From e8774838a1c31e56cf020a283283aa37fb83f09f Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 3 Nov 2023 00:55:22 +0000 Subject: [PATCH] Auto-Update: 2023-11-03T00:55:18.928976+00:00 --- CVE-2023/CVE-2023-420xx/CVE-2023-42027.json | 63 +++++++++++++++++++++ CVE-2023/CVE-2023-420xx/CVE-2023-42029.json | 63 +++++++++++++++++++++ CVE-2023/CVE-2023-430xx/CVE-2023-43018.json | 59 +++++++++++++++++++ README.md | 55 +++--------------- 4 files changed, 193 insertions(+), 47 deletions(-) create mode 100644 CVE-2023/CVE-2023-420xx/CVE-2023-42027.json create mode 100644 CVE-2023/CVE-2023-420xx/CVE-2023-42029.json create mode 100644 CVE-2023/CVE-2023-430xx/CVE-2023-43018.json diff --git a/CVE-2023/CVE-2023-420xx/CVE-2023-42027.json b/CVE-2023/CVE-2023-420xx/CVE-2023-42027.json new file mode 100644 index 00000000000..5e837b7d851 --- /dev/null +++ b/CVE-2023/CVE-2023-420xx/CVE-2023-42027.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-42027", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-11-03T00:15:12.593", + "lastModified": "2023-11-03T00:15:12.593", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM CICS TX Standard 11.1, Advanced 10.1, 11.1, and TXSeries for Multiplatforms 8.1, 8.2, 9.1 are vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 266057." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/266057", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7063659", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7063664", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-420xx/CVE-2023-42029.json b/CVE-2023/CVE-2023-420xx/CVE-2023-42029.json new file mode 100644 index 00000000000..081d484cd85 --- /dev/null +++ b/CVE-2023/CVE-2023-420xx/CVE-2023-42029.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-42029", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-11-03T00:15:12.683", + "lastModified": "2023-11-03T00:15:12.683", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM CICS TX Standard 11.1, Advanced 10.1, 11.1, and TXSeries for Multiplatforms 8.1, 8.2, 9.1 are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 266059." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/266059", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7063659", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7063663", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43018.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43018.json new file mode 100644 index 00000000000..27b8408f527 --- /dev/null +++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43018.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-43018", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-11-03T00:15:12.757", + "lastModified": "2023-11-03T00:15:12.757", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM CICS TX Standard 11.1 and Advanced 10.1, 11.1 performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses. IBM X-Force ID: 266163." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/266163", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7063668", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 7279cfaf010..c3ba51d5f89 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-02T23:00:19.058978+00:00 +2023-11-03T00:55:18.928976+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-02T22:15:09.250000+00:00 +2023-11-03T00:15:12.757000+00:00 ``` ### Last Data Feed Release @@ -29,61 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -229672 +229675 ``` ### CVEs added in the last Commit -Recently added CVEs: `17` +Recently added CVEs: `3` -* [CVE-2023-39284](CVE-2023/CVE-2023-392xx/CVE-2023-39284.json) (`2023-11-02T21:15:09.747`) -* [CVE-2023-5929](CVE-2023/CVE-2023-59xx/CVE-2023-5929.json) (`2023-11-02T21:15:10.040`) -* [CVE-2023-5930](CVE-2023/CVE-2023-59xx/CVE-2023-5930.json) (`2023-11-02T21:15:10.113`) -* [CVE-2023-31579](CVE-2023/CVE-2023-315xx/CVE-2023-31579.json) (`2023-11-02T22:15:08.640`) -* [CVE-2023-39042](CVE-2023/CVE-2023-390xx/CVE-2023-39042.json) (`2023-11-02T22:15:08.700`) -* [CVE-2023-39047](CVE-2023/CVE-2023-390xx/CVE-2023-39047.json) (`2023-11-02T22:15:08.750`) -* [CVE-2023-39048](CVE-2023/CVE-2023-390xx/CVE-2023-39048.json) (`2023-11-02T22:15:08.797`) -* [CVE-2023-39050](CVE-2023/CVE-2023-390xx/CVE-2023-39050.json) (`2023-11-02T22:15:08.840`) -* [CVE-2023-39051](CVE-2023/CVE-2023-390xx/CVE-2023-39051.json) (`2023-11-02T22:15:08.887`) -* [CVE-2023-39053](CVE-2023/CVE-2023-390xx/CVE-2023-39053.json) (`2023-11-02T22:15:08.933`) -* [CVE-2023-39054](CVE-2023/CVE-2023-390xx/CVE-2023-39054.json) (`2023-11-02T22:15:08.980`) -* [CVE-2023-39057](CVE-2023/CVE-2023-390xx/CVE-2023-39057.json) (`2023-11-02T22:15:09.023`) -* [CVE-2023-39283](CVE-2023/CVE-2023-392xx/CVE-2023-39283.json) (`2023-11-02T22:15:09.070`) -* [CVE-2023-42299](CVE-2023/CVE-2023-422xx/CVE-2023-42299.json) (`2023-11-02T22:15:09.113`) -* [CVE-2023-43194](CVE-2023/CVE-2023-431xx/CVE-2023-43194.json) (`2023-11-02T22:15:09.160`) -* [CVE-2023-46352](CVE-2023/CVE-2023-463xx/CVE-2023-46352.json) (`2023-11-02T22:15:09.203`) -* [CVE-2023-46958](CVE-2023/CVE-2023-469xx/CVE-2023-46958.json) (`2023-11-02T22:15:09.250`) +* [CVE-2023-42027](CVE-2023/CVE-2023-420xx/CVE-2023-42027.json) (`2023-11-03T00:15:12.593`) +* [CVE-2023-42029](CVE-2023/CVE-2023-420xx/CVE-2023-42029.json) (`2023-11-03T00:15:12.683`) +* [CVE-2023-43018](CVE-2023/CVE-2023-430xx/CVE-2023-43018.json) (`2023-11-03T00:15:12.757`) ### CVEs modified in the last Commit -Recently modified CVEs: `77` +Recently modified CVEs: `0` -* [CVE-2021-21618](CVE-2021/CVE-2021-216xx/CVE-2021-21618.json) (`2023-11-02T22:00:16.503`) -* [CVE-2021-21616](CVE-2021/CVE-2021-216xx/CVE-2021-21616.json) (`2023-11-02T22:00:26.357`) -* [CVE-2021-21611](CVE-2021/CVE-2021-216xx/CVE-2021-21611.json) (`2023-11-02T22:04:03.917`) -* [CVE-2021-21610](CVE-2021/CVE-2021-216xx/CVE-2021-21610.json) (`2023-11-02T22:04:07.153`) -* [CVE-2021-21608](CVE-2021/CVE-2021-216xx/CVE-2021-21608.json) (`2023-11-02T22:04:14.407`) -* [CVE-2021-21603](CVE-2021/CVE-2021-216xx/CVE-2021-21603.json) (`2023-11-02T22:10:01.387`) -* [CVE-2022-36905](CVE-2022/CVE-2022-369xx/CVE-2022-36905.json) (`2023-11-02T21:04:02.133`) -* [CVE-2022-36906](CVE-2022/CVE-2022-369xx/CVE-2022-36906.json) (`2023-11-02T21:04:15.330`) -* [CVE-2022-36907](CVE-2022/CVE-2022-369xx/CVE-2022-36907.json) (`2023-11-02T21:04:18.850`) -* [CVE-2022-36908](CVE-2022/CVE-2022-369xx/CVE-2022-36908.json) (`2023-11-02T21:04:44.127`) -* [CVE-2022-36909](CVE-2022/CVE-2022-369xx/CVE-2022-36909.json) (`2023-11-02T21:04:48.220`) -* [CVE-2022-36899](CVE-2022/CVE-2022-368xx/CVE-2022-36899.json) (`2023-11-02T21:05:45.437`) -* [CVE-2022-36900](CVE-2022/CVE-2022-369xx/CVE-2022-36900.json) (`2023-11-02T21:05:53.617`) -* [CVE-2022-36901](CVE-2022/CVE-2022-369xx/CVE-2022-36901.json) (`2023-11-02T21:06:17.390`) -* [CVE-2022-36902](CVE-2022/CVE-2022-369xx/CVE-2022-36902.json) (`2023-11-02T21:06:20.710`) -* [CVE-2022-36903](CVE-2022/CVE-2022-369xx/CVE-2022-36903.json) (`2023-11-02T21:06:24.167`) -* [CVE-2022-36898](CVE-2022/CVE-2022-368xx/CVE-2022-36898.json) (`2023-11-02T21:06:50.327`) -* [CVE-2022-30962](CVE-2022/CVE-2022-309xx/CVE-2022-30962.json) (`2023-11-02T21:59:41.800`) -* [CVE-2022-30961](CVE-2022/CVE-2022-309xx/CVE-2022-30961.json) (`2023-11-02T21:59:45.917`) -* [CVE-2022-30960](CVE-2022/CVE-2022-309xx/CVE-2022-30960.json) (`2023-11-02T21:59:52.287`) -* [CVE-2022-30956](CVE-2022/CVE-2022-309xx/CVE-2022-30956.json) (`2023-11-02T22:00:01.620`) -* [CVE-2022-29046](CVE-2022/CVE-2022-290xx/CVE-2022-29046.json) (`2023-11-02T22:00:06.127`) -* [CVE-2023-42456](CVE-2023/CVE-2023-424xx/CVE-2023-42456.json) (`2023-11-02T21:15:09.803`) -* [CVE-2023-45897](CVE-2023/CVE-2023-458xx/CVE-2023-45897.json) (`2023-11-02T21:15:09.913`) -* [CVE-2023-46858](CVE-2023/CVE-2023-468xx/CVE-2023-46858.json) (`2023-11-02T21:15:09.987`) ## Download and Usage