mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-09 03:57:14 +00:00
Auto-Update: 2023-07-07T06:00:34.818242+00:00
This commit is contained in:
parent
cfd8589a30
commit
758bdd283e
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-1424",
|
||||
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"published": "2023-05-24T05:15:08.780",
|
||||
"lastModified": "2023-06-06T20:04:55.843",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-07-07T04:15:10.070",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution."
|
||||
"value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules and MELSEC iQ-R Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -1154,15 +1154,6 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1727",
|
||||
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Technical Description",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33246",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-24T15:15:09.553",
|
||||
"lastModified": "2023-05-31T19:23:11.830",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-07-07T04:15:10.480",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -65,6 +65,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/173339/Apache-RocketMQ-5.1.0-Arbitrary-Code-Injection.html",
|
||||
"source": "security@apache.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp",
|
||||
"source": "security@apache.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33592",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-28T20:15:09.593",
|
||||
"lastModified": "2023-07-06T15:36:37.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-07-07T04:15:10.590",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -64,6 +64,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/173331/Lost-And-Found-Information-System-1.0-SQL-Injection.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/DARSHANAGUPTA10/CVE/blob/main/CVE-2023-33592",
|
||||
"source": "cve@mitre.org",
|
||||
|
26
README.md
26
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-07-07T04:00:32.226844+00:00
|
||||
2023-07-07T06:00:34.818242+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-07-07T03:42:58.847000+00:00
|
||||
2023-07-07T04:15:10.590000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -34,29 +34,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
* [CVE-2023-35890](CVE-2023/CVE-2023-358xx/CVE-2023-35890.json) (`2023-07-07T03:15:09.243`)
|
||||
* [CVE-2023-3532](CVE-2023/CVE-2023-35xx/CVE-2023-3532.json) (`2023-07-07T03:15:09.360`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `13`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
* [CVE-2020-36745](CVE-2020/CVE-2020-367xx/CVE-2020-36745.json) (`2023-07-07T03:40:15.570`)
|
||||
* [CVE-2020-36744](CVE-2020/CVE-2020-367xx/CVE-2020-36744.json) (`2023-07-07T03:40:24.520`)
|
||||
* [CVE-2020-36743](CVE-2020/CVE-2020-367xx/CVE-2020-36743.json) (`2023-07-07T03:40:40.173`)
|
||||
* [CVE-2020-36742](CVE-2020/CVE-2020-367xx/CVE-2020-36742.json) (`2023-07-07T03:40:47.073`)
|
||||
* [CVE-2020-36741](CVE-2020/CVE-2020-367xx/CVE-2020-36741.json) (`2023-07-07T03:40:53.450`)
|
||||
* [CVE-2020-36740](CVE-2020/CVE-2020-367xx/CVE-2020-36740.json) (`2023-07-07T03:41:05.177`)
|
||||
* [CVE-2021-4387](CVE-2021/CVE-2021-43xx/CVE-2021-4387.json) (`2023-07-07T03:41:12.840`)
|
||||
* [CVE-2021-4385](CVE-2021/CVE-2021-43xx/CVE-2021-4385.json) (`2023-07-07T03:41:59.283`)
|
||||
* [CVE-2021-4384](CVE-2021/CVE-2021-43xx/CVE-2021-4384.json) (`2023-07-07T03:42:10.610`)
|
||||
* [CVE-2021-4386](CVE-2021/CVE-2021-43xx/CVE-2021-4386.json) (`2023-07-07T03:42:58.847`)
|
||||
* [CVE-2023-3491](CVE-2023/CVE-2023-34xx/CVE-2023-3491.json) (`2023-07-07T03:19:34.877`)
|
||||
* [CVE-2023-37304](CVE-2023/CVE-2023-373xx/CVE-2023-37304.json) (`2023-07-07T03:38:30.963`)
|
||||
* [CVE-2023-37302](CVE-2023/CVE-2023-373xx/CVE-2023-37302.json) (`2023-07-07T03:38:52.823`)
|
||||
* [CVE-2023-1424](CVE-2023/CVE-2023-14xx/CVE-2023-1424.json) (`2023-07-07T04:15:10.070`)
|
||||
* [CVE-2023-33246](CVE-2023/CVE-2023-332xx/CVE-2023-33246.json) (`2023-07-07T04:15:10.480`)
|
||||
* [CVE-2023-33592](CVE-2023/CVE-2023-335xx/CVE-2023-33592.json) (`2023-07-07T04:15:10.590`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user