mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-30 10:10:41 +00:00
Auto-Update: 2023-07-14T04:00:45.425861+00:00
This commit is contained in:
parent
3f1b13f755
commit
719d27a7c9
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-33324",
|
||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"published": "2022-12-23T03:15:08.723",
|
||||
"lastModified": "2023-01-04T21:21:39.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-07-14T03:15:08.740",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions \"32\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions \"65\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU all versions, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V all versions, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU all versions and Mitsubishi Electric Corporation MELIPC Series MI5122-VW all versions allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery."
|
||||
"value": "Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions \"32\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions \"65\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU Firmware versions \"29\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V all versions, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU all versions and Mitsubishi Electric Corporation MELIPC Series MI5122-VW all versions allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-34241",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-06-22T23:15:09.493",
|
||||
"lastModified": "2023-06-30T21:15:08.973",
|
||||
"lastModified": "2023-07-14T03:15:08.927",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -144,6 +144,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/",
|
||||
"source": "security-advisories@github.com",
|
||||
|
21
README.md
21
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-07-14T02:00:33.648429+00:00
|
||||
2023-07-14T04:00:45.425861+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-07-14T01:15:08.763000+00:00
|
||||
2023-07-14T03:15:08.927000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -34,25 +34,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `11`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
* [CVE-2023-37466](CVE-2023/CVE-2023-374xx/CVE-2023-37466.json) (`2023-07-14T00:15:09.263`)
|
||||
* [CVE-2023-37714](CVE-2023/CVE-2023-377xx/CVE-2023-37714.json) (`2023-07-14T00:15:09.340`)
|
||||
* [CVE-2023-37715](CVE-2023/CVE-2023-377xx/CVE-2023-37715.json) (`2023-07-14T00:15:09.387`)
|
||||
* [CVE-2023-37716](CVE-2023/CVE-2023-377xx/CVE-2023-37716.json) (`2023-07-14T00:15:09.430`)
|
||||
* [CVE-2023-37717](CVE-2023/CVE-2023-377xx/CVE-2023-37717.json) (`2023-07-14T00:15:09.477`)
|
||||
* [CVE-2023-37718](CVE-2023/CVE-2023-377xx/CVE-2023-37718.json) (`2023-07-14T00:15:09.523`)
|
||||
* [CVE-2023-37719](CVE-2023/CVE-2023-377xx/CVE-2023-37719.json) (`2023-07-14T00:15:09.570`)
|
||||
* [CVE-2023-37721](CVE-2023/CVE-2023-377xx/CVE-2023-37721.json) (`2023-07-14T00:15:09.617`)
|
||||
* [CVE-2023-37722](CVE-2023/CVE-2023-377xx/CVE-2023-37722.json) (`2023-07-14T00:15:09.660`)
|
||||
* [CVE-2023-37723](CVE-2023/CVE-2023-377xx/CVE-2023-37723.json) (`2023-07-14T00:15:09.707`)
|
||||
* [CVE-2023-3668](CVE-2023/CVE-2023-36xx/CVE-2023-3668.json) (`2023-07-14T01:15:08.763`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
* [CVE-2022-33324](CVE-2022/CVE-2022-333xx/CVE-2022-33324.json) (`2023-07-14T03:15:08.740`)
|
||||
* [CVE-2023-34241](CVE-2023/CVE-2023-342xx/CVE-2023-34241.json) (`2023-07-14T03:15:08.927`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user