diff --git a/CVE-2005/CVE-2005-100xx/CVE-2005-10002.json b/CVE-2005/CVE-2005-100xx/CVE-2005-10002.json
index e4c47732dd1..a55d3606fee 100644
--- a/CVE-2005/CVE-2005-100xx/CVE-2005-10002.json
+++ b/CVE-2005/CVE-2005-100xx/CVE-2005-10002.json
@@ -2,8 +2,8 @@
"id": "CVE-2005-10002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-29T15:15:42.073",
- "lastModified": "2023-11-07T20:37:51.413",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:05:55.423",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2006/CVE-2006-100xx/CVE-2006-10001.json b/CVE-2006/CVE-2006-100xx/CVE-2006-10001.json
index 824fefa3790..ba809a60d9f 100644
--- a/CVE-2006/CVE-2006-100xx/CVE-2006-10001.json
+++ b/CVE-2006/CVE-2006-100xx/CVE-2006-10001.json
@@ -2,7 +2,7 @@
"id": "CVE-2006-10001",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T21:15:09.693",
- "lastModified": "2023-11-07T01:58:29.653",
+ "lastModified": "2024-02-29T01:06:38.930",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2007/CVE-2007-100xx/CVE-2007-10001.json b/CVE-2007/CVE-2007-100xx/CVE-2007-10001.json
index ebfda2eeb87..9f0cf8a71ae 100644
--- a/CVE-2007/CVE-2007-100xx/CVE-2007-10001.json
+++ b/CVE-2007/CVE-2007-100xx/CVE-2007-10001.json
@@ -2,7 +2,7 @@
"id": "CVE-2007-10001",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T12:15:09.040",
- "lastModified": "2023-11-07T02:00:16.863",
+ "lastModified": "2024-02-29T01:07:49.400",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2007/CVE-2007-100xx/CVE-2007-10002.json b/CVE-2007/CVE-2007-100xx/CVE-2007-10002.json
index 7220c2069e2..25c8f13089f 100644
--- a/CVE-2007/CVE-2007-100xx/CVE-2007-10002.json
+++ b/CVE-2007/CVE-2007-100xx/CVE-2007-10002.json
@@ -2,7 +2,7 @@
"id": "CVE-2007-10002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T10:15:10.950",
- "lastModified": "2023-11-07T02:00:17.043",
+ "lastModified": "2024-02-29T01:07:49.513",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2007/CVE-2007-100xx/CVE-2007-10003.json b/CVE-2007/CVE-2007-100xx/CVE-2007-10003.json
index 8210e2c937f..e5bf157ed2b 100644
--- a/CVE-2007/CVE-2007-100xx/CVE-2007-10003.json
+++ b/CVE-2007/CVE-2007-100xx/CVE-2007-10003.json
@@ -2,8 +2,8 @@
"id": "CVE-2007-10003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-29T18:15:38.687",
- "lastModified": "2023-11-07T20:39:37.933",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:07:49.613",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2008/CVE-2008-100xx/CVE-2008-10002.json b/CVE-2008/CVE-2008-100xx/CVE-2008-10002.json
index 781667eeed7..58832218c76 100644
--- a/CVE-2008/CVE-2008-100xx/CVE-2008-10002.json
+++ b/CVE-2008/CVE-2008-100xx/CVE-2008-10002.json
@@ -2,7 +2,7 @@
"id": "CVE-2008-10002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T02:15:58.877",
- "lastModified": "2023-11-07T02:01:51.037",
+ "lastModified": "2024-02-29T01:08:54.710",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2008/CVE-2008-100xx/CVE-2008-10003.json b/CVE-2008/CVE-2008-100xx/CVE-2008-10003.json
index 2de9ef98684..df7b0bd3b17 100644
--- a/CVE-2008/CVE-2008-100xx/CVE-2008-10003.json
+++ b/CVE-2008/CVE-2008-100xx/CVE-2008-10003.json
@@ -2,7 +2,7 @@
"id": "CVE-2008-10003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T02:15:58.983",
- "lastModified": "2023-11-07T02:01:51.203",
+ "lastModified": "2024-02-29T01:08:54.813",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2008/CVE-2008-100xx/CVE-2008-10004.json b/CVE-2008/CVE-2008-100xx/CVE-2008-10004.json
index 1a3a8c4f913..00a6e645e45 100644
--- a/CVE-2008/CVE-2008-100xx/CVE-2008-10004.json
+++ b/CVE-2008/CVE-2008-100xx/CVE-2008-10004.json
@@ -2,7 +2,7 @@
"id": "CVE-2008-10004",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T23:15:10.123",
- "lastModified": "2023-11-07T02:01:51.383",
+ "lastModified": "2024-02-29T01:08:54.893",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2009/CVE-2009-100xx/CVE-2009-10001.json b/CVE-2009/CVE-2009-100xx/CVE-2009-10001.json
index b0999eea5a8..3d730223d92 100644
--- a/CVE-2009/CVE-2009-100xx/CVE-2009-10001.json
+++ b/CVE-2009/CVE-2009-100xx/CVE-2009-10001.json
@@ -2,7 +2,7 @@
