Auto-Update: 2023-11-09T23:00:18.752024+00:00

This commit is contained in:
cad-safe-bot 2023-11-09 23:00:22 +00:00
parent 736e6b6d72
commit 2adcc67bad
39 changed files with 1560 additions and 155 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-28407",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T04:15:15.447",
"lastModified": "2023-11-03T13:22:51.977",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-09T21:42:24.177",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,19 +14,88 @@
"value": "En swtpm anterior a 0.4.2 y 0.5.x anterior a 0.5.1, un atacante local podr\u00eda sobrescribir archivos arbitrarios mediante un ataque de enlace simb\u00f3lico contra un archivo temporal como TMP2-00.permall."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:swtpm_project:swtpm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.4.2",
"matchCriteriaId": "A28C4936-308A-411B-AB1A-8BEFFCD5EDE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:swtpm_project:swtpm:0.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "205711EB-43BF-493A-B297-3FC5B3014B15"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1198395",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/stefanberger/swtpm/releases/tag/v0.4.2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/stefanberger/swtpm/releases/tag/v0.5.1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-41076",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-12-13T19:15:11.957",
"lastModified": "2022-12-15T21:51:17.383",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-09T22:15:09.223",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "PowerShell Remote Code Execution Vulnerability."
"value": "PowerShell Remote Code Execution Vulnerability"
}
],
"metrics": {

View File

@ -2,23 +2,23 @@
"id": "CVE-2022-41089",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-12-13T19:15:12.090",
"lastModified": "2023-10-15T16:18:45.880",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-09T22:15:09.370",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": ".NET Framework Remote Code Execution Vulnerability."
"value": ".NET Framework Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
@ -26,10 +26,10 @@
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-41115",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-12-13T19:15:12.217",
"lastModified": "2023-05-03T12:16:28.143",
"lastModified": "2023-11-09T22:15:09.610",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability."
"value": "Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability"
}
],
"metrics": {
@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-41121",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-12-13T19:15:12.277",
"lastModified": "2022-12-15T21:45:58.363",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-09T22:15:09.700",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Graphics Component Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-44671, CVE-2022-44680, CVE-2022-44697."
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"
}
],
"metrics": {

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-44689",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-12-13T19:15:13.823",
"lastModified": "2022-12-16T14:33:13.527",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-09T22:15:10.077",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability."
"value": "Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability"
}
],
"metrics": {

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-44702",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-12-13T19:15:14.540",
"lastModified": "2022-12-16T17:21:13.650",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-09T22:15:10.273",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Terminal Remote Code Execution Vulnerability."
"value": "Windows Terminal Remote Code Execution Vulnerability"
}
],
"metrics": {
@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-44704",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-12-13T19:15:14.603",
"lastModified": "2022-12-16T16:03:58.957",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-09T22:15:10.347",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Windows Sysmon Elevation of Privilege Vulnerability."
"value": "Microsoft Windows System Monitor (Sysmon) Elevation of Privilege Vulnerability"
}
],
"metrics": {

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-44708",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-12-13T19:15:14.733",
"lastModified": "2023-05-03T12:16:30.650",
"lastModified": "2023-11-09T22:15:10.447",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability."
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability"
}
],
"metrics": {
@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-1720",
"sourceIdentifier": "info@starlabs.sg",
"published": "2023-11-01T10:15:09.440",
"lastModified": "2023-11-01T12:51:08.910",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-09T21:12:21.233",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Lack of mime type response header in Bitrix24 22.0.300 allows authenticated remote attackers to execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via uploading a crafted HTML file through /desktop_app/file.ajax.php?action=uploadfile."
