Auto-Update: 2025-01-16T07:00:20.672506+00:00

This commit is contained in:
cad-safe-bot 2025-01-16 07:03:45 +00:00
parent a73ceda6af
commit 9b3630828b
6 changed files with 35 additions and 37 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-6942",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2024-01-30T09:15:47.757",
"lastModified": "2024-11-21T08:44:53.183",
"lastModified": "2025-01-16T05:15:07.950",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 and later, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) all versions, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E and later, MT Works2 all versions, MX Component versions 4.00A and later and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to bypass authentication by sending specially crafted packets and connect to the products illegally."
"value": "Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 to 5.92, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) versions 1.320J and prior, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E to 2.102G, MT Works2 versions 1.190Y and prior, MX Component versions 4.00A to 5.007H and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to bypass authentication by sending specially crafted packets and connect to the products illegally."
},
{
"lang": "es",
@ -62,7 +62,7 @@
"weaknesses": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-6943",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2024-01-30T09:15:47.960",
"lastModified": "2024-11-21T08:44:53.360",
"lastModified": "2025-01-16T05:15:09.533",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 and later, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) all versions, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E and later, MT Works2 all versions, MX Component versions 4.00A and later and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to execute a malicious code by RPC with a path to a malicious library while connected to the products."
"value": "Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 to 5.92, GT Designer3 Version1(GOT1000) all versions, GT Designer3 Version1(GOT2000) versions 1.320J and prior, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E to 2.102G, MT Works2 versions 1.190Y and prior, MX Component versions 4.00A to 5.007H and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to execute a malicious code by RPC with a path to a malicious library while connected to the products."
},
{
"lang": "es",
@ -62,7 +62,7 @@
"weaknesses": [
{
"source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-7033",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2024-02-27T04:15:06.473",
"lastModified": "2024-11-21T08:45:05.300",
"lastModified": "2025-01-16T05:15:09.720",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient Resource Pool vulnerability in Ethernet function of Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote attacker to cause a temporary Denial of Service condition for a certain period of time in Ethernet communication of the products by performing TCP SYN Flood attack."
"value": "Insufficient Resource Pool vulnerability in Ethernet function of Mitsubishi Electric Corporation MELSEC iQ-R series CPU module, MELSEC iQ-L series CPU module, MELSEC iQ-R Ethernet Interface Module, MELSEC iQ-R CC-Link IE TSN Master/Local Module, CC-Link IE TSN Remote I/O Module, CC-Link IE TSN Analog-Digital Converter Module, CC-Link IE TSN Digital-Analog Converter Module, CC-Link IE TSN - CC-Link IE Field Network Bridge Module, CC-Link IE TSN - AnyWireASLINK Bridge Module, CC-Link IE TSN FPGA Module, CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY, MELSEC iQ-R Motion Module, MELSEC iQ-L Motion Module, MELSEC iQ-F FX5 Motion Module, MELSEC iQ-F Series CPU module, MELSEC iQ-F Series Ethernet module, MELSEC iQ-F Series Ethernet/IP module, MELSEC iQ-F Series OPC UA Module, MELSEC iQ-F Series CC-Link IE TSN master/local module, GOT2000 Series CC-Link IE TSN Communication Unit, FR-A800-E series inverters, FR-F800-E series inverters, FR-E800-E series inverters, INVERTER CC-Link IE TSN Plug-in option, INVERTER CC-Link IE TSN Safety Plug-in option, INVERTER CC-Link IE TSN communication function built-in type, MR-J5 series AC Servos MELSERVO, MR-JET series AC Servos MELSERVO, MR-MD333G series AC Servos MELSERVO, MR-JE series AC Servos MELSERVO, MELSERVO-J4 AC Servos MELSERVO and Embedded Type Servo System Controller allow a remote attacker to cause a temporary Denial of Service condition for a certain period of time in Ethernet communication of the products by performing TCP SYN Flood attack."
