Auto-Update: 2023-05-30T10:00:25.876080+00:00

This commit is contained in:
cad-safe-bot 2023-05-30 10:00:29 +00:00
parent 0f889e4ff2
commit 33879aea3a
20 changed files with 659 additions and 37 deletions

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2022-4676",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:09.307",
"lastModified": "2023-05-30T08:15:09.307",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The OSM WordPress plugin through 6.01 does not validate and escape some of its shortcode attributes, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attack."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/1df3c17c-990d-4074-b1d5-b26da880d88e",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-0329",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:09.397",
"lastModified": "2023-05-30T08:15:09.397",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Elementor Website Builder WordPress plugin before 3.12.2 does not properly sanitize and escape the Replace URL parameter in the Tools module before using it in a SQL statement, leading to a SQL injection exploitable by users with the Administrator role."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/a875836d-77f4-4306-b275-2b60efff1493",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-0443",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:09.460",
"lastModified": "2023-05-30T08:15:09.460",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The AnyWhere Elementor WordPress plugin before 1.2.8 discloses a Freemius Secret Key which could be used by an attacker to purchase the pro subscription using test credit card numbers without actually paying the amount. Such key has been revoked."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/471f3226-8f90-43d1-b826-f11ef4bbd602",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-0733",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:09.523",
"lastModified": "2023-05-30T08:15:09.523",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Newsletter Popup WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow unauthenticated users to perform Stored Cross-Site Scripting attacks"
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/fed1e184-ff56-44fe-9876-d17c0156447a",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-0766",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:09.590",
"lastModified": "2023-05-30T08:15:09.590",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Newsletter Popup WordPress plugin through 1.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks as the wp_newsletter_show_localrecord page is not protected with a nonce."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/90a1976c-0348-41ea-90b4-f7a5d9306c88",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-1524",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:09.657",
"lastModified": "2023-05-30T08:15:09.657",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Download Manager WordPress plugin before 3.2.71 does not adequately validate passwords for password-protected files. Upon validation, a master key is generated and exposed to the user, which may be used to download any password-protected file on the server, allowing a user to download any file with the knowledge of any one file's password."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/3802d15d-9bfd-4762-ab8a-04475451868e",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-1938",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:09.713",
"lastModified": "2023-05-30T08:15:09.713",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP Fastest Cache WordPress plugin before 1.1.5 does not have CSRF check in an AJAX action, and does not validate user input before using it in the wp_remote_get() function, leading to a Blind SSRF issue"
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/92b1c6d8-51db-46aa-bde6-abdfb091aab5",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2023",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:09.787",
"lastModified": "2023-05-30T08:15:09.787",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Custom 404 Pro WordPress plugin before 3.7.3 does not escape some URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/8859843a-a8c2-4f7a-8372-67049d6ea317",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2111",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:09.837",
"lastModified": "2023-05-30T08:15:09.837",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Fast & Effective Popups & Lead-Generation for WordPress plugin before 2.1.4 concatenates user input into an SQL query without escaping it first in the plugin's report API endpoint, which could allow administrators in multi-site configuration to leak sensitive information from the site's database."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/7a0bdd47-c339-489d-9443-f173a83447f2",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2113",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:09.900",
