From 52da45d823c5469eff9b64f835b8a4ab62ab3b58 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 16 Dec 2023 00:55:28 +0000 Subject: [PATCH] Auto-Update: 2023-12-16T00:55:24.807180+00:00 --- CVE-2023/CVE-2023-273xx/CVE-2023-27317.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-280xx/CVE-2023-28022.json | 43 ++++++++++++++++ README.md | 22 +++------ 3 files changed, 105 insertions(+), 15 deletions(-) create mode 100644 CVE-2023/CVE-2023-273xx/CVE-2023-27317.json create mode 100644 CVE-2023/CVE-2023-280xx/CVE-2023-28022.json diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27317.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27317.json new file mode 100644 index 00000000000..d5c1559e853 --- /dev/null +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27317.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27317", + "sourceIdentifier": "security-alert@netapp.com", + "published": "2023-12-15T23:15:07.140", + "lastModified": "2023-12-15T23:15:07.140", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "ONTAP 9 versions 9.12.1P8, 9.13.1P4, and 9.13.1P5 are susceptible to a \nvulnerability which will cause all SAS-attached FIPS 140-2 drives to \nbecome unlocked after a system reboot or power cycle or a single \nSAS-attached FIPS 140-2 drive to become unlocked after reinsertion. This\n could lead to disclosure of sensitive information to an attacker with \nphysical access to the unlocked drives. \n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@netapp.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-alert@netapp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://security.netapp.com/advisory/NTAP-20231215-0001/", + "source": "security-alert@netapp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-280xx/CVE-2023-28022.json b/CVE-2023/CVE-2023-280xx/CVE-2023-28022.json new file mode 100644 index 00000000000..577f68e1d7c --- /dev/null +++ b/CVE-2023/CVE-2023-280xx/CVE-2023-28022.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-28022", + "sourceIdentifier": "psirt@hcl.com", + "published": "2023-12-15T23:15:07.373", + "lastModified": "2023-12-15T23:15:07.373", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "HCL Connections is vulnerable to an information disclosure vulnerability which could allow a user to obtain sensitive information they are not entitled to, caused by improper handling of request data.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108433", + "source": "psirt@hcl.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 7d19b64d408..61ff5826290 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-15T23:00:24.458997+00:00 +2023-12-16T00:55:24.807180+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-15T22:15:07.160000+00:00 +2023-12-15T23:15:07.373000+00:00 ``` ### Last Data Feed Release @@ -29,29 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -233523 +233525 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `2` -* [CVE-2023-4020](CVE-2023/CVE-2023-40xx/CVE-2023-4020.json) (`2023-12-15T21:15:08.560`) -* [CVE-2023-50264](CVE-2023/CVE-2023-502xx/CVE-2023-50264.json) (`2023-12-15T21:15:08.753`) -* [CVE-2023-50265](CVE-2023/CVE-2023-502xx/CVE-2023-50265.json) (`2023-12-15T21:15:08.943`) -* [CVE-2023-50266](CVE-2023/CVE-2023-502xx/CVE-2023-50266.json) (`2023-12-15T21:15:09.147`) -* [CVE-2023-50469](CVE-2023/CVE-2023-504xx/CVE-2023-50469.json) (`2023-12-15T21:15:09.353`) -* [CVE-2023-50728](CVE-2023/CVE-2023-507xx/CVE-2023-50728.json) (`2023-12-15T22:15:07.160`) +* [CVE-2023-27317](CVE-2023/CVE-2023-273xx/CVE-2023-27317.json) (`2023-12-15T23:15:07.140`) +* [CVE-2023-28022](CVE-2023/CVE-2023-280xx/CVE-2023-28022.json) (`2023-12-15T23:15:07.373`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `0` -* [CVE-2023-47321](CVE-2023/CVE-2023-473xx/CVE-2023-47321.json) (`2023-12-15T21:02:46.263`) -* [CVE-2023-47322](CVE-2023/CVE-2023-473xx/CVE-2023-47322.json) (`2023-12-15T21:08:27.877`) -* [CVE-2023-47323](CVE-2023/CVE-2023-473xx/CVE-2023-47323.json) (`2023-12-15T21:10:34.490`) -* [CVE-2023-0248](CVE-2023/CVE-2023-02xx/CVE-2023-0248.json) (`2023-12-15T22:15:07.070`) ## Download and Usage