From 4db864e49a1e5d3bd784278fde13faa83ed16dc9 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sun, 3 Dec 2023 19:00:21 +0000 Subject: [PATCH] Auto-Update: 2023-12-03T19:00:18.213644+00:00 --- CVE-2023/CVE-2023-451xx/CVE-2023-45178.json | 59 +++++++++++++++++++++ README.md | 36 +++---------- 2 files changed, 65 insertions(+), 30 deletions(-) create mode 100644 CVE-2023/CVE-2023-451xx/CVE-2023-45178.json diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45178.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45178.json new file mode 100644 index 00000000000..c72104e9696 --- /dev/null +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45178.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-45178", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-12-03T18:15:42.273", + "lastModified": "2023-12-03T18:15:42.273", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5 CLI is vulnerable to a denial of service when a specially crafted request is used. IBM X-Force ID: 268073." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/268073", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7087207", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 08bbc373800..b739be4d6c5 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-03T17:00:17.328663+00:00 +2023-12-03T19:00:18.213644+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-03T16:37:37.540000+00:00 +2023-12-03T18:15:42.273000+00:00 ``` ### Last Data Feed Release @@ -29,44 +29,20 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -231992 +231993 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `1` +* [CVE-2023-45178](CVE-2023/CVE-2023-451xx/CVE-2023-45178.json) (`2023-12-03T18:15:42.273`) ### CVEs modified in the last Commit -Recently modified CVEs: `43` +Recently modified CVEs: `0` -* [CVE-2023-6474](CVE-2023/CVE-2023-64xx/CVE-2023-6474.json) (`2023-12-03T16:37:30.347`) -* [CVE-2023-49926](CVE-2023/CVE-2023-499xx/CVE-2023-49926.json) (`2023-12-03T16:37:30.347`) -* [CVE-2023-48813](CVE-2023/CVE-2023-488xx/CVE-2023-48813.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-48842](CVE-2023/CVE-2023-488xx/CVE-2023-48842.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-48893](CVE-2023/CVE-2023-488xx/CVE-2023-48893.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-42006](CVE-2023/CVE-2023-420xx/CVE-2023-42006.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-26024](CVE-2023/CVE-2023-260xx/CVE-2023-26024.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-38268](CVE-2023/CVE-2023-382xx/CVE-2023-38268.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-43015](CVE-2023/CVE-2023-430xx/CVE-2023-43015.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-40699](CVE-2023/CVE-2023-406xx/CVE-2023-40699.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-42009](CVE-2023/CVE-2023-420xx/CVE-2023-42009.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-42019](CVE-2023/CVE-2023-420xx/CVE-2023-42019.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-42022](CVE-2023/CVE-2023-420xx/CVE-2023-42022.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-43021](CVE-2023/CVE-2023-430xx/CVE-2023-43021.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-46174](CVE-2023/CVE-2023-461xx/CVE-2023-46174.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-49277](CVE-2023/CVE-2023-492xx/CVE-2023-49277.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-44381](CVE-2023/CVE-2023-443xx/CVE-2023-44381.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-44382](CVE-2023/CVE-2023-443xx/CVE-2023-44382.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-44402](CVE-2023/CVE-2023-444xx/CVE-2023-44402.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-46746](CVE-2023/CVE-2023-467xx/CVE-2023-46746.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-48314](CVE-2023/CVE-2023-483xx/CVE-2023-48314.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-49276](CVE-2023/CVE-2023-492xx/CVE-2023-49276.json) (`2023-12-03T16:37:34.417`) -* [CVE-2023-45168](CVE-2023/CVE-2023-451xx/CVE-2023-45168.json) (`2023-12-03T16:37:37.540`) -* [CVE-2023-49371](CVE-2023/CVE-2023-493xx/CVE-2023-49371.json) (`2023-12-03T16:37:37.540`) -* [CVE-2023-4518](CVE-2023/CVE-2023-45xx/CVE-2023-4518.json) (`2023-12-03T16:37:37.540`) ## Download and Usage