mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2024-02-27T05:00:24.854151+00:00
This commit is contained in:
parent
a016b7ec0c
commit
521f5b90c0
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32307",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-05-26T23:15:10.127",
|
||||
"lastModified": "2023-06-17T04:15:45.223",
|
||||
"lastModified": "2024-02-27T04:15:06.247",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -133,6 +133,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OY66DOQ3B7GULJTI66X5HNX5FU3P65CX/",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5431",
|
||||
"source": "security-advisories@github.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-38852",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-15T17:15:10.760",
|
||||
"lastModified": "2024-02-27T02:15:06.157",
|
||||
"lastModified": "2024-02-27T04:15:06.403",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -75,6 +75,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQYGEBDBCOWBRHOW44BSSRADUOZBXHUE/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YHBUPYF2NX34HNAWZ3WYHKWU3KWVQUSV/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-70xx/CVE-2023-7033.json
Normal file
59
CVE-2023/CVE-2023-70xx/CVE-2023-7033.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-7033",
|
||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"published": "2024-02-27T04:15:06.473",
|
||||
"lastModified": "2024-02-27T04:15:06.473",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient Resource Pool vulnerability in Ethernet function of Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote attacker to cause a temporary Denial of Service condition for a certain period of time in Ethernet communication of the products by performing TCP SYN Flood attack."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-410"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/vu/JVNVU96145466/index.html",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
},
|
||||
{
|
||||
"url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-023_en.pdf",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-22368",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-01-09T09:15:42.910",
|
||||
"lastModified": "2024-02-27T02:15:06.397",
|
||||
"lastModified": "2024-02-27T04:15:06.767",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -91,6 +91,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00018.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R7NYWVVZYDZIQC5YEXNHZM6VEE26SJV/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNJVC4C5C5V44DNOZ5BHVU53CDXPB2OJ/",
|
||||
"source": "cve@mitre.org"
|
||||
|
30
README.md
30
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-02-27T03:00:24.937876+00:00
|
||||
2024-02-27T05:00:24.854151+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-02-27T02:15:06.763000+00:00
|
||||
2024-02-27T04:15:06.767000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,35 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
239528
|
||||
239529
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
* [CVE-2023-41506](CVE-2023/CVE-2023-415xx/CVE-2023-41506.json) (`2024-02-27T02:15:06.267`)
|
||||
* [CVE-2024-22544](CVE-2024/CVE-2024-225xx/CVE-2024-22544.json) (`2024-02-27T01:15:07.037`)
|
||||
* [CVE-2024-24720](CVE-2024/CVE-2024-247xx/CVE-2024-24720.json) (`2024-02-27T01:15:07.090`)
|
||||
* [CVE-2024-25166](CVE-2024/CVE-2024-251xx/CVE-2024-25166.json) (`2024-02-27T01:15:07.140`)
|
||||
* [CVE-2024-27356](CVE-2024/CVE-2024-273xx/CVE-2024-27356.json) (`2024-02-27T01:15:07.197`)
|
||||
* [CVE-2024-22543](CVE-2024/CVE-2024-225xx/CVE-2024-22543.json) (`2024-02-27T01:15:06.980`)
|
||||
* [CVE-2024-22917](CVE-2024/CVE-2024-229xx/CVE-2024-22917.json) (`2024-02-27T02:15:06.537`)
|
||||
* [CVE-2024-24095](CVE-2024/CVE-2024-240xx/CVE-2024-24095.json) (`2024-02-27T02:15:06.587`)
|
||||
* [CVE-2024-24096](CVE-2024/CVE-2024-240xx/CVE-2024-24096.json) (`2024-02-27T02:15:06.630`)
|
||||
* [CVE-2024-24099](CVE-2024/CVE-2024-240xx/CVE-2024-24099.json) (`2024-02-27T02:15:06.677`)
|
||||
* [CVE-2024-24100](CVE-2024/CVE-2024-241xx/CVE-2024-24100.json) (`2024-02-27T02:15:06.720`)
|
||||
* [CVE-2024-25711](CVE-2024/CVE-2024-257xx/CVE-2024-25711.json) (`2024-02-27T02:15:06.763`)
|
||||
* [CVE-2023-7033](CVE-2023/CVE-2023-70xx/CVE-2023-7033.json) (`2024-02-27T04:15:06.473`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `4`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
* [CVE-2022-48618](CVE-2022/CVE-2022-486xx/CVE-2022-48618.json) (`2024-02-27T02:00:01.320`)
|
||||
* [CVE-2023-38852](CVE-2023/CVE-2023-388xx/CVE-2023-38852.json) (`2024-02-27T02:15:06.157`)
|
||||
* [CVE-2023-52160](CVE-2023/CVE-2023-521xx/CVE-2023-52160.json) (`2024-02-27T02:15:06.327`)
|
||||
* [CVE-2024-22368](CVE-2024/CVE-2024-223xx/CVE-2024-22368.json) (`2024-02-27T02:15:06.397`)
|
||||
* [CVE-2023-32307](CVE-2023/CVE-2023-323xx/CVE-2023-32307.json) (`2024-02-27T04:15:06.247`)
|
||||
* [CVE-2023-38852](CVE-2023/CVE-2023-388xx/CVE-2023-38852.json) (`2024-02-27T04:15:06.403`)
|
||||
* [CVE-2024-22368](CVE-2024/CVE-2024-223xx/CVE-2024-22368.json) (`2024-02-27T04:15:06.767`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user