diff --git a/CVE-2021/CVE-2021-221xx/CVE-2021-22142.json b/CVE-2021/CVE-2021-221xx/CVE-2021-22142.json index e10f64765b7..959485530ee 100644 --- a/CVE-2021/CVE-2021-221xx/CVE-2021-22142.json +++ b/CVE-2021/CVE-2021-221xx/CVE-2021-22142.json @@ -2,8 +2,8 @@ "id": "CVE-2021-22142", "sourceIdentifier": "bressers@elastic.co", "published": "2023-11-22T01:15:07.210", - "lastModified": "2023-11-22T01:15:07.210", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-221xx/CVE-2021-22143.json b/CVE-2021/CVE-2021-221xx/CVE-2021-22143.json index 2cb1d2c3c4f..26a9143149d 100644 --- a/CVE-2021/CVE-2021-221xx/CVE-2021-22143.json +++ b/CVE-2021/CVE-2021-221xx/CVE-2021-22143.json @@ -2,8 +2,8 @@ "id": "CVE-2021-22143", "sourceIdentifier": "bressers@elastic.co", "published": "2023-11-22T02:15:41.860", - "lastModified": "2023-11-22T02:15:41.860", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-221xx/CVE-2021-22150.json b/CVE-2021/CVE-2021-221xx/CVE-2021-22150.json index 8cbb0e1ea85..c94bc88fef2 100644 --- a/CVE-2021/CVE-2021-221xx/CVE-2021-22150.json +++ b/CVE-2021/CVE-2021-221xx/CVE-2021-22150.json @@ -2,8 +2,8 @@ "id": "CVE-2021-22150", "sourceIdentifier": "bressers@elastic.co", "published": "2023-11-22T01:15:07.417", - "lastModified": "2023-11-22T01:15:07.417", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-221xx/CVE-2021-22151.json b/CVE-2021/CVE-2021-221xx/CVE-2021-22151.json index 2f61523449f..7cc009b977d 100644 --- a/CVE-2021/CVE-2021-221xx/CVE-2021-22151.json +++ b/CVE-2021/CVE-2021-221xx/CVE-2021-22151.json @@ -2,8 +2,8 @@ "id": "CVE-2021-22151", "sourceIdentifier": "bressers@elastic.co", "published": "2023-11-22T01:15:07.607", - "lastModified": "2023-11-22T01:15:07.607", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-379xx/CVE-2021-37937.json b/CVE-2021/CVE-2021-379xx/CVE-2021-37937.json index 4a93e736591..6547d7c425c 100644 --- a/CVE-2021/CVE-2021-379xx/CVE-2021-37937.json +++ b/CVE-2021/CVE-2021-379xx/CVE-2021-37937.json @@ -2,8 +2,8 @@ "id": "CVE-2021-37937", "sourceIdentifier": "bressers@elastic.co", "published": "2023-11-22T02:15:42.043", - "lastModified": "2023-11-22T02:15:42.043", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-379xx/CVE-2021-37942.json b/CVE-2021/CVE-2021-379xx/CVE-2021-37942.json index 93de0ef3666..6741492dccc 100644 --- a/CVE-2021/CVE-2021-379xx/CVE-2021-37942.json +++ b/CVE-2021/CVE-2021-379xx/CVE-2021-37942.json @@ -2,8 +2,8 @@ "id": "CVE-2021-37942", "sourceIdentifier": "bressers@elastic.co", "published": "2023-11-22T02:15:42.220", - "lastModified": "2023-11-22T02:15:42.220", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-245xx/CVE-2022-24599.json b/CVE-2022/CVE-2022-245xx/CVE-2022-24599.json index e8b2a4855ed..2fa604c655d 100644 --- a/CVE-2022/CVE-2022-245xx/CVE-2022-24599.json +++ b/CVE-2022/CVE-2022-245xx/CVE-2022-24599.json @@ -2,8 +2,8 @@ "id": "CVE-2022-24599", "sourceIdentifier": "cve@mitre.org", "published": "2022-02-24T15:15:29.633", - "lastModified": "2023-11-12T23:15:08.007", - "vulnStatus": "Modified", + "lastModified": "2023-11-22T03:15:07.263", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -105,6 +105,18 @@ { "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00006.html", "source": "cve@mitre.org" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4JXZ6QAMA3TSRY6GUZRY3WTHR7P5TPH/", + "source": "cve@mitre.org" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTETOUJNRR75REYJZTBGF6TAJZYTMXUY/", + "source": "cve@mitre.org" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZPG27YKICLIWUFOPVUOAFAZGOX4BNHY/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-356xx/CVE-2022-35638.json b/CVE-2022/CVE-2022-356xx/CVE-2022-35638.json new file mode 100644 index 00000000000..65998adf936 --- /dev/null +++ b/CVE-2022/CVE-2022-356xx/CVE-2022-35638.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2022-35638", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-11-22T04:15:07.237", + "lastModified": "2023-11-22T04:15:07.237", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 230824." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/230824", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7080104", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43422.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43422.json index 079619bc600..050afc2a0a5 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43422.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43422.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43422", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-10-19T16:15:11.333", - "lastModified": "2023-10-25T18:17:19.923", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-22T04:22:44.253", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43430.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43430.json index 36c8e26e858..98541326adc 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43430.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43430.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43430", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-10-19T16:15:11.787", - "lastModified": "2023-10-25T18:17:20.473", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-22T04:22:15.630", + "vulnStatus": "Analyzed", "evaluatorComment": "\n\n", "descriptions": [ { @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43431.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43431.json index 174dae1626b..156e97b5777 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43431.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43431.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43431", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-10-19T16:15:11.847", - "lastModified": "2023-10-25T18:17:20.