From 04a1aae75b0d1fdb4cc7096dbcdeb9bf70363e82 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 26 Jul 2023 14:00:29 +0000 Subject: [PATCH] Auto-Update: 2023-07-26T14:00:26.082115+00:00 --- CVE-2022/CVE-2022-25xx/CVE-2022-2502.json | 4 +- CVE-2022/CVE-2022-46xx/CVE-2022-4608.json | 4 +- CVE-2023/CVE-2023-14xx/CVE-2023-1401.json | 4 +- CVE-2023/CVE-2023-208xx/CVE-2023-20891.json | 4 +- CVE-2023/CVE-2023-265xx/CVE-2023-26564.json | 73 +++++++++++++++++++-- CVE-2023/CVE-2023-281xx/CVE-2023-28130.json | 4 +- CVE-2023/CVE-2023-324xx/CVE-2023-32468.json | 4 +- CVE-2023/CVE-2023-370xx/CVE-2023-37049.json | 20 ++++++ CVE-2023/CVE-2023-384xx/CVE-2023-38433.json | 4 +- CVE-2023/CVE-2023-385xx/CVE-2023-38555.json | 4 +- CVE-2023/CVE-2023-386xx/CVE-2023-38647.json | 4 +- CVE-2023/CVE-2023-386xx/CVE-2023-38669.json | 4 +- CVE-2023/CVE-2023-386xx/CVE-2023-38670.json | 4 +- CVE-2023/CVE-2023-386xx/CVE-2023-38671.json | 4 +- CVE-2023/CVE-2023-386xx/CVE-2023-38672.json | 55 ++++++++++++++++ CVE-2023/CVE-2023-386xx/CVE-2023-38673.json | 55 ++++++++++++++++ CVE-2023/CVE-2023-392xx/CVE-2023-39261.json | 55 ++++++++++++++++ CVE-2023/CVE-2023-39xx/CVE-2023-3946.json | 4 +- README.md | 47 +++++++------ 19 files changed, 300 insertions(+), 57 deletions(-) create mode 100644 CVE-2023/CVE-2023-370xx/CVE-2023-37049.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38672.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38673.json create mode 100644 CVE-2023/CVE-2023-392xx/CVE-2023-39261.json diff --git a/CVE-2022/CVE-2022-25xx/CVE-2022-2502.json b/CVE-2022/CVE-2022-25xx/CVE-2022-2502.json index 6c924666fbf..a8195f45456 100644 --- a/CVE-2022/CVE-2022-25xx/CVE-2022-2502.json +++ b/CVE-2022/CVE-2022-25xx/CVE-2022-2502.json @@ -2,8 +2,8 @@ "id": "CVE-2022-2502", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2023-07-26T06:15:09.760", - "lastModified": "2023-07-26T06:15:09.760", - "vulnStatus": "Received", + "lastModified": "2023-07-26T12:53:08.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4608.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4608.json index bf049c85ee4..cf957736b9f 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4608.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4608.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4608", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2023-07-26T06:15:10.220", - "lastModified": "2023-07-26T06:15:10.220", - "vulnStatus": "Received", + "lastModified": "2023-07-26T12:53:08.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1401.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1401.json index 313321fe895..b4ebe24250f 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1401.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1401.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1401", "sourceIdentifier": "cve@gitlab.com", "published": "2023-07-26T07:15:09.103", - "lastModified": "2023-07-26T07:15:09.103", - "vulnStatus": "Received", + "lastModified": "2023-07-26T12:53:08.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20891.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20891.json index 7920cd216cf..b28590ef395 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20891.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20891.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20891", "sourceIdentifier": "security@vmware.com", "published": "2023-07-26T06:15:10.637", - "lastModified": "2023-07-26T06:15:10.637", - "vulnStatus": "Received", + "lastModified": "2023-07-26T12:53:08.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26564.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26564.json index ff548a8cfc5..40dc33b4c0b 100644 --- a/CVE-2023/CVE-2023-265xx/CVE-2023-26564.json +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26564.json @@ -2,27 +2,88 @@ "id": "CVE-2023-26564", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-12T21:15:09.047", - "lastModified": "2023-07-13T08:32:09.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-26T13:58:32.947", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The Syncfusion EJ2 ASPCore File Provider 3ac357f is vulnerable to Models/PhysicalFileProvider.cs directory traversal. As a result, an unauthenticated attacker can list files within a directory, download any file, or upload any file to any directory accessible by the web server." