Auto-Update: 2023-08-08T22:00:34.933677+00:00

This commit is contained in:
cad-safe-bot 2023-08-08 22:00:38 +00:00
parent 8d1aafa7a8
commit 07067856fe
28 changed files with 916 additions and 130 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2010-1685",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-05-04T16:00:35.543",
"lastModified": "2010-05-04T16:00:35.543",
"vulnStatus": "Analyzed",
"lastModified": "2023-08-08T20:15:09.693",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -71,9 +71,24 @@
}
],
"references": [
{
"url": "http://osvdb.org/64079",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/39575",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.corelan.be:8800/index.php/forum/security-advisories/corelan-10-031-zip-wrangler-1-20-buffer-overflow/",
"source": "cve@mitre.org"
},
{
"url": "https://seclists.org/fulldisclosure/2010/Apr/331",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,27 +2,89 @@
"id": "CVE-2022-41401",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-04T17:15:09.583",
"lastModified": "2023-08-04T18:53:28.627",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T20:32:08.363",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "OpenRefine <= v3.5.2 contains a Server-Side Request Forgery (SSRF) vulnerability, which permits unauthorized users to exploit the system, potentially leading to unauthorized access to internal resources and sensitive file disclosure."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.5.2",
"matchCriteriaId": "3FBE270B-9569-4301-B543-5FDF33EC15AD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/OpenRefine/OpenRefine/blob/30d6edb7b6586623bda09456c797c35983fb80ff/main/tests/server/src/com/google/refine/importing/ImportingUtilitiesTests.java#L180",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/OpenRefine/OpenRefine/blob/cb55cdfdf6f9ca916839778dc847cce803688998/main/src/com/google/refine/importing/ImportingUtilities.java#L103",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/ixSly/CVE-2022-41401",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0956",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-08-03T19:15:10.323",
"lastModified": "2023-08-04T02:46:03.197",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T20:10:03.717",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -34,18 +54,76 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tel-ster:telwin_scada_webinterface:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.2",
"versionEndExcluding": "6.2",
"matchCriteriaId": "BA0C69E3-ACEB-4DED-B6CD-6EDFCE6FEA9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tel-ster:telwin_scada_webinterface:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0",
"versionEndExcluding": "7.2",
"matchCriteriaId": "5662B55B-7264-48DE-978D-C48A802663A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tel-ster:telwin_scada_webinterface:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A2DFACE5-7AB7-44EC-8384-9EB9B9A95A08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tel-ster:telwin_scada_webinterface:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "41E91A9D-DDA1-45E4-9FED-2F125DFB5B7A"
}
]
}
]
}
],
"references": [
{
"url": "https://cert.pl/posts/2023/07/CVE-2023-0956/",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-03",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.tel-ster.pl/index.php/telwin-scada/nowosci/372-telwin-scada-podatnosc-cve-2023-0956",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20569",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-08-08T18:15:11.530",
"lastModified": "2023-08-08T19:15:09.757",
"lastModified": "2023-08-08T21:15:09.367",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -12,6 +12,10 @@
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/08/08/4",
"source": "psirt@amd.com"
},
{
"url": "http://xenbits.xen.org/xsa/advisory-434.html",
"source": "psirt@amd.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20593",
"sourceIdentifier": "psirt@amd.com",
"published": "2023-07-24T20:15:10.237",
"lastModified": "2023-08-05T04:15:12.187",
"lastModified": "2023-08-08T21:15:10.133",
"vulnStatus": "Modified",
"descriptions": [
{
@ -2066,6 +2066,18 @@
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/08/08/6",
"source": "psirt@amd.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/08/08/7",
"source": "psirt@amd.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/08/08/8",
"source": "psirt@amd.com"
},
{
"url": "http://xenbits.xen.org/xsa/advisory-433.html",
"source": "psirt@amd.com",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-22403",
"sourceIdentifier": "sirt@juniper.net",
"published": "2023-01-13T00:15:10.767",
"lastModified": "2023-01-20T07:57:23.467",
"vulnStatus": "Analyzed",
"lastModified": "2023-08-08T21:15:10.807",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "An Allocation of Resources Without Limits or Throttling vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). On QFX10k Series Inter-Chassis Control Protocol (ICCP) is used in MC-LAG topologies to exchange control information between the devices in the topology. ICCP connection flaps and sync issues will be observed due to excessive specific traffic to the local device. This issue affects Juniper Networks Junos OS: All versions prior to 20.2R3-S7; 20.4 versions prior to 20.4R3-S4; 21.1 versions prior to 21.1R3-S3; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R2."
