mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-04-27T14:00:21.230695+00:00
This commit is contained in:
parent
97154e69fc
commit
da0d2b5f9e
59
CVE-2023/CVE-2023-23xx/CVE-2023-2340.json
Normal file
59
CVE-2023/CVE-2023-23xx/CVE-2023-2340.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-2340",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-04-27T13:15:09.213",
|
||||
"lastModified": "2023-04-27T13:15:09.213",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/commit/aa38319e353cc3cdfac12e03e21ed7a8f3628d3e",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/964762b0-b4fe-441c-81e1-0ebdbbf80f3b",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-292xx/CVE-2023-29255.json
Normal file
59
CVE-2023/CVE-2023-292xx/CVE-2023-29255.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-29255",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-04-27T13:15:09.053",
|
||||
"lastModified": "2023-04-27T13:15:09.053",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM DB2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to a denial of service as it may trap when compiling a variation of an anonymous block. IBM X-Force ID: 251991."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/251991",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/6985687",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-304xx/CVE-2023-30444.json
Normal file
55
CVE-2023/CVE-2023-304xx/CVE-2023-30444.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-30444",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-04-27T13:15:09.290",
|
||||
"lastModified": "2023-04-27T13:15:09.290",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Watson Machine Learning on Cloud Pak for Data 4.0 and 4.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 253350."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/6985859",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30542",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-16T08:15:07.867",
|
||||
"lastModified": "2023-04-17T13:12:43.170",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-27T13:23:36.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -36,8 +56,18 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -46,14 +76,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openzeppelin:contracts:*:*:*:*:*:node.js:*:*",
|
||||
"versionStartIncluding": "4.3.0",
|
||||
"versionEndExcluding": "4.8.3",
|
||||
"matchCriteriaId": "411C30F2-953A-46C1-B290-F73D73742342"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:openzeppelin:contracts_upgradeable:*:*:*:*:*:node.js:*:*",
|
||||
"versionStartIncluding": "4.3.0",
|
||||
"versionEndExcluding": "4.8.3",
|
||||
"matchCriteriaId": "DE759E37-EAC7-4CDA-9AB1-0703E9398214"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/OpenZeppelin/openzeppelin-contracts/releases/tag/v4.8.3",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-93hq-5wgc-jc82",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
71
README.md
71
README.md
@ -2,23 +2,23 @@
|
||||
|
||||
Community reconstruction of the soon-to-be deprecated JSON NVD Data Feeds.
|
||||
[Releases](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) each day at 00:00 AM UTC.
|
||||
Repository synchronizes with the NVD in 2 hour periods.
|
||||
Repository synchronizes with the NVD every 2 hours.
|
||||
|
||||
## Repository at a glance
|
||||
## Repository at a Glance
|
||||
|
||||
### Last repository update
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-04-27T13:02:44.285971+00:00
|
||||
2023-04-27T14:00:21.230695+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE modification timestamp synchronized with NVD
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-04-27T12:15:09.300000+00:00
|
||||
2023-04-27T13:23:36.267000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed release
|
||||
### Last Data Feed Release
|
||||
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
@ -26,33 +26,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
2023-04-27T00:00:20.965588+00:00
|
||||
```
|
||||
|
||||
### Total numbers of included CVEs
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
213663
|
||||
213666
|
||||
```
|
||||
|
||||
### CVEs added in the last commit
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
* CVE-2023-2340 (`2023-04-27T13:15:09.213`)
|
||||
* CVE-2023-29255 (`2023-04-27T13:15:09.053`)
|
||||
* CVE-2023-30444 (`2023-04-27T13:15:09.290`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
### CVEs modified in the last commit
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
Recently modified CVEs: `11`
|
||||
|
||||
* CVE-2023-1778 (`2023-04-27T10:15:09.160`)
|
||||
* CVE-2023-2322 (`2023-04-27T09:15:09.927`)
|
||||
* CVE-2023-2323 (`2023-04-27T09:15:10.007`)
|
||||
* CVE-2023-2327 (`2023-04-27T10:15:09.603`)
|
||||
* CVE-2023-2328 (`2023-04-27T10:15:09.670`)
|
||||
* CVE-2023-2331 (`2023-04-27T12:15:09.070`)
|
||||
* CVE-2023-2336 (`2023-04-27T12:15:09.173`)
|
||||
* CVE-2023-2338 (`2023-04-27T12:15:09.237`)
|
||||
* CVE-2023-2339 (`2023-04-27T12:15:09.300`)
|
||||
* CVE-2023-28769 (`2023-04-27T09:15:09.057`)
|
||||
* CVE-2023-28770 (`2023-04-27T09:15:09.850`)
|
||||
* CVE-2023-30542 (`2023-04-27T13:23:36.267`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
@ -63,7 +56,7 @@ There are several ways you can work with the data in this repository:
|
||||
|
||||
The most straightforward approach is to obtain the latest Data Feed release packages [here](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest).
|
||||
|
||||
Each day on 02:00 AM UTC we package and upload json files that aim to reconstruct the legacy NVD CVE Data Feeds.
|
||||
Each day at 00:00 AM UTC we package and upload JSON files that aim to reconstruct the legacy NVD CVE Data Feeds.
|
||||
Those are aggregated by the `year` part of the CVE identifier:
|
||||
|
||||
```
|
||||
@ -78,14 +71,14 @@ CVE-2023.json
|
||||
|
||||
We also upload the well-known `Recent` and `Modified` feeds.
