mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2023-12-16T00:55:24.807180+00:00
This commit is contained in:
parent
eb2d3205a2
commit
52da45d823
55
CVE-2023/CVE-2023-273xx/CVE-2023-27317.json
Normal file
55
CVE-2023/CVE-2023-273xx/CVE-2023-27317.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-27317",
|
||||
"sourceIdentifier": "security-alert@netapp.com",
|
||||
"published": "2023-12-15T23:15:07.140",
|
||||
"lastModified": "2023-12-15T23:15:07.140",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ONTAP 9 versions 9.12.1P8, 9.13.1P4, and 9.13.1P5 are susceptible to a \nvulnerability which will cause all SAS-attached FIPS 140-2 drives to \nbecome unlocked after a system reboot or power cycle or a single \nSAS-attached FIPS 140-2 drive to become unlocked after reinsertion. This\n could lead to disclosure of sensitive information to an attacker with \nphysical access to the unlocked drives. \n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@netapp.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-alert@netapp.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/NTAP-20231215-0001/",
|
||||
"source": "security-alert@netapp.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-280xx/CVE-2023-28022.json
Normal file
43
CVE-2023/CVE-2023-280xx/CVE-2023-28022.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-28022",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2023-12-15T23:15:07.373",
|
||||
"lastModified": "2023-12-15T23:15:07.373",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HCL Connections is vulnerable to an information disclosure vulnerability which could allow a user to obtain sensitive information they are not entitled to, caused by improper handling of request data.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108433",
|
||||
"source": "psirt@hcl.com"
|
||||
}
|
||||
]
|
||||
}
|
22
README.md
22
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-12-15T23:00:24.458997+00:00
|
||||
2023-12-16T00:55:24.807180+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-12-15T22:15:07.160000+00:00
|
||||
2023-12-15T23:15:07.373000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,29 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
233523
|
||||
233525
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `6`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
* [CVE-2023-4020](CVE-2023/CVE-2023-40xx/CVE-2023-4020.json) (`2023-12-15T21:15:08.560`)
|
||||
* [CVE-2023-50264](CVE-2023/CVE-2023-502xx/CVE-2023-50264.json) (`2023-12-15T21:15:08.753`)
|
||||
* [CVE-2023-50265](CVE-2023/CVE-2023-502xx/CVE-2023-50265.json) (`2023-12-15T21:15:08.943`)
|
||||
* [CVE-2023-50266](CVE-2023/CVE-2023-502xx/CVE-2023-50266.json) (`2023-12-15T21:15:09.147`)
|
||||
* [CVE-2023-50469](CVE-2023/CVE-2023-504xx/CVE-2023-50469.json) (`2023-12-15T21:15:09.353`)
|
||||
* [CVE-2023-50728](CVE-2023/CVE-2023-507xx/CVE-2023-50728.json) (`2023-12-15T22:15:07.160`)
|
||||
* [CVE-2023-27317](CVE-2023/CVE-2023-273xx/CVE-2023-27317.json) (`2023-12-15T23:15:07.140`)
|
||||
* [CVE-2023-28022](CVE-2023/CVE-2023-280xx/CVE-2023-28022.json) (`2023-12-15T23:15:07.373`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
* [CVE-2023-47321](CVE-2023/CVE-2023-473xx/CVE-2023-47321.json) (`2023-12-15T21:02:46.263`)
|
||||
* [CVE-2023-47322](CVE-2023/CVE-2023-473xx/CVE-2023-47322.json) (`2023-12-15T21:08:27.877`)
|
||||
* [CVE-2023-47323](CVE-2023/CVE-2023-473xx/CVE-2023-47323.json) (`2023-12-15T21:10:34.490`)
|
||||
* [CVE-2023-0248](CVE-2023/CVE-2023-02xx/CVE-2023-0248.json) (`2023-12-15T22:15:07.070`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user