"lastModified": "2023-05-30T08:15:09.900",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Autoptimize WordPress plugin before 3.1.7 does not sanitise and escape the settings imported from a previous export, allowing high privileged users (such as an administrator) to inject arbitrary javascript into the admin panel, even when the unfiltered_html capability is disabled, such as in a multisite setup."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/ddb4c95d-bbee-4095-aed6-25f6b8e63011",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2117",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:09.963",
"lastModified": "2023-05-30T08:15:09.963",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Image Optimizer by 10web WordPress plugin before 1.0.27 does not sanitize the dir parameter when handling the get_subdirs ajax action, allowing a high privileged users such as admins to inspect names of files and directories outside of the sites root."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/44024299-ba40-4da7-81e1-bd44d10846f3",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2223",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:10.030",
"lastModified": "2023-05-30T08:15:10.030",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Login rebuilder WordPress plugin before 2.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/7b356b82-5d03-4f70-b4ce-f1405304bb52",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2256",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:10.097",
"lastModified": "2023-05-30T08:15:10.097",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Product Addons & Fields for WooCommerce WordPress plugin before 32.0.7 does not sanitize and escape some URL parameters, leading to Reflected Cross-Site Scripting."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/1187e041-3be2-4613-8d56-c2394fcc75fb",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2287",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:10.157",
"lastModified": "2023-05-30T08:15:10.157",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Orbit Fox by ThemeIsle WordPress plugin before 2.10.24 does not limit URLs which may be used for the stock photo import feature, allowing the user to specify arbitrary URLs. This leads to a server-side request forgery as the user may force the server to access any URL of their choosing."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/1b36a184-2138-4a65-8940-07e7764669bb",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2288",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:10.217",
"lastModified": "2023-05-30T08:15:10.217",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Otter WordPress plugin before 2.2.6 does not sanitize some user-controlled file paths before performing file operations on them. This leads to a PHAR deserialization vulnerability on PHP < 8.0 using the phar:// stream wrapper."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/93acb4ee-1053-48e1-8b69-c09dc3b2f302",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2296",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:10.280",
"lastModified": "2023-05-30T08:15:10.280",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Loginizer WordPress plugin before 1.7.9 does not escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/8126ff73-c0e5-4c1b-ba10-2e51f690521e",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2470",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:10.337",
"lastModified": "2023-05-30T08:15:10.337",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Add to Feedly WordPress plugin through 1.2.11 does not sanitize and escape its settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/de0adf26-8a0b-4b90-96d5-4bec6e770e04",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-2518",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-30T08:15:10.390",
"lastModified": "2023-05-30T08:15:10.390",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Easy Forms for Mailchimp WordPress plugin through 6.8.8 does not sanitise and escape a parameter before outputting it back in the page when the debug option is enabled, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
}
],
"metrics": {},
"weaknesses": [
{
"source": "contact@wpscan.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/ca120255-2c50-4906-97f3-ea660486db4c",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-30601",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-30T08:15:10.450",
"lastModified": "2023-05-30T08:15:10.450",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Privilege escalation when enabling FQL/Audit logs allows user with JMX access to run arbitrary commands as the user running Apache Cassandra\nThis issue affects Apache Cassandra: from 4.0.0 through 4.0.9, from 4.1.0 through 4.1.1.\n\nWORKAROUND\nThe vulnerability requires nodetool/JMX access to be exploitable, disable access for any non-trusted users.\n\nMITIGATION\nUpgrade to 4.0.10 or 4.1.2 and leave the new FQL/Auditlog configuration property\u00a0allow_nodetool_archive_command as false."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@apache.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/f74p9jdhmmp7vtrqd8lgm8bq3dhxl8vn",