},
{
"lang": "es",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48463",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-04T21:15:04.707",
"lastModified": "2024-11-06T19:35:17.717",
"lastModified": "2025-01-16T06:15:26.940",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -67,6 +67,10 @@
{
"url": "https://www.usebruno.com/changelog",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/fulldisclosure/2025/Jan/6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-16T05:00:27.873866+00:00
2025-01-16T07:00:20.672506+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-16T04:15:08.287000+00:00
2025-01-16T06:15:26.940000+00:00
```
### Last Data Feed Release
@ -38,24 +38,18 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `9`
Recently added CVEs: `0`
- [CVE-2024-10789](CVE-2024/CVE-2024-107xx/CVE-2024-10789.json) (`2025-01-16T04:15:08.127`)
- [CVE-2024-11452](CVE-2024/CVE-2024-114xx/CVE-2024-11452.json) (`2025-01-16T04:15:08.287`)
- [CVE-2025-22904](CVE-2025/CVE-2025-229xx/CVE-2025-22904.json) (`2025-01-16T03:15:06.313`)
- [CVE-2025-22905](CVE-2025/CVE-2025-229xx/CVE-2025-22905.json) (`2025-01-16T03:15:06.430`)
- [CVE-2025-22906](CVE-2025/CVE-2025-229xx/CVE-2025-22906.json) (`2025-01-16T03:15:06.530`)
- [CVE-2025-22907](CVE-2025/CVE-2025-229xx/CVE-2025-22907.json) (`2025-01-16T03:15:06.630`)
- [CVE-2025-22912](CVE-2025/CVE-2025-229xx/CVE-2025-22912.json) (`2025-01-16T03:15:06.723`)
- [CVE-2025-22913](CVE-2025/CVE-2025-229xx/CVE-2025-22913.json) (`2025-01-16T03:15:06.850`)
- [CVE-2025-22916](CVE-2025/CVE-2025-229xx/CVE-2025-22916.json) (`2025-01-16T03:15:06.970`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `4`
- [CVE-2025-0457](CVE-2025/CVE-2025-04xx/CVE-2025-0457.json) (`2025-01-16T02:15:27.553`)
- [CVE-2023-6942](CVE-2023/CVE-2023-69xx/CVE-2023-6942.json) (`2025-01-16T05:15:07.950`)
- [CVE-2023-6943](CVE-2023/CVE-2023-69xx/CVE-2023-6943.json) (`2025-01-16T05:15:09.533`)
- [CVE-2023-7033](CVE-2023/CVE-2023-70xx/CVE-2023-7033.json) (`2025-01-16T05:15:09.720`)
- [CVE-2024-48463](CVE-2024/CVE-2024-484xx/CVE-2024-48463.json) (`2025-01-16T06:15:26.940`)
## Download and Usage

View File

@ -242011,8 +242011,8 @@ CVE-2023-6938,0,0,bf6ce0bd25ccb84e8585516f5f1e96599e70c565d5e6071dfb462f8acaae7a
CVE-2023-6939,0,0,9013c4f20cfa53f9418c260cc38f77fa6695014f1b33d48beba0b416f70e2975,2024-11-21T08:44:52.757000
CVE-2023-6940,0,0,1c68075899f5f28aacff5c0715f7a3755d2bf8d797a66e5c13ff31fd3decf9da,2024-11-21T08:44:52.890000
CVE-2023-6941,0,0,2161dd2689afce97b74cdf5f24ce41a948f3ac2aa7b9fe9ce548fe9f9673b96a,2024-11-21T08:44:53.043000
