Auto-Update: 2023-11-22T05:00:23.202185+00:00

This commit is contained in:
cad-safe-bot 2023-11-22 05:00:26 +00:00
parent 63cc96a831
commit 6512eb4108
43 changed files with 298 additions and 102 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-22142",
"sourceIdentifier": "bressers@elastic.co",
"published": "2023-11-22T01:15:07.210",
"lastModified": "2023-11-22T01:15:07.210",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-22143",
"sourceIdentifier": "bressers@elastic.co",
"published": "2023-11-22T02:15:41.860",
"lastModified": "2023-11-22T02:15:41.860",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-22150",
"sourceIdentifier": "bressers@elastic.co",
"published": "2023-11-22T01:15:07.417",
"lastModified": "2023-11-22T01:15:07.417",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-22151",
"sourceIdentifier": "bressers@elastic.co",
"published": "2023-11-22T01:15:07.607",
"lastModified": "2023-11-22T01:15:07.607",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-37937",
"sourceIdentifier": "bressers@elastic.co",
"published": "2023-11-22T02:15:42.043",
"lastModified": "2023-11-22T02:15:42.043",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-37942",
"sourceIdentifier": "bressers@elastic.co",
"published": "2023-11-22T02:15:42.220",
"lastModified": "2023-11-22T02:15:42.220",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-24599",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-02-24T15:15:29.633",
"lastModified": "2023-11-12T23:15:08.007",
"vulnStatus": "Modified",
"lastModified": "2023-11-22T03:15:07.263",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -105,6 +105,18 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00006.html",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4JXZ6QAMA3TSRY6GUZRY3WTHR7P5TPH/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTETOUJNRR75REYJZTBGF6TAJZYTMXUY/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZPG27YKICLIWUFOPVUOAFAZGOX4BNHY/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2022-35638",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-11-22T04:15:07.237",
"lastModified": "2023-11-22T04:15:07.237",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.0.3.8 and 6.1.0.0 through 6.1.2.1 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 230824."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/230824",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7080104",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43422",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.333",
"lastModified": "2023-10-25T18:17:19.923",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-22T04:22:44.253",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43430",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.787",
"lastModified": "2023-10-25T18:17:20.473",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-22T04:22:15.630",
"vulnStatus": "Analyzed",
"evaluatorComment": "\n\n",
"descriptions": [
{
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43431",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.847",
"lastModified": "2023-10-25T18:17:20.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-22T04:21:32.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -38,6 +38,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43432",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.897",
"lastModified": "2023-10-25T18:17:20.617",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-22T04:21:24.920",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43433",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:11.953",
"lastModified": "2023-10-25T18:17:20.677",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-22T04:20:51.540",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -38,6 +38,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43434",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:12.010",
"lastModified": "2023-10-25T18:17:20.733",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-22T04:20:01.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -38,6 +38,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43435",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-10-19T16:15:12.070",
"lastModified": "2023-10-25T18:17:20.787",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-22T04:18:55.650",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-45379",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:11.390",
"lastModified": "2023-10-25T18:17:20.847",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-22T04:18:00.013",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jenkins Script Security Plugin 1189.vb_a_b_7c8fd5fde and earlier stores whole-script approvals as the SHA-1 hash of the script, making it vulnerable to collision attacks."
},
{
"lang": "es",
"value": "Jenkins Script Security Plugin 1189.vb_a_b_7c8fd5fde y versiones anteriores almacena las aprobaciones de scripts completos como el hash SHA-1 del script, lo que lo hace vulnerable a ataques de colisi\u00f3n."
}
],
"metrics": {
@ -67,7 +71,10 @@
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2564",

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-45380",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:11.480",
"lastModified": "2023-10-25T18:17:20.903",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-22T04:23:52.063",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jenkins JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission."
},
{
"lang": "es",
"value": "Jenkins JUnit Plugin 1159.v0b_396e1e07dd y versiones anteriores convierten las URL HTTP(S) en la salida del informe de prueba en enlaces en los que se puede hacer clic de manera insegura, lo que genera una vulnerabilidad de Cross-Site Scripting (XSS) almacenada que pueden explotar los atacantes con permiso Item/Configure."
}
],
"metrics": {
@ -34,6 +38,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
@ -55,7 +71,10 @@
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2888",

