Auto-Update: 2024-02-27T05:00:24.854151+00:00

This commit is contained in:
cad-safe-bot 2024-02-27 05:00:28 +00:00
parent a016b7ec0c
commit 521f5b90c0
5 changed files with 83 additions and 24 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32307",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-26T23:15:10.127",
"lastModified": "2023-06-17T04:15:45.223",
"lastModified": "2024-02-27T04:15:06.247",
"vulnStatus": "Modified",
"descriptions": [
{
@ -133,6 +133,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OY66DOQ3B7GULJTI66X5HNX5FU3P65CX/",
"source": "security-advisories@github.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5431",
"source": "security-advisories@github.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-38852",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-15T17:15:10.760",
"lastModified": "2024-02-27T02:15:06.157",
"lastModified": "2024-02-27T04:15:06.403",
"vulnStatus": "Modified",
"descriptions": [
{
@ -75,6 +75,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQYGEBDBCOWBRHOW44BSSRADUOZBXHUE/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YHBUPYF2NX34HNAWZ3WYHKWU3KWVQUSV/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-7033",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2024-02-27T04:15:06.473",
"lastModified": "2024-02-27T04:15:06.473",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Insufficient Resource Pool vulnerability in Ethernet function of Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote attacker to cause a temporary Denial of Service condition for a certain period of time in Ethernet communication of the products by performing TCP SYN Flood attack."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-410"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/vu/JVNVU96145466/index.html",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
},
{
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-023_en.pdf",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22368",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-09T09:15:42.910",
"lastModified": "2024-02-27T02:15:06.397",
"lastModified": "2024-02-27T04:15:06.767",
"vulnStatus": "Modified",
"descriptions": [
{
@ -91,6 +91,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00018.html",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R7NYWVVZYDZIQC5YEXNHZM6VEE26SJV/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNJVC4C5C5V44DNOZ5BHVU53CDXPB2OJ/",
"source": "cve@mitre.org"

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-27T03:00:24.937876+00:00
2024-02-27T05:00:24.854151+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-27T02:15:06.763000+00:00
2024-02-27T04:15:06.767000+00:00
```
### Last Data Feed Release
@ -29,35 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
239528
239529
```
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `1`
* [CVE-2023-41506](CVE-2023/CVE-2023-415xx/CVE-2023-41506.json) (`2024-02-27T02:15:06.267`)
* [CVE-2024-22544](CVE-2024/CVE-2024-225xx/CVE-2024-22544.json) (`2024-02-27T01:15:07.037`)
* [CVE-2024-24720](CVE-2024/CVE-2024-247xx/CVE-2024-24720.json) (`2024-02-27T01:15:07.090`)
* [CVE-2024-25166](CVE-2024/CVE-2024-251xx/CVE-2024-25166.json) (`2024-02-27T01:15:07.140`)
* [CVE-2024-27356](CVE-2024/CVE-2024-273xx/CVE-2024-27356.json) (`2024-02-27T01:15:07.197`)
* [CVE-2024-22543](CVE-2024/CVE-2024-225xx/CVE-2024-22543.json) (`2024-02-27T01:15:06.980`)
* [CVE-2024-22917](CVE-2024/CVE-2024-229xx/CVE-2024-22917.json) (`2024-02-27T02:15:06.537`)
* [CVE-2024-24095](CVE-2024/CVE-2024-240xx/CVE-2024-24095.json) (`2024-02-27T02:15:06.587`)
* [CVE-2024-24096](CVE-2024/CVE-2024-240xx/CVE-2024-24096.json) (`2024-02-27T02:15:06.630`)
* [CVE-2024-24099](CVE-2024/CVE-2024-240xx/CVE-2024-24099.json) (`2024-02-27T02:15:06.677`)
* [CVE-2024-24100](CVE-2024/CVE-2024-241xx/CVE-2024-24100.json) (`2024-02-27T02:15:06.720`)
* [CVE-2024-25711](CVE-2024/CVE-2024-257xx/CVE-2024-25711.json) (`2024-02-27T02:15:06.763`)
* [CVE-2023-7033](CVE-2023/CVE-2023-70xx/CVE-2023-7033.json) (`2024-02-27T04:15:06.473`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `3`
* [CVE-2022-48618](CVE-2022/CVE-2022-486xx/CVE-2022-48618.json) (`2024-02-27T02:00:01.320`)
* [CVE-2023-38852](CVE-2023/CVE-2023-388xx/CVE-2023-38852.json) (`2024-02-27T02:15:06.157`)
* [CVE-2023-52160](CVE-2023/CVE-2023-521xx/CVE-2023-52160.json) (`2024-02-27T02:15:06.327`)
* [CVE-2024-22368](CVE-2024/CVE-2024-223xx/CVE-2024-22368.json) (`2024-02-27T02:15:06.397`)
* [CVE-2023-32307](CVE-2023/CVE-2023-323xx/CVE-2023-32307.json) (`2024-02-27T04:15:06.247`)
* [CVE-2023-38852](CVE-2023/CVE-2023-388xx/CVE-2023-38852.json) (`2024-02-27T04:15:06.403`)
* [CVE-2024-22368](CVE-2024/CVE-2024-223xx/CVE-2024-22368.json) (`2024-02-27T04:15:06.767`)
## Download and Usage