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-22T04:21:32.290", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43432.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43432.json index 67cd870f23d..87fa803a007 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43432.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43432.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43432", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-10-19T16:15:11.897", - "lastModified": "2023-10-25T18:17:20.617", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-22T04:21:24.920", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -45,7 +45,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "NVD-CWE-noinfo" } ] } diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43433.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43433.json index a347ce6d787..477e0a2eb7f 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43433.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43433.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43433", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-10-19T16:15:11.953", - "lastModified": "2023-10-25T18:17:20.677", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-22T04:20:51.540", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43434.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43434.json index 2c1c3c6411c..7f6a01f39dc 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43434.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43434.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43434", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-10-19T16:15:12.010", - "lastModified": "2023-10-25T18:17:20.733", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-22T04:20:01.307", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43435.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43435.json index a863eb27bda..9f848f2361f 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43435.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43435.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43435", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-10-19T16:15:12.070", - "lastModified": "2023-10-25T18:17:20.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-22T04:18:55.650", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45379.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45379.json index 7e7f6a4ecf6..e737744c0b5 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45379.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45379.json @@ -2,12 +2,16 @@ "id": "CVE-2022-45379", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-11-15T20:15:11.390", - "lastModified": "2023-10-25T18:17:20.847", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-22T04:18:00.013", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Jenkins Script Security Plugin 1189.vb_a_b_7c8fd5fde and earlier stores whole-script approvals as the SHA-1 hash of the script, making it vulnerable to collision attacks." + }, + { + "lang": "es", + "value": "Jenkins Script Security Plugin 1189.vb_a_b_7c8fd5fde y versiones anteriores almacena las aprobaciones de scripts completos como el hash SHA-1 del script, lo que lo hace vulnerable a ataques de colisi\u00f3n." } ], "metrics": { @@ -67,7 +71,10 @@ "references": [ { "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2564", diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45380.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45380.json index 7c586bfbc74..0b022e49936 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45380.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45380.json @@ -2,12 +2,16 @@ "id": "CVE-2022-45380", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-11-15T20:15:11.480", - "lastModified": "2023-10-25T18:17:20.903", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-22T04:23:52.063", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Jenkins JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission." + }, + { + "lang": "es", + "value": "Jenkins JUnit Plugin 1159.v0b_396e1e07dd y versiones anteriores convierten las URL HTTP(S) en la salida del informe de prueba en enlaces en los que se puede hacer clic de manera insegura, lo que genera una vulnerabilidad de Cross-Site Scripting (XSS) almacenada que pueden explotar los atacantes con permiso Item/Configure." } ], "metrics": { @@ -34,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ @@ -55,7 +71,10 @@ "references": [ { "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2888", diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45381.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45381.json index 5d1688e6f66..8e950678f27 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45381.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45381.json @@ -2,12 +2,16 @@ "id": "CVE-2022-45381", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-11-15T20:15:11.567", - "lastModified": "2023-10-25T18:17:20.960", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-22T04:23:46.943", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system." + }, + { + "lang": "es", + "value": "Jenkins Pipeline Utility Steps Plugin 2.13.1 y versiones anteriores no restringe el conjunto de interpoladores de prefijos habilitados y las versiones de paquetes de la librer\u00eda de configuraci\u00f3n Apache Commons que habilitan el interpolador de prefijos 'file:' de forma predeterminada, lo que permite a los atacantes capaces de configurar Pipelines para leer archivos arbitrarios de el sistema de archivos del controlador Jenkins." } ], "metrics": { @@ -67,7 +71,10 @@ "references": [ { "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2949", diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45382.