},
{
"lang": "es",
"value": "La falta de un encabezado de respuesta de tipo mime en Bitrix24 22.0.300 permite a atacantes remotos autenticados ejecutar c\u00f3digo JavaScript arbitrario en el navegador de la v\u00edctima, y posiblemente ejecutar c\u00f3digo PHP arbitrario en el servidor si la v\u00edctima tiene privilegios de administrador, cargando un archivo HTML manipulado a trav\u00e9s de /desktop_app /file.ajax.php?action=uploadfile."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
},
{
"source": "info@starlabs.sg",
"type": "Secondary",
@ -35,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
},
{
"source": "info@starlabs.sg",
"type": "Secondary",
@ -46,10 +80,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bitrix24:bitrix24:22.0.300:*:*:*:*:*:*:*",
"matchCriteriaId": "D47D6185-F86F-4402-85C1-C0A0EAE09B0D"
}
]
}
]
}
],
"references": [
{
"url": "https://starlabs.sg/advisories/23/23-1720/",
"source": "info@starlabs.sg"
"source": "info@starlabs.sg",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-29975",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-09T22:15:10.583",
"lastModified": "2023-11-09T22:15:10.583",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue discovered in Pfsense CE version 2.6.0 allows attackers to change the password of any user without verification."
}
],
"metrics": {},
"references": [
{
"url": "https://www.esecforte.com/cve-2023-29975-unverified-password-changed/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31579",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T22:15:08.640",
"lastModified": "2023-11-03T13:22:46.340",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-09T21:17:52.387",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,76 @@
"value": "Se descubri\u00f3 que Dromara Lamp-Cloud anterior a v3.8.1 utiliza una clave criptogr\u00e1fica codificada al crear y verificar un Token Web Json. Esta vulnerabilidad permite a los atacantes autenticarse en la aplicaci\u00f3n mediante un token JWT manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tangyh:lamp-cloud:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.8.1",
"matchCriteriaId": "D2219072-7E2E-4806-9D8B-32064FA47067"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dromara/lamp-cloud/issues/183",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://github.com/xubowenW/JWTissues/blob/main/lamp%20issue.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-32512",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T22:15:10.633",
"lastModified": "2023-11-09T22:15:10.633",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in ShortPixel ShortPixel Adaptive Images \u2013 WebP, AVIF, CDN, Image Optimization plugin <=\u00a03.7.1 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/shortpixel-adaptive-images/wordpress-shortpixel-adaptive-images-webp-avif-cdn-image-optimization-plugin-3-7-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-32579",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T22:15:10.730",
"lastModified": "2023-11-09T22:15:10.730",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Designs & Code Forget About Shortcode Buttons plugin <=\u00a02.1.2 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/forget-about-shortcode-buttons/wordpress-forget-about-shortcode-buttons-plugin-2-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-32587",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T22:15:10.817",
"lastModified": "2023-11-09T22:15:10.817",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WP Reactions, LLC WP Reactions Lite plugin <=\u00a01.3.8 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-reactions-lite/wordpress-wp-reactions-lite-plugin-1-3-8-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-32592",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T22:15:10.900",
"lastModified": "2023-11-09T22:15:10.900",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Palasthotel by Edward Bock, Katharina Rompf Sunny Search plugin <=\u00a01.0.2 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/fast-search-powered-by-solr/wordpress-sunny-search-plugin-1-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-32594",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.090",