"value": "\nAn Allocation of Resources Without Limits or Throttling vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS).\n\n\n\nOn QFX10K Series, Inter-Chassis Control Protocol (ICCP) is used in MC-LAG topologies to exchange control information between the devices in the topology. ICCP connection flaps and sync issues will be observed due to excessive specific traffic to the local device.\n\n\n\nThis issue affects Juniper Networks Junos OS on QFX10K Series:\n\n * All versions prior to 20.2R3-S7;\n * 20.4 versions prior to 20.4R3-S4;\n * 21.1 versions prior to 21.1R3-S3;\n * 21.2 versions prior to 21.2R3-S1;\n * 21.3 versions prior to 21.3R3;\n * 21.4 versions prior to 21.4R3;\n * 22.1 versions prior to 22.1R2.\n\n\n\n\n"
}
],
"metrics": {
@ -36,7 +36,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "sirt@juniper.net",
"type": "Primary",
"description": [
{
@ -46,7 +46,7 @@
]
},
{
"source": "sirt@juniper.net",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-26961",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T20:15:10.080",
"lastModified": "2023-08-08T20:39:01.517",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Alteryx Server 2022.1.1.42590 does not employ file type verification for uploaded files. This vulnerability allows attackers to upload arbitrary files by changing the extension of the uploaded file."
}
],
"metrics": {},
"references": [
{
"url": "http://alteryx.com",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/DylanGrl/4269ae834c5d0ec77c9b928ad35d3be3",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,23 +2,83 @@
"id": "CVE-2023-33666",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-03T20:15:11.337",
"lastModified": "2023-08-04T02:46:03.197",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T20:13:33.970",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ai-dev aioptimizedcombinations before v0.1.3 was discovered to contain a SQL injection vulnerability via the component /includes/ajax.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ai-dev:aioptimizedcombinations:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.1.3",
"matchCriteriaId": "192ACB0E-EA9E-4F97-83C6-9553F77434BA"
}
]
}
]
}
],
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2023/08/03/aioptimizedcombinations.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://www.boutique.ai-dev.fr/en/ergonomie/59-optimized-combinations.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35081",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-08-03T18:15:11.303",
"lastModified": "2023-08-04T02:46:03.197",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T20:25:09.337",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2023-07-31",
"cisaActionDue": "2023-08-21",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "support@hackerone.com",
@ -38,10 +60,58 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.8.0",
"versionEndExcluding": "11.8.1.2",
"matchCriteriaId": "A8C4E79F-9A4D-4507-B262-01E475954B92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.9.0",
"versionEndExcluding": "11.9.1.2",
"matchCriteriaId": "5A44EBED-1A3C-4951-B873-4E545F4432A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:endpoint_manager_mobile:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.10.0",
"versionEndExcluding": "11.10.0.3",
"matchCriteriaId": "F07E7E60-A611-4C0D-B5D0-0605D910B0F7"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/CVE-2023-35081-Arbitrary-File-Write?language=en_US",
"source": "support@hackerone.com"
"source": "support@hackerone.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35391",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T19:15:09.940",
"lastModified": "2023-08-08T19:15:09.940",
"vulnStatus": "Received",
"lastModified": "2023-08-08T20:39:01.517",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,23 +2,85 @@
"id": "CVE-2023-36213",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-03T17:15:11.977",
"lastModified": "2023-08-04T02:46:03.197",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T20:39:53.627",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in MotoCMS v.3.4.3 allows a remote attacker to gain privileges via the keyword parameter of the search function."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:motocms:motocms:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2AB7A4D6-633C-40C5-87FF-C0006F41C7D2"
}
]
}
]
}
],
"references": [
{
"url": "https://packetstormsecurity.com/files/172698/MotoCMS-3.4.3-SQL-Injection.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.exploit-db.com/exploits/51504",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-36344",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T20:15:10.170",
"lastModified": "2023-08-08T20:39:01.517",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in Diebold Nixdorf Vynamic View Console v.5.3.1 and before allows a local attacker to execute arbitrary code via not restricting the search path for required DLLs and not verifying the signature."
