Auto-Update: 2023-07-14T04:00:45.425861+00:00

This commit is contained in:
cad-safe-bot 2023-07-14 04:00:48 +00:00
parent 3f1b13f755
commit 719d27a7c9
3 changed files with 14 additions and 19 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-33324",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2022-12-23T03:15:08.723",
"lastModified": "2023-01-04T21:21:39.827",
"vulnStatus": "Analyzed",
"lastModified": "2023-07-14T03:15:08.740",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions \"32\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions \"65\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU all versions, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V all versions, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU all versions and Mitsubishi Electric Corporation MELIPC Series MI5122-VW all versions allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery."
"value": "Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions \"32\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions \"65\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU Firmware versions \"29\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V all versions, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU all versions and Mitsubishi Electric Corporation MELIPC Series MI5122-VW all versions allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery."
}
],
"metrics": {

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34241",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-06-22T23:15:09.493",
"lastModified": "2023-06-30T21:15:08.973",
"lastModified": "2023-07-14T03:15:08.927",
"vulnStatus": "Modified",
"descriptions": [
{
@ -144,6 +144,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/",
"source": "security-advisories@github.com",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-07-14T02:00:33.648429+00:00
2023-07-14T04:00:45.425861+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-07-14T01:15:08.763000+00:00
2023-07-14T03:15:08.927000+00:00
```
### Last Data Feed Release
@ -34,25 +34,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `11`
Recently added CVEs: `0`
* [CVE-2023-37466](CVE-2023/CVE-2023-374xx/CVE-2023-37466.json) (`2023-07-14T00:15:09.263`)
* [CVE-2023-37714](CVE-2023/CVE-2023-377xx/CVE-2023-37714.json) (`2023-07-14T00:15:09.340`)
* [CVE-2023-37715](CVE-2023/CVE-2023-377xx/CVE-2023-37715.json) (`2023-07-14T00:15:09.387`)
* [CVE-2023-37716](CVE-2023/CVE-2023-377xx/CVE-2023-37716.json) (`2023-07-14T00:15:09.430`)
* [CVE-2023-37717](CVE-2023/CVE-2023-377xx/CVE-2023-37717.json) (`2023-07-14T00:15:09.477`)
* [CVE-2023-37718](CVE-2023/CVE-2023-377xx/CVE-2023-37718.json) (`2023-07-14T00:15:09.523`)
* [CVE-2023-37719](CVE-2023/CVE-2023-377xx/CVE-2023-37719.json) (`2023-07-14T00:15:09.570`)
* [CVE-2023-37721](CVE-2023/CVE-2023-377xx/CVE-2023-37721.json) (`2023-07-14T00:15:09.617`)
* [CVE-2023-37722](CVE-2023/CVE-2023-377xx/CVE-2023-37722.json) (`2023-07-14T00:15:09.660`)
* [CVE-2023-37723](CVE-2023/CVE-2023-377xx/CVE-2023-37723.json) (`2023-07-14T00:15:09.707`)
* [CVE-2023-3668](CVE-2023/CVE-2023-36xx/CVE-2023-3668.json) (`2023-07-14T01:15:08.763`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `2`
* [CVE-2022-33324](CVE-2022/CVE-2022-333xx/CVE-2022-33324.json) (`2023-07-14T03:15:08.740`)
* [CVE-2023-34241](CVE-2023/CVE-2023-342xx/CVE-2023-34241.json) (`2023-07-14T03:15:08.927`)
## Download and Usage