mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2023-11-03T00:55:18.928976+00:00
This commit is contained in:
parent
70c75151cc
commit
e8774838a1
63
CVE-2023/CVE-2023-420xx/CVE-2023-42027.json
Normal file
63
CVE-2023/CVE-2023-420xx/CVE-2023-42027.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-42027",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-11-03T00:15:12.593",
|
||||
"lastModified": "2023-11-03T00:15:12.593",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM CICS TX Standard 11.1, Advanced 10.1, 11.1, and TXSeries for Multiplatforms 8.1, 8.2, 9.1 are vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 266057."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/266057",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7063659",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7063664",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
63
CVE-2023/CVE-2023-420xx/CVE-2023-42029.json
Normal file
63
CVE-2023/CVE-2023-420xx/CVE-2023-42029.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2023-42029",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-11-03T00:15:12.683",
|
||||
"lastModified": "2023-11-03T00:15:12.683",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM CICS TX Standard 11.1, Advanced 10.1, 11.1, and TXSeries for Multiplatforms 8.1, 8.2, 9.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 266059."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/266059",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7063659",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7063663",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-430xx/CVE-2023-43018.json
Normal file
59
CVE-2023/CVE-2023-430xx/CVE-2023-43018.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-43018",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-11-03T00:15:12.757",
|
||||
"lastModified": "2023-11-03T00:15:12.757",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM CICS TX Standard 11.1 and Advanced 10.1, 11.1 performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses. IBM X-Force ID: 266163."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-250"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/266163",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7063668",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
55
README.md
55
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-11-02T23:00:19.058978+00:00
|
||||
2023-11-03T00:55:18.928976+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-11-02T22:15:09.250000+00:00
|
||||
2023-11-03T00:15:12.757000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,61 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
229672
|
||||
229675
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `17`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
* [CVE-2023-39284](CVE-2023/CVE-2023-392xx/CVE-2023-39284.json) (`2023-11-02T21:15:09.747`)
|
||||
* [CVE-2023-5929](CVE-2023/CVE-2023-59xx/CVE-2023-5929.json) (`2023-11-02T21:15:10.040`)
|
||||
* [CVE-2023-5930](CVE-2023/CVE-2023-59xx/CVE-2023-5930.json) (`2023-11-02T21:15:10.113`)
|
||||
* [CVE-2023-31579](CVE-2023/CVE-2023-315xx/CVE-2023-31579.json) (`2023-11-02T22:15:08.640`)
|
||||
* [CVE-2023-39042](CVE-2023/CVE-2023-390xx/CVE-2023-39042.json) (`2023-11-02T22:15:08.700`)
|
||||
* [CVE-2023-39047](CVE-2023/CVE-2023-390xx/CVE-2023-39047.json) (`2023-11-02T22:15:08.750`)
|
||||
* [CVE-2023-39048](CVE-2023/CVE-2023-390xx/CVE-2023-39048.json) (`2023-11-02T22:15:08.797`)
|
||||
* [CVE-2023-39050](CVE-2023/CVE-2023-390xx/CVE-2023-39050.json) (`2023-11-02T22:15:08.840`)
|
||||
* [CVE-2023-39051](CVE-2023/CVE-2023-390xx/CVE-2023-39051.json) (`2023-11-02T22:15:08.887`)
|
||||