}
],
"metrics": {},
"references": [
{
"url": "https://packetstormsecurity.com/files/173990/Diebold-Nixdorf-Vynamic-View-Console-5.3.1-DLL-Hijacking.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/view/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-36482",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T20:15:10.230",
"lastModified": "2023-08-08T20:39:01.517",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Samsung NFC S3NRN4V, S3NSN4V, S3NSEN4, SEN82AB, and S3NRN82. A buffer copy without checking its input size can cause an NFC service restart."
}
],
"metrics": {},
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36873",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T19:15:10.057",
"lastModified": "2023-08-08T19:15:10.057",
"vulnStatus": "Received",
"lastModified": "2023-08-08T20:39:01.517",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36899",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T19:15:10.277",
"lastModified": "2023-08-08T19:15:10.277",
"vulnStatus": "Received",
"lastModified": "2023-08-08T20:39:01.517",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38180",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-08-08T19:15:10.367",
"lastModified": "2023-08-08T19:15:10.367",
"vulnStatus": "Received",
"lastModified": "2023-08-08T20:39:01.517",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38494",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-04T16:15:10.177",
"lastModified": "2023-08-04T17:10:50.263",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T20:24:08.943",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,14 +76,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:metersphere:metersphere:*:*:*:*:lts:*:*:*",
"versionEndExcluding": "2.10.4",
"matchCriteriaId": "34BBA850-D024-4FED-9794-74C62218EF49"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/metersphere/metersphere/commit/a23f75d93b666901fd148d834df9384f6f24cf28",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/metersphere/metersphere/security/advisories/GHSA-fjp5-95pv-5253",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-38948",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-03T16:15:12.077",
"lastModified": "2023-08-03T16:56:53.333",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T20:53:51.983",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file download vulnerability in the /c/PluginsController.php component of jizhi CMS 1.9.5 allows attackers to execute arbitrary code via downloading a crafted plugin."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-552"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jizhicms:jizhicms:1.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "07898D32-45C7-4692-AABE-5D7728D8B8B7"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/CTF-hacker/pwn/issues/I7LI4E",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2023-38964",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-04T16:15:10.697",
"lastModified": "2023-08-04T17:10:50.263",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T20:22:36.270",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Creative Item Academy LMS 6.0 was discovered to contain a cross-site scripting (XSS) vulnerability."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:creativeitem:academy_learning_management_system:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6755A0FD-32C7-47DC-AC89-32CDB7A5A082"
}
]
}
]
}
],
"references": [
{
"url": "https://vida03.gitbook.io/redteam/web/cve-2023-38964",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-39086",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T20:15:10.303",
"lastModified": "2023-08-08T20:39:01.517",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "ASUS RT-AC66U B1 3.0.0.4.286_51665 was discovered to transmit sensitive information in cleartext."
