From 081aa58bc20db5309c2bb8f13ab8ffee6b99eebb Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 4 Feb 2024 03:00:58 +0000 Subject: [PATCH] Auto-Update: 2024-02-04T03:00:54.933557+00:00 --- CVE-2023/CVE-2023-338xx/CVE-2023-33851.json | 59 +++++++++++++++++++ CVE-2023/CVE-2023-509xx/CVE-2023-50947.json | 63 +++++++++++++++++++++ README.md | 15 ++--- 3 files changed, 130 insertions(+), 7 deletions(-) create mode 100644 CVE-2023/CVE-2023-338xx/CVE-2023-33851.json create mode 100644 CVE-2023/CVE-2023-509xx/CVE-2023-50947.json diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33851.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33851.json new file mode 100644 index 00000000000..6904839fd2e --- /dev/null +++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33851.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-33851", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-04T01:15:24.490", + "lastModified": "2024-02-04T01:15:24.490", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerVM Hypervisor FW950.00 through FW950.90, FW1020.00 through FW1020.40, and FW1030.00 through FW1030.30 could reveal sensitive partition data to a system administrator. IBM X-Force ID: 257135." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/257135", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7114491", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50947.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50947.json new file mode 100644 index 00000000000..c985acc9eb4 --- /dev/null +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50947.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-50947", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-04T01:15:25.040", + "lastModified": "2024-02-04T01:15:25.040", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Business Automation Workflow 22.0.2, 23.0.1, and 23.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 275665." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275665", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7114419", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7114430", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 620383aba9a..50f49922576 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-03T21:00:24.758504+00:00 +2024-02-04T03:00:54.933557+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-03T19:15:08.450000+00:00 +2024-02-04T01:15:25.040000+00:00 ``` ### Last Data Feed Release @@ -23,26 +23,27 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-02-03T01:00:28.223424+00:00 +2024-02-04T01:00:28.256851+00:00 ``` ### Total Number of included CVEs ```plain -237507 +237509 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `2` +* [CVE-2023-33851](CVE-2023/CVE-2023-338xx/CVE-2023-33851.json) (`2024-02-04T01:15:24.490`) +* [CVE-2023-50947](CVE-2023/CVE-2023-509xx/CVE-2023-50947.json) (`2024-02-04T01:15:25.040`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -* [CVE-2024-23301](CVE-2024/CVE-2024-233xx/CVE-2024-23301.json) (`2024-02-03T19:15:08.450`) ## Download and Usage