|
||||
Furthermore, we provide the `All` feed, which contains a recent snapshot of all NVD records.
|
||||
Once your local copy is synced and the last sync was no older than 8 days, you can rely on these to stay up to date:
|
||||
Once your local copy is synchronized and the last synchronization is no older than 8 days, you can rely on these to stay up to date:
|
||||
|
||||
```plain
|
||||
CVE-Recent.json # CVEs that were added in the previous eight days
|
||||
CVE-Modified.json # CVEs that were modified or added in the previous eight days
|
||||
```
|
||||
|
||||
Note that all feeds are distributed in `xz`-compressed format to save storage and bandwidth on Github.
|
||||
Note that all feeds are distributed in `xz`-compressed format to save storage and bandwidth.
|
||||
For decompression execute:
|
||||
|
||||
```sh
|
||||
@ -95,7 +88,7 @@ xz -d -k <feed>.json.xz
|
||||
|
||||
#### Automation using Release Data Feed Packages
|
||||
|
||||
You can fetch the latest releases for each package using the following static link layout:
|
||||
You can fetch the latest releases for each package with the following static link layout:
|
||||
|
||||
```sh
|
||||
https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest/download/CVE-<YEAR>.json.xz
|
||||
@ -108,14 +101,14 @@ wget https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest/download/CV
|
||||
xz -d -k CVE-2023.json.xz
|
||||
```
|
||||
|
||||
### 2) Clone the repository (with git history)
|
||||
### 2) Clone the Repository (with Git History)
|
||||
|
||||
As you can see by browsing this repository, there is a slight difference between the release packages format and the repo folder structure.
|
||||
As you can see by browsing this repository, there is a slight difference between the release packages format and the repository folder structure.
|
||||
This is because we want to maintain explorability of the dataset.
|
||||
|
||||
Each CVE gets its own json file, e.g., `CVE-1999-0001.json`.
|
||||
Each CVE gets its own JSON file, e.g., `CVE-1999-0001.json`.
|
||||
Here, each file is put into a folder layout that first sorts by CVE `year` identifier part and then by `number` part.
|
||||
We mask (`xx`) the last two digits to create easily navigable folders that hold a maximum of 100 CVE jsons:
|
||||
We mask (`xx`) the last two digits to create easily navigable folders that hold a maximum of 100 CVE JSON files:
|
||||
|
||||
```plain
|
||||
.
|
||||
@ -135,15 +128,15 @@ We mask (`xx`) the last two digits to create easily navigable folders that hold
|
||||
└── [...]
|
||||
```
|
||||
|
||||
A byproduct of managing and continuously updating this dataset via git is that we can track changes over time through the git history.
|
||||
A byproduct of managing and continuously updating this dataset via Git is that we can track changes over time through the Git history.
|
||||
|
||||
If you are interested in having the NVD data as organized above, including the historical data of changes, just clone this repo (large!):
|
||||
If you are interested in having the NVD data as organized above, including the historical data of changes, just clone this repository (large!):
|
||||
|
||||
```sh
|
||||
git clone https://github.com/fkie-cad/nvd-json-data-feeds.git
|
||||
```
|
||||
|
||||
### 3) Clone the repository (without git history)
|
||||
### 3) Clone the Repository (without Git History)
|
||||
|
||||
Don't need the history? Then create a shallow copy:
|
||||
|
||||
@ -153,18 +146,18 @@ git clone --depth 1 -b main https://github.com/fkie-cad/nvd-json-data-feeds.git
|
||||
|
||||
## Motivation
|
||||
|
||||
As of Sept. 2023, the NIST will retire all [json-based NVD Data Feeds](https://nvd.nist.gov/vuln/data-feeds#divRetirementBanner-1).
|
||||
As of September 2023, the NIST will retire all [JSON-based NVD Data Feeds](https://nvd.nist.gov/vuln/data-feeds#divRetirementBanner-1).
|
||||
The new [NVD CVE API 2.0](https://nvd.nist.gov/developers/vulnerabilities) is, without a doubt, a great way to obtain CVE information.
|
||||
However, we from [Fraunhofer FKIE - Cyber Analysis and Defense](https://www.fkie.fraunhofer.de/en/departments/cad.html) believe that the API does not cover a variety of use cases.
|
||||
|
||||
The legacy NVD Data Feeds provided a convenient way to quickly obtain a complete, file-based offline database snapshot; just download the `CVE-<YEAR>.tar.gz`, decompress it, and use it as you please, e.g.:
|
||||
|
||||
* Put the json feed into a document-based database and quickly leverage upon that data in your software project, ...
|
||||
* Put the JSON feed into a document-based database and quickly leverage upon that data in your software project, ...
|
||||
* Parse and analyze it using your favorite programming language, ...
|
||||
* Put it on a USB stick and transfer it to a system without internet access, or ...
|
||||
* Query the file using `jq`!
|
||||
|
||||
Unfortunately, the new NVD API 2.0 puts complexity into this process.
|
||||
Unfortunately, the new NVD API 2.0 adds complexity to this process.
|
||||
We want to preserve ease of use by reconstructing these data sources.
|
||||
|
||||
## Non-Endorsement Clause
|
||||
|
Loading…
x
Reference in New Issue
Block a user