}
],
"metrics": {},
"references": [
{
"url": "http://121.41.98.87/2023/08/04/info/",
"source": "cve@mitre.org"
},
{
"url": "http://asus.com",
"source": "cve@mitre.org"
},
{
"url": "http://na.com",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2023-39112",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-04T17:15:11.300",
"lastModified": "2023-08-04T18:53:28.627",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T20:09:47.073",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ECShop v4.1.16 contains an arbitrary file deletion vulnerability in the Admin Panel."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:shopex:ecshop:4.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "4C808BB3-5048-437D-A494-301254A4B578"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Luci4n555/vul_report/blob/master/vul_1.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,23 +2,101 @@
"id": "CVE-2023-39143",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-04T17:15:11.510",
"lastModified": "2023-08-07T18:15:10.093",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-08-08T20:07:16.543",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "PaperCut NG and PaperCut MF before 22.1.3 on Windows allow path traversal, enabling attackers to upload, read, or delete arbitrary files. This leads to remote code execution when external device integration is enabled (a very common configuration)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.1.3",
"matchCriteriaId": "2D1E7B69-F906-49B6-A5AE-BC95E528AB81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.1.3",
"matchCriteriaId": "AE9EEC66-6455-4B4E-879D-7109E6E16199"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.horizon3.ai/cve-2023-39143-papercut-path-traversal-file-upload-rce-vulnerability/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.papercut.com/kb/Main/securitybulletinjuly2023/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39518",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-08T19:15:10.533",
"lastModified": "2023-08-08T19:15:10.533",
"vulnStatus": "Received",
"lastModified": "2023-08-08T20:39:01.517",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39533",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-08T19:15:10.657",
"lastModified": "2023-08-08T19:15:10.657",
"vulnStatus": "Received",
"lastModified": "2023-08-08T20:39:01.517",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40041",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T19:15:10.800",
"lastModified": "2023-08-08T19:15:10.800",
"vulnStatus": "Received",
"lastModified": "2023-08-08T20:39:01.517",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40042",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T19:15:10.873",
"lastModified": "2023-08-08T19:15:10.873",
"vulnStatus": "Received",
"lastModified": "2023-08-08T20:39:01.517",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4158",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-08-04T18:15:17.873",
"lastModified": "2023-08-04T18:53:22.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-08T20:36:47.257",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -46,14 +68,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:omeka:omeka_s:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.3",
"matchCriteriaId": "B619F3B7-C1D9-4056-9C23-8E39B1185F3D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/omeka/omeka-s/commit/2a7fb26452167c8a1d95f207ae5328c6b1b0fcf8",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.dev/bounties/e0e462ae-d7cb-4a84-b6fe-5f5de20e3d15",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-08-08T20:00:34.994278+00:00