"lastModified": "2023-11-09T21:15:24.090",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Benedict B., Maciej Gryniuk Hyphenator plugin <=\u00a05.1.5 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/hyphenator/wordpress-hyphenator-plugin-5-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-32602",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.180",
"lastModified": "2023-11-09T21:15:24.180",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in LOKALYZE CALL ME NOW plugin <=\u00a03.0 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/lokalyze-call-now/wordpress-call-me-now-plugin-3-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-32739",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.270",
"lastModified": "2023-11-09T21:15:24.270",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Web_Trendy WP Custom Cursors | WordPress Cursor Plugin plugin <\u00a03.2 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-custom-cursors/wordpress-wp-custom-cursors-plugin-3-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-32744",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.370",
"lastModified": "2023-11-09T21:15:24.370",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce Product Recommendations plugin <=\u00a02.3.0 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-product-recommendations/wordpress-woocommerce-product-recommendations-plugin-2-3-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-32745",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.463",
"lastModified": "2023-11-09T21:15:24.463",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce AutomateWoo plugin <=\u00a05.7.1 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/automatewoo/wordpress-automatewoo-plugin-5-7-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-32794",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.553",
"lastModified": "2023-11-09T21:15:24.553",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce Product Add-Ons plugin <=\u00a06.1.3 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-product-addons/wordpress-woocommerce-product-add-ons-plugin-6-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-34024",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.647",
"lastModified": "2023-11-09T21:15:24.647",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Guillemant David WP Full Auto Tags Manager plugin <=\u00a02.2 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-full-auto-tags-manager/wordpress-wp-full-auto-tags-manager-plugin-2-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-34025",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.740",
"lastModified": "2023-11-09T21:15:24.740",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in LWS LWS Hide Login plugin <=\u00a02.1.6 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/lws-hide-login/wordpress-lws-hide-login-plugin-2-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-34031",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.827",
"lastModified": "2023-11-09T21:15:24.827",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Pascal Casier bbPress Toolkit plugin <=\u00a01.0.12 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/bbp-toolkit/wordpress-bbpress-toolkit-plugin-1-0-12-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36621",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T04:15:21.083",
"lastModified": "2023-11-03T13:22:46.340",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-09T21:55:49.257",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,19 +14,82 @@
"value": "Se descubri\u00f3 un problema en la aplicaci\u00f3n Boomerang Parental Control hasta la versi\u00f3n 13.83 para Android. El ni\u00f1o puede utilizar el Modo Seguro para eliminar temporalmente todas las restricciones o desinstalar la aplicaci\u00f3n sin que los padres se den cuenta."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nationaledtech:boomerang:*:*:*:*:*:android:*:*",
"versionEndExcluding": "13.83",