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45382.json index 500854fb9bd..0859e94c2f5 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45382.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45382.json @@ -2,12 +2,16 @@ "id": "CVE-2022-45382", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-11-15T20:15:11.647", - "lastModified": "2023-10-25T18:17:21.023", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-22T04:23:37.247", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Jenkins Naginator Plugin 1.18.1 and earlier does not escape display names of source builds in builds that were triggered via Retry action, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to edit build display names." + }, + { + "lang": "es", + "value": "Jenkins Naginator Plugin 1.18.1 y versiones anteriores no escapa a los nombres para mostrar de las compilaciones de origen en compilaciones que se activaron mediante la acci\u00f3n Reintentar, lo que da como resultado una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado que pueden explotar los atacantes capaces de editar los nombres para mostrar de las compilaciones." } ], "metrics": { @@ -34,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ @@ -55,7 +71,10 @@ "references": [ { "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2946", diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45383.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45383.json index 6ccbba24a04..e260efead97 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45383.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45383.json @@ -2,12 +2,16 @@ "id": "CVE-2022-45383", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-11-15T20:15:11.730", - "lastModified": "2023-10-25T18:17:21.077", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-11-22T04:23:26.613", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An incorrect permission check in Jenkins Support Core Plugin 1206.v14049fa_b_d860 and earlier allows attackers with Support/DownloadBundle permission to download a previously created support bundle containing information limited to users with Overall/Administer permission." + }, + { + "lang": "es", + "value": "Una verificaci\u00f3n de permisos incorrecta en Jenkins Support Core Plugin 1206.v14049fa_b_d860 y versiones anteriores permite a atacantes con permiso Support/DownloadBundle descargar un paquete de soporte creado previamente que contiene informaci\u00f3n limitada a usuarios con permiso General/Administrador." } ], "metrics": { @@ -67,7 +71,11 @@ "references": [ { "url": "http://www.openwall.com/lists/oss-security/2022/11/15/4", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2804", diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35127.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35127.json index 88b4a2440fe..b0e3ac51b47 100644 --- a/CVE-2023/CVE-2023-351xx/CVE-2023-35127.json +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35127.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35127", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-11-22T01:15:07.813", - "lastModified": "2023-11-22T01:15:07.813", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40152.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40152.json index 3543d34ce52..48864b554bf 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40152.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40152.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40152", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-11-22T01:15:08.007", - "lastModified": "2023-11-22T01:15:08.007", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48228.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48228.json index 3e1a0be2594..f696a5d6c2e 100644 --- a/CVE-2023/CVE-2023-482xx/CVE-2023-48228.json +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48228.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48228", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-21T21:15:08.477", - "lastModified": "2023-11-21T21:15:08.477", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:44.963", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48230.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48230.json index dbd3abc7ee1..ce4bbc3ec0f 100644 --- a/CVE-2023/CVE-2023-482xx/CVE-2023-48230.json +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48230.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48230", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-21T21:15:08.683", - "lastModified": "2023-11-21T21:15:08.683", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:44.963", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48239.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48239.json index b2da6fabd5d..f517ffe7c99 100644 --- a/CVE-2023/CVE-2023-482xx/CVE-2023-48239.json +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48239.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48239", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-21T21:15:08.880", - "lastModified": "2023-11-21T21:15:08.880", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:44.963", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48299.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48299.json index cc521d28cf3..cf567d183ea 100644 --- a/CVE-2023/CVE-2023-482xx/CVE-2023-48299.json +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48299.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48299", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-21T21:15:09.077", - "lastModified": "2023-11-21T21:15:09.077", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:44.963", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48301.