* [CVE-2023-39053](CVE-2023/CVE-2023-390xx/CVE-2023-39053.json) (`2023-11-02T22:15:08.933`)
|
||||
* [CVE-2023-39054](CVE-2023/CVE-2023-390xx/CVE-2023-39054.json) (`2023-11-02T22:15:08.980`)
|
||||
* [CVE-2023-39057](CVE-2023/CVE-2023-390xx/CVE-2023-39057.json) (`2023-11-02T22:15:09.023`)
|
||||
* [CVE-2023-39283](CVE-2023/CVE-2023-392xx/CVE-2023-39283.json) (`2023-11-02T22:15:09.070`)
|
||||
* [CVE-2023-42299](CVE-2023/CVE-2023-422xx/CVE-2023-42299.json) (`2023-11-02T22:15:09.113`)
|
||||
* [CVE-2023-43194](CVE-2023/CVE-2023-431xx/CVE-2023-43194.json) (`2023-11-02T22:15:09.160`)
|
||||
* [CVE-2023-46352](CVE-2023/CVE-2023-463xx/CVE-2023-46352.json) (`2023-11-02T22:15:09.203`)
|
||||
* [CVE-2023-46958](CVE-2023/CVE-2023-469xx/CVE-2023-46958.json) (`2023-11-02T22:15:09.250`)
|
||||
* [CVE-2023-42027](CVE-2023/CVE-2023-420xx/CVE-2023-42027.json) (`2023-11-03T00:15:12.593`)
|
||||
* [CVE-2023-42029](CVE-2023/CVE-2023-420xx/CVE-2023-42029.json) (`2023-11-03T00:15:12.683`)
|
||||
* [CVE-2023-43018](CVE-2023/CVE-2023-430xx/CVE-2023-43018.json) (`2023-11-03T00:15:12.757`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `77`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
* [CVE-2021-21618](CVE-2021/CVE-2021-216xx/CVE-2021-21618.json) (`2023-11-02T22:00:16.503`)
|
||||
* [CVE-2021-21616](CVE-2021/CVE-2021-216xx/CVE-2021-21616.json) (`2023-11-02T22:00:26.357`)
|
||||
* [CVE-2021-21611](CVE-2021/CVE-2021-216xx/CVE-2021-21611.json) (`2023-11-02T22:04:03.917`)
|
||||
* [CVE-2021-21610](CVE-2021/CVE-2021-216xx/CVE-2021-21610.json) (`2023-11-02T22:04:07.153`)
|
||||
* [CVE-2021-21608](CVE-2021/CVE-2021-216xx/CVE-2021-21608.json) (`2023-11-02T22:04:14.407`)
|
||||
* [CVE-2021-21603](CVE-2021/CVE-2021-216xx/CVE-2021-21603.json) (`2023-11-02T22:10:01.387`)
|
||||
* [CVE-2022-36905](CVE-2022/CVE-2022-369xx/CVE-2022-36905.json) (`2023-11-02T21:04:02.133`)
|
||||
* [CVE-2022-36906](CVE-2022/CVE-2022-369xx/CVE-2022-36906.json) (`2023-11-02T21:04:15.330`)
|
||||
* [CVE-2022-36907](CVE-2022/CVE-2022-369xx/CVE-2022-36907.json) (`2023-11-02T21:04:18.850`)
|
||||
* [CVE-2022-36908](CVE-2022/CVE-2022-369xx/CVE-2022-36908.json) (`2023-11-02T21:04:44.127`)
|
||||
* [CVE-2022-36909](CVE-2022/CVE-2022-369xx/CVE-2022-36909.json) (`2023-11-02T21:04:48.220`)
|
||||
* [CVE-2022-36899](CVE-2022/CVE-2022-368xx/CVE-2022-36899.json) (`2023-11-02T21:05:45.437`)
|
||||
* [CVE-2022-36900](CVE-2022/CVE-2022-369xx/CVE-2022-36900.json) (`2023-11-02T21:05:53.617`)
|
||||
* [CVE-2022-36901](CVE-2022/CVE-2022-369xx/CVE-2022-36901.json) (`2023-11-02T21:06:17.390`)
|
||||
* [CVE-2022-36902](CVE-2022/CVE-2022-369xx/CVE-2022-36902.json) (`2023-11-02T21:06:20.710`)
|
||||
* [CVE-2022-36903](CVE-2022/CVE-2022-369xx/CVE-2022-36903.json) (`2023-11-02T21:06:24.167`)
|
||||
* [CVE-2022-36898](CVE-2022/CVE-2022-368xx/CVE-2022-36898.json) (`2023-11-02T21:06:50.327`)
|
||||
* [CVE-2022-30962](CVE-2022/CVE-2022-309xx/CVE-2022-30962.json) (`2023-11-02T21:59:41.800`)
|
||||
* [CVE-2022-30961](CVE-2022/CVE-2022-309xx/CVE-2022-30961.json) (`2023-11-02T21:59:45.917`)
|
||||
* [CVE-2022-30960](CVE-2022/CVE-2022-309xx/CVE-2022-30960.json) (`2023-11-02T21:59:52.287`)
|
||||
* [CVE-2022-30956](CVE-2022/CVE-2022-309xx/CVE-2022-30956.json) (`2023-11-02T22:00:01.620`)
|
||||
* [CVE-2022-29046](CVE-2022/CVE-2022-290xx/CVE-2022-29046.json) (`2023-11-02T22:00:06.127`)
|
||||
* [CVE-2023-42456](CVE-2023/CVE-2023-424xx/CVE-2023-42456.json) (`2023-11-02T21:15:09.803`)
|
||||
* [CVE-2023-45897](CVE-2023/CVE-2023-458xx/CVE-2023-45897.json) (`2023-11-02T21:15:09.913`)
|
||||
* [CVE-2023-46858](CVE-2023/CVE-2023-468xx/CVE-2023-46858.json) (`2023-11-02T21:15:09.987`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user