Auto-Update: 2023-05-02T14:00:24.246120+00:00

This commit is contained in:
René Helmke 2023-05-02 16:00:27 +02:00
parent 0533eea5b7
commit 35ea0652b6
57 changed files with 782 additions and 116 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2013-10026",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T02:15:27.267",
"lastModified": "2023-05-02T02:15:27.267",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-125100",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T02:15:27.423",
"lastModified": "2023-05-02T02:15:27.423",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-25713",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-05-02T06:15:08.500",
"lastModified": "2023-05-02T06:15:08.500",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-33273",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-05-02T08:15:08.763",
"lastModified": "2023-05-02T08:15:08.763",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-33281",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-05-02T06:15:09.507",
"lastModified": "2023-05-02T06:15:09.507",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-33292",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-05-02T06:15:09.757",
"lastModified": "2023-05-02T06:15:09.757",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-33304",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-05-02T06:15:09.910",
"lastModified": "2023-05-02T06:15:09.910",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-33305",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-05-02T06:15:09.997",
"lastModified": "2023-05-02T06:15:09.997",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34144",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-05-02T06:15:10.077",
"lastModified": "2023-05-02T06:15:10.077",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-35898",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-01T20:15:14.463",
"lastModified": "2023-05-01T20:15:14.463",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:26.420",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-40504",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-05-02T08:15:09.437",
"lastModified": "2023-05-02T08:15:09.437",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-40505",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-05-02T06:15:10.173",
"lastModified": "2023-05-02T06:15:10.173",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-40508",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-05-02T06:15:10.263",
"lastModified": "2023-05-02T06:15:10.263",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48482",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-02T05:15:27.407",
"lastModified": "2023-05-02T05:15:27.407",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48483",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-02T05:15:28.057",
"lastModified": "2023-05-02T05:15:28.057",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0203",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-04-22T03:15:09.270",
"lastModified": "2023-04-24T13:02:13.210",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-02T13:53:49.337",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -46,10 +76,53 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nvidia:connectx_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "35.1012",
"matchCriteriaId": "22D68BAB-D2DD-4997-9881-15F3243A9D7B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nvidia:connectx-5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85FBF3A9-B6C3-4705-A2E1-2503E7A6725D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nvidia:connectx-6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8421C891-26D3-4845-A20A-80E4769D4E25"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nvidia:connectx-6-dx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BAADC39-548E-44E4-AD25-74A7CEBCC2EB"
}
]
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5459",
"source": "psirt@nvidia.com"
"source": "psirt@nvidia.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0204",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-04-22T03:15:09.330",
"lastModified": "2023-04-24T13:02:13.210",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-02T13:56:56.390",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -46,10 +76,53 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nvidia:connectx_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "35.1012",
"matchCriteriaId": "22D68BAB-D2DD-4997-9881-15F3243A9D7B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nvidia:connectx-5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85FBF3A9-B6C3-4705-A2E1-2503E7A6725D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nvidia:connectx-6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8421C891-26D3-4845-A20A-80E4769D4E25"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nvidia:connectx-6-dx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BAADC39-548E-44E4-AD25-74A7CEBCC2EB"
}
]
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5459",
"source": "psirt@nvidia.com"
"source": "psirt@nvidia.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0205",
"sourceIdentifier": "psirt@nvidia.com",
"published": "2023-04-22T03:15:09.387",
"lastModified": "2023-04-24T13:02:13.210",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-02T13:58:32.890",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "psirt@nvidia.com",
"type": "Secondary",
@ -46,10 +76,53 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:nvidia:connectx_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "35.1012",
"matchCriteriaId": "22D68BAB-D2DD-4997-9881-15F3243A9D7B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nvidia:connectx-5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85FBF3A9-B6C3-4705-A2E1-2503E7A6725D"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nvidia:connectx-6:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8421C891-26D3-4845-A20A-80E4769D4E25"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:nvidia:connectx-6-dx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BAADC39-548E-44E4-AD25-74A7CEBCC2EB"
}
]
}
]
}
],
"references": [
{
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5459",
"source": "psirt@nvidia.com"
"source": "psirt@nvidia.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0891",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:09.513",
"lastModified": "2023-05-02T08:15:09.513",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0924",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:09.620",
"lastModified": "2023-05-02T08:15:09.620",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1021",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:09.693",
"lastModified": "2023-05-02T08:15:09.693",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1090",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:09.753",
"lastModified": "2023-05-02T08:15:09.753",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1125",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:09.823",
"lastModified": "2023-05-02T08:15:09.823",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1196",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T09:15:09.280",
"lastModified": "2023-05-02T09:15:09.280",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1525",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:09.893",
"lastModified": "2023-05-02T08:15:09.893",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1546",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:09.957",
