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:34:14.737", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28154.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28154.json index 5c734a61006..a4a05cac553 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28154.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28154.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28154", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-03-29T13:15:10.180", - "lastModified": "2023-10-25T18:17:01.187", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:34:10.873", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28155.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28155.json index 662020b3a07..b20775125aa 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28155.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28155.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28155", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-03-29T13:15:10.320", - "lastModified": "2023-10-25T18:17:01.253", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:33:05.297", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28156.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28156.json index 68b816c4a3c..c083d1e8139 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28156.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28156.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28156", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-03-29T13:15:10.383", - "lastModified": "2023-10-25T18:17:01.317", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:34:58.183", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28157.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28157.json index 592cac70130..8e36572df9f 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28157.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28157.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28157", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-03-29T13:15:10.440", - "lastModified": "2023-10-25T18:17:01.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:32:51.690", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28158.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28158.json index cb3ccff8c12..ed626d38a5a 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28158.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28158.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28158", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-03-29T13:15:10.497", - "lastModified": "2023-10-25T18:17:01.447", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:31:56.047", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28159.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28159.json index 5fd5730b402..24f4351450e 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28159.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28159.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28159", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-03-29T13:15:10.550", - "lastModified": "2023-10-25T18:17:01.513", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:31:38.663", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28160.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28160.json index fddd5a9f6db..38568fcc44e 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28160.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28160.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28160", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-03-29T13:15:10.617", - "lastModified": "2023-10-25T18:17:01.603", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:31:30.100", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-295xx/CVE-2022-29529.json b/CVE-2022/CVE-2022-295xx/CVE-2022-29529.json index 9d816033042..b4e8351cb5c 100644 --- a/CVE-2022/CVE-2022-295xx/CVE-2022-29529.json +++ b/CVE-2022/CVE-2022-295xx/CVE-2022-29529.json @@ -2,8 +2,8 @@ "id": "CVE-2022-29529", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-20T23:15:08.467", - "lastModified": "2023-10-30T22:15:09.297", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:55:08.753", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -112,7 +112,10 @@ }, { "url": "https://zigrin.com/advisories/misp-stored-xss-via-the-linotp-login-field/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://zigrin.com/cakephp-application-cybersecurity-research-protect-your-website-from-stored-xss-attacks-understanding-and-preventing-vulnerabilities-in-open-source-applications/", diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30963.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30963.json index c0f43df8f24..86beb991b5d 100644 --- a/CVE-2022/CVE-2022-309xx/CVE-2022-30963.json +++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30963.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30963", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-05-17T15:15:10.523", - "lastModified": "2023-10-25T18:17:03.937", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:52:56.157", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30964.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30964.json index 635babb88ab..679b308bc06 100644 --- a/CVE-2022/CVE-2022-309xx/CVE-2022-30964.json +++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30964.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30964", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-05-17T15:15:10.617", - "lastModified": "2023-10-25T18:17:03.993", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:53:00.880", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30965.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30965.json index 676efab89e5..ce377724350 100644 --- a/CVE-2022/CVE-2022-309xx/CVE-2022-30965.json +++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30965.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30965", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-05-17T15:15:10.717", - "lastModified": "2023-10-25T18:17:04.050", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:53:06.647", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30966.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30966.json index 05885e27b7f..8b736a648d0 100644 --- a/CVE-2022/CVE-2022-309xx/CVE-2022-30966.json +++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30966.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30966", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-05-17T15:15:10.827", - "lastModified": "2023-10-25T18:17:04.113", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:53:10.817", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30967.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30967.json index 80c53888305..38bbb1a6e9e 100644 --- a/CVE-2022/CVE-2022-309xx/CVE-2022-30967.json +++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30967.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30967", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-05-17T15:15:10.937", - "lastModified": "2023-10-25T18:17:04.193", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:49:36.377", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30968.