diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10401.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10401.json index 1d50b1cb10d..1bc0f9f721a 100644 --- a/CVE-2019/CVE-2019-104xx/CVE-2019-10401.json +++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10401.json @@ -2,8 +2,8 @@ "id": "CVE-2019-10401", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2019-09-25T16:15:10.383", - "lastModified": "2023-10-25T18:16:20.997", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:06:38.500", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10402.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10402.json index 61778f8d5ca..e65bf48fa0d 100644 --- a/CVE-2019/CVE-2019-104xx/CVE-2019-10402.json +++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10402.json @@ -2,8 +2,8 @@ "id": "CVE-2019-10402", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2019-09-25T16:15:10.463", - "lastModified": "2023-10-25T18:16:21.070", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:06:42.280", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10403.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10403.json index 8395e921c3c..eeca896cca0 100644 --- a/CVE-2019/CVE-2019-104xx/CVE-2019-10403.json +++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10403.json @@ -2,8 +2,8 @@ "id": "CVE-2019-10403", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2019-09-25T16:15:10.570", - "lastModified": "2023-10-25T18:16:21.150", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:06:46.090", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -110,7 +110,10 @@ }, { "url": "https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1537%20%281%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10404.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10404.json index b16b83664e6..eab5dbf6ef6 100644 --- a/CVE-2019/CVE-2019-104xx/CVE-2019-10404.json +++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10404.json @@ -2,8 +2,8 @@ "id": "CVE-2019-10404", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2019-09-25T16:15:10.633", - "lastModified": "2023-10-25T18:16:21.237", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:30:17.540", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -110,7 +110,10 @@ }, { "url": "https://jenkins.io/security/advisory/2019-09-25/#SECURITY-1537%20%282%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10405.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10405.json index 99c202f6d8e..ffd2f976ff7 100644 --- a/CVE-2019/CVE-2019-104xx/CVE-2019-10405.json +++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10405.json @@ -2,8 +2,8 @@ "id": "CVE-2019-10405", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2019-09-25T16:15:10.697", - "lastModified": "2023-10-25T18:16:21.313", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:30:24.780", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2019/CVE-2019-104xx/CVE-2019-10406.json b/CVE-2019/CVE-2019-104xx/CVE-2019-10406.json index c28de735ac0..faea9e83880 100644 --- a/CVE-2019/CVE-2019-104xx/CVE-2019-10406.json +++ b/CVE-2019/CVE-2019-104xx/CVE-2019-10406.json @@ -2,8 +2,8 @@ "id": "CVE-2019-10406", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2019-09-25T16:15:10.773", - "lastModified": "2023-10-25T18:16:21.383", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:30:28.613", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16562.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16562.json index e3a9fabb7c6..7e23c25a790 100644 --- a/CVE-2019/CVE-2019-165xx/CVE-2019-16562.json +++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16562.json @@ -2,8 +2,8 @@ "id": "CVE-2019-16562", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2019-12-17T15:15:19.503", - "lastModified": "2023-10-25T18:16:27.513", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:30:32.413", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16563.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16563.json index 6b5ee486e23..5baab965f13 100644 --- a/CVE-2019/CVE-2019-165xx/CVE-2019-16563.json +++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16563.json @@ -2,8 +2,8 @@ "id": "CVE-2019-16563", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2019-12-17T15:15:19.753", - "lastModified": "2023-10-25T18:16:27.587", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:25:39.790", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2019/CVE-2019-165xx/CVE-2019-16564.json b/CVE-2019/CVE-2019-165xx/CVE-2019-16564.json index 9f1f400c41b..ebc0935ba4f 100644 --- a/CVE-2019/CVE-2019-165xx/CVE-2019-16564.json +++ b/CVE-2019/CVE-2019-165xx/CVE-2019-16564.json @@ -2,8 +2,8 @@ "id": "CVE-2019-16564", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2019-12-17T15:15:20.193", - "lastModified": "2023-10-25T18:16:27.647", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:25:44.440", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-20xx/CVE-2020-2096.json b/CVE-2020/CVE-2020-20xx/CVE-2020-2096.json index 4b7195baa40..7169f928136 100644 --- a/CVE-2020/CVE-2020-20xx/CVE-2020-2096.json +++ b/CVE-2020/CVE-2020-20xx/CVE-2020-2096.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2096", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-01-15T16:15:14.853", - "lastModified": "2023-10-25T18:16:28.930", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:25:47.770", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2106.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2106.json index 6895bb16966..ff41e87e3a0 100644 --- a/CVE-2020/CVE-2020-21xx/CVE-2020-2106.json +++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2106.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2106", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-01-29T16:15:12.630", - "lastModified": "2023-10-25T18:16:29.660", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:26:47.237", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2137.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2137.json index 9ac269c1136..2dbf48578ac 100644 --- a/CVE-2020/CVE-2020-21xx/CVE-2020-2137.json +++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2137.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2137", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-03-09T16:15:12.890", - "lastModified": "2023-10-25T18:16:31.697", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:27:25.420", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/03/09/1", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2161.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2161.json index d9f5959d0f2..8d80ad84d9e 100644 --- a/CVE-2020/CVE-2020-21xx/CVE-2020-2161.json +++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2161.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2161", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-03-25T17:15:15.000", - "lastModified": "2023-10-25T18:16:33.197", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:11:34.960", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2162.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2162.json index 9b85b7cf1bc..66e90e5ca2c 100644 --- a/CVE-2020/CVE-2020-21xx/CVE-2020-2162.json +++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2162.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2162", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-03-25T17:15:15.093", - "lastModified": "2023-10-25T18:16:33.277", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:11:45.810", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2163.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2163.json index 98364a49034..4adc39436aa 100644 --- a/CVE-2020/CVE-2020-21xx/CVE-2020-2163.json +++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2163.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2163", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-03-25T17:15:15.203", - "lastModified": "2023-10-25T18:16:33.337", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:11:55.893", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2169.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2169.json index 459fc065932..3d7c1a9a693 100644 --- a/CVE-2020/CVE-2020-21xx/CVE-2020-2169.json +++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2169.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2169", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-03-25T17:15:15.763", - "lastModified": "2023-10-25T18:16:33.830", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:12:05.030", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2170.