"lastModified": "2023-05-02T08:15:09.957",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1554",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.023",
"lastModified": "2023-05-02T08:15:10.023",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1614",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.097",
"lastModified": "2023-05-02T08:15:10.097",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1669",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.180",
"lastModified": "2023-05-02T08:15:10.180",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1730",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.267",
"lastModified": "2023-05-02T08:15:10.267",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1804",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.337",
"lastModified": "2023-05-02T08:15:10.337",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1805",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.393",
"lastModified": "2023-05-02T08:15:10.393",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1809",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.453",
"lastModified": "2023-05-02T08:15:10.453",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1861",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.517",
"lastModified": "2023-05-02T08:15:10.517",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1911",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.570",
"lastModified": "2023-05-02T08:15:10.570",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2000",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2023-05-02T09:15:10.013",
"lastModified": "2023-05-02T09:15:10.013",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21642",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-05-02T06:15:10.347",
"lastModified": "2023-05-02T06:15:10.347",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21665",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-05-02T06:15:10.433",
"lastModified": "2023-05-02T06:15:10.433",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21666",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-05-02T06:15:10.510",
"lastModified": "2023-05-02T06:15:10.510",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2197",
"sourceIdentifier": "security@hashicorp.com",
"published": "2023-05-01T20:15:14.597",
"lastModified": "2023-05-01T20:15:14.597",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:26.420",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2210",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T09:15:07.970",
"lastModified": "2023-04-24T13:02:28.070",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-02T13:36:03.597",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +93,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:coffee_shop_pos_system_project:coffee_shop_pos_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F4D1D90-B3B0-4E6B-9B75-C6A2C6FF6909"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Coffee%20Shop%20POS%20System/Coffee%20Shop%20POS%20System%20-%20vuln%202.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.226975",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.226975",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2247",
"sourceIdentifier": "security@octopus.com",
"published": "2023-05-02T05:15:28.113",
"lastModified": "2023-05-02T05:15:28.113",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:18.213",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-23723",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-02T12:15:22.430",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Winwar Media WP Email Capture plugin <=\u00a03.9.3 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-email-capture/wordpress-wordpress-email-marketing-plugin-wp-email-capture-plugin-3-9-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-2473",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T13:15:25.090",
"lastModified": "2023-05-02T13:29:57.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Dreamer CMS up to 4.1.3. It has been declared as problematic. This vulnerability affects the function updatePwd of the file UserController.java of the component Password Hash Calculation. The manipulation leads to inefficient algorithmic complexity. The attack can be initiated remotely. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227860."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-407"
}
]
}
],
"references": [
{
"url": "https://gitee.com/isoftforce/dreamer_cms/issues/I6WHO7",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.227860",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.227860",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-2474",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T13:15:25.197",
"lastModified": "2023-05-02T13:29:57.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Rebuild 3.2 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. VDB-227866 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://gitee.com/getrebuild/rebuild/issues/I6W4M2",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.227866",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.227866",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2023-2475",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T13:15:25.287",
"lastModified": "2023-05-02T13:29:57.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Dromara J2eeFAST up to 2.6.0 and classified as problematic. This issue affects some unknown processing of the component System Message Handler. The manipulation of the argument ?? leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-227867."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://gitee.com/dromara/J2EEFAST/commit/7a9e1a00e3329fdc0ae05f7a8257cce77037134d",
"source": "cna@vuldb.com"
},
{
"url": "https://gitee.com/dromara/J2EEFAST/issues/I6W390",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.227867",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.227867",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26987",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-01T22:15:09.483",
"lastModified": "2023-05-01T22:15:09.483",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:26.420",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27035",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-01T22:15:09.547",
"lastModified": "2023-05-01T22:15:09.547",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:26.420",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27108",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-01T22:15:09.617",
"lastModified": "2023-05-01T22:15:09.617",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:26.420",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29680",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-01T22:15:09.673",
"lastModified": "2023-05-01T22:15:09.673",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:26.420",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29681",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-01T22:15:09.723",
"lastModified": "2023-05-01T22:15:09.723",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:26.420",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-29772",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-02T13:15:24.957",
"lastModified": "2023-05-02T13:29:57.300",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A Cross-site scripting (XSS) vulnerability in the System Log/General Log page of the administrator web UI in ASUS RT-AC51U wireless router firmware version up to and including 3.0.0.4.380.8591 allows remote attackers to inject arbitrary web script or HTML via a malicious network request."