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30968.json index bc2d045772a..9b9ee9868f0 100644 --- a/CVE-2022/CVE-2022-309xx/CVE-2022-30968.json +++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30968.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30968", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-05-17T15:15:11.037", - "lastModified": "2023-10-25T18:17:04.270", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:49:42.217", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30970.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30970.json index be71f6282b7..df8fe1d7c1f 100644 --- a/CVE-2022/CVE-2022-309xx/CVE-2022-30970.json +++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30970.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30970", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-05-17T15:15:11.257", - "lastModified": "2023-10-25T18:17:04.397", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:49:45.927", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34170.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34170.json index f3a63177bd8..d100444f160 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34170.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34170.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34170", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-06-23T17:15:15.253", - "lastModified": "2023-10-25T18:17:05.083", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:52:35.667", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,19 +21,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 6.1, + "baseScore": 5.4, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 2.3, "impactScore": 2.7 } ], diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34171.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34171.json index 0e8d6cf3c0d..a6117b71fa3 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34171.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34171.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34171", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-06-23T17:15:15.317", - "lastModified": "2023-10-25T18:17:05.217", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:44:47.747", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,19 +21,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 6.1, + "baseScore": 5.4, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 2.3, "impactScore": 2.7 } ], diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34172.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34172.json index c570ffe1a63..0c38b36e5c9 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34172.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34172.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34172", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-06-23T17:15:15.383", - "lastModified": "2023-10-25T18:17:05.293", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:46:59.020", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,19 +21,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 6.1, + "baseScore": 5.4, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 2.3, "impactScore": 2.7 } ], diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34173.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34173.json index be4fd885481..3bdd8440f58 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34173.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34173.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34173", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-06-23T17:15:15.447", - "lastModified": "2023-10-25T18:17:05.420", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:47:09.900", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,19 +21,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 6.1, + "baseScore": 5.4, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 2.3, "impactScore": 2.7 } ], diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34176.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34176.json index f582f9c08c6..f83d584b0a0 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34176.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34176.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34176", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-06-23T17:15:15.620", - "lastModified": "2023-10-25T18:17:05.927", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:47:27.337", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,6 +63,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34178.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34178.json index 20b0a092aa1..89289a02364 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34178.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34178.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34178", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-06-23T17:15:15.737", - "lastModified": "2023-10-25T18:17:06.300", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:41:06.147", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,6 +63,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34182.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34182.json index dc6ad6ecaae..3ea968dffaa 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34182.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34182.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34182", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-06-23T17:15:15.990", - "lastModified": "2023-10-25T18:17:06.770", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:41:39.790", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,6 +63,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34183.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34183.json index 3159792b7f2..6a7b7a5d37a 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34183.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34183.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34183", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-06-23T17:15:16.057", - "lastModified": "2023-10-25T18:17:06.887", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:41:49.433", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,6 +63,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34184.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34184.json index 40a8fafabca..8f63b63591c 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34184.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34184.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34184", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-06-23T17:15:16.123", - "lastModified": "2023-10-25T18:17:06.980", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:41:58.117", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,6 +63,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34185.