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2170.json index 77b4894a8f5..89077ca21e7 100644 --- a/CVE-2020/CVE-2020-21xx/CVE-2020-2170.json +++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2170.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2170", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-03-25T17:15:15.843", - "lastModified": "2023-10-25T18:16:33.903", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:12:11.637", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2173.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2173.json index b308bf0099e..d7f61f1e35e 100644 --- a/CVE-2020/CVE-2020-21xx/CVE-2020-2173.json +++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2173.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2173", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-04-07T13:15:13.633", - "lastModified": "2023-10-25T18:16:34.127", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:12:34.363", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -96,7 +96,10 @@ "references": [ { "url": "http://www.openwall.com/lists/oss-security/2020/04/07/3", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://jenkins.io/security/advisory/2020-04-07/#SECURITY-1633", diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2175.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2175.json index 7eca796f718..2b98982a14b 100644 --- a/CVE-2020/CVE-2020-21xx/CVE-2020-2175.json +++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2175.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2175", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-04-07T13:15:13.777", - "lastModified": "2023-10-25T18:16:34.283", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:42:00.827", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -96,7 +96,10 @@ "references": [ { "url": "http://www.openwall.com/lists/oss-security/2020/04/07/3", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://jenkins.io/security/advisory/2020-04-07/#SECURITY-1801", diff --git a/CVE-2020/CVE-2020-21xx/CVE-2020-2176.json b/CVE-2020/CVE-2020-21xx/CVE-2020-2176.json index e887ea0540a..baec6325a5b 100644 --- a/CVE-2020/CVE-2020-21xx/CVE-2020-2176.json +++ b/CVE-2020/CVE-2020-21xx/CVE-2020-2176.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2176", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-04-07T13:15:13.853", - "lastModified": "2023-10-25T18:16:34.340", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:42:05.413", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -96,7 +96,10 @@ "references": [ { "url": "http://www.openwall.com/lists/oss-security/2020/04/07/3", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://jenkins.io/security/advisory/2020-04-07/#SECURITY-1780", diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2205.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2205.json index ff43c7f1bcf..55816ca2b70 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2205.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2205.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2205", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-07-02T15:15:17.507", - "lastModified": "2023-10-25T18:16:36.263", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:42:10.480", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,12 +98,16 @@ "url": "http://www.openwall.com/lists/oss-security/2020/07/02/7", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, { "url": "https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1728%20%281%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2206.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2206.json index 1c754ad8f69..7e6f90f9a7e 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2206.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2206.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2206", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-07-02T15:15:17.600", - "lastModified": "2023-10-25T18:16:36.323", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:41:15.633", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,12 +98,16 @@ "url": "http://www.openwall.com/lists/oss-security/2020/07/02/7", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, { "url": "https://jenkins.io/security/advisory/2020-07-02/#SECURITY-1728%20%282%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2207.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2207.json index 89a5375ecd4..1a3ebae9849 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2207.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2207.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2207", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-07-02T15:15:17.677", - "lastModified": "2023-10-25T18:16:36.383", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:41:21.070", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/07/02/7", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2217.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2217.json index 0630a9ae50b..c0263353893 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2217.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2217.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2217", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-07-02T15:15:18.600", - "lastModified": "2023-10-25T18:16:36.967", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:41:34.180", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/07/02/7", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2229.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2229.json index 460cddee653..9880a61b963 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2229.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2229.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2229", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-08-12T14:15:13.110", - "lastModified": "2023-10-25T18:16:37.737", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:41:39.730", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2230.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2230.json index a0d849ef74d..2f3c259c0ef 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2230.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2230.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2230", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-08-12T14:15:13.190", - "lastModified": "2023-10-25T18:16:37.813", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:39:07.867", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2231.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2231.json index 2b2b738acc8..b49e2b134b7 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2231.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2231.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2231", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-08-12T14:15:13.267", - "lastModified": "2023-10-25T18:16:37.877", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:39:11.873", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2236.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2236.json index 36e58c280ed..0853f2d1b4e 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2236.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2236.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2236", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-08-12T14:15:13.657", - "lastModified": "2023-10-25T18:16:38.227", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:40:21.913", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2238.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2238.json index 4db2d781a3c..e4ed7852c4d 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2238.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2238.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2238", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-01T14:15:12.550", - "lastModified": "2023-10-25T18:16:38.357", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:40:31.353", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2243.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2243.json index b74b05dd077..a9612d9b451 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2243.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2243.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2243", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-01T14:15:12.927", - "lastModified": "2023-10-25T18:16:38.670", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:40:44.237", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2244.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2244.json index 74dc77efaad..c672e921909 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2244.