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:syncfusion:ej2_aspcore_file_provider:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E9E184E-DCFE-49C7-97D5-F62AE009D575" + } + ] + } + ] + } + ], "references": [ { "url": "https://ej2.syncfusion.com/documentation/file-manager/file-system-provider/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/RupturaInfoSec/CVE-2023-26563-26564-26565/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/SyncfusionExamples/ej2-aspcore-file-provider", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28130.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28130.json index f3596ab37a4..2dcdc279eb8 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28130.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28130.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28130", "sourceIdentifier": "cve@checkpoint.com", "published": "2023-07-26T11:15:09.550", - "lastModified": "2023-07-26T11:15:09.550", - "vulnStatus": "Received", + "lastModified": "2023-07-26T12:53:08.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32468.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32468.json index 3cc1dd2c6a1..3198162aafb 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32468.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32468.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32468", "sourceIdentifier": "security_alert@emc.com", "published": "2023-07-26T08:15:10.063", - "lastModified": "2023-07-26T08:15:10.063", - "vulnStatus": "Received", + "lastModified": "2023-07-26T12:53:08.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37049.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37049.json new file mode 100644 index 00000000000..98d7f79d1b3 --- /dev/null +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37049.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-37049", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-07-26T13:15:10.173", + "lastModified": "2023-07-26T13:15:10.173", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "emlog 2.1.9 is vulnerable to Arbitrary file deletion via admin\\template.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Num-Nine/CVE/issues/1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38433.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38433.json index b4d273e8a55..daa60adfda1 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38433.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38433.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38433", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-07-26T08:15:10.227", - "lastModified": "2023-07-26T08:15:10.227", - "vulnStatus": "Received", + "lastModified": "2023-07-26T12:53:08.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38555.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38555.json index 568b1aa35e0..0d3f1eabbc7 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38555.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38555.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38555", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-07-26T08:15:10.317", - "lastModified": "2023-07-26T08:15:10.317", - "vulnStatus": "Received", + "lastModified": "2023-07-26T12:53:08.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38647.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38647.json index 6d19c17f31c..796446cf389 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38647.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38647.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38647", "sourceIdentifier": "security@apache.org", "published": "2023-07-26T08:15:10.410", - "lastModified": "2023-07-26T08:15:10.410", - "vulnStatus": "Received", + "lastModified": "2023-07-26T12:53:08.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38669.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38669.json index 07a1ff931f3..946c8b8d19c 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38669.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38669.