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34185.json index a4f5c019d25..96cdfb315d0 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34185.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34185.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34185", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-06-23T17:15:16.190", - "lastModified": "2023-10-25T18:17:07.100", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:53:49.573", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,6 +63,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34186.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34186.json index 864e3a353c4..9ab2dd079f7 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34186.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34186.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34186", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-06-23T17:15:16.257", - "lastModified": "2023-10-25T18:17:07.203", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:53:46.053", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,6 +63,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34187.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34187.json index 5b6687f7c8d..2af22ea4b50 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34187.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34187.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34187", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-06-23T17:15:16.327", - "lastModified": "2023-10-25T18:17:07.410", - "vulnStatus": "Modified", + "lastModified": "2023-11-03T02:53:41.337", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,6 +63,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43423.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43423.json index 80b0b701238..b77d88c8324 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43423.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43423.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43423", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-10-19T16:15:11.387", - "lastModified": "2023-10-25T18:17:19.980", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:22:52.570", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43424.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43424.json index 508438bcb0f..106bb14fb06 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43424.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43424.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43424", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-10-19T16:15:11.440", - "lastModified": "2023-10-25T18:17:20.057", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:24:27.667", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], "configurations": [ { "operator": "AND", @@ -48,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:jenkins:compuware_xpediter_code:*:*:*:*:*:wordpress:*:*", - "versionEndIncluding": "1.0.7", - "matchCriteriaId": "AA9F910E-95CE-43AF-AD37-341F04123DC9" + "criteria": "cpe:2.3:a:jenkins:compuware_xpediter_code_coverage:*:*:*:*:*:jenkins:*:*", + "versionEndExcluding": "1.0.8", + "matchCriteriaId": "40CF8A84-DDEA-47E8-A80E-5AA09209F189" } ] }, diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43425.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43425.json index ab10dd4252e..afbd4046998 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43425.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43425.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43425", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-10-19T16:15:11.500", - "lastModified": "2023-10-25T18:17:20.140", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:28:28.093", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43426.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43426.json index 384d3624dfc..8ea3752235d 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43426.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43426.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43426", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-10-19T16:15:11.553", - "lastModified": "2023-10-25T18:17:20.197", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:31:29.647", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43427.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43427.json index 658c598d124..0a5d33b321d 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43427.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43427.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43427", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-10-19T16:15:11.613", - "lastModified": "2023-10-25T18:17:20.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:33:29.297", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "configurations": [ { "nodes": [ @@ -47,9 +59,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:jenkins:compuware_topaz_for_total_test:*:*:*:*:*:wordpress:*:*", - "versionEndIncluding": "2.4.8", - "matchCriteriaId": "905A53D8-F45C-408E-B996-90AD7D539519" + "criteria": "cpe:2.3:a:jenkins:compuware_topaz_for_total_test:*:*:*:*:*:jenkins:*:*", + "versionEndExcluding": "2.4.8", + "matchCriteriaId": "EE8AA4CD-8F56-4BFF-BF1E-11C120770EDB" } ] } diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43428.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43428.json index b28489094f6..7cf67a796cb 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43428.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43428.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43428", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-10-19T16:15:11.673", - "lastModified": "2023-10-25T18:17:20.313", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:39:41.243", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], "configurations": [ { "operator": "AND", diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43429.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43429.json index 0e944203588..31900c1d5cd 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43429.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43429.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43429", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-10-19T16:15:11.730", - "lastModified": "2023-10-25T18:17:20.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:41:51.027", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], "configurations": [ { "operator": "AND", @@ -48,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:jenkins:compuware_topaz_for_total_test:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:jenkins:compuware_topaz_for_total_test:*:*:*:*:*:jenkins:*:*", "versionEndIncluding": "2.4.8", - "matchCriteriaId": "905A53D8-F45C-408E-B996-90AD7D539519" + "matchCriteriaId": "9BBA3703-E550-492C-B952-BA184EE2C37E" } ] }, diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24429.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24429.json index 1e849661493..0737e21c7d3 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24429.