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2244.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2244", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-01T14:15:12.987", - "lastModified": "2023-10-25T18:16:38.730", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:38:48.523", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2246.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2246.json index a26b81cbb45..bdeb35fff28 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2246.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2246.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2246", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-01T14:15:13.113", - "lastModified": "2023-10-25T18:16:38.850", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:33:24.990", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2248.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2248.json index 94482bd2125..dab2daf4692 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2248.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2248.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2248", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-01T14:15:13.223", - "lastModified": "2023-10-25T18:16:38.970", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:33:11.827", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2256.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2256.json index d1b0c3c3f4a..81e147c4352 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2256.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2256.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2256", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-16T14:15:13.313", - "lastModified": "2023-10-25T18:16:39.487", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:48:37.567", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/09/16/3", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2257.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2257.json index 54f3eea6685..2448c4734d4 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2257.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2257.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2257", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-16T14:15:13.377", - "lastModified": "2023-10-25T18:16:39.550", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:48:41.160", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/09/16/3", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2259.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2259.json index 66864571262..3718356209d 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2259.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2259.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2259", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-16T14:15:13.517", - "lastModified": "2023-10-25T18:16:39.667", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:48:44.907", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/09/16/3", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2262.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2262.json index cabe2f69914..e638e14eee4 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2262.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2262.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2262", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-16T14:15:13.703", - "lastModified": "2023-10-25T18:16:39.843", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:48:48.263", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/09/16/3", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2263.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2263.json index 3c60af6bbad..fc56d26b406 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2263.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2263.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2263", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-16T14:15:13.783", - "lastModified": "2023-10-25T18:16:39.900", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:48:51.197", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/09/16/3", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2264.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2264.json index 969a8b02153..36b344bfa7e 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2264.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2264.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2264", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-16T14:15:13.847", - "lastModified": "2023-10-25T18:16:39.960", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:48:54.290", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/09/16/3", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2265.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2265.json index 660f56bb142..f944a025168 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2265.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2265.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2265", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-16T14:15:13.923", - "lastModified": "2023-10-25T18:16:40.017", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:48:58.550", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/09/16/3", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2266.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2266.json index 00fdb4c52b2..f995bc983b0 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2266.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2266.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2266", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-16T14:15:13.987", - "lastModified": "2023-10-25T18:16:40.077", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:49:02.217", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/09/16/3", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2269.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2269.json index 9cccaf39651..a348de8ab52 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2269.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2269.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2269", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-16T14:15:14.250", - "lastModified": "2023-10-25T18:16:40.257", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:43:01.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/09/16/3", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2270.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2270.json index 99524e0602b..d42faf22ecf 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2270.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2270.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2270", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-16T14:15:14.330", - "lastModified": "2023-10-25T18:16:40.313", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:47:32.373", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/09/16/3", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2271.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2271.json index 122d3748e6b..053ca16bd0a 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2271.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2271.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2271", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-16T14:15:14.437", - "lastModified": "2023-10-25T18:16:40.367", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:47:35.757", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/09/16/3", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2283.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2283.json index 1d6bc63c51a..452799e3de1 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2283.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2283.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2283", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-09-23T14:15:13.353", - "lastModified": "2023-10-25T18:16:41.110", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:47:42.067", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/09/23/1", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2289.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2289.json index b9ed7aab9d2..3a8b342ff6e 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2289.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2289.