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-45381",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:11.567",
"lastModified": "2023-10-25T18:17:20.960",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-22T04:23:46.943",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jenkins Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of Apache Commons Configuration library that enable the 'file:' prefix interpolator by default, allowing attackers able to configure Pipelines to read arbitrary files from the Jenkins controller file system."
},
{
"lang": "es",
"value": "Jenkins Pipeline Utility Steps Plugin 2.13.1 y versiones anteriores no restringe el conjunto de interpoladores de prefijos habilitados y las versiones de paquetes de la librer\u00eda de configuraci\u00f3n Apache Commons que habilitan el interpolador de prefijos 'file:' de forma predeterminada, lo que permite a los atacantes capaces de configurar Pipelines para leer archivos arbitrarios de el sistema de archivos del controlador Jenkins."
}
],
"metrics": {
@ -67,7 +71,10 @@
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2949",

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-45382",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:11.647",
"lastModified": "2023-10-25T18:17:21.023",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-22T04:23:37.247",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jenkins Naginator Plugin 1.18.1 and earlier does not escape display names of source builds in builds that were triggered via Retry action, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to edit build display names."
},
{
"lang": "es",
"value": "Jenkins Naginator Plugin 1.18.1 y versiones anteriores no escapa a los nombres para mostrar de las compilaciones de origen en compilaciones que se activaron mediante la acci\u00f3n Reintentar, lo que da como resultado una vulnerabilidad de Cross-Site Scripting (XSS) Almacenado que pueden explotar los atacantes capaces de editar los nombres para mostrar de las compilaciones."
}
],
"metrics": {
@ -34,6 +38,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
@ -55,7 +71,10 @@
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2946",