"matchCriteriaId": "089758F0-76D9-4112-BD0E-30126923EFE1"
}
]
}
]
}
],
"references": [
{
"url": "https://sec-consult.com/blog/detail/the-hidden-costs-of-parental-control-apps/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://seclists.org/fulldisclosure/2023/Jul/12",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://useboomerang.com/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41343",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2023-11-03T05:15:29.583",
"lastModified": "2023-11-03T13:22:57.130",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-09T21:59:36.353",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
@ -50,10 +80,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ragic:enterprise_cloud_database:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A6FFCBE-8253-42C0-8196-D875A952AB25"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/tw/cp-132-7509-5b734-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41914",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T05:15:30.000",
"lastModified": "2023-11-07T04:21:08.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-09T22:11:29.870",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,19 +14,106 @@
"value": "SchedMD Slurm 23.02.x anterior al 23.02.6 y 22.05.x anterior al 22.05.10 permite condiciones de ejecuci\u00f3n del sistema de archivos para obtener la propiedad de un archivo, sobrescribir un archivo o eliminar archivos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:schedmd:slurm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "22.05",
"versionEndExcluding": "22.05.10",
"matchCriteriaId": "19A18E74-8CD9-48E1-9E87-B2131E4A2287"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:schedmd:slurm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.02",
"versionEndExcluding": "23.02.6",
"matchCriteriaId": "CBD283CA-90F8-4A9B-A857-2EFC0031F0F1"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
}
]
}
]
}
],
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OWKTCYZT3DXEH66QXQJYB7NI7ONDRS4M/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.schedmd.com/pipermail/slurm-announce/2023/000100.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "https://schedmd.com/security.php",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43982",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T05:15:30.093",
"lastModified": "2023-11-03T13:22:46.340",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-09T22:07:27.420",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,68 @@
"value": "Se descubri\u00f3 que Bon Presta boninstagramcarousel entre v5.2.1 y v7.0.0 conten\u00eda Server-Side Request Forgery (SSRF) a trav\u00e9s del par\u00e1metro url en insta_parser.php. Esta vulnerabilidad permite a los atacantes utilizar el sitio web vulnerable como proxy para atacar otros sitios web o extraer datos mediante una llamada HTTP."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bontheme:socialfeed_-_photos_\\&_video_using_instagram_api:*:*:*:*:*:prestashop:*:*",
"versionStartIncluding": "5.2.1",
"versionEndExcluding": "7.0.0",
"matchCriteriaId": "DE3D54C2-5497-4EF9-9252-3DD2D8F31E9F"
}
]
}
]
}
],
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2023/11/02/boninstagramcarousel.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-4379",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-11-09T21:15:24.930",
"lastModified": "2023-11-09T21:15:24.930",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue has been discovered in GitLab EE affecting all versions starting from 15.3 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. Code owner approval was not removed from merge requests when the target branch was updated."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "cve@gitlab.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/415496",
"source": "cve@gitlab.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44271",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T05:15:30.137",
"lastModified": "2023-11-03T13:22:46.340",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-09T22:01:30.133",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,19 +14,81 @@