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48301.json index aa2b1e5df71..1e9a84e3002 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48301.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48301.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48301", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-21T22:15:07.490", - "lastModified": "2023-11-21T22:15:07.490", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:44.963", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48302.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48302.json index f6da4249d82..b879afd6a44 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48302.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48302.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48302", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-21T22:15:07.697", - "lastModified": "2023-11-21T22:15:07.697", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:44.963", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48303.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48303.json index 5ad88066cfb..bb9c2c25503 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48303.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48303.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48303", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-21T22:15:07.893", - "lastModified": "2023-11-21T22:15:07.893", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:44.963", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48304.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48304.json index 8f031985171..590b4cc3905 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48304.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48304.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48304", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-21T22:15:08.087", - "lastModified": "2023-11-21T22:15:08.087", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48305.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48305.json index 56f359ca895..7b4e461c57f 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48305.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48305.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48305", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-21T23:15:07.373", - "lastModified": "2023-11-21T23:15:07.373", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48306.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48306.json index 261caac76fe..122e7a6e1e4 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48306.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48306.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48306", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-21T23:15:07.600", - "lastModified": "2023-11-21T23:15:07.600", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-483xx/CVE-2023-48307.json b/CVE-2023/CVE-2023-483xx/CVE-2023-48307.json index f225f1f91a1..d5203fdb632 100644 --- a/CVE-2023/CVE-2023-483xx/CVE-2023-48307.json +++ b/CVE-2023/CVE-2023-483xx/CVE-2023-48307.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48307", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-21T23:15:07.807", - "lastModified": "2023-11-21T23:15:07.807", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48699.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48699.json index 9afb160f550..75752ac1811 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48699.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48699.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48699", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-21T23:15:08.103", - "lastModified": "2023-11-21T23:15:08.103", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48700.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48700.json index 2d15a462cbd..7308446073a 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48700.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48700.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48700", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-21T23:15:08.307", - "lastModified": "2023-11-21T23:15:08.307", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48701.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48701.json index 1a4cb1881ab..c7515278219 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48701.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48701.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48701", "sourceIdentifier": "security-advisories@github.com", "published": "2023-11-21T23:15:08.510", - "lastModified": "2023-11-21T23:15:08.510", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49103.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49103.json index 35626082fa4..9bd3d5df152 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49103.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49103.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49103", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-21T22:15:08.277", - "lastModified": "2023-11-21T22:15:08.277", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49104.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49104.json index 0feea2810a0..cac7b8a9cf0 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49104.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49104.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49104", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-21T22:15:08.450", - "lastModified": "2023-11-21T22:15:08.450", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49105.