CVE-2023-6942,0,0,e3eac9be15854abefc989a2e01cd2b43becc96377db4a63912413055ebb2c3cb,2024-11-21T08:44:53.183000
CVE-2023-6943,0,0,bb6fd8b1a5071fe1ff64c8e6bead86d136b045f61616068f93cae1cbcd76b456,2024-11-21T08:44:53.360000
CVE-2023-6942,0,1,63ff759cff72a7fb12664254d3b67e72e27f3864a44d1d149daa963c45a02d79,2025-01-16T05:15:07.950000
CVE-2023-6943,0,1,cf3bf415a18baeec3ddec8dcbf2d7dfeb26dc8235685b2b41a64289b36009776,2025-01-16T05:15:09.533000
CVE-2023-6944,0,0,df2b7229c517209019fce35466d5ffbbde525fb676023ff8b16393577f2b89f6,2024-11-21T08:44:53.520000
CVE-2023-6945,0,0,eee61cdc8cecbbaa6c3be1b94704de1a8c4d868a06c2b4c07233fbc728fc898a,2024-11-21T08:44:53.660000
CVE-2023-6946,0,0,d11da4da13dc038beb075b5af1213743f8b40d251e7b7ea3b52df4c6657ce74d,2024-11-21T08:44:53.810000
@ -242097,7 +242097,7 @@ CVE-2023-7029,0,0,ff4956ed28d25d29eca37970978058cc4c79d9b58f07982222e98f39c0eebb
CVE-2023-7030,0,0,3c0e7e678cd5c617b5ce9677e1be89fed25cef8cbc989aad9df6d54a4663d59b,2024-11-21T08:45:04.850000
CVE-2023-7031,0,0,d56d1f243e4bd6c87e3002c4501e9fe5a78b6fc19e814625316adbaf20b3903f,2024-11-21T08:45:04.987000
CVE-2023-7032,0,0,90028d31b608d7a4d2fc3aaf47e6ddce9fe1fee5eae81e1705864bc5b8e20e15,2024-11-21T08:45:05.137000
CVE-2023-7033,0,0,910f8db060630e17377205b4dd4ef01f142c6966165dd9e87eeb04f37145de01,2024-11-21T08:45:05.300000
CVE-2023-7033,0,1,3740bc13eb2fe0e0616085b4a70bef4c5f396920119b20e38bd7301edafc37d2,2025-01-16T05:15:09.720000
CVE-2023-7035,0,0,9a580e747a6f691e954c5cf866c67d6926e0732ca03645e320728e14627545d3,2024-11-21T08:45:05.527000
CVE-2023-7036,0,0,e8a0ecd56cc1901f1ceaafdfee06a05cea7e8ad945252611e87d6c4ac4ef2ec2,2024-11-21T08:45:05.700000
CVE-2023-7037,0,0,43c6fec2f65f06abfabe29dda4ceaabe11aa4fb5a5ee0860d8c7a05dfe2b8e1a,2024-11-21T08:45:05.857000
@ -243907,7 +243907,7 @@ CVE-2024-10785,0,0,3f01bd087d273daf30380c315f820020814d213e2340745da66061077350c
CVE-2024-10786,0,0,ccc5097d72c9d28e3db11dc281f3f9385330979372f0eb8c07e82e1cc6da99f0,2024-11-18T17:11:17.393000
CVE-2024-10787,0,0,e4342596cadc13376c45fe50690327764f44d01e21796411a0b18745cbef6e4c,2024-12-04T09:15:04.323000
CVE-2024-10788,0,0,62788f949bca5d7e37cdb922f69d1fcd20199b1de5b86ec020525fca7a998fe6,2024-11-21T13:57:24.187000
CVE-2024-10789,1,1,326b4c9cd14597942539e336ac48055d70bbbea16751093a371cdebc8e9b05e9,2025-01-16T04:15:08.127000
CVE-2024-10789,0,0,326b4c9cd14597942539e336ac48055d70bbbea16751093a371cdebc8e9b05e9,2025-01-16T04:15:08.127000
CVE-2024-1079,0,0,076f0d90756c2348b32c6cbe4a55fada41785208b845fa866d02741439c7a75a,2024-11-21T08:49:45.060000
CVE-2024-10790,0,0,6341528a54cdf3270385869d50c1019cff42d20615be0c52b3565e350b691531,2024-11-12T13:55:21.227000
