diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1424.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1424.json new file mode 100644 index 00000000000..a68e7f4c712 --- /dev/null +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1424.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-1424", + "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "published": "2023-05-24T05:15:08.780", + "lastModified": "2023-05-24T05:15:08.780", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/vu/JVNVU94650413", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-03", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-003_en.pdf", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24805.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24805.json index 8a569906f49..c54b2fd441b 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24805.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24805.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24805", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-17T18:15:09.177", - "lastModified": "2023-05-22T04:15:09.747", + "lastModified": "2023-05-24T05:15:09.530", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -59,6 +59,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00021.html", "source": "security-advisories@github.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KL2SJMZQ5T5JIH3PMQ2CGCY5TUUE255Y/", + "source": "security-advisories@github.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNCGL2ZTAS2GFF23QFT55UFWIDMI4ZJK/", "source": "security-advisories@github.com" diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2426.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2426.json index e0a3e319176..a82166de34c 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2426.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2426.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2426", "sourceIdentifier": "security@huntr.dev", "published": "2023-04-29T22:15:09.243", - "lastModified": "2023-05-20T04:15:09.527", + "lastModified": "2023-05-24T05:15:09.700", "vulnStatus": "Modified", "descriptions": [ { @@ -114,6 +114,10 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LOJP6M7ZTKZQYOGVOOAY6TIE6ACBJL55/", "source": "security@huntr.dev" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2609.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2609.json index bad406960f8..398ff5bc820 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2609.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2609.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2609", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-09T18:15:14.147", - "lastModified": "2023-05-16T15:11:22.003", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-24T05:15:09.897", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2610.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2610.json index d6774c41448..df63806623d 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2610.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2610.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2610", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-09T22:15:10.197", - "lastModified": "2023-05-12T09:24:13.633", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-24T05:15:12.677", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Exploit", "Patch" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 6209f80b100..98698b3295f 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-24T02:00:27.385077+00:00 +2023-05-24T06:00:28.970329+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-24T01:36:38.743000+00:00 +2023-05-24T05:15:12.677000+00:00 ``` ### Last Data Feed Release @@ -29,49 +29,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -215888 +215889 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `1` -* [CVE-2023-2494](CVE-2023/CVE-2023-24xx/CVE-2023-2494.json) (`2023-05-24T00:15:09.243`) -* [CVE-2023-2496](CVE-2023/CVE-2023-24xx/CVE-2023-2496.json) (`2023-05-24T00:15:09.317`) -* [CVE-2023-2498](CVE-2023/CVE-2023-24xx/CVE-2023-2498.json) (`2023-05-24T00:15:09.387`) -* [CVE-2023-31759](CVE-2023/CVE-2023-317xx/CVE-2023-31759.json) (`2023-05-24T00:15:09.450`) -* [CVE-2023-31761](CVE-2023/CVE-2023-317xx/CVE-2023-31761.json) (`2023-05-24T00:15:09.497`) -* [CVE-2023-31762](CVE-2023/CVE-2023-317xx/CVE-2023-31762.json) (`2023-05-24T00:15:09.543`) -* [CVE-2023-31763](CVE-2023/CVE-2023-317xx/CVE-2023-31763.json) (`2023-05-24T00:15:09.583`) +* [CVE-2023-1424](CVE-2023/CVE-2023-14xx/CVE-2023-1424.json) (`2023-05-24T05:15:08.780`) ### CVEs modified in the last Commit -Recently modified CVEs: `23` +Recently modified CVEs: `4` -* [CVE-2021-24383](CVE-2021/CVE-2021-243xx/CVE-2021-24383.json) (`2023-05-24T00:49:51.630`) -* [CVE-2022-47595](CVE-2022/CVE-2022-475xx/CVE-2022-47595.json) (`2023-05-24T00:48:39.567`) -* [CVE-2022-48020](CVE-2022/CVE-2022-480xx/CVE-2022-48020.json) (`2023-05-24T00:59:39.260`) -* [CVE-2023-20914](CVE-2023/CVE-2023-209xx/CVE-2023-20914.json) (`2023-05-24T00:14:55.697`) -* [CVE-2023-20930](CVE-2023/CVE-2023-209xx/CVE-2023-20930.json) (`2023-05-24T00:15:11.830`) -* [CVE-2023-21102](CVE-2023/CVE-2023-211xx/CVE-2023-21102.json) (`2023-05-24T00:15:29.453`) -* [CVE-2023-21103](CVE-2023/CVE-2023-211xx/CVE-2023-21103.json) (`2023-05-24T00:15:42.343`) -* [CVE-2023-21104](CVE-2023/CVE-2023-211xx/CVE-2023-21104.json) (`2023-05-24T00:16:17.847`) -* [CVE-2023-21106](CVE-2023/CVE-2023-211xx/CVE-2023-21106.json) (`2023-05-24T00:16:34.480`) -* [CVE-2023-21107](CVE-2023/CVE-2023-211xx/CVE-2023-21107.json) (`2023-05-24T00:17:10.547`) -* [CVE-2023-21109](CVE-2023/CVE-2023-211xx/CVE-2023-21109.json) (`2023-05-24T00:17:22.613`) -* [CVE-2023-21110](CVE-2023/CVE-2023-211xx/CVE-2023-21110.json) (`2023-05-24T00:17:35.097`) -* [CVE-2023-21111](CVE-2023/CVE-2023-211xx/CVE-2023-21111.json) (`2023-05-24T00:17:46.907`) -* [CVE-2023-21112](CVE-2023/CVE-2023-211xx/CVE-2023-21112.json) (`2023-05-24T00:17:58.943`) -* [CVE-2023-21116](CVE-2023/CVE-2023-211xx/CVE-2023-21116.json) (`2023-05-24T00:19:34.900`) -* [CVE-2023-21117](CVE-2023/CVE-2023-211xx/CVE-2023-21117.json) (`2023-05-24T00:19:55.867`) -* [CVE-2023-21118](CVE-2023/CVE-2023-211xx/CVE-2023-21118.json) (`2023-05-24T00:20:11.947`) -* [CVE-2023-2682](CVE-2023/CVE-2023-26xx/CVE-2023-2682.json) (`2023-05-24T01:06:31.557`) -* [CVE-2023-1934](CVE-2023/CVE-2023-19xx/CVE-2023-1934.json) (`2023-05-24T01:24:00.233`) -* [CVE-2023-27823](CVE-2023/CVE-2023-278xx/CVE-2023-27823.json) (`2023-05-24T01:27:36.207`) -* [CVE-2023-31922](CVE-2023/CVE-2023-319xx/CVE-2023-31922.json) (`2023-05-24T01:30:08.417`) -* [CVE-2023-29242](CVE-2023/CVE-2023-292xx/CVE-2023-29242.json) (`2023-05-24T01:34:24.577`) -* [CVE-2023-30763](CVE-2023/CVE-2023-307xx/CVE-2023-30763.json) (`2023-05-24T01:36:38.743`) +* [CVE-2023-24805](CVE-2023/CVE-2023-248xx/CVE-2023-24805.json) (`2023-05-24T05:15:09.530`) +* [CVE-2023-2426](CVE-2023/CVE-2023-24xx/CVE-2023-2426.json) (`2023-05-24T05:15:09.700`) +* [CVE-2023-2609](CVE-2023/CVE-2023-26xx/CVE-2023-2609.json) (`2023-05-24T05:15:09.897`) +* [CVE-2023-2610](CVE-2023/CVE-2023-26xx/CVE-2023-2610.json) (`2023-05-24T05:15:12.677`) ## Download and Usage