diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46757.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46757.json index 964dd82e94e..1bf9f560d48 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46757.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46757.json @@ -2,12 +2,12 @@ "id": "CVE-2023-46757", "sourceIdentifier": "psirt@huawei.com", "published": "2023-11-08T11:15:09.127", - "lastModified": "2023-11-08T14:00:53.167", + "lastModified": "2023-11-09T08:15:07.703", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Keep-alive vulnerability in the sticky broadcast mechanism. Successful exploitation of this vulnerability may cause malicious apps to run continuously in the background." + "value": "The remote PIN module has a vulnerability that causes incorrect information storage locations.Successful exploitation of this vulnerability may affect confidentiality." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46758.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46758.json index a6d0b07a17d..ec3538bc665 100644 --- a/CVE-2023/CVE-2023-467xx/CVE-2023-46758.json +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46758.json @@ -2,12 +2,12 @@ "id": "CVE-2023-46758", "sourceIdentifier": "psirt@huawei.com", "published": "2023-11-08T11:15:09.530", - "lastModified": "2023-11-08T14:00:53.167", + "lastModified": "2023-11-09T08:15:07.897", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "The multi-screen interaction module has a vulnerability in permission management. Successful exploitation of this vulnerability may cause exceptions of the device services.\n" + "value": "Permission management vulnerability in the multi-screen interaction module. Successful exploitation of this vulnerability may cause service exceptions of the device." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47613.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47613.json new file mode 100644 index 00000000000..401788782f1 --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47613.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47613", + "sourceIdentifier": "vulnerability@kaspersky.com", + "published": "2023-11-09T07:15:07.310", + "lastModified": "2023-11-09T07:15:07.310", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A CWE-23: Relative Path Traversal vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow a local, low privileged attacker to escape from virtual directories and get read/write access to protected files on the targeted system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "vulnerability@kaspersky.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "vulnerability@kaspersky.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://ics-cert.kaspersky.com/advisories/2023/11/08/klcert-22-211-telit-cinterion-thales-gemalto-modules-relative-path-traversal/", + "source": "vulnerability@kaspersky.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 97dfcd6ddb7..9522924796b 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-09T07:00:20.524693+00:00 +2023-11-09T09:00:19.804833+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-09T06:15:24.347000+00:00 +2023-11-09T08:15:07.897000+00:00 ``` ### Last Data Feed Release @@ -29,38 +29,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -230212 +230213 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `1` -* [CVE-2023-26156](CVE-2023/CVE-2023-261xx/CVE-2023-26156.json) (`2023-11-09T05:15:09.230`) -* [CVE-2023-46492](CVE-2023/CVE-2023-464xx/CVE-2023-46492.json) (`2023-11-09T05:15:11.070`) -* [CVE-2023-47488](CVE-2023/CVE-2023-474xx/CVE-2023-47488.json) (`2023-11-09T06:15:24.290`) -* [CVE-2023-47489](CVE-2023/CVE-2023-474xx/CVE-2023-47489.json) (`2023-11-09T06:15:24.347`) +* [CVE-2023-47613](CVE-2023/CVE-2023-476xx/CVE-2023-47613.json) (`2023-11-09T07:15:07.310`) ### CVEs modified in the last Commit -Recently modified CVEs: `15` +Recently modified CVEs: `2` -* [CVE-2018-10054](CVE-2018/CVE-2018-100xx/CVE-2018-10054.json) (`2023-11-09T06:15:24.080`) -* [CVE-2022-36816](CVE-2022/CVE-2022-368xx/CVE-2022-36816.json) (`2023-11-09T05:15:09.047`) -* [CVE-2023-39357](CVE-2023/CVE-2023-393xx/CVE-2023-39357.json) (`2023-11-09T05:15:09.590`) -* [CVE-2023-39359](CVE-2023/CVE-2023-393xx/CVE-2023-39359.json) (`2023-11-09T05:15:09.757`) -* [CVE-2023-39361](CVE-2023/CVE-2023-393xx/CVE-2023-39361.json) (`2023-11-09T05:15:09.867`) -* [CVE-2023-39362](CVE-2023/CVE-2023-393xx/CVE-2023-39362.json) (`2023-11-09T05:15:09.970`) -* [CVE-2023-39364](CVE-2023/CVE-2023-393xx/CVE-2023-39364.json) (`2023-11-09T05:15:10.093`) -* [CVE-2023-39365](CVE-2023/CVE-2023-393xx/CVE-2023-39365.json) (`2023-11-09T05:15:10.213`) -* [CVE-2023-39366](CVE-2023/CVE-2023-393xx/CVE-2023-39366.json) (`2023-11-09T05:15:10.317`) -* [CVE-2023-39510](CVE-2023/CVE-2023-395xx/CVE-2023-39510.json) (`2023-11-09T05:15:10.427`) -* [CVE-2023-39512](CVE-2023/CVE-2023-395xx/CVE-2023-39512.json) (`2023-11-09T05:15:10.527`) -* [CVE-2023-39513](CVE-2023/CVE-2023-395xx/CVE-2023-39513.json) (`2023-11-09T05:15:10.640`) -* [CVE-2023-39514](CVE-2023/CVE-2023-395xx/CVE-2023-39514.json) (`2023-11-09T05:15:10.750`) -* [CVE-2023-39515](CVE-2023/CVE-2023-395xx/CVE-2023-39515.json) (`2023-11-09T05:15:10.857`) -* [CVE-2023-39516](CVE-2023/CVE-2023-395xx/CVE-2023-39516.json) (`2023-11-09T05:15:10.960`) +* [CVE-2023-46757](CVE-2023/CVE-2023-467xx/CVE-2023-46757.json) (`2023-11-09T08:15:07.703`) +* [CVE-2023-46758](CVE-2023/CVE-2023-467xx/CVE-2023-46758.json) (`2023-11-09T08:15:07.897`) ## Download and Usage