Auto-Update: 2023-12-16T00:55:24.807180+00:00

This commit is contained in:
cad-safe-bot 2023-12-16 00:55:28 +00:00
parent eb2d3205a2
commit 52da45d823
3 changed files with 105 additions and 15 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-27317",
"sourceIdentifier": "security-alert@netapp.com",
"published": "2023-12-15T23:15:07.140",
"lastModified": "2023-12-15T23:15:07.140",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "ONTAP 9 versions 9.12.1P8, 9.13.1P4, and 9.13.1P5 are susceptible to a \nvulnerability which will cause all SAS-attached FIPS 140-2 drives to \nbecome unlocked after a system reboot or power cycle or a single \nSAS-attached FIPS 140-2 drive to become unlocked after reinsertion. This\n could lead to disclosure of sensitive information to an attacker with \nphysical access to the unlocked drives. \n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@netapp.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-alert@netapp.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/NTAP-20231215-0001/",
"source": "security-alert@netapp.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-28022",
"sourceIdentifier": "psirt@hcl.com",
"published": "2023-12-15T23:15:07.373",
"lastModified": "2023-12-15T23:15:07.373",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "HCL Connections is vulnerable to an information disclosure vulnerability which could allow a user to obtain sensitive information they are not entitled to, caused by improper handling of request data.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@hcl.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108433",
"source": "psirt@hcl.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-12-15T23:00:24.458997+00:00
2023-12-16T00:55:24.807180+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-12-15T22:15:07.160000+00:00
2023-12-15T23:15:07.373000+00:00
```
### Last Data Feed Release
@ -29,29 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
233523
233525
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `2`
* [CVE-2023-4020](CVE-2023/CVE-2023-40xx/CVE-2023-4020.json) (`2023-12-15T21:15:08.560`)
* [CVE-2023-50264](CVE-2023/CVE-2023-502xx/CVE-2023-50264.json) (`2023-12-15T21:15:08.753`)
* [CVE-2023-50265](CVE-2023/CVE-2023-502xx/CVE-2023-50265.json) (`2023-12-15T21:15:08.943`)
* [CVE-2023-50266](CVE-2023/CVE-2023-502xx/CVE-2023-50266.json) (`2023-12-15T21:15:09.147`)
* [CVE-2023-50469](CVE-2023/CVE-2023-504xx/CVE-2023-50469.json) (`2023-12-15T21:15:09.353`)
* [CVE-2023-50728](CVE-2023/CVE-2023-507xx/CVE-2023-50728.json) (`2023-12-15T22:15:07.160`)
* [CVE-2023-27317](CVE-2023/CVE-2023-273xx/CVE-2023-27317.json) (`2023-12-15T23:15:07.140`)
* [CVE-2023-28022](CVE-2023/CVE-2023-280xx/CVE-2023-28022.json) (`2023-12-15T23:15:07.373`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `0`
* [CVE-2023-47321](CVE-2023/CVE-2023-473xx/CVE-2023-47321.json) (`2023-12-15T21:02:46.263`)
* [CVE-2023-47322](CVE-2023/CVE-2023-473xx/CVE-2023-47322.json) (`2023-12-15T21:08:27.877`)
* [CVE-2023-47323](CVE-2023/CVE-2023-473xx/CVE-2023-47323.json) (`2023-12-15T21:10:34.490`)
* [CVE-2023-0248](CVE-2023/CVE-2023-02xx/CVE-2023-0248.json) (`2023-12-15T22:15:07.070`)
## Download and Usage