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2289", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-10-08T13:15:11.547", - "lastModified": "2023-10-25T18:16:41.560", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:47:45.473", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,6 +63,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ @@ -86,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/10/08/5", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2290.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2290.json index 0b1fecebdc0..db54be77f89 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2290.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2290.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2290", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-10-08T13:15:11.610", - "lastModified": "2023-10-25T18:16:41.620", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:48:06.380", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,6 +63,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ @@ -86,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/10/08/5", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-22xx/CVE-2020-2292.json b/CVE-2020/CVE-2020-22xx/CVE-2020-2292.json index bdb37b4cb9e..b7113aab35f 100644 --- a/CVE-2020/CVE-2020-22xx/CVE-2020-2292.json +++ b/CVE-2020/CVE-2020-22xx/CVE-2020-2292.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2292", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-10-08T13:15:11.750", - "lastModified": "2023-10-25T18:16:41.747", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:48:09.623", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -98,6 +98,7 @@ "url": "http://www.openwall.com/lists/oss-security/2020/10/08/5", "source": "jenkinsci-cert@googlegroups.com", "tags": [ + "Mailing List", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2316.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2316.json index c05fd971b20..997230db5a8 100644 --- a/CVE-2020/CVE-2020-23xx/CVE-2020-2316.json +++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2316.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2316", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-11-04T15:15:12.413", - "lastModified": "2023-10-25T18:16:43.417", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T22:10:16.147", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -63,6 +63,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2020/CVE-2020-23xx/CVE-2020-2317.json b/CVE-2020/CVE-2020-23xx/CVE-2020-2317.json index f7e022c7b6f..90297e41225 100644 --- a/CVE-2020/CVE-2020-23xx/CVE-2020-2317.json +++ b/CVE-2020/CVE-2020-23xx/CVE-2020-2317.json @@ -2,8 +2,8 @@ "id": "CVE-2020-2317", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2020-11-04T15:15:12.490", - "lastModified": "2023-10-25T18:16:43.483", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T22:10:11.657", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-292xx/CVE-2020-29297.json b/CVE-2020/CVE-2020-292xx/CVE-2020-29297.json index b89c4bb0ea8..cd8ee9fa265 100644 --- a/CVE-2020/CVE-2020-292xx/CVE-2020-29297.json +++ b/CVE-2020/CVE-2020-292xx/CVE-2020-29297.json @@ -2,12 +2,12 @@ "id": "CVE-2020-29297", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:13.183", - "lastModified": "2023-01-26T18:41:17.243", - "vulnStatus": "Analyzed", + "lastModified": "2023-11-02T21:15:09.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Multiple SQL Injection vulnerabilies in tourist5 Online-food-ordering-system 1.0." + "value": "Multiple SQL Injection vulnerabilities in tourist5 Online-food-ordering-system 1.0." } ], "metrics": { diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21603.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21603.json index c1542adab27..745f58934b8 100644 --- a/CVE-2021/CVE-2021-216xx/CVE-2021-21603.json +++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21603.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21603", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2021-01-13T16:15:13.460", - "lastModified": "2023-10-25T18:16:44.693", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T22:10:01.387", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21608.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21608.json index 7789cccdda6..13e8b1783f5 100644 --- a/CVE-2021/CVE-2021-216xx/CVE-2021-21608.json +++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21608.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21608", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2021-01-13T16:15:13.837", - "lastModified": "2023-10-25T18:16:45.210", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T22:04:14.407", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21610.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21610.json index 24b05592279..bcf1fa272d2 100644 --- a/CVE-2021/CVE-2021-216xx/CVE-2021-21610.json +++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21610.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21610", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2021-01-13T16:15:14.007", - "lastModified": "2023-10-25T18:16:45.387", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T22:04:07.153", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21611.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21611.json index f8d5951119d..517b7aa74b6 100644 --- a/CVE-2021/CVE-2021-216xx/CVE-2021-21611.json +++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21611.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21611", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2021-01-13T16:15:14.087", - "lastModified": "2023-10-25T18:16:45.470", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T22:04:03.917", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21616.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21616.json index dbbeba43ac2..a3d777a948f 100644 --- a/CVE-2021/CVE-2021-216xx/CVE-2021-21616.json +++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21616.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21616", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2021-02-24T16:15:14.663", - "lastModified": "2023-10-25T18:16:46.033", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T22:00:26.357", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21618.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21618.json index 783744b6bbd..7f8d8941bd6 100644 --- a/CVE-2021/CVE-2021-216xx/CVE-2021-21618.json +++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21618.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21618", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2021-02-24T16:15:14.897", - "lastModified": "2023-10-25T18:16:46.270", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T22:00:16.503", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-216xx/CVE-2021-21619.json b/CVE-2021/CVE-2021-216xx/CVE-2021-21619.json index 91797f2107a..018f0f44917 100644 --- a/CVE-2021/CVE-2021-216xx/CVE-2021-21619.json +++ b/CVE-2021/CVE-2021-216xx/CVE-2021-21619.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21619", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2021-02-24T16:15:14.983", - "lastModified": "2023-10-25T18:16:46.350", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T22:00:12.080", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -104,7 +104,10 @@ }, { "url": "https://www.jenkins.io/security/advisory/2021-02-24/#SECURITY-2188%20%281%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-290xx/CVE-2022-29046.json b/CVE-2022/CVE-2022-290xx/CVE-2022-29046.json index 903a77f72a3..d801b820e9c 100644 --- a/CVE-2022/CVE-2022-290xx/CVE-2022-29046.json +++ b/CVE-2022/CVE-2022-290xx/CVE-2022-29046.json @@ -2,8 +2,8 @@ "id": "CVE-2022-29046", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-04-12T20:15:09.567", - "lastModified": "2023-10-25T18:17:02.350", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T22:00:06.127", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30956.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30956.json index 105ad069474..194740a9bb5 100644 --- a/CVE-2022/CVE-2022-309xx/CVE-2022-30956.json +++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30956.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30956", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-05-17T15:15:09.687", - "lastModified": "2023-10-25T18:17:03.517", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T22:00:01.620", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30960.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30960.json index 787d85dabb7..c56c941d582 100644 --- a/CVE-2022/CVE-2022-309xx/CVE-2022-30960.json +++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30960.