}
],
"metrics": {},
"references": [
{
"url": "https://gitlab.com/donnm/cves/-/blob/master/xss_rtac51u_syslog.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30639",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-01T22:15:09.770",
"lastModified": "2023-05-01T22:15:09.770",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:26.420",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30869",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-02T10:15:09.357",
"lastModified": "2023-05-02T10:15:09.357",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31207",
"sourceIdentifier": "security@checkmk.com",
"published": "2023-05-02T09:15:10.120",
"lastModified": "2023-05-02T09:15:10.120",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32007",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-02T09:15:10.207",
"lastModified": "2023-05-02T09:15:10.207",
"vulnStatus": "Received",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-02T12:00:24.363206+00:00
2023-05-02T14:00:24.246120+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-02T10:15:09.357000+00:00
2023-05-02T13:58:32.890000+00:00
```
### Last Data Feed Release
@ -29,22 +29,75 @@ Download and Changelog: [Click](releases/latest)
### Total Number of included CVEs
```plain
213915
213920
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `5`
* [CVE-2023-30869](CVE-2023/CVE-2023-308xx/CVE-2023-30869.json) (`2023-05-02T10:15:09.357`)
* [CVE-2023-23723](CVE-2023/CVE-2023-237xx/CVE-2023-23723.json) (`2023-05-02T12:15:22.430`)
* [CVE-2023-2473](CVE-2023/CVE-2023-24xx/CVE-2023-2473.json) (`2023-05-02T13:15:25.090`)
* [CVE-2023-2474](CVE-2023/CVE-2023-24xx/CVE-2023-2474.json) (`2023-05-02T13:15:25.197`)
* [CVE-2023-2475](CVE-2023/CVE-2023-24xx/CVE-2023-2475.json) (`2023-05-02T13:15:25.287`)
* [CVE-2023-29772](CVE-2023/CVE-2023-297xx/CVE-2023-29772.json) (`2023-05-02T13:15:24.957`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `51`
* [CVE-2022-1113](CVE-2022/CVE-2022-11xx/CVE-2022-1113.json) (`2023-05-02T10:15:08.983`)
* [CVE-2022-4471](CVE-2022/CVE-2022-44xx/CVE-2022-4471.json) (`2023-05-02T10:15:09.250`)
* [CVE-2013-10026](CVE-2013/CVE-2013-100xx/CVE-2013-10026.json) (`2023-05-02T12:56:18.213`)
* [CVE-2014-125100](CVE-2014/CVE-2014-1251xx/CVE-2014-125100.json) (`2023-05-02T12:56:18.213`)
* [CVE-2022-25713](CVE-2022/CVE-2022-257xx/CVE-2022-25713.json) (`2023-05-02T12:56:18.213`)
* [CVE-2022-33273](CVE-2022/CVE-2022-332xx/CVE-2022-33273.json) (`2023-05-02T12:56:18.213`)
* [CVE-2022-33281](CVE-2022/CVE-2022-332xx/CVE-2022-33281.json) (`2023-05-02T12:56:18.213`)
* [CVE-2022-33292](CVE-2022/CVE-2022-332xx/CVE-2022-33292.json) (`2023-05-02T12:56:18.213`)
* [CVE-2022-33304](CVE-2022/CVE-2022-333xx/CVE-2022-33304.json) (`2023-05-02T12:56:18.213`)
* [CVE-2022-33305](CVE-2022/CVE-2022-333xx/CVE-2022-33305.json) (`2023-05-02T12:56:18.213`)
* [CVE-2022-34144](CVE-2022/CVE-2022-341xx/CVE-2022-34144.json) (`2023-05-02T12:56:18.213`)
* [CVE-2022-35898](CVE-2022/CVE-2022-358xx/CVE-2022-35898.json) (`2023-05-02T12:56:26.420`)
* [CVE-2022-40504](CVE-2022/CVE-2022-405xx/CVE-2022-40504.json) (`2023-05-02T12:56:18.213`)
* [CVE-2022-40505](CVE-2022/CVE-2022-405xx/CVE-2022-40505.json) (`2023-05-02T12:56:18.213`)
* [CVE-2022-40508](CVE-2022/CVE-2022-405xx/CVE-2022-40508.json) (`2023-05-02T12:56:18.213`)
* [CVE-2022-48482](CVE-2022/CVE-2022-484xx/CVE-2022-48482.json) (`2023-05-02T12:56:18.213`)