View File

@ -2,12 +2,16 @@
"id": "CVE-2022-45383",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-11-15T20:15:11.730",
"lastModified": "2023-10-25T18:17:21.077",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-22T04:23:26.613",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An incorrect permission check in Jenkins Support Core Plugin 1206.v14049fa_b_d860 and earlier allows attackers with Support/DownloadBundle permission to download a previously created support bundle containing information limited to users with Overall/Administer permission."
},
{
"lang": "es",
"value": "Una verificaci\u00f3n de permisos incorrecta en Jenkins Support Core Plugin 1206.v14049fa_b_d860 y versiones anteriores permite a atacantes con permiso Support/DownloadBundle descargar un paquete de soporte creado previamente que contiene informaci\u00f3n limitada a usuarios con permiso General/Administrador."
}
],
"metrics": {
@ -67,7 +71,11 @@
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2022/11/15/4",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2804",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35127",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-11-22T01:15:07.813",
"lastModified": "2023-11-22T01:15:07.813",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40152",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-11-22T01:15:08.007",
"lastModified": "2023-11-22T01:15:08.007",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48228",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-21T21:15:08.477",
"lastModified": "2023-11-21T21:15:08.477",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:44.963",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48230",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-21T21:15:08.683",
"lastModified": "2023-11-21T21:15:08.683",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:44.963",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48239",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-21T21:15:08.880",
"lastModified": "2023-11-21T21:15:08.880",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:44.963",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48299",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-21T21:15:09.077",
"lastModified": "2023-11-21T21:15:09.077",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:44.963",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48301",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-21T22:15:07.490",
"lastModified": "2023-11-21T22:15:07.490",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:44.963",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48302",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-21T22:15:07.697",
"lastModified": "2023-11-21T22:15:07.697",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:44.963",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48303",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-21T22:15:07.893",
"lastModified": "2023-11-21T22:15:07.893",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:44.963",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48304",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-21T22:15:08.087",
"lastModified": "2023-11-21T22:15:08.087",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48305",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-21T23:15:07.373",
"lastModified": "2023-11-21T23:15:07.373",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48306",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-21T23:15:07.600",
"lastModified": "2023-11-21T23:15:07.600",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48307",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-21T23:15:07.807",
"lastModified": "2023-11-21T23:15:07.807",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48699",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-21T23:15:08.103",
"lastModified": "2023-11-21T23:15:08.103",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48700",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-21T23:15:08.307",
"lastModified": "2023-11-21T23:15:08.307",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48701",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-21T23:15:08.510",
"lastModified": "2023-11-21T23:15:08.510",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49103",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-21T22:15:08.277",
"lastModified": "2023-11-21T22:15:08.277",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49104",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-21T22:15:08.450",
"lastModified": "2023-11-21T22:15:08.450",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49105",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-21T22:15:08.613",
"lastModified": "2023-11-21T22:15:08.613",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5299",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-11-22T01:15:08.187",
"lastModified": "2023-11-22T01:15:08.187",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6238",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-21T21:15:09.273",
"lastModified": "2023-11-21T21:15:09.273",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:44.963",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6248",
"sourceIdentifier": "cve@asrg.io",
"published": "2023-11-21T22:15:08.787",
"lastModified": "2023-11-21T22:15:08.787",
"vulnStatus": "Received",
"lastModified": "2023-11-22T03:36:37.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-22T03:00:18.732421+00:00
2023-11-22T05:00:23.202185+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-22T02:15:42.220000+00:00
2023-11-22T04:23:52.063000+00:00
```
### Last Data Feed Release
@ -29,28 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
231259
231260
```
### CVEs added in the last Commit
Recently added CVEs: `9`
Recently added CVEs: `1`
* [CVE-2021-22142](CVE-2021/CVE-2021-221xx/CVE-2021-22142.json) (`2023-11-22T01:15:07.210`)
* [CVE-2021-22150](CVE-2021/CVE-2021-221xx/CVE-2021-22150.json) (`2023-11-22T01:15:07.417`)
* [CVE-2021-22151](CVE-2021/CVE-2021-221xx/CVE-2021-22151.json) (`2023-11-22T01:15:07.607`)
* [CVE-2021-22143](CVE-2021/CVE-2021-221xx/CVE-2021-22143.json) (`2023-11-22T02:15:41.860`)
* [CVE-2021-37937](CVE-2021/CVE-2021-379xx/CVE-2021-37937.json) (`2023-11-22T02:15:42.043`)
* [CVE-2021-37942](CVE-2021/CVE-2021-379xx/CVE-2021-37942.json) (`2023-11-22T02:15:42.220`)
* [CVE-2023-35127](CVE-2023/CVE-2023-351xx/CVE-2023-35127.json) (`2023-11-22T01:15:07.813`)
* [CVE-2023-40152](CVE-2023/CVE-2023-401xx/CVE-2023-40152.json) (`2023-11-22T01:15:08.007`)
* [CVE-2023-5299](CVE-2023/CVE-2023-52xx/CVE-2023-5299.json) (`2023-11-22T01:15:08.187`)
* [CVE-2022-35638](CVE-2022/CVE-2022-356xx/CVE-2022-35638.json) (`2023-11-22T04:15:07.237`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `41`
* [CVE-2022-45382](CVE-2022/CVE-2022-453xx/CVE-2022-45382.json) (`2023-11-22T04:23:37.247`)
* [CVE-2022-45381](CVE-2022/CVE-2022-453xx/CVE-2022-45381.json) (`2023-11-22T04:23:46.943`)
* [CVE-2022-45380](CVE-2022/CVE-2022-453xx/CVE-2022-45380.json) (`2023-11-22T04:23:52.063`)
* [CVE-2023-48304](CVE-2023/CVE-2023-483xx/CVE-2023-48304.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-49103](CVE-2023/CVE-2023-491xx/CVE-2023-49103.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-49104](CVE-2023/CVE-2023-491xx/CVE-2023-49104.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-49105](CVE-2023/CVE-2023-491xx/CVE-2023-49105.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-6248](CVE-2023/CVE-2023-62xx/CVE-2023-6248.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-48305](CVE-2023/CVE-2023-483xx/CVE-2023-48305.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-48306](CVE-2023/CVE-2023-483xx/CVE-2023-48306.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-48307](CVE-2023/CVE-2023-483xx/CVE-2023-48307.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-48699](CVE-2023/CVE-2023-486xx/CVE-2023-48699.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-48700](CVE-2023/CVE-2023-487xx/CVE-2023-48700.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-48701](CVE-2023/CVE-2023-487xx/CVE-2023-48701.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-35127](CVE-2023/CVE-2023-351xx/CVE-2023-35127.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-40152](CVE-2023/CVE-2023-401xx/CVE-2023-40152.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-5299](CVE-2023/CVE-2023-52xx/CVE-2023-5299.json) (`2023-11-22T03:36:37.770`)
* [CVE-2023-48228](CVE-2023/CVE-2023-482xx/CVE-2023-48228.json) (`2023-11-22T03:36:44.963`)
* [CVE-2023-48230](CVE-2023/CVE-2023-482xx/CVE-2023-48230.json) (`2023-11-22T03:36:44.963`)
* [CVE-2023-48239](CVE-2023/CVE-2023-482xx/CVE-2023-48239.json) (`2023-11-22T03:36:44.963`)
* [CVE-2023-48299](CVE-2023/CVE-2023-482xx/CVE-2023-48299.json) (`2023-11-22T03:36:44.963`)
* [CVE-2023-6238](CVE-2023/CVE-2023-62xx/CVE-2023-6238.json) (`2023-11-22T03:36:44.963`)
* [CVE-2023-48301](CVE-2023/CVE-2023-483xx/CVE-2023-48301.json) (`2023-11-22T03:36:44.963`)
* [CVE-2023-48302](CVE-2023/CVE-2023-483xx/CVE-2023-48302.json) (`2023-11-22T03:36:44.963`)
* [CVE-2023-48303](CVE-2023/CVE-2023-483xx/CVE-2023-48303.json) (`2023-11-22T03:36:44.963`)
## Download and Usage