diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25940.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25940.json index a9d4c5487d0..7c4019ea950 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25940.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25940.json @@ -2,12 +2,12 @@ "id": "CVE-2023-25940", "sourceIdentifier": "security_alert@emc.com", "published": "2023-04-04T11:15:06.960", - "lastModified": "2023-04-11T15:51:33.990", - "vulnStatus": "Analyzed", + "lastModified": "2023-06-22T07:15:08.537", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Dell PowerScale OneFS version 9.5.0.0 contains improper link resolution before file access vulnerability in isi_gather_info. A low privilege local attacker could potentially exploit this vulnerability, leading to system takeover and it breaks the compliance mode guarantees." + "value": "\nDell PowerScale OneFS version 9.5.0.0 contains improper link resolution before file access vulnerability in isi_gather_info. A high privileged local attacker could potentially exploit this vulnerability, leading to system takeover and it breaks the compliance mode guarantees.\n\n\n" } ], "metrics": { diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31975.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31975.json index 60e1c09ad26..3ad0a1b0381 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31975.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31975.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31975", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T13:15:18.590", - "lastModified": "2023-06-22T00:15:47.717", + "lastModified": "2023-06-22T06:15:09.457", "vulnStatus": "Modified", "descriptions": [ { @@ -96,6 +96,10 @@ "url": "http://www.openwall.com/lists/oss-security/2023/06/21/9", "source": "cve@mitre.org" }, + { + "url": "http://www.openwall.com/lists/oss-security/2023/06/22/1", + "source": "cve@mitre.org" + }, { "url": "https://github.com/yasm/yasm/issues/210", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32449.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32449.json new file mode 100644 index 00000000000..86e805fb45c --- /dev/null +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32449.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-32449", + "sourceIdentifier": "security_alert@emc.com", + "published": "2023-06-22T07:15:08.867", + "lastModified": "2023-06-22T07:15:08.867", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nDell PowerStore versions prior to 3.5 contain an improper verification of cryptographic signature vulnerability. An attacker can trick a high privileged user to install a malicious binary by bypassing the existing cryptographic signature checks\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.6, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000215171/dsa-2023-173-dell-powerstore-family-security-update-for-multiple-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 2a96a6364f8..d53e26799da 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-22T06:00:25.559000+00:00 +2023-06-22T08:00:30.331019+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-22T05:15:09.157000+00:00 +2023-06-22T07:15:08.867000+00:00 ``` ### Last Data Feed Release @@ -29,23 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -218205 +218206 ``` ### CVEs added in the last Commit Recently added CVEs: `1` -* [CVE-2023-26115](CVE-2023/CVE-2023-261xx/CVE-2023-26115.json) (`2023-06-22T05:15:09.157`) +* [CVE-2023-32449](CVE-2023/CVE-2023-324xx/CVE-2023-32449.json) (`2023-06-22T07:15:08.867`) ### CVEs modified in the last Commit -Recently modified CVEs: `3` +Recently modified CVEs: `2` -* [CVE-2022-47184](CVE-2022/CVE-2022-471xx/CVE-2022-47184.json) (`2023-06-22T04:15:08.417`) -* [CVE-2023-30631](CVE-2023/CVE-2023-306xx/CVE-2023-30631.json) (`2023-06-22T04:15:08.770`) -* [CVE-2023-33933](CVE-2023/CVE-2023-339xx/CVE-2023-33933.json) (`2023-06-22T04:15:08.917`) +* [CVE-2023-31975](CVE-2023/CVE-2023-319xx/CVE-2023-31975.json) (`2023-06-22T06:15:09.457`) +* [CVE-2023-25940](CVE-2023/CVE-2023-259xx/CVE-2023-25940.json) (`2023-06-22T07:15:08.537`) ## Download and Usage