diff --git a/2023/1xxx/CVE-2023-1424.json b/2023/1xxx/CVE-2023-1424.json index 34202b71738..07b7279d464 100644 --- a/2023/1xxx/CVE-2023-1424.json +++ b/2023/1xxx/CVE-2023-1424.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution." + "value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules and MELSEC iQ-R Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution." } ] }, @@ -41,7 +41,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -52,7 +52,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -63,7 +63,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -74,7 +74,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -85,7 +85,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -96,7 +96,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -107,7 +107,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -118,7 +118,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -129,7 +129,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -140,7 +140,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -151,7 +151,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -162,7 +162,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -173,7 +173,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -184,7 +184,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -195,7 +195,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -206,7 +206,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -217,7 +217,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -228,7 +228,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -239,7 +239,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -250,7 +250,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -261,7 +261,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -272,7 +272,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -283,7 +283,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -294,7 +294,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "Serial number 17X**** or later, versions 1.220 and later" + "version_value": "Serial number 17X**** or later, versions from 1.220 to 1.281" } ] } @@ -305,7 +305,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "versions 1.220 and later" + "version_value": "versions from 1.220 to 1.281" } ] } @@ -316,7 +316,7 @@ "version_data": [ { "version_affected": "=", - "version_value": "versions 1.220 and later" + "version_value": "versions from 1.220 to 1.281" } ] } @@ -327,7 +327,238 @@ "version_data": [ { "version_affected": "=", - "version_value": "versions 1.220 and later" + "version_value": "versions from 1.220 to 1.281" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R00CPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions 35 and prior" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R01CPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions 35 and prior" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R02CPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions 35 and prior" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R04CPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions from 12 to 68" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R08CPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions from 12 to 68" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R16CPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions from 12 to 68" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R32CPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions from 12 to 68" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R120CPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions from 12 to 68" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R04ENCPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions from 12 to 68" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R08ENCPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions from 12 to 68" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R16ENCPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions from 12 to 68" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R32ENCPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions from 12 to 68" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R120ENCPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions from 12 to 68" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R08SFCPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions 26 and later" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R16SFCPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions 26 and later" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R32SFCPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions 26 and later" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R120SFCPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions 26 and later" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R08PCPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions 3 and later" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R16PCPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions 3 and later" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R32PCPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions 3 and later" + } + ] + } + }, + { + "product_name": "MELSEC iQ-R Series R120PCPU", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "versions 3 and later" } ] } @@ -354,11 +585,6 @@ "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-03", "refsource": "MISC", "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-03" - }, - { - "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1727", - "refsource": "MISC", - "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1727" } ] }, diff --git a/2023/33xxx/CVE-2023-33246.json b/2023/33xxx/CVE-2023-33246.json index 19d6813210d..e518142e5ae 100644 --- a/2023/33xxx/CVE-2023-33246.json +++ b/2023/33xxx/CVE-2023-33246.json @@ -59,6 +59,11 @@ "url": "https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp", "refsource": "MISC", "name": "https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp" + }, + { + "url": "http://packetstormsecurity.com/files/173339/Apache-RocketMQ-5.1.0-Arbitrary-Code-Injection.html", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173339/Apache-RocketMQ-5.1.0-Arbitrary-Code-Injection.html" } ] }, diff --git a/2023/33xxx/CVE-2023-33592.json b/2023/33xxx/CVE-2023-33592.json index 61c536bf799..995accb7f3f 100644 --- a/2023/33xxx/CVE-2023-33592.json +++ b/2023/33xxx/CVE-2023-33592.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/DARSHANAGUPTA10/CVE/blob/main/CVE-2023-33592", "url": "https://github.com/DARSHANAGUPTA10/CVE/blob/main/CVE-2023-33592" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/173331/Lost-And-Found-Information-System-1.0-SQL-Injection.html", + "url": "http://packetstormsecurity.com/files/173331/Lost-And-Found-Information-System-1.0-SQL-Injection.html" } ] }