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30960", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-05-17T15:15:10.203", - "lastModified": "2023-10-25T18:17:03.760", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:59:52.287", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30961.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30961.json index dceb3c81efc..38baf29e292 100644 --- a/CVE-2022/CVE-2022-309xx/CVE-2022-30961.json +++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30961.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30961", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-05-17T15:15:10.293", - "lastModified": "2023-10-25T18:17:03.820", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:59:45.917", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-309xx/CVE-2022-30962.json b/CVE-2022/CVE-2022-309xx/CVE-2022-30962.json index 0ada348963e..10bebcfbda8 100644 --- a/CVE-2022/CVE-2022-309xx/CVE-2022-30962.json +++ b/CVE-2022/CVE-2022-309xx/CVE-2022-30962.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30962", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-05-17T15:15:10.417", - "lastModified": "2023-10-25T18:17:03.880", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:59:41.800", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36898.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36898.json index 358a153a03a..35dd5084d23 100644 --- a/CVE-2022/CVE-2022-368xx/CVE-2022-36898.json +++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36898.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36898", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-07-27T15:15:09.667", - "lastModified": "2023-10-25T18:17:13.000", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:06:50.327", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36899.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36899.json index 61818834b12..b71dfc210f4 100644 --- a/CVE-2022/CVE-2022-368xx/CVE-2022-36899.json +++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36899.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36899", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-07-27T15:15:09.723", - "lastModified": "2023-10-25T18:17:13.057", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:05:45.437", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36900.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36900.json index f8d77d9171d..a45c8dcacdb 100644 --- a/CVE-2022/CVE-2022-369xx/CVE-2022-36900.json +++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36900.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36900", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-07-27T15:15:09.777", - "lastModified": "2023-10-25T18:17:13.123", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:05:53.617", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], "configurations": [ { "operator": "AND", diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36901.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36901.json index 0fc6cf71377..c76c0c316db 100644 --- a/CVE-2022/CVE-2022-369xx/CVE-2022-36901.json +++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36901.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36901", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-07-27T15:15:09.827", - "lastModified": "2023-10-25T18:17:13.223", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:06:17.390", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -45,7 +45,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "CWE-522" } ] } diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36902.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36902.json index 67cc43d9596..2e496c24b45 100644 --- a/CVE-2022/CVE-2022-369xx/CVE-2022-36902.json +++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36902.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36902", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-07-27T15:15:09.873", - "lastModified": "2023-10-25T18:17:13.317", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:06:20.710", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36903.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36903.json index 08ccafce08d..ea825b5882f 100644 --- a/CVE-2022/CVE-2022-369xx/CVE-2022-36903.json +++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36903.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36903", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-07-27T15:15:09.923", - "lastModified": "2023-10-25T18:17:13.377", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:06:24.167", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "configurations": [ { "nodes": [ @@ -67,7 +79,10 @@ }, { "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2665%20%281%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36905.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36905.json index f9a465279c0..09adb43ac69 100644 --- a/CVE-2022/CVE-2022-369xx/CVE-2022-36905.json +++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36905.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36905", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-07-27T15:15:10.023", - "lastModified": "2023-10-25T18:17:13.497", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:04:02.133", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36906.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36906.json index dfc2744da7a..580a3fc09f7 100644 --- a/CVE-2022/CVE-2022-369xx/CVE-2022-36906.json +++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36906.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36906", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-07-27T15:15:10.073", - "lastModified": "2023-10-25T18:17:13.557", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:04:15.330", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "configurations": [ { "nodes": [ @@ -67,7 +79,10 @@ }, { "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20%281%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36907.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36907.json index 9a8c3ef53b8..e3ad75f4a71 100644 --- a/CVE-2022/CVE-2022-369xx/CVE-2022-36907.json +++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36907.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36907", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-07-27T15:15:10.123", - "lastModified": "2023-10-25T18:17:13.617", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:04:18.850", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "configurations": [ { "nodes": [ @@ -67,7 +79,10 @@ }, { "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20%281%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36908.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36908.json index 6bf614f0465..17b4284ec43 100644 --- a/CVE-2022/CVE-2022-369xx/CVE-2022-36908.json +++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36908.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36908", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-07-27T15:15:10.173", - "lastModified": "2023-10-25T18:17:13.677", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:04:44.127", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "configurations": [ { "nodes": [ @@ -67,7 +79,10 @@ }, { "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20%282%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36909.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36909.json index 2aff1247162..afed8962a49 100644 --- a/CVE-2022/CVE-2022-369xx/CVE-2022-36909.json +++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36909.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36909", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-07-27T15:15:10.227", - "lastModified": "2023-10-25T18:17:13.733", - "vulnStatus": "Modified", + "lastModified": "2023-11-02T21:04:48.220", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -38,6 +38,18 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "configurations": [ { "nodes": [ @@ -67,7 +79,10 @@ }, { "url": "https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20%282%29", - "source": "jenkinsci-cert@googlegroups.com" + "source": "jenkinsci-cert@googlegroups.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31579.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31579.json new file mode 100644 index 00000000000..c293f2fd96d --- /dev/null +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31579.