"value": "Se descubri\u00f3 un problema en Pillow antes de la versi\u00f3n 10.0.0. Es una Denegaci\u00f3n de Servicio que asigna memoria de forma incontrolable para procesar una tarea determinada, lo que puede provocar que un servicio falle al quedarse sin memoria. Esto ocurre para truetype en ImageFont cuando la longitud del texto en una instancia de ImageDraw opera con un argumento de texto largo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.0",
"matchCriteriaId": "70ADC73C-9DBB-4903-B4E9-6C2354F2F07A"
}
]
}
]
}
],
"references": [
{
"url": "https://devhub.checkmarx.com/cve-details/CVE-2023-44271/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/python-pillow/Pillow/commit/1fe1bb49c452b0318cad12ea9d97c3bef188e9a7",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/python-pillow/Pillow/pull/7244",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45360",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T05:15:30.730",
"lastModified": "2023-11-03T13:22:46.340",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-09T22:18:24.930",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,87 @@
"value": "Se descubri\u00f3 un problema en MediaWiki antes de 1.35.12, 1.36.x hasta 1.39.x antes de 1.39.5 y 1.40.x antes de 1.40.1. Hay XSS en youhavenewmessagesmanyusers y youhavenewmessages i18n mensajes. Esto est\u00e1 relacionado con MediaWiki: Youhavenewmessagesfromusers."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.35.12",
"matchCriteriaId": "6A920574-0C59-4036-9878-C5A39EF82AA1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.39.0",
"versionEndExcluding": "1.39.5",
"matchCriteriaId": "28CCB302-794F-478B-8331-D9D56CC63983"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mediawiki:mediawiki:1.40.0:-:*:*:*:*:*:*",
"matchCriteriaId": "195C853F-2D51-44A4-990E-8E04FF4E9AA8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mediawiki:mediawiki:1.40.0:rc0:*:*:*:*:*:*",
"matchCriteriaId": "F7880C3A-6D22-4D41-BD00-7E30D3A46FB8"
}
]
}
]
}
],
"references": [
{
"url": "https://phabricator.wikimedia.org/T340221",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46725",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-02T15:15:08.847",
"lastModified": "2023-11-06T17:15:11.917",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-09T21:16:04.827",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,8 +60,22 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-367"
},
{
"lang": "en",
"value": "CWE-918"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -50,22 +84,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:foodcoopshop:foodcoopshop:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.2.0",
"versionEndIncluding": "3.6.0",
"matchCriteriaId": "3F749AE9-CD3D-408F-ADA7-47D384325618"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/foodcoopshop/foodcoopshop/commit/0d5bec5c4c22e1affe7fd321a30e3f3a4d99e808",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/foodcoopshop/foodcoopshop/pull/972",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/foodcoopshop/foodcoopshop/security/advisories/GHSA-jhww-fx2j-3rf7",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://pastebin.com/8K5Brwbq",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Not Applicable"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46954",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T03:15:07.920",
"lastModified": "2023-11-03T13:22:57.130",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-09T21:38:55.393",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,78 @@
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Relativity ODA LLC RelativityOne v.12.1.537.3 Patch 2 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de nombre."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:relativity:relativityone:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.4.537.3",
"matchCriteriaId": "5F56546A-08CB-4C9D-8C9A-9D35D4F753D2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:relativity:relativityone:12.4.537.3:-:*:*:*:*:*:*",