2023-08-08T22:00:34.933677+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-08-08T19:58:23.307000+00:00
2023-08-08T21:15:10.807000+00:00
```
### Last Data Feed Release
@ -29,69 +29,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
222103
222107
```
### CVEs added in the last Commit
Recently added CVEs: `99`
Recently added CVEs: `4`
* [CVE-2023-35381](CVE-2023/CVE-2023-353xx/CVE-2023-35381.json) (`2023-08-08T18:15:12.930`)
* [CVE-2023-35382](CVE-2023/CVE-2023-353xx/CVE-2023-35382.json) (`2023-08-08T18:15:13.010`)
* [CVE-2023-35383](CVE-2023/CVE-2023-353xx/CVE-2023-35383.json) (`2023-08-08T18:15:13.093`)
* [CVE-2023-35384](CVE-2023/CVE-2023-353xx/CVE-2023-35384.json) (`2023-08-08T18:15:13.177`)
* [CVE-2023-35385](CVE-2023/CVE-2023-353xx/CVE-2023-35385.json) (`2023-08-08T18:15:13.263`)
* [CVE-2023-35386](CVE-2023/CVE-2023-353xx/CVE-2023-35386.json) (`2023-08-08T18:15:13.343`)
* [CVE-2023-35387](CVE-2023/CVE-2023-353xx/CVE-2023-35387.json) (`2023-08-08T18:15:13.420`)
* [CVE-2023-35388](CVE-2023/CVE-2023-353xx/CVE-2023-35388.json) (`2023-08-08T18:15:13.507`)
* [CVE-2023-20555](CVE-2023/CVE-2023-205xx/CVE-2023-20555.json) (`2023-08-08T18:15:11.173`)
* [CVE-2023-20556](CVE-2023/CVE-2023-205xx/CVE-2023-20556.json) (`2023-08-08T18:15:11.340`)
* [CVE-2023-20561](CVE-2023/CVE-2023-205xx/CVE-2023-20561.json) (`2023-08-08T18:15:11.407`)
* [CVE-2023-20562](CVE-2023/CVE-2023-205xx/CVE-2023-20562.json) (`2023-08-08T18:15:11.467`)
* [CVE-2023-20586](CVE-2023/CVE-2023-205xx/CVE-2023-20586.json) (`2023-08-08T18:15:11.593`)
* [CVE-2023-20588](CVE-2023/CVE-2023-205xx/CVE-2023-20588.json) (`2023-08-08T18:15:11.653`)
* [CVE-2023-20589](CVE-2023/CVE-2023-205xx/CVE-2023-20589.json) (`2023-08-08T18:15:11.717`)
* [CVE-2023-20569](CVE-2023/CVE-2023-205xx/CVE-2023-20569.json) (`2023-08-08T18:15:11.530`)
* [CVE-2023-35391](CVE-2023/CVE-2023-353xx/CVE-2023-35391.json) (`2023-08-08T19:15:09.940`)
* [CVE-2023-36873](CVE-2023/CVE-2023-368xx/CVE-2023-36873.json) (`2023-08-08T19:15:10.057`)
* [CVE-2023-36899](CVE-2023/CVE-2023-368xx/CVE-2023-36899.json) (`2023-08-08T19:15:10.277`)
* [CVE-2023-38180](CVE-2023/CVE-2023-381xx/CVE-2023-38180.json) (`2023-08-08T19:15:10.367`)
* [CVE-2023-38815](CVE-2023/CVE-2023-388xx/CVE-2023-38815.json) (`2023-08-08T19:15:10.463`)
* [CVE-2023-39518](CVE-2023/CVE-2023-395xx/CVE-2023-39518.json) (`2023-08-08T19:15:10.533`)
* [CVE-2023-39533](CVE-2023/CVE-2023-395xx/CVE-2023-39533.json) (`2023-08-08T19:15:10.657`)
* [CVE-2023-40041](CVE-2023/CVE-2023-400xx/CVE-2023-40041.json) (`2023-08-08T19:15:10.800`)
* [CVE-2023-40042](CVE-2023/CVE-2023-400xx/CVE-2023-40042.json) (`2023-08-08T19:15:10.873`)
* [CVE-2023-26961](CVE-2023/CVE-2023-269xx/CVE-2023-26961.json) (`2023-08-08T20:15:10.080`)
* [CVE-2023-36344](CVE-2023/CVE-2023-363xx/CVE-2023-36344.json) (`2023-08-08T20:15:10.170`)
* [CVE-2023-36482](CVE-2023/CVE-2023-364xx/CVE-2023-36482.json) (`2023-08-08T20:15:10.230`)
* [CVE-2023-39086](CVE-2023/CVE-2023-390xx/CVE-2023-39086.json) (`2023-08-08T20:15:10.303`)
### CVEs modified in the last Commit
Recently modified CVEs: `47`
Recently modified CVEs: `23`
* [CVE-2023-36135](CVE-2023/CVE-2023-361xx/CVE-2023-36135.json) (`2023-08-08T19:01:10.757`)
* [CVE-2023-36134](CVE-2023/CVE-2023-361xx/CVE-2023-36134.json) (`2023-08-08T19:01:33.350`)
* [CVE-2023-38952](CVE-2023/CVE-2023-389xx/CVE-2023-38952.json) (`2023-08-08T19:01:48.613`)
* [CVE-2023-38951](CVE-2023/CVE-2023-389xx/CVE-2023-38951.json) (`2023-08-08T19:02:13.353`)
* [CVE-2023-38950](CVE-2023/CVE-2023-389xx/CVE-2023-38950.json) (`2023-08-08T19:02:30.850`)
* [CVE-2023-38949](CVE-2023/CVE-2023-389xx/CVE-2023-38949.json) (`2023-08-08T19:02:37.480`)
* [CVE-2023-30958](CVE-2023/CVE-2023-309xx/CVE-2023-30958.json) (`2023-08-08T19:02:55.393`)