* [CVE-2022-48483](CVE-2022/CVE-2022-484xx/CVE-2022-48483.json) (`2023-05-02T12:56:18.213`)
* [CVE-2023-0203](CVE-2023/CVE-2023-02xx/CVE-2023-0203.json) (`2023-05-02T13:53:49.337`)
* [CVE-2023-0204](CVE-2023/CVE-2023-02xx/CVE-2023-0204.json) (`2023-05-02T13:56:56.390`)
* [CVE-2023-0205](CVE-2023/CVE-2023-02xx/CVE-2023-0205.json) (`2023-05-02T13:58:32.890`)
* [CVE-2023-0891](CVE-2023/CVE-2023-08xx/CVE-2023-0891.json) (`2023-05-02T12:56:18.213`)
* [CVE-2023-0924](CVE-2023/CVE-2023-09xx/CVE-2023-0924.json) (`2023-05-02T12:56:18.213`)
* [CVE-2023-1021](CVE-2023/CVE-2023-10xx/CVE-2023-1021.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-1090](CVE-2023/CVE-2023-10xx/CVE-2023-1090.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-1125](CVE-2023/CVE-2023-11xx/CVE-2023-1125.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-1196](CVE-2023/CVE-2023-11xx/CVE-2023-1196.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-1525](CVE-2023/CVE-2023-15xx/CVE-2023-1525.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-1546](CVE-2023/CVE-2023-15xx/CVE-2023-1546.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-1554](CVE-2023/CVE-2023-15xx/CVE-2023-1554.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-1614](CVE-2023/CVE-2023-16xx/CVE-2023-1614.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-1669](CVE-2023/CVE-2023-16xx/CVE-2023-1669.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-1730](CVE-2023/CVE-2023-17xx/CVE-2023-1730.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-1804](CVE-2023/CVE-2023-18xx/CVE-2023-1804.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-1805](CVE-2023/CVE-2023-18xx/CVE-2023-1805.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-1809](CVE-2023/CVE-2023-18xx/CVE-2023-1809.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-1861](CVE-2023/CVE-2023-18xx/CVE-2023-1861.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-1911](CVE-2023/CVE-2023-19xx/CVE-2023-1911.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-2000](CVE-2023/CVE-2023-20xx/CVE-2023-2000.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-21642](CVE-2023/CVE-2023-216xx/CVE-2023-21642.json) (`2023-05-02T12:56:18.213`)
* [CVE-2023-21665](CVE-2023/CVE-2023-216xx/CVE-2023-21665.json) (`2023-05-02T12:56:18.213`)
* [CVE-2023-21666](CVE-2023/CVE-2023-216xx/CVE-2023-21666.json) (`2023-05-02T12:56:18.213`)
* [CVE-2023-2197](CVE-2023/CVE-2023-21xx/CVE-2023-2197.json) (`2023-05-02T12:56:26.420`)
* [CVE-2023-2210](CVE-2023/CVE-2023-22xx/CVE-2023-2210.json) (`2023-05-02T13:36:03.597`)
* [CVE-2023-2247](CVE-2023/CVE-2023-22xx/CVE-2023-2247.json) (`2023-05-02T12:56:18.213`)
* [CVE-2023-26987](CVE-2023/CVE-2023-269xx/CVE-2023-26987.json) (`2023-05-02T12:56:26.420`)
* [CVE-2023-27035](CVE-2023/CVE-2023-270xx/CVE-2023-27035.json) (`2023-05-02T12:56:26.420`)
* [CVE-2023-27108](CVE-2023/CVE-2023-271xx/CVE-2023-27108.json) (`2023-05-02T12:56:26.420`)
* [CVE-2023-29680](CVE-2023/CVE-2023-296xx/CVE-2023-29680.json) (`2023-05-02T12:56:26.420`)
* [CVE-2023-29681](CVE-2023/CVE-2023-296xx/CVE-2023-29681.json) (`2023-05-02T12:56:26.420`)
* [CVE-2023-30639](CVE-2023/CVE-2023-306xx/CVE-2023-30639.json) (`2023-05-02T12:56:26.420`)
* [CVE-2023-30869](CVE-2023/CVE-2023-308xx/CVE-2023-30869.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-31207](CVE-2023/CVE-2023-312xx/CVE-2023-31207.json) (`2023-05-02T12:56:12.940`)
* [CVE-2023-32007](CVE-2023/CVE-2023-320xx/CVE-2023-32007.json) (`2023-05-02T12:56:12.940`)
## Download and Usage