diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32307.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32307.json index ec3a733233d..c7d7caa9e9a 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32307.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32307.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32307", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-26T23:15:10.127", - "lastModified": "2023-06-17T04:15:45.223", + "lastModified": "2024-02-27T04:15:06.247", "vulnStatus": "Modified", "descriptions": [ { @@ -133,6 +133,10 @@ "Third Party Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OY66DOQ3B7GULJTI66X5HNX5FU3P65CX/", + "source": "security-advisories@github.com" + }, { "url": "https://www.debian.org/security/2023/dsa-5431", "source": "security-advisories@github.com" diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38852.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38852.json index 4eb640bba35..dc1ff879c19 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38852.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38852.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38852", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-15T17:15:10.760", - "lastModified": "2024-02-27T02:15:06.157", + "lastModified": "2024-02-27T04:15:06.403", "vulnStatus": "Modified", "descriptions": [ { @@ -75,6 +75,10 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQYGEBDBCOWBRHOW44BSSRADUOZBXHUE/", "source": "cve@mitre.org" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YHBUPYF2NX34HNAWZ3WYHKWU3KWVQUSV/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7033.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7033.json new file mode 100644 index 00000000000..51e4cdcc07d --- /dev/null +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7033.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-7033", + "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "published": "2024-02-27T04:15:06.473", + "lastModified": "2024-02-27T04:15:06.473", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Insufficient Resource Pool vulnerability in Ethernet function of Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote attacker to cause a temporary Denial of Service condition for a certain period of time in Ethernet communication of the products by performing TCP SYN Flood attack." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-410" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/vu/JVNVU96145466/index.html", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-023_en.pdf", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22368.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22368.json index 71a3866505f..9ca3b08d035 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22368.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22368.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22368", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-09T09:15:42.910", - "lastModified": "2024-02-27T02:15:06.397", + "lastModified": "2024-02-27T04:15:06.767", "vulnStatus": "Modified", "descriptions": [ { @@ -91,6 +91,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00018.html", "source": "cve@mitre.org" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6R7NYWVVZYDZIQC5YEXNHZM6VEE26SJV/", + "source": "cve@mitre.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNJVC4C5C5V44DNOZ5BHVU53CDXPB2OJ/", "source": "cve@mitre.org" diff --git a/README.md b/README.md index 2355f316f51..9dd58c8def4 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-27T03:00:24.937876+00:00 +2024-02-27T05:00:24.854151+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-27T02:15:06.763000+00:00 +2024-02-27T04:15:06.767000+00:00 ``` ### Last Data Feed Release @@ -29,35 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -239528 +239529 ``` ### CVEs added in the last Commit -Recently added CVEs: `12` +Recently added CVEs: `1` -* [CVE-2023-41506](CVE-2023/CVE-2023-415xx/CVE-2023-41506.json) (`2024-02-27T02:15:06.267`) -* [CVE-2024-22544](CVE-2024/CVE-2024-225xx/CVE-2024-22544.json) (`2024-02-27T01:15:07.037`) -* [CVE-2024-24720](CVE-2024/CVE-2024-247xx/CVE-2024-24720.json) (`2024-02-27T01:15:07.090`) -* [CVE-2024-25166](CVE-2024/CVE-2024-251xx/CVE-2024-25166.json) (`2024-02-27T01:15:07.140`) -* [CVE-2024-27356](CVE-2024/CVE-2024-273xx/CVE-2024-27356.json) (`2024-02-27T01:15:07.197`) -* [CVE-2024-22543](CVE-2024/CVE-2024-225xx/CVE-2024-22543.json) (`2024-02-27T01:15:06.980`) -* [CVE-2024-22917](CVE-2024/CVE-2024-229xx/CVE-2024-22917.json) (`2024-02-27T02:15:06.537`) -* [CVE-2024-24095](CVE-2024/CVE-2024-240xx/CVE-2024-24095.json) (`2024-02-27T02:15:06.587`) -* [CVE-2024-24096](CVE-2024/CVE-2024-240xx/CVE-2024-24096.json) (`2024-02-27T02:15:06.630`) -* [CVE-2024-24099](CVE-2024/CVE-2024-240xx/CVE-2024-24099.json) (`2024-02-27T02:15:06.677`) -* [CVE-2024-24100](CVE-2024/CVE-2024-241xx/CVE-2024-24100.json) (`2024-02-27T02:15:06.720`) -* [CVE-2024-25711](CVE-2024/CVE-2024-257xx/CVE-2024-25711.json) (`2024-02-27T02:15:06.763`) +* [CVE-2023-7033](CVE-2023/CVE-2023-70xx/CVE-2023-7033.json) (`2024-02-27T04:15:06.473`) ### CVEs modified in the last Commit -Recently modified CVEs: `4` +Recently modified CVEs: `3` -* [CVE-2022-48618](CVE-2022/CVE-2022-486xx/CVE-2022-48618.json) (`2024-02-27T02:00:01.320`) -* [CVE-2023-38852](CVE-2023/CVE-2023-388xx/CVE-2023-38852.json) (`2024-02-27T02:15:06.157`) -* [CVE-2023-52160](CVE-2023/CVE-2023-521xx/CVE-2023-52160.json) (`2024-02-27T02:15:06.327`) -* [CVE-2024-22368](CVE-2024/CVE-2024-223xx/CVE-2024-22368.json) (`2024-02-27T02:15:06.397`) +* [CVE-2023-32307](CVE-2023/CVE-2023-323xx/CVE-2023-32307.json) (`2024-02-27T04:15:06.247`) +* [CVE-2023-38852](CVE-2023/CVE-2023-388xx/CVE-2023-38852.json) (`2024-02-27T04:15:06.403`) +* [CVE-2024-22368](CVE-2024/CVE-2024-223xx/CVE-2024-22368.json) (`2024-02-27T04:15:06.767`) ## Download and Usage