"matchCriteriaId": "E24AE837-3C41-4178-895E-FA5A65B128B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:relativity:relativityone:12.4.537.3:patch_2:*:*:*:*:*:*",
"matchCriteriaId": "FC00D670-40AA-4DFD-AA51-B664F793BD20"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jakedmurphy1/CVE-2023-46954",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-5543",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2023-11-09T22:15:11.000",
"lastModified": "2023-11-09T22:15:11.000",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "When duplicating a BigBlueButton activity, the original meeting ID was also duplicated instead of using a new ID for the new activity. This could provide unintended access to the original meeting."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77795",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243442",
"source": "patrick@puiterwijk.org"
},
{
"url": "https://moodle.org/mod/forum/discuss.php?d=451584",
"source": "patrick@puiterwijk.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5923",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-02T19:15:41.673",
"lastModified": "2023-11-07T04:24:34.237",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-09T21:14:25.430",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,27 @@
"metrics": {
"cvssMetricV31": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -39,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -65,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
@ -75,18 +95,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_student_information_system_project:simple_student_information_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9A977027-1635-4913-88BD-002BD8DB5538"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Simple%20Student%20Information%20System/Simple%20Student%20Information%20System%20-%20vuln%201.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.244323",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.244323",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5924",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-02T19:15:41.747",
"lastModified": "2023-11-07T04:24:34.603",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-09T21:07:52.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,7 +17,27 @@
"metrics": {
"cvssMetricV31": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -39,7 +59,7 @@
],
"cvssMetricV2": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@ -65,7 +85,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
@ -75,18 +95,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_student_information_system_project:simple_student_information_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9A977027-1635-4913-88BD-002BD8DB5538"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Simple%20Student%20Information%20System/Simple%20Student%20Information%20System%20-%20vuln%202.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.244324",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.244324",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-5954",
"sourceIdentifier": "security@hashicorp.com",
"published": "2023-11-09T21:15:25.143",
"lastModified": "2023-11-09T21:15:25.143",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "HashiCorp Vault and Vault Enterprise inbound client requests triggering a policy check can lead to an unbounded consumption of memory. A large number of these requests may lead to denial-of-service. Fixed in Vault 1.15.2, 1.14.6, and 1.13.10."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@hashicorp.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@hashicorp.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"references": [
{
"url": "https://discuss.hashicorp.com/t/hcsec-2023-33-vault-requests-triggering-policy-checks-may-lead-to-unbounded-memory-consumption/59926",
"source": "security@hashicorp.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-09T21:00:18.773325+00:00
2023-11-09T23:00:18.752024+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-09T20:58:00.163000+00:00
2023-11-09T22:18:24.930000+00:00
```
### Last Data Feed Release
@ -29,69 +29,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