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-31579", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-02T22:15:08.640", + "lastModified": "2023-11-02T22:15:08.640", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Dromara Lamp-Cloud before v3.8.1 was discovered to use a hardcoded cryptographic key when creating and verifying a Json Web Token. This vulnerability allows attackers to authenticate to the application via a crafted JWT token." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/dromara/lamp-cloud/issues/183", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/xubowenW/JWTissues/blob/main/lamp%20issue.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39042.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39042.json new file mode 100644 index 00000000000..254c62d7ef8 --- /dev/null +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39042.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-39042", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-02T22:15:08.700", + "lastModified": "2023-11-02T22:15:08.700", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An information leak in Gyouza-newhushimi v13.6.1 allows attackers to obtain the channel access token and send crafted messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39042.md", + "source": "cve@mitre.org" + }, + { + "url": "https://liff.line.me/1660693321-VmNyyXqO", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39047.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39047.json new file mode 100644 index 00000000000..97163138211 --- /dev/null +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39047.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-39047", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-02T22:15:08.750", + "lastModified": "2023-11-02T22:15:08.750", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An information leak in shouzu sweets oz v13.6.1 allows attackers to obtain the channel access token and send crafted messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39047.md", + "source": "cve@mitre.org" + }, + { + "url": "https://liff.line.me/1657207159-oGgKdNNW", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39048.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39048.json new file mode 100644 index 00000000000..415607912bd --- /dev/null +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39048.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-39048", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-02T22:15:08.797", + "lastModified": "2023-11-02T22:15:08.797", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An information leak in Tokudaya.honten v13.6.1 allows attackers to obtain the channel access token and send crafted messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39048.md", + "source": "cve@mitre.org" + }, + { + "url": "https://liff.line.me/1660822133-g5YonEZK", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39050.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39050.json new file mode 100644 index 00000000000..bae8879b3ec --- /dev/null +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39050.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-39050", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-02T22:15:08.840", + "lastModified": "2023-11-02T22:15:08.840", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An information leak in Daiky-value.Fukueten v13.6.1 allows attackers to obtain the channel access token and send crafted messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39050.md", + "source": "cve@mitre.org" + }, + { + "url": "https://liff.line.me/1657264266-MPKmV0nq", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39051.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39051.json new file mode 100644 index 00000000000..6ef3fb77ac7 --- /dev/null +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39051.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-39051", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-02T22:15:08.887", + "lastModified": "2023-11-02T22:15:08.887", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An information leak in VISION MEAT WORKS Track Diner 10/10mbl v13.6.1 allows attackers to obtain the channel access token and send crafted messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39051.md", + "source": "cve@mitre.org" + }, + { + "url": "https://liff.line.me/1660679085-jy2OO7WE", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39053.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39053.json new file mode 100644 index 00000000000..8132f6d01a4 --- /dev/null +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39053.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-39053", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-02T22:15:08.933", + "lastModified": "2023-11-02T22:15:08.933", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An information leak in Hattoriya v13.6.1 allows attackers to obtain the channel access token and send crafted messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39053.md", + "source": "cve@mitre.org" + }, + { + "url": "https://liff.line.me/1657507029-eDjDJQ68", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39054.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39054.json new file mode 100644 index 00000000000..d65dfbbeac7 --- /dev/null +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39054.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-39054", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-02T22:15:08.980", + "lastModified": "2023-11-02T22:15:08.980", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An information leak in Tokudaya.ekimae_mc v13.6.1 allows attackers to obtain the channel access token and send crafted messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39054.md", + "source": "cve@mitre.org" + }, + { + "url": "https://liff.line.me/1660822001-2aM5Rl7Q", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39057.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39057.json new file mode 100644 index 00000000000..2e54a9f5c0d --- /dev/null +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39057.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-39057", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-02T22:15:09.023", + "lastModified": "2023-11-02T22:15:09.023", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An information leak in hirochanKAKIwaiting v13.6.1 allows attackers to obtain the channel access token and send crafted messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39057.md", + "source": "cve@mitre.org" + }, + { + "url": "https://liff.line.me/1657563463-WZNjNErk", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39283.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39283.json new file mode 100644 index 00000000000..dc98316d21d --- /dev/null +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39283.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-39283", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-02T22:15:09.070", + "lastModified": "2023-11-02T22:15:09.070", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An SMM memory corruption vulnerability in the SMM driver (SMRAM write) in CsmInt10HookSmm in Insyde InsydeH2O with kernel 5.0 through 5.5 allows attackers to send arbitrary data to SMM which could lead to privilege escalation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.insyde.com/security-pledge", + "source": "cve@mitre.org" + }, + { + "url": "https://www.insyde.com/security-pledge/SA-2023055", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39284.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39284.json new file mode 100644 index 00000000000..e051a957f29 --- /dev/null +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39284.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-39284", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-02T21:15:09.747", + "lastModified": "2023-11-02T21:15:09.747", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in IhisiServicesSmm in Insyde InsydeH2O with kernel 5.0 through 5.5. There are arbitrary calls to SetVariable with unsanitized arguments in the SMI handler." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.insyde.com/security-pledge", + "source": "cve@mitre.org" + }, + { + "url": "https://www.insyde.com/security-pledge/SA-2023056", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42299.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42299.json new file mode 100644 index 00000000000..8a325a8e962 --- /dev/null +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42299.