From 719d27a7c980a05ddc7e58effa5d59a6fbaf1297 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 14 Jul 2023 04:00:48 +0000 Subject: [PATCH] Auto-Update: 2023-07-14T04:00:45.425861+00:00 --- CVE-2022/CVE-2022-333xx/CVE-2022-33324.json | 6 +++--- CVE-2023/CVE-2023-342xx/CVE-2023-34241.json | 6 +++++- README.md | 21 ++++++--------------- 3 files changed, 14 insertions(+), 19 deletions(-) diff --git a/CVE-2022/CVE-2022-333xx/CVE-2022-33324.json b/CVE-2022/CVE-2022-333xx/CVE-2022-33324.json index 21776a3dc8c..e0b9e8fa0d6 100644 --- a/CVE-2022/CVE-2022-333xx/CVE-2022-33324.json +++ b/CVE-2022/CVE-2022-333xx/CVE-2022-33324.json @@ -2,12 +2,12 @@ "id": "CVE-2022-33324", "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "published": "2022-12-23T03:15:08.723", - "lastModified": "2023-01-04T21:21:39.827", - "vulnStatus": "Analyzed", + "lastModified": "2023-07-14T03:15:08.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions \"32\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions \"65\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU all versions, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V all versions, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU all versions and Mitsubishi Electric Corporation MELIPC Series MI5122-VW all versions allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery." + "value": "Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions \"32\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions \"65\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU Firmware versions \"29\" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V all versions, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU all versions and Mitsubishi Electric Corporation MELIPC Series MI5122-VW all versions allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34241.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34241.json index 676cd037430..578e67e411a 100644 --- a/CVE-2023/CVE-2023-342xx/CVE-2023-34241.json +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34241.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34241", "sourceIdentifier": "security-advisories@github.com", "published": "2023-06-22T23:15:09.493", - "lastModified": "2023-06-30T21:15:08.973", + "lastModified": "2023-07-14T03:15:08.927", "vulnStatus": "Modified", "descriptions": [ { @@ -144,6 +144,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00038.html", "source": "security-advisories@github.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7I7DWGYGEMBNLZF5UQBMF3SONR37YUBN/", + "source": "security-advisories@github.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TBIYKDS3UG3W4Z7YOHTR2AWFNBRYPNYY/", "source": "security-advisories@github.com", diff --git a/README.md b/README.md index fa8c8162dca..3ff6ff93f3c 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-07-14T02:00:33.648429+00:00 +2023-07-14T04:00:45.425861+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-07-14T01:15:08.763000+00:00 +2023-07-14T03:15:08.927000+00:00 ``` ### Last Data Feed Release @@ -34,25 +34,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `0` -* [CVE-2023-37466](CVE-2023/CVE-2023-374xx/CVE-2023-37466.json) (`2023-07-14T00:15:09.263`) -* [CVE-2023-37714](CVE-2023/CVE-2023-377xx/CVE-2023-37714.json) (`2023-07-14T00:15:09.340`) -* [CVE-2023-37715](CVE-2023/CVE-2023-377xx/CVE-2023-37715.json) (`2023-07-14T00:15:09.387`) -* [CVE-2023-37716](CVE-2023/CVE-2023-377xx/CVE-2023-37716.json) (`2023-07-14T00:15:09.430`) -* [CVE-2023-37717](CVE-2023/CVE-2023-377xx/CVE-2023-37717.json) (`2023-07-14T00:15:09.477`) -* [CVE-2023-37718](CVE-2023/CVE-2023-377xx/CVE-2023-37718.json) (`2023-07-14T00:15:09.523`) -* [CVE-2023-37719](CVE-2023/CVE-2023-377xx/CVE-2023-37719.json) (`2023-07-14T00:15:09.570`) -* [CVE-2023-37721](CVE-2023/CVE-2023-377xx/CVE-2023-37721.json) (`2023-07-14T00:15:09.617`) -* [CVE-2023-37722](CVE-2023/CVE-2023-377xx/CVE-2023-37722.json) (`2023-07-14T00:15:09.660`) -* [CVE-2023-37723](CVE-2023/CVE-2023-377xx/CVE-2023-37723.json) (`2023-07-14T00:15:09.707`) -* [CVE-2023-3668](CVE-2023/CVE-2023-36xx/CVE-2023-3668.json) (`2023-07-14T01:15:08.763`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `2` +* [CVE-2022-33324](CVE-2022/CVE-2022-333xx/CVE-2022-33324.json) (`2023-07-14T03:15:08.740`) +* [CVE-2023-34241](CVE-2023/CVE-2023-342xx/CVE-2023-34241.json) (`2023-07-14T03:15:08.927`) ## Download and Usage