CVE-2024-10791,0,0,ac0a06f123ca4f2a82c8817f0119d46a6b214304ec50f56d301c5704362b7969,2024-11-06T15:05:38.240000
@ -244466,7 +244466,7 @@ CVE-2024-11447,0,0,bd53c50380b55196efb74cff3fad5c24687f184135cfde8b6a52ffe6934cf
CVE-2024-1145,0,0,71ba2561916ff383446b1b9365376abadae467a3a4b7425691a59ca4e4176804,2024-11-21T08:49:54.097000
CVE-2024-11450,0,0,d9225aed2ac8475bb91c6ace69e4cc88aaeb28d7907e757183e21dfd957a870f,2024-12-06T09:15:07.137000
CVE-2024-11451,0,0,1ae0af532d165e743ffcab70ed2c779554ae651574ede2e8a8329313fc3507ad,2024-12-07T02:15:18.117000
CVE-2024-11452,1,1,be6218bb73af4916bcdfb49b679c8c453a76008a24ac12876ba169e1c1829357,2025-01-16T04:15:08.287000
CVE-2024-11452,0,0,be6218bb73af4916bcdfb49b679c8c453a76008a24ac12876ba169e1c1829357,2025-01-16T04:15:08.287000
CVE-2024-11453,0,0,5ddaa320fe1d4d03e381c657f388a7d4f2fbdff28eda17ec4fc3bcaf67d9e87d,2024-12-03T08:15:05.830000
CVE-2024-11454,0,0,54cb66d7c340e670e7be7c1c93e117d3d3f291412c8539746ac6183c30e6034e,2024-12-09T18:15:22.400000
CVE-2024-11455,0,0,2585d76118af0f8584c93ef70fec17184fe9addb803068b4dbf20f8e44717637,2024-11-21T13:57:24.187000
@ -267852,7 +267852,7 @@ CVE-2024-48457,0,0,d6eb8d01e509ef9b22dcdaa634f41366b40afb740c8dfe3efbec542dff95a
CVE-2024-48459,0,0,f2ab7e7f3244c10dbfc979fa6bc201608cff2894282b5a96f254cb41fcce18b6,2024-10-29T20:35:32.737000
CVE-2024-4846,0,0,74d9cb500e6ec3c3eeaefc6b52bb41cb76c1e47820ff2b958b0158c620b5f565,2024-11-21T09:43:43.533000
CVE-2024-48461,0,0,18aa4511ff3360b386c9bf1fdfd51c3ed737ebfb483f16f5fc9298b5d999091e,2024-11-01T12:57:35.843000
CVE-2024-48463,0,0,1903ada97c27caa907bf2f503c17630a02c1e83d664e419cb87c103722376f0b,2024-11-06T19:35:17.717000
CVE-2024-48463,0,1,a9da886d10211a0daa32ff4570d14cee8d4257ed78c329f02f3658c8bd15f25c,2025-01-16T06:15:26.940000
CVE-2024-48465,0,0,86905cef5ebcd2b050652d2c9d8dc0390e1a20f41c011a54752e2071221c8455,2024-10-30T18:35:15.410000
CVE-2024-4847,0,0,c22f0a9897ae48897485c24e89d63816b43b2f4df2bd2f027cb4528747492fd8,2024-11-21T09:43:43.737000
CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000
@ -277052,7 +277052,7 @@ CVE-2025-0447,0,0,138036fe549fb5dfab13974a3a7e47ae79c89eaed414c24b8cf74783a36c14
CVE-2025-0448,0,0,9737e1fa272da2233ef1ed93dd9ff1970ce75261fdc9a589a193db451cacf099,2025-01-15T15:15:16.277000
CVE-2025-0455,0,0,7e0ad5449b041c53f734be428a31bc6a89dc398ea20bdfa939a9fd70a4abf29c,2025-01-16T02:15:27.203000
CVE-2025-0456,0,0,c9c279a8e9b15f51a325b001d98fa11372919fecd3f4fd4a6edf61e03b1f1c0f,2025-01-16T02:15:27.387000
CVE-2025-0457,0,1,405b792def7adc24ffc4fcc8d4e99a3e6be8693d2375d98d328f438c15858c78,2025-01-16T02:15:27.553000