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-42299", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-02T22:15:09.113", + "lastModified": "2023-11-02T22:15:09.113", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability in OpenImageIO oiio v.2.4.12.0 allows a remote attacker to execute arbitrary code and cause a denial of service via the read_subimage_data function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/OpenImageIO/oiio/issues/3840", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42456.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42456.json index 38342b2d61c..2958567e572 100644 --- a/CVE-2023/CVE-2023-424xx/CVE-2023-42456.json +++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42456.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42456", "sourceIdentifier": "security-advisories@github.com", "published": "2023-09-21T16:15:09.980", - "lastModified": "2023-09-26T14:18:33.340", - "vulnStatus": "Analyzed", + "lastModified": "2023-11-02T21:15:09.803", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -59,19 +59,9 @@ ] }, "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-22" - } - ] - }, { "source": "security-advisories@github.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -82,6 +72,16 @@ "value": "CWE-23" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ @@ -103,6 +103,10 @@ } ], "references": [ + { + "url": "http://www.openwall.com/lists/oss-security/2023/11/02/1", + "source": "security-advisories@github.com" + }, { "url": "https://github.com/memorysafety/sudo-rs/commit/bfdbda22968e3de43fa8246cab1681cfd5d5493d", "source": "security-advisories@github.com", diff --git a/CVE-2023/CVE-2023-431xx/CVE-2023-43194.json b/CVE-2023/CVE-2023-431xx/CVE-2023-43194.json new file mode 100644 index 00000000000..fbb0a72ed32 --- /dev/null +++ b/CVE-2023/CVE-2023-431xx/CVE-2023-43194.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-43194", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-02T22:15:09.160", + "lastModified": "2023-11-02T22:15:09.160", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Submitty before v22.06.00 is vulnerable to Incorrect Access Control. An attacker can delete any post in the forum by modifying request parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://fuchai.net/cve/CVE-2023-43194", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Submitty/Submitty/pull/8032", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45897.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45897.json index b437ff30dce..def80c23b65 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45897.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45897.json @@ -2,16 +2,24 @@ "id": "CVE-2023-45897", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-28T21:15:07.577", - "lastModified": "2023-10-29T01:44:12.570", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-02T21:15:09.913", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", "value": "exfatprogs before 1.2.2 allows out-of-bounds memory access, such as in read_file_dentry_set." + }, + { + "lang": "es", + "value": "exfatprogs anteriores a 1.2.2 permiten el acceso a la memoria fuera de los l\u00edmites, como en read_file_dentry_set." } ], "metrics": {}, "references": [ + { + "url": "https://dfir.ru/2023/11/01/cve-2023-45897-a-vulnerability-in-the-linux-exfat-userspace-tools/", + "source": "cve@mitre.org" + }, { "url": "https://github.com/exfatprogs/exfatprogs/commit/22d0e43e8d24119cbfc6efafabb0dec6517a86c4", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46352.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46352.json new file mode 100644 index 00000000000..f1cb9b15022 --- /dev/null +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46352.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46352", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-02T22:15:09.203", + "lastModified": "2023-11-02T22:15:09.203", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the module \"Pixel Plus: Events + CAPI + Pixel Catalog for Facebook Module\" (facebookconversiontrackingplus) up to version 2.4.9 from Smart Modules for PrestaShop, a guest can download personal information without restriction. Due to a lack of permissions control, a guest can access exports from the module which can lead to a leak of personal information from ps_customer table such as name / surname / email." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://addons.prestashop.com/en/analytics-statistics/18739-pixel-plus-events-capi-pixel-catalog-for-facebook.html", + "source": "cve@mitre.org" + }, + { + "url": "https://security.friendsofpresta.org/modules/2023/10/31/facebookconversiontrackingplus.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46858.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46858.json index 666bbd6e583..8c0e9472f29 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46858.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46858.json @@ -2,12 +2,16 @@ "id": "CVE-2023-46858", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-29T01:15:41.087", - "lastModified": "2023-10-29T01:44:12.570", + "lastModified": "2023-11-02T21:15:09.987", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "** DISPUTED ** Moodle 4.3 allows /grade/report/grader/index.php?searchvalue= reflected XSS when logged in as a teacher. NOTE: the Moodle Security FAQ link states \"Some forms of rich content [are] used by teachers to enhance their courses ... admins and teachers can post XSS-capable content, but students can not.\"" + }, + { + "lang": "es", + "value": "** EN DISPUTA ** Moodle 4.3 permite /grade/report/grader/index.php?searchvalue= XSS reflejado cuando se inicia sesi\u00f3n como profesor. NOTA: el enlace de preguntas frecuentes sobre seguridad de Moodle indica: \"Los profesores utilizan algunas formas de contenido enriquecido para mejorar sus cursos... los administradores y profesores pueden publicar contenido compatible con XSS, pero los estudiantes no\"." } ], "metrics": {}, @@ -19,6 +23,10 @@ { "url": "https://gist.github.com/Abid-Ahmad/12d2b4878eb731e8871b96b7d55125cd", "source": "cve@mitre.org" + }, + { + "url": "https://packetstormsecurity.com/files/175277/Moodle-4.3-Cross-Site-Scripting.html", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46958.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46958.json new file mode 100644 index 00000000000..f09bc0d50f4 --- /dev/null +++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46958.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-46958", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-02T22:15:09.250", + "lastModified": "2023-11-02T22:15:09.250", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue in lmxcms v.1.41 allows a remote attacker to execute arbitrary code via a crafted script to the admin.php file." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://lmxcms.com", + "source": "cve@mitre.org" + }, + { + "url": "http://www.lmxcms.com/", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/durian5201314/6507d1057c62f4bf93e740a631617434", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5929.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5929.json new file mode 100644 index 00000000000..7a88db811df --- /dev/null +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5929.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-5929", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-11-02T21:15:10.040", + "lastModified": "2023-11-02T21:15:10.040", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes Simple Student Information System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/students/manage_academic.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-244329 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.2 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 5.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Simple%20Student%20Information%20System/Simple%20Student%20Information%20System%20-%20vuln%207.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.244329", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.244329", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5930.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5930.json new file mode 100644 index 00000000000..44b24f846bc --- /dev/null +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5930.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-5930", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-11-02T21:15:10.113", + "lastModified": "2023-11-02T21:15:10.113", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Campcodes Simple Student Information System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/students/manage_academic.php. The manipulation of the argument student_id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-244330 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Simple%20Student%20Information%20System/Simple%20Student%20Information%20System%20-%20vuln%208.