Auto-Update: 2023-07-07T06:00:34.818242+00:00

This commit is contained in:
cad-safe-bot 2023-07-07 06:00:38 +00:00
parent cfd8589a30
commit 758bdd283e
4 changed files with 22 additions and 35 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-1424",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2023-05-24T05:15:08.780",
"lastModified": "2023-06-06T20:04:55.843",
"vulnStatus": "Analyzed",
"lastModified": "2023-07-07T04:15:10.070",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution."
"value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules and MELSEC iQ-R Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution."
}
],
"metrics": {
@ -1154,15 +1154,6 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1727",
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33246",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-24T15:15:09.553",
"lastModified": "2023-05-31T19:23:11.830",
"vulnStatus": "Analyzed",
"lastModified": "2023-07-07T04:15:10.480",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -65,6 +65,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/173339/Apache-RocketMQ-5.1.0-Arbitrary-Code-Injection.html",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/1s8j2c8kogthtpv3060yddk03zq0pxyp",
"source": "security@apache.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33592",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-28T20:15:09.593",
"lastModified": "2023-07-06T15:36:37.120",
"vulnStatus": "Analyzed",
"lastModified": "2023-07-07T04:15:10.590",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -64,6 +64,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/173331/Lost-And-Found-Information-System-1.0-SQL-Injection.html",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/DARSHANAGUPTA10/CVE/blob/main/CVE-2023-33592",
"source": "cve@mitre.org",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-07-07T04:00:32.226844+00:00
2023-07-07T06:00:34.818242+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-07-07T03:42:58.847000+00:00
2023-07-07T04:15:10.590000+00:00
```
### Last Data Feed Release
@ -34,29 +34,17 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `0`
* [CVE-2023-35890](CVE-2023/CVE-2023-358xx/CVE-2023-35890.json) (`2023-07-07T03:15:09.243`)
* [CVE-2023-3532](CVE-2023/CVE-2023-35xx/CVE-2023-3532.json) (`2023-07-07T03:15:09.360`)
### CVEs modified in the last Commit
Recently modified CVEs: `13`
Recently modified CVEs: `3`
* [CVE-2020-36745](CVE-2020/CVE-2020-367xx/CVE-2020-36745.json) (`2023-07-07T03:40:15.570`)
* [CVE-2020-36744](CVE-2020/CVE-2020-367xx/CVE-2020-36744.json) (`2023-07-07T03:40:24.520`)
* [CVE-2020-36743](CVE-2020/CVE-2020-367xx/CVE-2020-36743.json) (`2023-07-07T03:40:40.173`)
* [CVE-2020-36742](CVE-2020/CVE-2020-367xx/CVE-2020-36742.json) (`2023-07-07T03:40:47.073`)
* [CVE-2020-36741](CVE-2020/CVE-2020-367xx/CVE-2020-36741.json) (`2023-07-07T03:40:53.450`)
* [CVE-2020-36740](CVE-2020/CVE-2020-367xx/CVE-2020-36740.json) (`2023-07-07T03:41:05.177`)
* [CVE-2021-4387](CVE-2021/CVE-2021-43xx/CVE-2021-4387.json) (`2023-07-07T03:41:12.840`)
* [CVE-2021-4385](CVE-2021/CVE-2021-43xx/CVE-2021-4385.json) (`2023-07-07T03:41:59.283`)
* [CVE-2021-4384](CVE-2021/CVE-2021-43xx/CVE-2021-4384.json) (`2023-07-07T03:42:10.610`)
* [CVE-2021-4386](CVE-2021/CVE-2021-43xx/CVE-2021-4386.json) (`2023-07-07T03:42:58.847`)
* [CVE-2023-3491](CVE-2023/CVE-2023-34xx/CVE-2023-3491.json) (`2023-07-07T03:19:34.877`)
* [CVE-2023-37304](CVE-2023/CVE-2023-373xx/CVE-2023-37304.json) (`2023-07-07T03:38:30.963`)
* [CVE-2023-37302](CVE-2023/CVE-2023-373xx/CVE-2023-37302.json) (`2023-07-07T03:38:52.823`)
* [CVE-2023-1424](CVE-2023/CVE-2023-14xx/CVE-2023-1424.json) (`2023-07-07T04:15:10.070`)
* [CVE-2023-33246](CVE-2023/CVE-2023-332xx/CVE-2023-33246.json) (`2023-07-07T04:15:10.480`)
* [CVE-2023-33592](CVE-2023/CVE-2023-335xx/CVE-2023-33592.json) (`2023-07-07T04:15:10.590`)
## Download and Usage