mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2024-03-01T05:00:24.680840+00:00
This commit is contained in:
parent
c6fe196af4
commit
8840308a99
59
CVE-2023/CVE-2023-383xx/CVE-2023-38366.json
Normal file
59
CVE-2023/CVE-2023-383xx/CVE-2023-38366.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-38366",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-01T03:15:06.077",
|
||||
"lastModified": "2024-03-01T03:15:06.077",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Filenet Content Manager Component 5.5.8.0, 5.5.10.0, and 5.5.11.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 261115."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/261115",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7039783",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-477xx/CVE-2023-47716.json
Normal file
59
CVE-2023/CVE-2023-477xx/CVE-2023-47716.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-47716",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-01T03:15:06.280",
|
||||
"lastModified": "2024-03-01T03:15:06.280",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM CP4BA - Filenet Content Manager Component 5.5.8.0, 5.5.10.0, and 5.5.11.0 could allow a user to gain the privileges of another user under unusual circumstances. IBM X-Force ID: 271656."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-264"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/271656",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7078780",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4886",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-10-03T15:15:40.737",
|
||||
"lastModified": "2023-12-14T22:15:43.967",
|
||||
"lastModified": "2024-03-01T03:15:06.487",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -118,6 +118,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2023:7851",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1061",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-4886",
|
||||
"source": "secalert@redhat.com",
|
||||
|
59
CVE-2023/CVE-2023-503xx/CVE-2023-50312.json
Normal file
59
CVE-2023/CVE-2023-503xx/CVE-2023-50312.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-50312",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-01T03:15:06.620",
|
||||
"lastModified": "2024-03-01T03:15:06.620",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM WebSphere Application Server Liberty 17.0.0.3 through 24.0.0.2 could provide weaker than expected security for outbound TLS connections caused by a failure to honor user configuration. IBM X-Force ID: 274711."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/274711",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7125527",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-21338",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2024-02-13T18:15:49.083",
|
||||
"lastModified": "2024-02-20T21:31:18.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-03-01T04:15:06.080",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -117,6 +117,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-byovd-with-an-admin-to-kernel-zero-day/",
|
||||
"source": "secure@microsoft.com"
|
||||
},
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21338",
|
||||
"source": "secure@microsoft.com",
|
||||
|
31
README.md
31
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-03-01T03:00:26.437543+00:00
|
||||
2024-03-01T05:00:24.680840+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-03-01T02:15:08.027000+00:00
|
||||
2024-03-01T04:15:06.080000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,35 +29,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
240165
|
||||
240168
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `7`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
* [CVE-2023-28525](CVE-2023/CVE-2023-285xx/CVE-2023-28525.json) (`2024-03-01T02:15:06.860`)
|
||||
* [CVE-2023-28949](CVE-2023/CVE-2023-289xx/CVE-2023-28949.json) (`2024-03-01T02:15:07.063`)
|
||||
* [CVE-2023-50305](CVE-2023/CVE-2023-503xx/CVE-2023-50305.json) (`2024-03-01T02:15:07.590`)
|
||||
* [CVE-2023-50324](CVE-2023/CVE-2023-503xx/CVE-2023-50324.json) (`2024-03-01T02:15:07.823`)
|
||||
* [CVE-2024-1941](CVE-2024/CVE-2024-19xx/CVE-2024-1941.json) (`2024-03-01T01:15:07.110`)
|
||||
* [CVE-2024-22100](CVE-2024/CVE-2024-221xx/CVE-2024-22100.json) (`2024-03-01T01:15:07.330`)
|
||||
* [CVE-2024-25578](CVE-2024/CVE-2024-255xx/CVE-2024-25578.json) (`2024-03-01T01:15:07.550`)
|
||||
* [CVE-2023-38366](CVE-2023/CVE-2023-383xx/CVE-2023-38366.json) (`2024-03-01T03:15:06.077`)
|
||||
* [CVE-2023-47716](CVE-2023/CVE-2023-477xx/CVE-2023-47716.json) (`2024-03-01T03:15:06.280`)
|
||||
* [CVE-2023-50312](CVE-2023/CVE-2023-503xx/CVE-2023-50312.json) (`2024-03-01T03:15:06.620`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `9`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
* [CVE-2020-13574](CVE-2020/CVE-2020-135xx/CVE-2020-13574.json) (`2024-03-01T02:15:06.193`)
|
||||
* [CVE-2020-13575](CVE-2020/CVE-2020-135xx/CVE-2020-13575.json) (`2024-03-01T02:15:06.403`)
|
||||
* [CVE-2020-13576](CVE-2020/CVE-2020-135xx/CVE-2020-13576.json) (`2024-03-01T02:15:06.523`)
|
||||
* [CVE-2020-13577](CVE-2020/CVE-2020-135xx/CVE-2020-13577.json) (`2024-03-01T02:15:06.630`)
|
||||
* [CVE-2020-13578](CVE-2020/CVE-2020-135xx/CVE-2020-13578.json) (`2024-03-01T02:15:06.727`)
|
||||
* [CVE-2023-29360](CVE-2023/CVE-2023-293xx/CVE-2023-29360.json) (`2024-03-01T02:00:01.743`)
|
||||
* [CVE-2023-4511](CVE-2023/CVE-2023-45xx/CVE-2023-4511.json) (`2024-03-01T02:15:07.253`)
|
||||
* [CVE-2023-4513](CVE-2023/CVE-2023-45xx/CVE-2023-4513.json) (`2024-03-01T02:15:07.420`)
|
||||
* [CVE-2024-0208](CVE-2024/CVE-2024-02xx/CVE-2024-0208.json) (`2024-03-01T02:15:08.027`)
|
||||
* [CVE-2023-4886](CVE-2023/CVE-2023-48xx/CVE-2023-4886.json) (`2024-03-01T03:15:06.487`)
|
||||
* [CVE-2024-21338](CVE-2024/CVE-2024-213xx/CVE-2024-21338.json) (`2024-03-01T04:15:06.080`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user