Auto-Update: 2023-06-29T12:00:28.989849+00:00

This commit is contained in:
cad-safe-bot 2023-06-29 12:00:32 +00:00
parent 9d95d5d75e
commit f5aecb878f
2 changed files with 38 additions and 25 deletions

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-22886",
"sourceIdentifier": "security@apache.org",
"published": "2023-06-29T10:15:09.650",
"lastModified": "2023-06-29T10:15:09.650",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow JDBC Provider.\nAirflow JDBC Provider Connection\u2019s [Connection URL] parameters had no\nrestrictions, which made it possible to implement RCE attacks via\ndifferent type JDBC drivers, obtain airflow server permission.\nThis issue affects Apache Airflow JDBC Provider: before 4.0.0.\n\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/ynbjwp4n0vzql0xzhog1gkp1ovncf8j3",
"source": "security@apache.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-06-29T10:00:49.539119+00:00
2023-06-29T12:00:28.989849+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-06-29T09:15:11.123000+00:00
2023-06-29T10:15:09.650000+00:00
```
### Last Data Feed Release
@ -29,39 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
218868
218869
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `1`
* [CVE-2023-22886](CVE-2023/CVE-2023-228xx/CVE-2023-22886.json) (`2023-06-29T10:15:09.650`)
### CVEs modified in the last Commit
Recently modified CVEs: `20`
Recently modified CVEs: `0`
* [CVE-2022-0179](CVE-2022/CVE-2022-01xx/CVE-2022-0179.json) (`2023-06-29T08:15:09.523`)
* [CVE-2022-0277](CVE-2022/CVE-2022-02xx/CVE-2022-0277.json) (`2023-06-29T08:15:09.807`)
* [CVE-2022-0414](CVE-2022/CVE-2022-04xx/CVE-2022-0414.json) (`2023-06-29T08:15:09.913`)
* [CVE-2022-25164](CVE-2022/CVE-2022-251xx/CVE-2022-25164.json) (`2023-06-29T08:15:10.023`)
* [CVE-2022-29827](CVE-2022/CVE-2022-298xx/CVE-2022-29827.json) (`2023-06-29T08:15:10.137`)
* [CVE-2022-29828](CVE-2022/CVE-2022-298xx/CVE-2022-29828.json) (`2023-06-29T08:15:10.213`)
* [CVE-2022-29830](CVE-2022/CVE-2022-298xx/CVE-2022-29830.json) (`2023-06-29T08:15:10.290`)
* [CVE-2022-0596](CVE-2022/CVE-2022-05xx/CVE-2022-0596.json) (`2023-06-29T09:15:09.577`)
* [CVE-2022-0726](CVE-2022/CVE-2022-07xx/CVE-2022-0726.json) (`2023-06-29T09:15:10.120`)
* [CVE-2022-0755](CVE-2022/CVE-2022-07xx/CVE-2022-0755.json) (`2023-06-29T09:15:10.227`)
* [CVE-2022-0756](CVE-2022/CVE-2022-07xx/CVE-2022-0756.json) (`2023-06-29T09:15:10.320`)
* [CVE-2022-0871](CVE-2022/CVE-2022-08xx/CVE-2022-0871.json) (`2023-06-29T09:15:10.410`)
* [CVE-2022-0905](CVE-2022/CVE-2022-09xx/CVE-2022-0905.json) (`2023-06-29T09:15:10.503`)
* [CVE-2022-0932](CVE-2022/CVE-2022-09xx/CVE-2022-0932.json) (`2023-06-29T09:15:10.587`)
* [CVE-2022-1238](CVE-2022/CVE-2022-12xx/CVE-2022-1238.json) (`2023-06-29T09:15:10.670`)
* [CVE-2022-1511](CVE-2022/CVE-2022-15xx/CVE-2022-1511.json) (`2023-06-29T09:15:10.767`)
* [CVE-2022-1714](CVE-2022/CVE-2022-17xx/CVE-2022-1714.json) (`2023-06-29T09:15:10.850`)
* [CVE-2022-1810](CVE-2022/CVE-2022-18xx/CVE-2022-1810.json) (`2023-06-29T09:15:10.947`)
* [CVE-2022-2062](CVE-2022/CVE-2022-20xx/CVE-2022-2062.json) (`2023-06-29T09:15:11.030`)
* [CVE-2022-3993](CVE-2022/CVE-2022-39xx/CVE-2022-3993.json) (`2023-06-29T09:15:11.123`)
## Download and Usage