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24429.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24429", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-01-26T21:18:17.110", - "lastModified": "2023-10-25T18:17:23.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:49:40.803", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -67,7 +67,10 @@ "references": [ { "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2973%20%281%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24430.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24430.json index 0115692473f..e56ea403bce 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24430.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24430.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24430", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-01-26T21:18:17.170", - "lastModified": "2023-10-25T18:17:24.057", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:45:22.703", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -67,7 +67,10 @@ "references": [ { "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2973%20%282%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24431.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24431.json index dba9bedf128..9cba8189095 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24431.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24431.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24431", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-01-26T21:18:17.240", - "lastModified": "2023-10-25T18:17:24.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:50:55.897", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -67,7 +67,10 @@ "references": [ { "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%281%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24432.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24432.json index 1de797ab676..fe449694e2a 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24432.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24432.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24432", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-01-26T21:18:17.307", - "lastModified": "2023-10-25T18:17:24.167", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:43:10.883", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -67,7 +67,10 @@ "references": [ { "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%282%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24433.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24433.json index 972ffcff315..1e6d6088ff3 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24433.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24433.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24433", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-01-26T21:18:17.387", - "lastModified": "2023-10-25T18:17:24.233", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:51:35.530", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -67,7 +67,10 @@ "references": [ { "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2772%20%282%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24434.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24434.json index adc5c941df6..b2c0f143fea 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24434.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24434.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24434", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-01-26T21:18:17.457", - "lastModified": "2023-10-25T18:17:24.300", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:52:57.313", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -67,7 +67,10 @@ "references": [ { "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24435.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24435.json index 82dabad4415..02338d426c3 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24435.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24435.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24435", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-01-26T21:18:17.537", - "lastModified": "2023-10-25T18:17:24.357", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:53:24.537", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -67,7 +67,10 @@ "references": [ { "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%282%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24436.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24436.json index 064c5519af6..dfe7c31b08c 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24436.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24436.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24436", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-01-26T21:18:17.600", - "lastModified": "2023-10-25T18:17:24.417", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:55:43.407", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -67,7 +67,10 @@ "references": [ { "url": "https://www.jenkins.io/security/advisory/2023-01-24/#SECURITY-2789%20%281%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25761.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25761.json index b8c52859d0e..37f05b41f73 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25761.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25761.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25761", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-02-15T14:15:13.387", - "lastModified": "2023-10-25T18:17:24.680", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:59:17.893", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,6 +34,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25762.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25762.json index 950d5e3fca3..00f518a9d01 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25762.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25762.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25762", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-02-15T14:15:13.470", - "lastModified": "2023-10-25T18:17:24.743", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:58:18.033", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,6 +34,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25763.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25763.json index ab552c41207..0106264f549 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25763.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25763.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25763", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-02-15T14:15:13.543", - "lastModified": "2023-10-25T18:17:24.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:59:48.757", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,6 +34,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ @@ -44,8 +56,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:jenkins:email_extension:*:*:*:*:*:jenkins:*:*", - "versionEndIncluding": "2.93", - "matchCriteriaId": "01DE9D8E-739F-40C4-B7B2-5A89343A1E62" + "versionEndExcluding": "2.93.1", + "matchCriteriaId": "0EAD1FED-8A76-46BE-BA9A-4407E1368FE4" } ] } diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25764.