"id": "CVE-2009-10001",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T18:15:08.750",
- "lastModified": "2023-11-07T02:03:47.383",
+ "lastModified": "2024-02-29T01:10:01.770",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2009/CVE-2009-100xx/CVE-2009-10002.json b/CVE-2009/CVE-2009-100xx/CVE-2009-10002.json
index e0d2568b363..b9cbdcad0c7 100644
--- a/CVE-2009/CVE-2009-100xx/CVE-2009-10002.json
+++ b/CVE-2009/CVE-2009-100xx/CVE-2009-10002.json
@@ -2,7 +2,7 @@
"id": "CVE-2009-10002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T18:15:10.333",
- "lastModified": "2023-11-07T02:03:47.563",
+ "lastModified": "2024-02-29T01:10:01.890",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2009/CVE-2009-100xx/CVE-2009-10003.json b/CVE-2009/CVE-2009-100xx/CVE-2009-10003.json
index ef5828ece54..3158f6d6447 100644
--- a/CVE-2009/CVE-2009-100xx/CVE-2009-10003.json
+++ b/CVE-2009/CVE-2009-100xx/CVE-2009-10003.json
@@ -2,7 +2,7 @@
"id": "CVE-2009-10003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-29T19:15:08.810",
- "lastModified": "2023-11-07T02:03:47.733",
+ "lastModified": "2024-02-29T01:10:01.967",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2009/CVE-2009-100xx/CVE-2009-10004.json b/CVE-2009/CVE-2009-100xx/CVE-2009-10004.json
index 9bf68ac395a..a8c1344de71 100644
--- a/CVE-2009/CVE-2009-100xx/CVE-2009-10004.json
+++ b/CVE-2009/CVE-2009-100xx/CVE-2009-10004.json
@@ -2,7 +2,7 @@
"id": "CVE-2009-10004",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T00:15:08.113",
- "lastModified": "2023-11-07T02:03:48.023",
+ "lastModified": "2024-02-29T01:10:02.070",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2010/CVE-2010-100xx/CVE-2010-10002.json b/CVE-2010/CVE-2010-100xx/CVE-2010-10002.json
index 0dc210c5ab6..c385d767299 100644
--- a/CVE-2010/CVE-2010-100xx/CVE-2010-10002.json
+++ b/CVE-2010/CVE-2010-100xx/CVE-2010-10002.json
@@ -2,7 +2,7 @@
"id": "CVE-2010-10002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-01T17:15:09.963",
- "lastModified": "2023-11-07T02:05:11.980",
+ "lastModified": "2024-02-29T01:10:48.450",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2010/CVE-2010-100xx/CVE-2010-10003.json b/CVE-2010/CVE-2010-100xx/CVE-2010-10003.json
index c3122e74b8e..92b5710e406 100644
--- a/CVE-2010/CVE-2010-100xx/CVE-2010-10003.json
+++ b/CVE-2010/CVE-2010-100xx/CVE-2010-10003.json
@@ -2,12 +2,16 @@
"id": "CVE-2010-10003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T10:15:09.577",
- "lastModified": "2023-11-07T02:05:12.173",
+ "lastModified": "2024-02-29T01:10:48.553",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in gesellix titlelink on Joomla. Affected by this vulnerability is an unknown functionality of the file plugin_content_title.php. The manipulation of the argument phrase leads to sql injection. The patch is named b4604e523853965fa981a4e79aef4b554a535db0. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217351."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en gesellix titlelink en Joomla y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo plugin_content_title.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n de la frase argumental conduce a la inyecci\u00f3n de SQL. El parche se llama b4604e523853965fa981a4e79aef4b554a535db0. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-217351."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2010/CVE-2010-100xx/CVE-2010-10004.json b/CVE-2010/CVE-2010-100xx/CVE-2010-10004.json
index c09045c98a3..fc5577fc96c 100644
--- a/CVE-2010/CVE-2010-100xx/CVE-2010-10004.json
+++ b/CVE-2010/CVE-2010-100xx/CVE-2010-10004.json
@@ -2,7 +2,7 @@
"id": "CVE-2010-10004",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T08:15:10.683",
- "lastModified": "2023-11-07T02:05:12.337",
+ "lastModified": "2024-02-29T01:10:48.633",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2010/CVE-2010-100xx/CVE-2010-10006.json b/CVE-2010/CVE-2010-100xx/CVE-2010-10006.json
index 9bf7e891341..8b1f22eed1f 100644
--- a/CVE-2010/CVE-2010-100xx/CVE-2010-10006.json
+++ b/CVE-2010/CVE-2010-100xx/CVE-2010-10006.json
@@ -2,7 +2,7 @@