* [CVE-2023-30952](CVE-2023/CVE-2023-309xx/CVE-2023-30952.json) (`2023-08-08T19:03:14.770`)
* [CVE-2023-20204](CVE-2023/CVE-2023-202xx/CVE-2023-20204.json) (`2023-08-08T19:03:28.583`)
* [CVE-2023-3817](CVE-2023/CVE-2023-38xx/CVE-2023-3817.json) (`2023-08-08T19:04:09.103`)
* [CVE-2023-39121](CVE-2023/CVE-2023-391xx/CVE-2023-39121.json) (`2023-08-08T19:04:41.457`)
* [CVE-2023-36884](CVE-2023/CVE-2023-368xx/CVE-2023-36884.json) (`2023-08-08T19:15:10.140`)
* [CVE-2023-3669](CVE-2023/CVE-2023-36xx/CVE-2023-3669.json) (`2023-08-08T19:15:21.743`)
* [CVE-2023-33665](CVE-2023/CVE-2023-336xx/CVE-2023-33665.json) (`2023-08-08T19:26:59.550`)
* [CVE-2023-4145](CVE-2023/CVE-2023-41xx/CVE-2023-4145.json) (`2023-08-08T19:33:04.777`)
* [CVE-2023-4138](CVE-2023/CVE-2023-41xx/CVE-2023-4138.json) (`2023-08-08T19:39:05.930`)
* [CVE-2023-33363](CVE-2023/CVE-2023-333xx/CVE-2023-33363.json) (`2023-08-08T19:49:16.247`)
* [CVE-2023-33377](CVE-2023/CVE-2023-333xx/CVE-2023-33377.json) (`2023-08-08T19:49:32.947`)
* [CVE-2023-33378](CVE-2023/CVE-2023-333xx/CVE-2023-33378.json) (`2023-08-08T19:50:32.190`)
* [CVE-2023-33376](CVE-2023/CVE-2023-333xx/CVE-2023-33376.json) (`2023-08-08T19:51:32.797`)
* [CVE-2023-33375](CVE-2023/CVE-2023-333xx/CVE-2023-33375.json) (`2023-08-08T19:52:05.723`)
* [CVE-2023-33373](CVE-2023/CVE-2023-333xx/CVE-2023-33373.json) (`2023-08-08T19:53:07.920`)
* [CVE-2023-33374](CVE-2023/CVE-2023-333xx/CVE-2023-33374.json) (`2023-08-08T19:53:38.237`)
* [CVE-2023-33372](CVE-2023/CVE-2023-333xx/CVE-2023-33372.json) (`2023-08-08T19:54:55.223`)
* [CVE-2023-25524](CVE-2023/CVE-2023-255xx/CVE-2023-25524.json) (`2023-08-08T19:58:23.307`)
* [CVE-2010-1685](CVE-2010/CVE-2010-16xx/CVE-2010-1685.json) (`2023-08-08T20:15:09.693`)
* [CVE-2022-41401](CVE-2022/CVE-2022-414xx/CVE-2022-41401.json) (`2023-08-08T20:32:08.363`)
* [CVE-2023-39143](CVE-2023/CVE-2023-391xx/CVE-2023-39143.json) (`2023-08-08T20:07:16.543`)
* [CVE-2023-39112](CVE-2023/CVE-2023-391xx/CVE-2023-39112.json) (`2023-08-08T20:09:47.073`)
* [CVE-2023-0956](CVE-2023/CVE-2023-09xx/CVE-2023-0956.json) (`2023-08-08T20:10:03.717`)
* [CVE-2023-33666](CVE-2023/CVE-2023-336xx/CVE-2023-33666.json) (`2023-08-08T20:13:33.970`)
* [CVE-2023-38964](CVE-2023/CVE-2023-389xx/CVE-2023-38964.json) (`2023-08-08T20:22:36.270`)
* [CVE-2023-38494](CVE-2023/CVE-2023-384xx/CVE-2023-38494.json) (`2023-08-08T20:24:08.943`)
* [CVE-2023-35081](CVE-2023/CVE-2023-350xx/CVE-2023-35081.json) (`2023-08-08T20:25:09.337`)
* [CVE-2023-4158](CVE-2023/CVE-2023-41xx/CVE-2023-4158.json) (`2023-08-08T20:36:47.257`)
* [CVE-2023-35391](CVE-2023/CVE-2023-353xx/CVE-2023-35391.json) (`2023-08-08T20:39:01.517`)
* [CVE-2023-36873](CVE-2023/CVE-2023-368xx/CVE-2023-36873.json) (`2023-08-08T20:39:01.517`)
* [CVE-2023-36899](CVE-2023/CVE-2023-368xx/CVE-2023-36899.json) (`2023-08-08T20:39:01.517`)
* [CVE-2023-38180](CVE-2023/CVE-2023-381xx/CVE-2023-38180.json) (`2023-08-08T20:39:01.517`)
* [CVE-2023-39518](CVE-2023/CVE-2023-395xx/CVE-2023-39518.json) (`2023-08-08T20:39:01.517`)
* [CVE-2023-39533](CVE-2023/CVE-2023-395xx/CVE-2023-39533.json) (`2023-08-08T20:39:01.517`)
* [CVE-2023-40041](CVE-2023/CVE-2023-400xx/CVE-2023-40041.json) (`2023-08-08T20:39:01.517`)
* [CVE-2023-40042](CVE-2023/CVE-2023-400xx/CVE-2023-40042.json) (`2023-08-08T20:39:01.517`)
* [CVE-2023-36213](CVE-2023/CVE-2023-362xx/CVE-2023-36213.json) (`2023-08-08T20:39:53.627`)
* [CVE-2023-38948](CVE-2023/CVE-2023-389xx/CVE-2023-38948.json) (`2023-08-08T20:53:51.983`)
* [CVE-2023-20569](CVE-2023/CVE-2023-205xx/CVE-2023-20569.json) (`2023-08-08T21:15:09.367`)
* [CVE-2023-20593](CVE-2023/CVE-2023-205xx/CVE-2023-20593.json) (`2023-08-08T21:15:10.133`)
* [CVE-2023-22403](CVE-2023/CVE-2023-224xx/CVE-2023-22403.json) (`2023-08-08T21:15:10.807`)
## Download and Usage