CVE-2025-0457,0,0,405b792def7adc24ffc4fcc8d4e99a3e6be8693d2375d98d328f438c15858c78,2025-01-16T02:15:27.553000
CVE-2025-0458,0,0,45329d1650f63d093b7e8acb76f7370c8c0262fb6197b3161a1f0db17a2920b7,2025-01-14T16:15:34.397000
CVE-2025-0459,0,0,7f66205a9ceec34ce8406cb81bab600a3721d11d4c8a05bee0623fea9fbc9cf7,2025-01-14T16:15:34.617000
CVE-2025-0460,0,0,4ed76bb5f64af8fe8c4011df0eca20c45ae0fdebb5a3f0252615a76ad2d1b042,2025-01-14T16:15:34.800000
@ -277572,13 +277572,13 @@ CVE-2025-22824,0,0,fb201e5b5828770ff11d00a29d3f8e00f0da01f397b44ffb8e7c8ad29623f
CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000
CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000
CVE-2025-22828,0,0,146919e8038c633aebea97dab991ef56f9be23b958183120e0167c3ba087763b,2025-01-13T19:15:11.373000
CVE-2025-22904,1,1,0d689dab7d93efe5e3619f41b65ed2e226865052631c380e622bfad8a4d89cc2,2025-01-16T03:15:06.313000
CVE-2025-22905,1,1,7ce0ff9256a4854fc352d077f3f0c739a33a0a92874bf3c98059151498413642,2025-01-16T03:15:06.430000
CVE-2025-22906,1,1,b430df8a6e6400aee0d0b5dedcfd1ceca5ac91f1415ad22a738e6b90d9215435,2025-01-16T03:15:06.530000
CVE-2025-22907,1,1,3a606e36c0c8fbf9d55b43d449cfe35e7f71d0a76ec87887dc5c5630771d2b0f,2025-01-16T03:15:06.630000
CVE-2025-22912,1,1,9bdac6d997fb4afcd0ffdb49cf15bb2a6d4a40fead5179445a0f3cc7227fc94c,2025-01-16T03:15:06.723000
CVE-2025-22913,1,1,43a94f497f840a978d8316cb659d9517bb656ec1d12ffe55ff10808892909274,2025-01-16T03:15:06.850000
CVE-2025-22916,1,1,49672c014458a546bd5e8ed40fbb9d744fa61afd0b8f15aa50934354bd803c8d,2025-01-16T03:15:06.970000
CVE-2025-22904,0,0,0d689dab7d93efe5e3619f41b65ed2e226865052631c380e622bfad8a4d89cc2,2025-01-16T03:15:06.313000
CVE-2025-22905,0,0,7ce0ff9256a4854fc352d077f3f0c739a33a0a92874bf3c98059151498413642,2025-01-16T03:15:06.430000
CVE-2025-22906,0,0,b430df8a6e6400aee0d0b5dedcfd1ceca5ac91f1415ad22a738e6b90d9215435,2025-01-16T03:15:06.530000
CVE-2025-22907,0,0,3a606e36c0c8fbf9d55b43d449cfe35e7f71d0a76ec87887dc5c5630771d2b0f,2025-01-16T03:15:06.630000
CVE-2025-22912,0,0,9bdac6d997fb4afcd0ffdb49cf15bb2a6d4a40fead5179445a0f3cc7227fc94c,2025-01-16T03:15:06.723000
CVE-2025-22913,0,0,43a94f497f840a978d8316cb659d9517bb656ec1d12ffe55ff10808892909274,2025-01-16T03:15:06.850000
CVE-2025-22916,0,0,49672c014458a546bd5e8ed40fbb9d744fa61afd0b8f15aa50934354bd803c8d,2025-01-16T03:15:06.970000
CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000
CVE-2025-22949,0,0,9276342af8ee37607a1ffae2d3f1aeab3d942e0b55b28a72d519f8d3d1707262,2025-01-14T15:15:28.637000
CVE-2025-22963,0,0,ddb005db611e43367f0caf5873d662acfb7b90267f1a87ba259499e665e1b39e,2025-01-13T16:15:19.367000

Can't render this file because it is too large.