230276
230293
```
### CVEs added in the last Commit
Recently added CVEs: `25`
Recently added CVEs: `17`
* [CVE-2023-34178](CVE-2023/CVE-2023-341xx/CVE-2023-34178.json) (`2023-11-09T19:15:08.033`)
* [CVE-2023-34181](CVE-2023/CVE-2023-341xx/CVE-2023-34181.json) (`2023-11-09T19:15:08.117`)
* [CVE-2023-34182](CVE-2023/CVE-2023-341xx/CVE-2023-34182.json) (`2023-11-09T19:15:08.210`)
* [CVE-2023-34371](CVE-2023/CVE-2023-343xx/CVE-2023-34371.json) (`2023-11-09T19:15:08.307`)
* [CVE-2023-47237](CVE-2023/CVE-2023-472xx/CVE-2023-47237.json) (`2023-11-09T19:15:08.397`)
* [CVE-2023-47238](CVE-2023/CVE-2023-472xx/CVE-2023-47238.json) (`2023-11-09T19:15:08.480`)
* [CVE-2023-6053](CVE-2023/CVE-2023-60xx/CVE-2023-6053.json) (`2023-11-09T19:15:08.577`)
* [CVE-2023-6054](CVE-2023/CVE-2023-60xx/CVE-2023-6054.json) (`2023-11-09T19:15:08.803`)
* [CVE-2023-34033](CVE-2023/CVE-2023-340xx/CVE-2023-34033.json) (`2023-11-09T20:15:08.320`)
* [CVE-2023-34169](CVE-2023/CVE-2023-341xx/CVE-2023-34169.json) (`2023-11-09T20:15:08.393`)
* [CVE-2023-34171](CVE-2023/CVE-2023-341xx/CVE-2023-34171.json) (`2023-11-09T20:15:08.487`)
* [CVE-2023-34177](CVE-2023/CVE-2023-341xx/CVE-2023-34177.json) (`2023-11-09T20:15:08.577`)
* [CVE-2023-39198](CVE-2023/CVE-2023-391xx/CVE-2023-39198.json) (`2023-11-09T20:15:08.730`)
* [CVE-2023-5539](CVE-2023/CVE-2023-55xx/CVE-2023-5539.json) (`2023-11-09T20:15:08.920`)
* [CVE-2023-5540](CVE-2023/CVE-2023-55xx/CVE-2023-5540.json) (`2023-11-09T20:15:09.103`)
* [CVE-2023-5541](CVE-2023/CVE-2023-55xx/CVE-2023-5541.json) (`2023-11-09T20:15:09.283`)
* [CVE-2023-5542](CVE-2023/CVE-2023-55xx/CVE-2023-5542.json) (`2023-11-09T20:15:09.480`)
* [CVE-2023-5544](CVE-2023/CVE-2023-55xx/CVE-2023-5544.json) (`2023-11-09T20:15:09.660`)
* [CVE-2023-5545](CVE-2023/CVE-2023-55xx/CVE-2023-5545.json) (`2023-11-09T20:15:09.850`)
* [CVE-2023-5546](CVE-2023/CVE-2023-55xx/CVE-2023-5546.json) (`2023-11-09T20:15:10.030`)
* [CVE-2023-5547](CVE-2023/CVE-2023-55xx/CVE-2023-5547.json) (`2023-11-09T20:15:10.210`)
* [CVE-2023-5548](CVE-2023/CVE-2023-55xx/CVE-2023-5548.json) (`2023-11-09T20:15:10.390`)
* [CVE-2023-5549](CVE-2023/CVE-2023-55xx/CVE-2023-5549.json) (`2023-11-09T20:15:10.683`)
* [CVE-2023-5550](CVE-2023/CVE-2023-55xx/CVE-2023-5550.json) (`2023-11-09T20:15:10.867`)
* [CVE-2023-5551](CVE-2023/CVE-2023-55xx/CVE-2023-5551.json) (`2023-11-09T20:15:11.053`)
* [CVE-2023-32594](CVE-2023/CVE-2023-325xx/CVE-2023-32594.json) (`2023-11-09T21:15:24.090`)
* [CVE-2023-32602](CVE-2023/CVE-2023-326xx/CVE-2023-32602.json) (`2023-11-09T21:15:24.180`)
* [CVE-2023-32739](CVE-2023/CVE-2023-327xx/CVE-2023-32739.json) (`2023-11-09T21:15:24.270`)
* [CVE-2023-32744](CVE-2023/CVE-2023-327xx/CVE-2023-32744.json) (`2023-11-09T21:15:24.370`)
* [CVE-2023-32745](CVE-2023/CVE-2023-327xx/CVE-2023-32745.json) (`2023-11-09T21:15:24.463`)
* [CVE-2023-32794](CVE-2023/CVE-2023-327xx/CVE-2023-32794.json) (`2023-11-09T21:15:24.553`)
* [CVE-2023-34024](CVE-2023/CVE-2023-340xx/CVE-2023-34024.json) (`2023-11-09T21:15:24.647`)
* [CVE-2023-34025](CVE-2023/CVE-2023-340xx/CVE-2023-34025.json) (`2023-11-09T21:15:24.740`)
* [CVE-2023-34031](CVE-2023/CVE-2023-340xx/CVE-2023-34031.json) (`2023-11-09T21:15:24.827`)
* [CVE-2023-4379](CVE-2023/CVE-2023-43xx/CVE-2023-4379.json) (`2023-11-09T21:15:24.930`)
* [CVE-2023-5954](CVE-2023/CVE-2023-59xx/CVE-2023-5954.json) (`2023-11-09T21:15:25.143`)
* [CVE-2023-29975](CVE-2023/CVE-2023-299xx/CVE-2023-29975.json) (`2023-11-09T22:15:10.583`)
* [CVE-2023-32512](CVE-2023/CVE-2023-325xx/CVE-2023-32512.json) (`2023-11-09T22:15:10.633`)
* [CVE-2023-32579](CVE-2023/CVE-2023-325xx/CVE-2023-32579.json) (`2023-11-09T22:15:10.730`)
* [CVE-2023-32587](CVE-2023/CVE-2023-325xx/CVE-2023-32587.json) (`2023-11-09T22:15:10.817`)
* [CVE-2023-32592](CVE-2023/CVE-2023-325xx/CVE-2023-32592.json) (`2023-11-09T22:15:10.900`)
* [CVE-2023-5543](CVE-2023/CVE-2023-55xx/CVE-2023-5543.json) (`2023-11-09T22:15:11.000`)
### CVEs modified in the last Commit
Recently modified CVEs: `91`
Recently modified CVEs: `21`
* [CVE-2023-3899](CVE-2023/CVE-2023-38xx/CVE-2023-3899.json) (`2023-11-09T20:11:15.350`)
