Auto-Update: 2023-04-29T08:00:25.027230+00:00

This commit is contained in:
René Helmke 2023-04-29 10:00:28 +02:00
parent c2a43ab165
commit 346cf7b118
5 changed files with 74 additions and 15 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-4065",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-11-19T19:15:10.433",
"lastModified": "2022-11-26T03:24:55.030",
"vulnStatus": "Analyzed",
"lastModified": "2023-04-29T07:15:07.957",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in cbeust testng. It has been declared as critical. Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser. The manipulation leads to path traversal. The attack can be launched remotely. The name of the patch is 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-214027."
"value": "A vulnerability was found in cbeust testng 7.5.0/7.6.0/7.6.1/7.7.0. It has been declared as critical. Affected by this vulnerability is the function testngXmlExistsInJar of the file testng-core/src/main/java/org/testng/JarFileUtils.java of the component XML File Parser. The manipulation leads to path traversal. The attack can be launched remotely. Upgrading to version 7.5.1 and 7.7.1 is able to address this issue. The name of the patch is 9150736cd2c123a6a3b60e6193630859f9f0422b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-214027."
}
],
"metrics": {
@ -31,13 +31,15 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -52,6 +54,31 @@
"exploitabilityScore": 2.1,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
@ -101,6 +128,14 @@
"Third Party Advisory"
]
},
{
"url": "https://github.com/cbeust/testng/releases/tag/7.7.1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.214027",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.214027",
"source": "cna@vuldb.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48468",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-13T21:15:07.077",
"lastModified": "2023-04-29T05:15:45.667",
"lastModified": "2023-04-29T07:15:07.207",
"vulnStatus": "Modified",
"descriptions": [
{
@ -100,6 +100,14 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EI4JZSHJXW7WOOTAQSV5SUCC5GE2GC2B/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UGLZZYPOLI733DPETL444E3GY5KSS6LG/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VNUEZZEPR2F6M67ANXLOPJX6AQL3TK4P/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28626",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-03-28T21:15:11.190",
"lastModified": "2023-04-29T05:15:46.250",
"lastModified": "2023-04-29T07:15:08.127",
"vulnStatus": "Modified",
"descriptions": [
{
@ -109,9 +109,17 @@
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OUYME2VA555X6567H7ORIJQFN4BVGT6N/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTWZWCT7KCX2KTXTLPUYZ3EHOONG4X46/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQ3UBC7LE4VPCMZBTADIBL353CH7CPVV/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28631",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-03-28T21:15:11.250",
"lastModified": "2023-04-29T05:15:46.363",
"lastModified": "2023-04-29T07:15:08.230",
"vulnStatus": "Modified",
"descriptions": [
{
@ -109,9 +109,17 @@
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OUYME2VA555X6567H7ORIJQFN4BVGT6N/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTWZWCT7KCX2KTXTLPUYZ3EHOONG4X46/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VQ3UBC7LE4VPCMZBTADIBL353CH7CPVV/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-04-29T06:00:24.156291+00:00
2023-04-29T08:00:25.027230+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-04-29T05:15:46.467000+00:00
2023-04-29T07:15:08.230000+00:00
```
### Last Data Feed Release
@ -42,10 +42,10 @@ Recently added CVEs: `0`
Recently modified CVEs: `4`
* [CVE-2022-48468](CVE-2022/CVE-2022-484xx/CVE-2022-48468.json) (`2023-04-29T05:15:45.667`)
* [CVE-2023-28626](CVE-2023/CVE-2023-286xx/CVE-2023-28626.json) (`2023-04-29T05:15:46.250`)
* [CVE-2023-28631](CVE-2023/CVE-2023-286xx/CVE-2023-28631.json) (`2023-04-29T05:15:46.363`)
* [CVE-2023-29197](CVE-2023/CVE-2023-291xx/CVE-2023-29197.json) (`2023-04-29T05:15:46.467`)
* [CVE-2022-4065](CVE-2022/CVE-2022-40xx/CVE-2022-4065.json) (`2023-04-29T07:15:07.957`)
* [CVE-2022-48468](CVE-2022/CVE-2022-484xx/CVE-2022-48468.json) (`2023-04-29T07:15:07.207`)
* [CVE-2023-28626](CVE-2023/CVE-2023-286xx/CVE-2023-28626.json) (`2023-04-29T07:15:08.127`)
* [CVE-2023-28631](CVE-2023/CVE-2023-286xx/CVE-2023-28631.json) (`2023-04-29T07:15:08.230`)
## Download and Usage