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25764.json index 79b94d42d42..08d676ceb16 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25764.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25764.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25764", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-02-15T14:15:13.617", - "lastModified": "2023-10-25T18:17:24.857", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T01:57:13.527", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -56,8 +56,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:jenkins:email_extension:*:*:*:*:*:jenkins:*:*", - "versionEndIncluding": "2.93", - "matchCriteriaId": "01DE9D8E-739F-40C4-B7B2-5A89343A1E62" + "versionEndExcluding": "2.93.1", + "matchCriteriaId": "0EAD1FED-8A76-46BE-BA9A-4407E1368FE4" } ] } diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25765.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25765.json index b53867149b3..7e65aebbd2d 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25765.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25765.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25765", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-02-15T14:15:13.700", - "lastModified": "2023-10-25T18:17:24.917", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:00:58.373", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,6 +34,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], "configurations": [ { "nodes": [ @@ -44,8 +56,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:jenkins:email_extension:*:*:*:*:*:jenkins:*:*", - "versionEndIncluding": "2.93", - "matchCriteriaId": "01DE9D8E-739F-40C4-B7B2-5A89343A1E62" + "versionEndExcluding": "2.93.1", + "matchCriteriaId": "0EAD1FED-8A76-46BE-BA9A-4407E1368FE4" } ] } diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25766.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25766.json index 233ba0c1b21..7d702600e08 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25766.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25766.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25766", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-02-15T14:15:13.773", - "lastModified": "2023-10-25T18:17:24.967", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:06:20.837", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25767.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25767.json index c03080793ad..be45ecbd05c 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25767.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25767.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25767", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-02-15T14:15:13.847", - "lastModified": "2023-10-25T18:17:25.027", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:02:37.800", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,6 +34,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25768.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25768.json index b36aa94f541..c99f05bd962 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25768.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25768.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25768", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-02-15T14:15:13.947", - "lastModified": "2023-10-25T18:17:25.083", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:04:03.650", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36022.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36022.json new file mode 100644 index 00000000000..4e9eac4de8a --- /dev/null +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36022.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36022", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-11-03T01:15:07.907", + "lastModified": "2023-11-03T01:15:07.907", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.7 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36022", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36029.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36029.json new file mode 100644 index 00000000000..02d8bb6fcbb --- /dev/null +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36029.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36029", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-11-03T01:15:07.980", + "lastModified": "2023-11-03T01:15:07.980", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36029", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36034.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36034.json new file mode 100644 index 00000000000..961f30ea6f3 --- /dev/null +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36034.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36034", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-11-03T01:15:08.047", + "lastModified": "2023-11-03T01:15:08.047", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.7 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36034", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40592.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40592.json index 271be8fd193..be79a5951ab 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40592.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40592.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40592", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-08-30T17:15:09.763", - "lastModified": "2023-10-18T21:15:08.740", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:12:20.743", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -113,7 +113,10 @@ }, { "url": "https://research.splunk.com/application/182f9080-4137-4629-94ac-cb1083ac981a/", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40593.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40593.json index 68325a744d5..36742efc279 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40593.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40593.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40593", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-08-30T17:15:09.853", - "lastModified": "2023-10-18T21:15:08.833", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:13:51.010", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -108,7 +108,10 @@ }, { "url": "https://research.splunk.com/application/8e8a86d5-f323-4567-95be-8e817e2baee6/", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40594.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40594.json index 9bb3bad9c61..8a6007c4d0e 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40594.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40594.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40594", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-08-30T17:15:09.940", - "lastModified": "2023-10-18T21:15:08.897", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:16:11.283", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -113,7 +113,10 @@ }, { "url": "https://research.splunk.com/application/78b48d08-075c-4eac-bd07-e364c3780867/", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40595.