"source": "security@apache.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2023-05-30T08:00:25.435104+00:00 2023-05-30T10:00:25.876080+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2023-05-30T07:15:10.850000+00:00 2023-05-30T08:15:10.450000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -29,51 +29,38 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
216327 216346
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `7` Recently added CVEs: `19`
* [CVE-2023-2970](CVE-2023/CVE-2023-29xx/CVE-2023-2970.json) (`2023-05-30T06:16:30.853`) * [CVE-2022-4676](CVE-2022/CVE-2022-46xx/CVE-2022-4676.json) (`2023-05-30T08:15:09.307`)
* [CVE-2023-33183](CVE-2023/CVE-2023-331xx/CVE-2023-33183.json) (`2023-05-30T06:16:35.080`) * [CVE-2023-0329](CVE-2023/CVE-2023-03xx/CVE-2023-0329.json) (`2023-05-30T08:15:09.397`)
* [CVE-2023-33186](CVE-2023/CVE-2023-331xx/CVE-2023-33186.json) (`2023-05-30T06:16:36.237`) * [CVE-2023-0443](CVE-2023/CVE-2023-04xx/CVE-2023-0443.json) (`2023-05-30T08:15:09.460`)
* [CVE-2023-33189](CVE-2023/CVE-2023-331xx/CVE-2023-33189.json) (`2023-05-30T06:16:37.937`) * [CVE-2023-0733](CVE-2023/CVE-2023-07xx/CVE-2023-0733.json) (`2023-05-30T08:15:09.523`)
* [CVE-2023-33193](CVE-2023/CVE-2023-331xx/CVE-2023-33193.json) (`2023-05-30T06:16:42.767`) * [CVE-2023-0766](CVE-2023/CVE-2023-07xx/CVE-2023-0766.json) (`2023-05-30T08:15:09.590`)
* [CVE-2023-33191](CVE-2023/CVE-2023-331xx/CVE-2023-33191.json) (`2023-05-30T07:15:09.997`) * [CVE-2023-1524](CVE-2023/CVE-2023-15xx/CVE-2023-1524.json) (`2023-05-30T08:15:09.657`)
* [CVE-2023-33955](CVE-2023/CVE-2023-339xx/CVE-2023-33955.json) (`2023-05-30T07:15:10.850`) * [CVE-2023-1938](CVE-2023/CVE-2023-19xx/CVE-2023-1938.json) (`2023-05-30T08:15:09.713`)
* [CVE-2023-2023](CVE-2023/CVE-2023-20xx/CVE-2023-2023.json) (`2023-05-30T08:15:09.787`)
* [CVE-2023-2111](CVE-2023/CVE-2023-21xx/CVE-2023-2111.json) (`2023-05-30T08:15:09.837`)
* [CVE-2023-2113](CVE-2023/CVE-2023-21xx/CVE-2023-2113.json) (`2023-05-30T08:15:09.900`)
* [CVE-2023-2117](CVE-2023/CVE-2023-21xx/CVE-2023-2117.json) (`2023-05-30T08:15:09.963`)
* [CVE-2023-2223](CVE-2023/CVE-2023-22xx/CVE-2023-2223.json) (`2023-05-30T08:15:10.030`)
* [CVE-2023-2256](CVE-2023/CVE-2023-22xx/CVE-2023-2256.json) (`2023-05-30T08:15:10.097`)
* [CVE-2023-2287](CVE-2023/CVE-2023-22xx/CVE-2023-2287.json) (`2023-05-30T08:15:10.157`)
* [CVE-2023-2288](CVE-2023/CVE-2023-22xx/CVE-2023-2288.json) (`2023-05-30T08:15:10.217`)
* [CVE-2023-2296](CVE-2023/CVE-2023-22xx/CVE-2023-2296.json) (`2023-05-30T08:15:10.280`)
* [CVE-2023-2470](CVE-2023/CVE-2023-24xx/CVE-2023-2470.json) (`2023-05-30T08:15:10.337`)
* [CVE-2023-2518](CVE-2023/CVE-2023-25xx/CVE-2023-2518.json) (`2023-05-30T08:15:10.390`)
* [CVE-2023-30601](CVE-2023/CVE-2023-306xx/CVE-2023-30601.json) (`2023-05-30T08:15:10.450`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `137` Recently modified CVEs: `0`
* [CVE-2023-0802](CVE-2023/CVE-2023-08xx/CVE-2023-0802.json) (`2023-05-30T06:16:11.997`)
* [CVE-2023-0803](CVE-2023/CVE-2023-08xx/CVE-2023-0803.json) (`2023-05-30T06:16:12.957`)
* [CVE-2023-0804](CVE-2023/CVE-2023-08xx/CVE-2023-0804.json) (`2023-05-30T06:16:13.943`)
* [CVE-2023-1393](CVE-2023/CVE-2023-13xx/CVE-2023-1393.json) (`2023-05-30T06:16:15.063`)
* [CVE-2023-23517](CVE-2023/CVE-2023-235xx/CVE-2023-23517.json) (`2023-05-30T06:16:16.343`)
* [CVE-2023-23518](CVE-2023/CVE-2023-235xx/CVE-2023-23518.json) (`2023-05-30T06:16:17.017`)
* [CVE-2023-23529](CVE-2023/CVE-2023-235xx/CVE-2023-23529.json) (`2023-05-30T06:16:17.547`)
* [CVE-2023-23532](CVE-2023/CVE-2023-235xx/CVE-2023-23532.json) (`2023-05-30T06:16:18.063`)
* [CVE-2023-23535](CVE-2023/CVE-2023-235xx/CVE-2023-23535.json) (`2023-05-30T06:16:18.727`)
* [CVE-2023-24998](CVE-2023/CVE-2023-249xx/CVE-2023-24998.json) (`2023-05-30T06:16:19.283`)
* [CVE-2023-25358](CVE-2023/CVE-2023-253xx/CVE-2023-25358.json) (`2023-05-30T06:16:20.363`)
* [CVE-2023-25360](CVE-2023/CVE-2023-253xx/CVE-2023-25360.json) (`2023-05-30T06:16:21.383`)
* [CVE-2023-25361](CVE-2023/CVE-2023-253xx/CVE-2023-25361.json) (`2023-05-30T06:16:22.163`)
* [CVE-2023-25362](CVE-2023/CVE-2023-253xx/CVE-2023-25362.json) (`2023-05-30T06:16:22.917`)
* [CVE-2023-25363](CVE-2023/CVE-2023-253xx/CVE-2023-25363.json) (`2023-05-30T06:16:23.723`)
* [CVE-2023-27932](CVE-2023/CVE-2023-279xx/CVE-2023-27932.json) (`2023-05-30T06:16:24.793`)
* [CVE-2023-27945](CVE-2023/CVE-2023-279xx/CVE-2023-27945.json) (`2023-05-30T06:16:25.860`)
* [CVE-2023-27954](CVE-2023/CVE-2023-279xx/CVE-2023-27954.json) (`2023-05-30T06:16:26.723`)
* [CVE-2023-28181](CVE-2023/CVE-2023-281xx/CVE-2023-28181.json) (`2023-05-30T06:16:27.220`)
* [CVE-2023-28205](CVE-2023/CVE-2023-282xx/CVE-2023-28205.json) (`2023-05-30T06:16:27.887`)
* [CVE-2023-28427](CVE-2023/CVE-2023-284xx/CVE-2023-28427.json) (`2023-05-30T06:16:28.550`)
* [CVE-2023-28709](CVE-2023/CVE-2023-287xx/CVE-2023-28709.json) (`2023-05-30T06:16:29.747`)
* [CVE-2023-31285](CVE-2023/CVE-2023-312xx/CVE-2023-31285.json) (`2023-05-30T06:16:32.220`)
* [CVE-2023-31286](CVE-2023/CVE-2023-312xx/CVE-2023-31286.json) (`2023-05-30T06:16:33.220`)
* [CVE-2023-31287](CVE-2023/CVE-2023-312xx/CVE-2023-31287.json) (`2023-05-30T06:16:34.137`)
## Download and Usage ## Download and Usage