diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22886.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22886.json new file mode 100644 index 00000000000..c94614030c0 --- /dev/null +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22886.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-22886", + "sourceIdentifier": "security@apache.org", + "published": "2023-06-29T10:15:09.650", + "lastModified": "2023-06-29T10:15:09.650", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper Input Validation vulnerability in Apache Software Foundation Apache Airflow JDBC Provider.\nAirflow JDBC Provider Connection\u2019s [Connection URL] parameters had no\nrestrictions, which made it possible to implement RCE attacks via\ndifferent type JDBC drivers, obtain airflow server permission.\nThis issue affects Apache Airflow JDBC Provider: before 4.0.0.\n\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/ynbjwp4n0vzql0xzhog1gkp1ovncf8j3", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 2e1981d457b..199e2066910 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-29T10:00:49.539119+00:00 +2023-06-29T12:00:28.989849+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-29T09:15:11.123000+00:00 +2023-06-29T10:15:09.650000+00:00 ``` ### Last Data Feed Release @@ -29,39 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -218868 +218869 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `1` +* [CVE-2023-22886](CVE-2023/CVE-2023-228xx/CVE-2023-22886.json) (`2023-06-29T10:15:09.650`) ### CVEs modified in the last Commit -Recently modified CVEs: `20` +Recently modified CVEs: `0` -* [CVE-2022-0179](CVE-2022/CVE-2022-01xx/CVE-2022-0179.json) (`2023-06-29T08:15:09.523`) -* [CVE-2022-0277](CVE-2022/CVE-2022-02xx/CVE-2022-0277.json) (`2023-06-29T08:15:09.807`) -* [CVE-2022-0414](CVE-2022/CVE-2022-04xx/CVE-2022-0414.json) (`2023-06-29T08:15:09.913`) -* [CVE-2022-25164](CVE-2022/CVE-2022-251xx/CVE-2022-25164.json) (`2023-06-29T08:15:10.023`) -* [CVE-2022-29827](CVE-2022/CVE-2022-298xx/CVE-2022-29827.json) (`2023-06-29T08:15:10.137`) -* [CVE-2022-29828](CVE-2022/CVE-2022-298xx/CVE-2022-29828.json) (`2023-06-29T08:15:10.213`) -* [CVE-2022-29830](CVE-2022/CVE-2022-298xx/CVE-2022-29830.json) (`2023-06-29T08:15:10.290`) -* [CVE-2022-0596](CVE-2022/CVE-2022-05xx/CVE-2022-0596.json) (`2023-06-29T09:15:09.577`) -* [CVE-2022-0726](CVE-2022/CVE-2022-07xx/CVE-2022-0726.json) (`2023-06-29T09:15:10.120`) -* [CVE-2022-0755](CVE-2022/CVE-2022-07xx/CVE-2022-0755.json) (`2023-06-29T09:15:10.227`) -* [CVE-2022-0756](CVE-2022/CVE-2022-07xx/CVE-2022-0756.json) (`2023-06-29T09:15:10.320`) -* [CVE-2022-0871](CVE-2022/CVE-2022-08xx/CVE-2022-0871.json) (`2023-06-29T09:15:10.410`) -* [CVE-2022-0905](CVE-2022/CVE-2022-09xx/CVE-2022-0905.json) (`2023-06-29T09:15:10.503`) -* [CVE-2022-0932](CVE-2022/CVE-2022-09xx/CVE-2022-0932.json) (`2023-06-29T09:15:10.587`) -* [CVE-2022-1238](CVE-2022/CVE-2022-12xx/CVE-2022-1238.json) (`2023-06-29T09:15:10.670`) -* [CVE-2022-1511](CVE-2022/CVE-2022-15xx/CVE-2022-1511.json) (`2023-06-29T09:15:10.767`) -* [CVE-2022-1714](CVE-2022/CVE-2022-17xx/CVE-2022-1714.json) (`2023-06-29T09:15:10.850`) -* [CVE-2022-1810](CVE-2022/CVE-2022-18xx/CVE-2022-1810.json) (`2023-06-29T09:15:10.947`) -* [CVE-2022-2062](CVE-2022/CVE-2022-20xx/CVE-2022-2062.json) (`2023-06-29T09:15:11.030`) -* [CVE-2022-3993](CVE-2022/CVE-2022-39xx/CVE-2022-3993.json) (`2023-06-29T09:15:11.123`) ## Download and Usage