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49105.json index 0c038ed1359..6fbc0b42a52 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49105.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49105.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49105", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-21T22:15:08.613", - "lastModified": "2023-11-21T22:15:08.613", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5299.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5299.json index cca50d0ebd1..6bf74fb7ad3 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5299.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5299.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5299", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-11-22T01:15:08.187", - "lastModified": "2023-11-22T01:15:08.187", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6238.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6238.json index a4f83269804..7f24e4966e4 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6238.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6238.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6238", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-21T21:15:09.273", - "lastModified": "2023-11-21T21:15:09.273", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:44.963", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6248.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6248.json index c1c83b328a1..4f475820504 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6248.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6248.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6248", "sourceIdentifier": "cve@asrg.io", "published": "2023-11-21T22:15:08.787", - "lastModified": "2023-11-21T22:15:08.787", - "vulnStatus": "Received", + "lastModified": "2023-11-22T03:36:37.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 1baaf3abec4..a8c19e23e95 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-22T03:00:18.732421+00:00 +2023-11-22T05:00:23.202185+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-22T02:15:42.220000+00:00 +2023-11-22T04:23:52.063000+00:00 ``` ### Last Data Feed Release @@ -29,28 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -231259 +231260 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `1` -* [CVE-2021-22142](CVE-2021/CVE-2021-221xx/CVE-2021-22142.json) (`2023-11-22T01:15:07.210`) -* [CVE-2021-22150](CVE-2021/CVE-2021-221xx/CVE-2021-22150.json) (`2023-11-22T01:15:07.417`) -* [CVE-2021-22151](CVE-2021/CVE-2021-221xx/CVE-2021-22151.json) (`2023-11-22T01:15:07.607`) -* [CVE-2021-22143](CVE-2021/CVE-2021-221xx/CVE-2021-22143.json) (`2023-11-22T02:15:41.860`) -* [CVE-2021-37937](CVE-2021/CVE-2021-379xx/CVE-2021-37937.json) (`2023-11-22T02:15:42.043`) -* [CVE-2021-37942](CVE-2021/CVE-2021-379xx/CVE-2021-37942.json) (`2023-11-22T02:15:42.220`) -* [CVE-2023-35127](CVE-2023/CVE-2023-351xx/CVE-2023-35127.json) (`2023-11-22T01:15:07.813`) -* [CVE-2023-40152](CVE-2023/CVE-2023-401xx/CVE-2023-40152.json) (`2023-11-22T01:15:08.007`) -* [CVE-2023-5299](CVE-2023/CVE-2023-52xx/CVE-2023-5299.json) (`2023-11-22T01:15:08.187`) +* [CVE-2022-35638](CVE-2022/CVE-2022-356xx/CVE-2022-35638.json) (`2023-11-22T04:15:07.237`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `41` +* [CVE-2022-45382](CVE-2022/CVE-2022-453xx/CVE-2022-45382.json) (`2023-11-22T04:23:37.247`) +* [CVE-2022-45381](CVE-2022/CVE-2022-453xx/CVE-2022-45381.json) (`2023-11-22T04:23:46.943`) +* [CVE-2022-45380](CVE-2022/CVE-2022-453xx/CVE-2022-45380.json) (`2023-11-22T04:23:52.063`) +* [CVE-2023-48304](CVE-2023/CVE-2023-483xx/CVE-2023-48304.json) (`2023-11-22T03:36:37.770`) +* [CVE-2023-49103](CVE-2023/CVE-2023-491xx/CVE-2023-49103.json) (`2023-11-22T03:36:37.770`) +* [CVE-2023-49104](CVE-2023/CVE-2023-491xx/CVE-2023-49104.json) (`2023-11-22T03:36:37.770`) +* [CVE-2023-49105](CVE-2023/CVE-2023-491xx/CVE-2023-49105.json) (`2023-11-22T03:36:37.770`) +* [CVE-2023-6248](CVE-2023/CVE-2023-62xx/CVE-2023-6248.json) (`2023-11-22T03:36:37.770`) +* [CVE-2023-48305](CVE-2023/CVE-2023-483xx/CVE-2023-48305.json) (`2023-11-22T03:36:37.770`) +* [CVE-2023-48306](CVE-2023/CVE-2023-483xx/CVE-2023-48306.json) (`2023-11-22T03:36:37.770`) +* [CVE-2023-48307](CVE-2023/CVE-2023-483xx/CVE-2023-48307.json) (`2023-11-22T03:36:37.770`) +* [CVE-2023-48699](CVE-2023/CVE-2023-486xx/CVE-2023-48699.json) (`2023-11-22T03:36:37.770`) +* [CVE-2023-48700](CVE-2023/CVE-2023-487xx/CVE-2023-48700.json) (`2023-11-22T03:36:37.770`) +* [CVE-2023-48701](CVE-2023/CVE-2023-487xx/CVE-2023-48701.json) (`2023-11-22T03:36:37.770`) +* [CVE-2023-35127](CVE-2023/CVE-2023-351xx/CVE-2023-35127.json) (`2023-11-22T03:36:37.770`) +* [CVE-2023-40152](CVE-2023/CVE-2023-401xx/CVE-2023-40152.json) (`2023-11-22T03:36:37.770`) +* [CVE-2023-5299](CVE-2023/CVE-2023-52xx/CVE-2023-5299.json) (`2023-11-22T03:36:37.770`) +* [CVE-2023-48228](CVE-2023/CVE-2023-482xx/CVE-2023-48228.json) (`2023-11-22T03:36:44.963`) +* [CVE-2023-48230](CVE-2023/CVE-2023-482xx/CVE-2023-48230.json) (`2023-11-22T03:36:44.963`) +* [CVE-2023-48239](CVE-2023/CVE-2023-482xx/CVE-2023-48239.json) (`2023-11-22T03:36:44.963`) +* [CVE-2023-48299](CVE-2023/CVE-2023-482xx/CVE-2023-48299.json) (`2023-11-22T03:36:44.963`) +* [CVE-2023-6238](CVE-2023/CVE-2023-62xx/CVE-2023-6238.json) (`2023-11-22T03:36:44.963`) +* [CVE-2023-48301](CVE-2023/CVE-2023-483xx/CVE-2023-48301.json) (`2023-11-22T03:36:44.963`) +* [CVE-2023-48302](CVE-2023/CVE-2023-483xx/CVE-2023-48302.json) (`2023-11-22T03:36:44.963`) +* [CVE-2023-48303](CVE-2023/CVE-2023-483xx/CVE-2023-48303.json) (`2023-11-22T03:36:44.963`) ## Download and Usage