From 4d6d8f601f72063f00c3727939caf643de645f74 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 10 Feb 2024 17:00:27 +0000 Subject: [PATCH] Auto-Update: 2024-02-10T17:00:24.226837+00:00 --- CVE-2023/CVE-2023-509xx/CVE-2023-50957.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-223xx/CVE-2024-22312.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-223xx/CVE-2024-22313.json | 59 +++++++++++++++++++++ CVE-2024/CVE-2024-223xx/CVE-2024-22361.json | 59 +++++++++++++++++++++ README.md | 15 +++--- 5 files changed, 245 insertions(+), 6 deletions(-) create mode 100644 CVE-2023/CVE-2023-509xx/CVE-2023-50957.json create mode 100644 CVE-2024/CVE-2024-223xx/CVE-2024-22312.json create mode 100644 CVE-2024/CVE-2024-223xx/CVE-2024-22313.json create mode 100644 CVE-2024/CVE-2024-223xx/CVE-2024-22361.json diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50957.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50957.json new file mode 100644 index 00000000000..4bf7349ec3b --- /dev/null +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50957.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-50957", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-10T16:15:07.857", + "lastModified": "2024-02-10T16:15:07.857", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Storage Defender - Resiliency Service 2.0 could allow a privileged user to perform unauthorized actions after obtaining encrypted data from clear text key storage. IBM X-Force ID: 275783." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275783", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7115261", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22312.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22312.json new file mode 100644 index 00000000000..68bfb8760be --- /dev/null +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22312.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22312", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-10T16:15:08.153", + "lastModified": "2024-02-10T16:15:08.153", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Storage Defender - Resiliency Service 2.0 stores user credentials in plain clear text which can be read by a local user. IBM X-Force ID: 278748." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/278748", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7115261", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22313.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22313.json new file mode 100644 index 00000000000..2f9a9fd81bd --- /dev/null +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22313.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22313", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-10T16:15:08.360", + "lastModified": "2024-02-10T16:15:08.360", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Storage Defender - Resiliency Service 2.0 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 278749." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/278749", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7115261", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22361.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22361.json new file mode 100644 index 00000000000..50c8bae2ab8 --- /dev/null +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22361.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-22361", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-02-10T15:15:35.667", + "lastModified": "2024-02-10T15:15:35.667", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Semeru Runtime 8.0.302.0 through 8.0.392.0, 11.0.12.0 through 11.0.21.0, 17.0.1.0 - 17.0.9.0, and 21.0.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 281222." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/281222", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7116431", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 90baa3a6fde..9e937cd61b0 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-10T13:00:24.725948+00:00 +2024-02-10T17:00:24.226837+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-10T11:15:08.557000+00:00 +2024-02-10T16:15:08.360000+00:00 ``` ### Last Data Feed Release @@ -29,20 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -238104 +238108 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `4` +* [CVE-2023-50957](CVE-2023/CVE-2023-509xx/CVE-2023-50957.json) (`2024-02-10T16:15:07.857`) +* [CVE-2024-22361](CVE-2024/CVE-2024-223xx/CVE-2024-22361.json) (`2024-02-10T15:15:35.667`) +* [CVE-2024-22312](CVE-2024/CVE-2024-223xx/CVE-2024-22312.json) (`2024-02-10T16:15:08.153`) +* [CVE-2024-22313](CVE-2024/CVE-2024-223xx/CVE-2024-22313.json) (`2024-02-10T16:15:08.360`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -* [CVE-2023-6656](CVE-2023/CVE-2023-66xx/CVE-2023-6656.json) (`2024-02-10T11:15:08.557`) ## Download and Usage