* [CVE-2023-32741](CVE-2023/CVE-2023-327xx/CVE-2023-32741.json) (`2023-11-09T20:11:34.543`)
* [CVE-2023-6001](CVE-2023/CVE-2023-60xx/CVE-2023-6001.json) (`2023-11-09T20:15:11.237`)
* [CVE-2023-6002](CVE-2023/CVE-2023-60xx/CVE-2023-6002.json) (`2023-11-09T20:15:11.400`)
* [CVE-2023-42027](CVE-2023/CVE-2023-420xx/CVE-2023-42027.json) (`2023-11-09T20:23:47.600`)
* [CVE-2023-45189](CVE-2023/CVE-2023-451xx/CVE-2023-45189.json) (`2023-11-09T20:27:56.003`)
* [CVE-2023-5929](CVE-2023/CVE-2023-59xx/CVE-2023-5929.json) (`2023-11-09T20:28:22.787`)
* [CVE-2023-36677](CVE-2023/CVE-2023-366xx/CVE-2023-36677.json) (`2023-11-09T20:31:09.167`)
* [CVE-2023-5928](CVE-2023/CVE-2023-59xx/CVE-2023-5928.json) (`2023-11-09T20:32:30.993`)
* [CVE-2023-46753](CVE-2023/CVE-2023-467xx/CVE-2023-46753.json) (`2023-11-09T20:35:08.240`)
* [CVE-2023-1713](CVE-2023/CVE-2023-17xx/CVE-2023-1713.json) (`2023-11-09T20:37:42.650`)
* [CVE-2023-1714](CVE-2023/CVE-2023-17xx/CVE-2023-1714.json) (`2023-11-09T20:38:00.327`)
* [CVE-2023-5846](CVE-2023/CVE-2023-58xx/CVE-2023-5846.json) (`2023-11-09T20:41:19.543`)
* [CVE-2023-5927](CVE-2023/CVE-2023-59xx/CVE-2023-5927.json) (`2023-11-09T20:46:42.307`)
* [CVE-2023-41726](CVE-2023/CVE-2023-417xx/CVE-2023-41726.json) (`2023-11-09T20:47:03.140`)
* [CVE-2023-1716](CVE-2023/CVE-2023-17xx/CVE-2023-1716.json) (`2023-11-09T20:47:06.643`)
* [CVE-2023-41725](CVE-2023/CVE-2023-417xx/CVE-2023-41725.json) (`2023-11-09T20:48:01.590`)
* [CVE-2023-1717](CVE-2023/CVE-2023-17xx/CVE-2023-1717.json) (`2023-11-09T20:50:30.427`)
* [CVE-2023-1718](CVE-2023/CVE-2023-17xx/CVE-2023-1718.json) (`2023-11-09T20:51:18.170`)
* [CVE-2023-5926](CVE-2023/CVE-2023-59xx/CVE-2023-5926.json) (`2023-11-09T20:51:32.893`)
* [CVE-2023-1719](CVE-2023/CVE-2023-17xx/CVE-2023-1719.json) (`2023-11-09T20:52:06.307`)
* [CVE-2023-43898](CVE-2023/CVE-2023-438xx/CVE-2023-43898.json) (`2023-11-09T20:54:18.747`)
* [CVE-2023-5925](CVE-2023/CVE-2023-59xx/CVE-2023-5925.json) (`2023-11-09T20:56:15.113`)
* [CVE-2023-43615](CVE-2023/CVE-2023-436xx/CVE-2023-43615.json) (`2023-11-09T20:56:20.313`)
* [CVE-2023-4504](CVE-2023/CVE-2023-45xx/CVE-2023-4504.json) (`2023-11-09T20:58:00.163`)
* [CVE-2020-28407](CVE-2020/CVE-2020-284xx/CVE-2020-28407.json) (`2023-11-09T21:42:24.177`)
* [CVE-2022-41076](CVE-2022/CVE-2022-410xx/CVE-2022-41076.json) (`2023-11-09T22:15:09.223`)
* [CVE-2022-41089](CVE-2022/CVE-2022-410xx/CVE-2022-41089.json) (`2023-11-09T22:15:09.370`)
* [CVE-2022-41115](CVE-2022/CVE-2022-411xx/CVE-2022-41115.json) (`2023-11-09T22:15:09.610`)
* [CVE-2022-41121](CVE-2022/CVE-2022-411xx/CVE-2022-41121.json) (`2023-11-09T22:15:09.700`)
* [CVE-2022-44689](CVE-2022/CVE-2022-446xx/CVE-2022-44689.json) (`2023-11-09T22:15:10.077`)
* [CVE-2022-44702](CVE-2022/CVE-2022-447xx/CVE-2022-44702.json) (`2023-11-09T22:15:10.273`)
* [CVE-2022-44704](CVE-2022/CVE-2022-447xx/CVE-2022-44704.json) (`2023-11-09T22:15:10.347`)
* [CVE-2022-44708](CVE-2022/CVE-2022-447xx/CVE-2022-44708.json) (`2023-11-09T22:15:10.447`)
* [CVE-2023-5924](CVE-2023/CVE-2023-59xx/CVE-2023-5924.json) (`2023-11-09T21:07:52.570`)
* [CVE-2023-1720](CVE-2023/CVE-2023-17xx/CVE-2023-1720.json) (`2023-11-09T21:12:21.233`)
* [CVE-2023-5923](CVE-2023/CVE-2023-59xx/CVE-2023-5923.json) (`2023-11-09T21:14:25.430`)
* [CVE-2023-46725](CVE-2023/CVE-2023-467xx/CVE-2023-46725.json) (`2023-11-09T21:16:04.827`)
* [CVE-2023-31579](CVE-2023/CVE-2023-315xx/CVE-2023-31579.json) (`2023-11-09T21:17:52.387`)
* [CVE-2023-46954](CVE-2023/CVE-2023-469xx/CVE-2023-46954.json) (`2023-11-09T21:38:55.393`)
* [CVE-2023-36621](CVE-2023/CVE-2023-366xx/CVE-2023-36621.json) (`2023-11-09T21:55:49.257`)
* [CVE-2023-41343](CVE-2023/CVE-2023-413xx/CVE-2023-41343.json) (`2023-11-09T21:59:36.353`)
* [CVE-2023-44271](CVE-2023/CVE-2023-442xx/CVE-2023-44271.json) (`2023-11-09T22:01:30.133`)
* [CVE-2023-43982](CVE-2023/CVE-2023-439xx/CVE-2023-43982.json) (`2023-11-09T22:07:27.420`)
* [CVE-2023-41914](CVE-2023/CVE-2023-419xx/CVE-2023-41914.json) (`2023-11-09T22:11:29.870`)
* [CVE-2023-45360](CVE-2023/CVE-2023-453xx/CVE-2023-45360.json) (`2023-11-09T22:18:24.930`)
## Download and Usage