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38669", "sourceIdentifier": "paddle-security@baidu.com", "published": "2023-07-26T10:15:11.457", - "lastModified": "2023-07-26T10:15:11.457", - "vulnStatus": "Received", + "lastModified": "2023-07-26T12:53:08.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38670.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38670.json index 4e061f7575a..48e8f9261bd 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38670.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38670.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38670", "sourceIdentifier": "paddle-security@baidu.com", "published": "2023-07-26T11:15:09.633", - "lastModified": "2023-07-26T11:15:09.633", - "vulnStatus": "Received", + "lastModified": "2023-07-26T12:53:08.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38671.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38671.json index 43da2b63f75..0156d818fd0 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38671.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38671.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38671", "sourceIdentifier": "paddle-security@baidu.com", "published": "2023-07-26T11:15:09.707", - "lastModified": "2023-07-26T11:15:09.707", - "vulnStatus": "Received", + "lastModified": "2023-07-26T12:53:08.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38672.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38672.json new file mode 100644 index 00000000000..5494c3cc1b0 --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38672.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38672", + "sourceIdentifier": "paddle-security@baidu.com", + "published": "2023-07-26T12:15:09.563", + "lastModified": "2023-07-26T12:53:08.817", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "FPE in paddle.trace in PaddlePaddle before 2.5.0. This flaw can cause a runtime crash and a denial of service.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "paddle-security@baidu.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "paddle-security@baidu.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-369" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-004.md", + "source": "paddle-security@baidu.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38673.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38673.json new file mode 100644 index 00000000000..0dbb75e4c2a --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38673.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-38673", + "sourceIdentifier": "paddle-security@baidu.com", + "published": "2023-07-26T12:15:09.640", + "lastModified": "2023-07-26T12:53:08.817", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "PaddlePaddle before 2.5.0 has a command injection in fs.py. This resulted in\u00a0the ability to execute arbitrary commands on the operating system.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "paddle-security@baidu.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "paddle-security@baidu.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-005.md", + "source": "paddle-security@baidu.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39261.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39261.json new file mode 100644 index 00000000000..33e0e33f17c --- /dev/null +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39261.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-39261", + "sourceIdentifier": "security@jetbrains.com", + "published": "2023-07-26T13:15:10.233", + "lastModified": "2023-07-26T13:15:10.233", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains IntelliJ IDEA before 2023.2 plugin for Space was requesting excessive permissions" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "security@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3946.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3946.json index 61f1f5dc410..a490d3d9f5c 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3946.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3946.