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40595.json index 3a57b27ca2d..35f606724a5 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40595.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40595.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40595", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-08-30T17:15:10.027", - "lastModified": "2023-10-18T21:15:08.967", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:21:10.870", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -17,19 +17,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 8.8, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.8, "impactScore": 5.9 }, { @@ -61,7 +61,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-502" } ] } @@ -113,7 +113,10 @@ }, { "url": "https://research.splunk.com/application/d1d8fda6-874a-400f-82cf-dcbb59d8e4db/", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40597.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40597.json index e61b2d0bb66..4d3bf8ea506 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40597.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40597.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40597", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-08-30T17:15:10.180", - "lastModified": "2023-10-18T21:15:09.033", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:22:28.370", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -113,7 +113,10 @@ }, { "url": "https://research.splunk.com/application/356bd3fe-f59b-4f64-baa1-51495411b7ad/", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40598.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40598.json index 1c5b618bfc2..a8ff6eeecf3 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40598.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40598.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40598", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-08-30T17:15:10.267", - "lastModified": "2023-10-18T21:15:09.107", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-03T02:23:14.207", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -114,7 +114,10 @@ }, { "url": "https://research.splunk.com/application/ee69374a-d27e-4136-adac-956a96ff60fd/", - "source": "prodsec@splunk.com" + "source": "prodsec@splunk.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46176.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46176.json new file mode 100644 index 00000000000..1191e88b248 --- /dev/null +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46176.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-46176", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-11-03T01:15:08.117", + "lastModified": "2023-11-03T01:15:08.117", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM MQ Appliance 9.3 CD could allow a local attacker to gain elevated privileges on the system, caused by improper validation of security keys. IBM X-Force ID: 269535." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-424" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269535", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7060769", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index c3ba51d5f89..116217cad56 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-03T00:55:18.928976+00:00 +2023-11-03T03:00:19.927592+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-03T00:15:12.757000+00:00 +2023-11-03T02:55:08.753000+00:00 ``` ### Last Data Feed Release @@ -23,28 +23,55 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2023-11-01T01:00:13.544214+00:00 +2023-11-03T01:00:13.595060+00:00 ``` ### Total Number of included CVEs ```plain -229675 +229680 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `5` -* [CVE-2023-42027](CVE-2023/CVE-2023-420xx/CVE-2023-42027.json) (`2023-11-03T00:15:12.593`) -* [CVE-2023-42029](CVE-2023/CVE-2023-420xx/CVE-2023-42029.json) (`2023-11-03T00:15:12.683`) -* [CVE-2023-43018](CVE-2023/CVE-2023-430xx/CVE-2023-43018.json) (`2023-11-03T00:15:12.757`) +* [CVE-2017-7252](CVE-2017/CVE-2017-72xx/CVE-2017-7252.json) (`2023-11-03T01:15:07.777`) +* [CVE-2023-36022](CVE-2023/CVE-2023-360xx/CVE-2023-36022.json) (`2023-11-03T01:15:07.907`) +* [CVE-2023-36029](CVE-2023/CVE-2023-360xx/CVE-2023-36029.json) (`2023-11-03T01:15:07.980`) +* [CVE-2023-36034](CVE-2023/CVE-2023-360xx/CVE-2023-36034.json) (`2023-11-03T01:15:08.047`) +* [CVE-2023-46176](CVE-2023/CVE-2023-461xx/CVE-2023-46176.json) (`2023-11-03T01:15:08.117`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `63` +* [CVE-2022-34185](CVE-2022/CVE-2022-341xx/CVE-2022-34185.json) (`2023-11-03T02:53:49.573`) +* [CVE-2022-25318](CVE-2022/CVE-2022-253xx/CVE-2022-25318.json) (`2023-11-03T02:54:55.067`) +* [CVE-2022-29529](CVE-2022/CVE-2022-295xx/CVE-2022-29529.json) (`2023-11-03T02:55:08.753`) +* [CVE-2023-24432](CVE-2023/CVE-2023-244xx/CVE-2023-24432.json) (`2023-11-03T01:43:10.883`) +* [CVE-2023-24430](CVE-2023/CVE-2023-244xx/CVE-2023-24430.json) (`2023-11-03T01:45:22.703`) +* [CVE-2023-24429](CVE-2023/CVE-2023-244xx/CVE-2023-24429.json) (`2023-11-03T01:49:40.803`) +* [CVE-2023-24431](CVE-2023/CVE-2023-244xx/CVE-2023-24431.json) (`2023-11-03T01:50:55.897`) +* [CVE-2023-24433](CVE-2023/CVE-2023-244xx/CVE-2023-24433.json) (`2023-11-03T01:51:35.530`) +* [CVE-2023-24434](CVE-2023/CVE-2023-244xx/CVE-2023-24434.json) (`2023-11-03T01:52:57.313`) +* [CVE-2023-24435](CVE-2023/CVE-2023-244xx/CVE-2023-24435.json) (`2023-11-03T01:53:24.537`) +* [CVE-2023-24436](CVE-2023/CVE-2023-244xx/CVE-2023-24436.json) (`2023-11-03T01:55:43.407`) +* [CVE-2023-25764](CVE-2023/CVE-2023-257xx/CVE-2023-25764.json) (`2023-11-03T01:57:13.527`) +* [CVE-2023-25762](CVE-2023/CVE-2023-257xx/CVE-2023-25762.json) (`2023-11-03T01:58:18.033`) +* [CVE-2023-25761](CVE-2023/CVE-2023-257xx/CVE-2023-25761.json) (`2023-11-03T01:59:17.893`) +* [CVE-2023-25763](CVE-2023/CVE-2023-257xx/CVE-2023-25763.json) (`2023-11-03T01:59:48.757`) +* [CVE-2023-25765](CVE-2023/CVE-2023-257xx/CVE-2023-25765.json) (`2023-11-03T02:00:58.373`) +* [CVE-2023-25767](CVE-2023/CVE-2023-257xx/CVE-2023-25767.json) (`2023-11-03T02:02:37.800`) +* [CVE-2023-25768](CVE-2023/CVE-2023-257xx/CVE-2023-25768.json) (`2023-11-03T02:04:03.650`) +* [CVE-2023-25766](CVE-2023/CVE-2023-257xx/CVE-2023-25766.json) (`2023-11-03T02:06:20.837`) +* [CVE-2023-40592](CVE-2023/CVE-2023-405xx/CVE-2023-40592.json) (`2023-11-03T02:12:20.743`) +* [CVE-2023-40593](CVE-2023/CVE-2023-405xx/CVE-2023-40593.json) (`2023-11-03T02:13:51.010`) +* [CVE-2023-40594](CVE-2023/CVE-2023-405xx/CVE-2023-40594.json) (`2023-11-03T02:16:11.283`) +* [CVE-2023-40595](CVE-2023/CVE-2023-405xx/CVE-2023-40595.json) (`2023-11-03T02:21:10.870`) +* [CVE-2023-40597](CVE-2023/CVE-2023-405xx/CVE-2023-40597.json) (`2023-11-03T02:22:28.370`) +* [CVE-2023-40598](CVE-2023/CVE-2023-405xx/CVE-2023-40598.json) (`2023-11-03T02:23:14.207`) ## Download and Usage