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.244330", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.244330", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 099b18cfe46..7279cfaf010 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-02T21:00:19.350421+00:00 +2023-11-02T23:00:19.058978+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-02T20:57:37.993000+00:00 +2023-11-02T22:15:09.250000+00:00 ``` ### Last Data Feed Release @@ -29,60 +29,61 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -229655 +229672 ``` ### CVEs added in the last Commit -Recently added CVEs: `16` +Recently added CVEs: `17` -* [CVE-2023-31016](CVE-2023/CVE-2023-310xx/CVE-2023-31016.json) (`2023-11-02T19:15:40.947`) -* [CVE-2023-31017](CVE-2023/CVE-2023-310xx/CVE-2023-31017.json) (`2023-11-02T19:15:41.033`) -* [CVE-2023-31018](CVE-2023/CVE-2023-310xx/CVE-2023-31018.json) (`2023-11-02T19:15:41.103`) -* [CVE-2023-31019](CVE-2023/CVE-2023-310xx/CVE-2023-31019.json) (`2023-11-02T19:15:41.180`) -* [CVE-2023-31020](CVE-2023/CVE-2023-310xx/CVE-2023-31020.json) (`2023-11-02T19:15:41.247`) -* [CVE-2023-31021](CVE-2023/CVE-2023-310xx/CVE-2023-31021.json) (`2023-11-02T19:15:41.313`) -* [CVE-2023-31022](CVE-2023/CVE-2023-310xx/CVE-2023-31022.json) (`2023-11-02T19:15:41.380`) -* [CVE-2023-31023](CVE-2023/CVE-2023-310xx/CVE-2023-31023.json) (`2023-11-02T19:15:41.453`) -* [CVE-2023-31026](CVE-2023/CVE-2023-310xx/CVE-2023-31026.json) (`2023-11-02T19:15:41.527`) -* [CVE-2023-31027](CVE-2023/CVE-2023-310xx/CVE-2023-31027.json) (`2023-11-02T19:15:41.597`) -* [CVE-2023-5923](CVE-2023/CVE-2023-59xx/CVE-2023-5923.json) (`2023-11-02T19:15:41.673`) -* [CVE-2023-5924](CVE-2023/CVE-2023-59xx/CVE-2023-5924.json) (`2023-11-02T19:15:41.747`) -* [CVE-2023-5925](CVE-2023/CVE-2023-59xx/CVE-2023-5925.json) (`2023-11-02T20:15:10.103`) -* [CVE-2023-5926](CVE-2023/CVE-2023-59xx/CVE-2023-5926.json) (`2023-11-02T20:15:10.183`) -* [CVE-2023-5927](CVE-2023/CVE-2023-59xx/CVE-2023-5927.json) (`2023-11-02T20:15:10.257`) -* [CVE-2023-5928](CVE-2023/CVE-2023-59xx/CVE-2023-5928.json) (`2023-11-02T20:15:10.337`) +* [CVE-2023-39284](CVE-2023/CVE-2023-392xx/CVE-2023-39284.json) (`2023-11-02T21:15:09.747`) +* [CVE-2023-5929](CVE-2023/CVE-2023-59xx/CVE-2023-5929.json) (`2023-11-02T21:15:10.040`) +* [CVE-2023-5930](CVE-2023/CVE-2023-59xx/CVE-2023-5930.json) (`2023-11-02T21:15:10.113`) +* [CVE-2023-31579](CVE-2023/CVE-2023-315xx/CVE-2023-31579.json) (`2023-11-02T22:15:08.640`) +* [CVE-2023-39042](CVE-2023/CVE-2023-390xx/CVE-2023-39042.json) (`2023-11-02T22:15:08.700`) +* [CVE-2023-39047](CVE-2023/CVE-2023-390xx/CVE-2023-39047.json) (`2023-11-02T22:15:08.750`) +* [CVE-2023-39048](CVE-2023/CVE-2023-390xx/CVE-2023-39048.json) (`2023-11-02T22:15:08.797`) +* [CVE-2023-39050](CVE-2023/CVE-2023-390xx/CVE-2023-39050.json) (`2023-11-02T22:15:08.840`) +* [CVE-2023-39051](CVE-2023/CVE-2023-390xx/CVE-2023-39051.json) (`2023-11-02T22:15:08.887`) +* [CVE-2023-39053](CVE-2023/CVE-2023-390xx/CVE-2023-39053.json) (`2023-11-02T22:15:08.933`) +* [CVE-2023-39054](CVE-2023/CVE-2023-390xx/CVE-2023-39054.json) (`2023-11-02T22:15:08.980`) +* [CVE-2023-39057](CVE-2023/CVE-2023-390xx/CVE-2023-39057.json) (`2023-11-02T22:15:09.023`) +* [CVE-2023-39283](CVE-2023/CVE-2023-392xx/CVE-2023-39283.json) (`2023-11-02T22:15:09.070`) +* [CVE-2023-42299](CVE-2023/CVE-2023-422xx/CVE-2023-42299.json) (`2023-11-02T22:15:09.113`) +* [CVE-2023-43194](CVE-2023/CVE-2023-431xx/CVE-2023-43194.json) (`2023-11-02T22:15:09.160`) +* [CVE-2023-46352](CVE-2023/CVE-2023-463xx/CVE-2023-46352.json) (`2023-11-02T22:15:09.203`) +* [CVE-2023-46958](CVE-2023/CVE-2023-469xx/CVE-2023-46958.json) (`2023-11-02T22:15:09.250`) ### CVEs modified in the last Commit -Recently modified CVEs: `34` +Recently modified CVEs: `77` -* [CVE-2022-36921](CVE-2022/CVE-2022-369xx/CVE-2022-36921.json) (`2023-11-02T20:52:20.690`) -* [CVE-2022-36922](CVE-2022/CVE-2022-369xx/CVE-2022-36922.json) (`2023-11-02T20:52:24.460`) -* [CVE-2022-38663](CVE-2022/CVE-2022-386xx/CVE-2022-38663.json) (`2023-11-02T20:52:29.600`) -* [CVE-2022-38664](CVE-2022/CVE-2022-386xx/CVE-2022-38664.json) (`2023-11-02T20:52:32.417`) -* [CVE-2022-38665](CVE-2022/CVE-2022-386xx/CVE-2022-38665.json) (`2023-11-02T20:53:03.907`) -* [CVE-2022-38666](CVE-2022/CVE-2022-386xx/CVE-2022-38666.json) (`2023-11-02T20:53:11.360`) -* [CVE-2022-36904](CVE-2022/CVE-2022-369xx/CVE-2022-36904.json) (`2023-11-02T20:57:37.993`) -* [CVE-2023-5746](CVE-2023/CVE-2023-57xx/CVE-2023-5746.json) (`2023-11-02T19:01:11.237`) -* [CVE-2023-40401](CVE-2023/CVE-2023-404xx/CVE-2023-40401.json) (`2023-11-02T19:43:45.520`) -* [CVE-2023-5726](CVE-2023/CVE-2023-57xx/CVE-2023-5726.json) (`2023-11-02T19:57:30.190`) -* [CVE-2023-5727](CVE-2023/CVE-2023-57xx/CVE-2023-5727.json) (`2023-11-02T20:09:22.683`) -* [CVE-2023-5728](CVE-2023/CVE-2023-57xx/CVE-2023-5728.json) (`2023-11-02T20:12:56.233`) -* [CVE-2023-5724](CVE-2023/CVE-2023-57xx/CVE-2023-5724.json) (`2023-11-02T20:17:36.167`) -* [CVE-2023-5725](CVE-2023/CVE-2023-57xx/CVE-2023-5725.json) (`2023-11-02T20:28:43.127`) -* [CVE-2023-21395](CVE-2023/CVE-2023-213xx/CVE-2023-21395.json) (`2023-11-02T20:37:40.020`) -* [CVE-2023-21394](CVE-2023/CVE-2023-213xx/CVE-2023-21394.json) (`2023-11-02T20:38:00.393`) -* [CVE-2023-21371](CVE-2023/CVE-2023-213xx/CVE-2023-21371.json) (`2023-11-02T20:38:18.707`) -* [CVE-2023-21370](CVE-2023/CVE-2023-213xx/CVE-2023-21370.json) (`2023-11-02T20:38:36.647`) -* [CVE-2023-21369](CVE-2023/CVE-2023-213xx/CVE-2023-21369.json) (`2023-11-02T20:38:51.333`) -* [CVE-2023-21367](CVE-2023/CVE-2023-213xx/CVE-2023-21367.json) (`2023-11-02T20:39:14.803`) -* [CVE-2023-21368](CVE-2023/CVE-2023-213xx/CVE-2023-21368.json) (`2023-11-02T20:39:30.460`) -* [CVE-2023-21366](CVE-2023/CVE-2023-213xx/CVE-2023-21366.json) (`2023-11-02T20:39:50.183`) -* [CVE-2023-21365](CVE-2023/CVE-2023-213xx/CVE-2023-21365.json) (`2023-11-02T20:40:11.590`) -* [CVE-2023-21364](CVE-2023/CVE-2023-213xx/CVE-2023-21364.json) (`2023-11-02T20:40:26.690`) -* [CVE-2023-5633](CVE-2023/CVE-2023-56xx/CVE-2023-5633.json) (`2023-11-02T20:48:33.403`) +* [CVE-2021-21618](CVE-2021/CVE-2021-216xx/CVE-2021-21618.json) (`2023-11-02T22:00:16.503`) +* [CVE-2021-21616](CVE-2021/CVE-2021-216xx/CVE-2021-21616.json) (`2023-11-02T22:00:26.357`) +* [CVE-2021-21611](CVE-2021/CVE-2021-216xx/CVE-2021-21611.json) (`2023-11-02T22:04:03.917`) +* [CVE-2021-21610](CVE-2021/CVE-2021-216xx/CVE-2021-21610.json) (`2023-11-02T22:04:07.153`) +* [CVE-2021-21608](CVE-2021/CVE-2021-216xx/CVE-2021-21608.json) (`2023-11-02T22:04:14.407`) +* [CVE-2021-21603](CVE-2021/CVE-2021-216xx/CVE-2021-21603.json) (`2023-11-02T22:10:01.387`) +* [CVE-2022-36905](CVE-2022/CVE-2022-369xx/CVE-2022-36905.json) (`2023-11-02T21:04:02.133`) +* [CVE-2022-36906](CVE-2022/CVE-2022-369xx/CVE-2022-36906.json) (`2023-11-02T21:04:15.330`) +* [CVE-2022-36907](CVE-2022/CVE-2022-369xx/CVE-2022-36907.json) (`2023-11-02T21:04:18.850`) +* [CVE-2022-36908](CVE-2022/CVE-2022-369xx/CVE-2022-36908.json) (`2023-11-02T21:04:44.127`) +* [CVE-2022-36909](CVE-2022/CVE-2022-369xx/CVE-2022-36909.json) (`2023-11-02T21:04:48.220`) +* [CVE-2022-36899](CVE-2022/CVE-2022-368xx/CVE-2022-36899.json) (`2023-11-02T21:05:45.437`) +* [CVE-2022-36900](CVE-2022/CVE-2022-369xx/CVE-2022-36900.json) (`2023-11-02T21:05:53.617`) +* [CVE-2022-36901](CVE-2022/CVE-2022-369xx/CVE-2022-36901.json) (`2023-11-02T21:06:17.390`) +* [CVE-2022-36902](CVE-2022/CVE-2022-369xx/CVE-2022-36902.json) (`2023-11-02T21:06:20.710`) +* [CVE-2022-36903](CVE-2022/CVE-2022-369xx/CVE-2022-36903.json) (`2023-11-02T21:06:24.167`) +* [CVE-2022-36898](CVE-2022/CVE-2022-368xx/CVE-2022-36898.json) (`2023-11-02T21:06:50.327`) +* [CVE-2022-30962](CVE-2022/CVE-2022-309xx/CVE-2022-30962.json) (`2023-11-02T21:59:41.800`) +* [CVE-2022-30961](CVE-2022/CVE-2022-309xx/CVE-2022-30961.json) (`2023-11-02T21:59:45.917`) +* [CVE-2022-30960](CVE-2022/CVE-2022-309xx/CVE-2022-30960.json) (`2023-11-02T21:59:52.287`) +* [CVE-2022-30956](CVE-2022/CVE-2022-309xx/CVE-2022-30956.json) (`2023-11-02T22:00:01.620`) +* [CVE-2022-29046](CVE-2022/CVE-2022-290xx/CVE-2022-29046.json) (`2023-11-02T22:00:06.127`) +* [CVE-2023-42456](CVE-2023/CVE-2023-424xx/CVE-2023-42456.json) (`2023-11-02T21:15:09.803`) +* [CVE-2023-45897](CVE-2023/CVE-2023-458xx/CVE-2023-45897.json) (`2023-11-02T21:15:09.913`) +* [CVE-2023-46858](CVE-2023/CVE-2023-468xx/CVE-2023-46858.json) (`2023-11-02T21:15:09.987`) ## Download and Usage