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3946", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2023-07-26T06:15:11.080", - "lastModified": "2023-07-26T06:15:11.080", - "vulnStatus": "Received", + "lastModified": "2023-07-26T12:53:08.817", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 4549491f33d..6d827ad0cfd 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-07-26T12:00:27.390467+00:00 +2023-07-26T14:00:26.082115+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-07-26T11:15:09.707000+00:00 +2023-07-26T13:58:32.947000+00:00 ``` ### Last Data Feed Release @@ -29,40 +29,37 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -221050 +221054 ``` ### CVEs added in the last Commit Recently added CVEs: `4` -* [CVE-2023-38669](CVE-2023/CVE-2023-386xx/CVE-2023-38669.json) (`2023-07-26T10:15:11.457`) -* [CVE-2023-28130](CVE-2023/CVE-2023-281xx/CVE-2023-28130.json) (`2023-07-26T11:15:09.550`) -* [CVE-2023-38670](CVE-2023/CVE-2023-386xx/CVE-2023-38670.json) (`2023-07-26T11:15:09.633`) -* [CVE-2023-38671](CVE-2023/CVE-2023-386xx/CVE-2023-38671.json) (`2023-07-26T11:15:09.707`) +* [CVE-2023-38672](CVE-2023/CVE-2023-386xx/CVE-2023-38672.json) (`2023-07-26T12:15:09.563`) +* [CVE-2023-38673](CVE-2023/CVE-2023-386xx/CVE-2023-38673.json) (`2023-07-26T12:15:09.640`) +* [CVE-2023-37049](CVE-2023/CVE-2023-370xx/CVE-2023-37049.json) (`2023-07-26T13:15:10.173`) +* [CVE-2023-39261](CVE-2023/CVE-2023-392xx/CVE-2023-39261.json) (`2023-07-26T13:15:10.233`) ### CVEs modified in the last Commit -Recently modified CVEs: `17` +Recently modified CVEs: `14` -* [CVE-2023-1547](CVE-2023/CVE-2023-15xx/CVE-2023-1547.json) (`2023-07-26T10:15:09.940`) -* [CVE-2023-1803](CVE-2023/CVE-2023-18xx/CVE-2023-1803.json) (`2023-07-26T10:15:10.057`) -* [CVE-2023-1833](CVE-2023/CVE-2023-18xx/CVE-2023-1833.json) (`2023-07-26T10:15:10.173`) -* [CVE-2023-2703](CVE-2023/CVE-2023-27xx/CVE-2023-2703.json) (`2023-07-26T10:15:10.277`) -* [CVE-2023-2712](CVE-2023/CVE-2023-27xx/CVE-2023-2712.json) (`2023-07-26T10:15:10.397`) -* [CVE-2023-2713](CVE-2023/CVE-2023-27xx/CVE-2023-2713.json) (`2023-07-26T10:15:10.510`) -* [CVE-2023-2851](CVE-2023/CVE-2023-28xx/CVE-2023-2851.json) (`2023-07-26T10:15:10.630`) -* [CVE-2023-2882](CVE-2023/CVE-2023-28xx/CVE-2023-2882.json) (`2023-07-26T10:15:10.750`) -* [CVE-2023-2884](CVE-2023/CVE-2023-28xx/CVE-2023-2884.json) (`2023-07-26T10:15:10.860`) -* [CVE-2023-2885](CVE-2023/CVE-2023-28xx/CVE-2023-2885.json) (`2023-07-26T10:15:10.963`) -* [CVE-2023-2886](CVE-2023/CVE-2023-28xx/CVE-2023-2886.json) (`2023-07-26T10:15:11.063`) -* [CVE-2023-2887](CVE-2023/CVE-2023-28xx/CVE-2023-2887.json) (`2023-07-26T10:15:11.163`) -* [CVE-2023-2958](CVE-2023/CVE-2023-29xx/CVE-2023-2958.json) (`2023-07-26T10:15:11.257`) -* [CVE-2023-35069](CVE-2023/CVE-2023-350xx/CVE-2023-35069.json) (`2023-07-26T10:15:11.360`) -* [CVE-2023-3048](CVE-2023/CVE-2023-30xx/CVE-2023-3048.json) (`2023-07-26T10:15:11.547`) -* [CVE-2023-3049](CVE-2023/CVE-2023-30xx/CVE-2023-3049.json) (`2023-07-26T10:15:11.660`) -* [CVE-2023-3319](CVE-2023/CVE-2023-33xx/CVE-2023-3319.json) (`2023-07-26T10:15:11.750`) +* [CVE-2022-2502](CVE-2022/CVE-2022-25xx/CVE-2022-2502.json) (`2023-07-26T12:53:08.817`) +* [CVE-2022-4608](CVE-2022/CVE-2022-46xx/CVE-2022-4608.json) (`2023-07-26T12:53:08.817`) +* [CVE-2023-20891](CVE-2023/CVE-2023-208xx/CVE-2023-20891.json) (`2023-07-26T12:53:08.817`) +* [CVE-2023-3946](CVE-2023/CVE-2023-39xx/CVE-2023-3946.json) (`2023-07-26T12:53:08.817`) +* [CVE-2023-1401](CVE-2023/CVE-2023-14xx/CVE-2023-1401.json) (`2023-07-26T12:53:08.817`) +* [CVE-2023-32468](CVE-2023/CVE-2023-324xx/CVE-2023-32468.json) (`2023-07-26T12:53:08.817`) +* [CVE-2023-38433](CVE-2023/CVE-2023-384xx/CVE-2023-38433.json) (`2023-07-26T12:53:08.817`) +* [CVE-2023-38555](CVE-2023/CVE-2023-385xx/CVE-2023-38555.json) (`2023-07-26T12:53:08.817`) +* [CVE-2023-38647](CVE-2023/CVE-2023-386xx/CVE-2023-38647.json) (`2023-07-26T12:53:08.817`) +* [CVE-2023-38669](CVE-2023/CVE-2023-386xx/CVE-2023-38669.json) (`2023-07-26T12:53:08.817`) +* [CVE-2023-28130](CVE-2023/CVE-2023-281xx/CVE-2023-28130.json) (`2023-07-26T12:53:08.817`) +* [CVE-2023-38670](CVE-2023/CVE-2023-386xx/CVE-2023-38670.json) (`2023-07-26T12:53:08.817`) +* [CVE-2023-38671](CVE-2023/CVE-2023-386xx/CVE-2023-38671.json) (`2023-07-26T12:53:08.817`) +* [CVE-2023-26564](CVE-2023/CVE-2023-265xx/CVE-2023-26564.json) (`2023-07-26T13:58:32.947`) ## Download and Usage