"id": "CVE-2010-10006",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T00:15:11.420",
- "lastModified": "2023-11-07T02:05:12.610",
+ "lastModified": "2024-02-29T01:10:48.717",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2010/CVE-2010-100xx/CVE-2010-10007.json b/CVE-2010/CVE-2010-100xx/CVE-2010-10007.json
index 4e99fe73582..b61d7364d79 100644
--- a/CVE-2010/CVE-2010-100xx/CVE-2010-10007.json
+++ b/CVE-2010/CVE-2010-100xx/CVE-2010-10007.json
@@ -2,12 +2,16 @@
"id": "CVE-2010-10007",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T06:15:11.023",
- "lastModified": "2023-11-07T02:05:12.783",
+ "lastModified": "2024-02-29T01:10:48.810",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in lierdakil click-reminder. It has been rated as critical. This issue affects the function db_query of the file src/backend/include/BaseAction.php. The manipulation leads to sql injection. The identifier of the patch is 41213b660e8eb01b22c8074f06208f59a73ca8dc. It is recommended to apply a patch to fix this issue. The identifier VDB-218465 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ },
+ {
+ "lang": "es",
+ "value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Se encontr\u00f3 una vulnerabilidad en lierdakil click-reminder. Ha sido declarada como cr\u00edtica. Este problema afecta la funci\u00f3n db_query del archivo src/backend/include/BaseAction.php. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El identificador del parche es 41213b660e8eb01b22c8074f06208f59a73ca8dc. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-218465. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2010/CVE-2010-100xx/CVE-2010-10008.json b/CVE-2010/CVE-2010-100xx/CVE-2010-10008.json
index 1cfb6107df9..711d6ae5f83 100644
--- a/CVE-2010/CVE-2010-100xx/CVE-2010-10008.json
+++ b/CVE-2010/CVE-2010-100xx/CVE-2010-10008.json
@@ -2,7 +2,7 @@
"id": "CVE-2010-10008",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T08:15:10.063",
- "lastModified": "2023-11-07T02:05:13.047",
+ "lastModified": "2024-02-29T01:10:48.893",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2010/CVE-2010-100xx/CVE-2010-10009.json b/CVE-2010/CVE-2010-100xx/CVE-2010-10009.json
index 6f2255b4786..e9b38a074fe 100644
--- a/CVE-2010/CVE-2010-100xx/CVE-2010-10009.json
+++ b/CVE-2010/CVE-2010-100xx/CVE-2010-10009.json
@@ -2,7 +2,7 @@
"id": "CVE-2010-10009",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T21:15:10.160",
- "lastModified": "2023-11-07T02:05:13.230",
+ "lastModified": "2024-02-29T01:10:48.973",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2010/CVE-2010-100xx/CVE-2010-10010.json b/CVE-2010/CVE-2010-100xx/CVE-2010-10010.json
index aa5f732fbf5..46003816305 100644
--- a/CVE-2010/CVE-2010-100xx/CVE-2010-10010.json
+++ b/CVE-2010/CVE-2010-100xx/CVE-2010-10010.json
@@ -2,7 +2,7 @@
"id": "CVE-2010-10010",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-01T05:15:09.503",
- "lastModified": "2024-02-14T01:17:43.863",
+ "lastModified": "2024-02-29T01:10:49.057",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2010/CVE-2010-100xx/CVE-2010-10011.json b/CVE-2010/CVE-2010-100xx/CVE-2010-10011.json
index 0636f05c629..0ba306f6f07 100644
--- a/CVE-2010/CVE-2010-100xx/CVE-2010-10011.json
+++ b/CVE-2010/CVE-2010-100xx/CVE-2010-10011.json
@@ -2,8 +2,8 @@
"id": "CVE-2010-10011",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-12T20:15:46.833",
- "lastModified": "2024-01-22T16:41:48.287",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:10:49.153",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2011/CVE-2011-100xx/CVE-2011-10001.json b/CVE-2011/CVE-2011-100xx/CVE-2011-10001.json
index 5aec2cc83bb..ba409b39b0b 100644
--- a/CVE-2011/CVE-2011-100xx/CVE-2011-10001.json
+++ b/CVE-2011/CVE-2011-100xx/CVE-2011-10001.json
@@ -2,7 +2,7 @@
"id": "CVE-2011-10001",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T16:15:10.617",
- "lastModified": "2023-11-07T02:06:54.740",
+ "lastModified": "2024-02-29T01:11:40.270",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2011/CVE-2011-100xx/CVE-2011-10002.json b/CVE-2011/CVE-2011-100xx/CVE-2011-10002.json
index b58ea259d1d..1260343400c 100644
--- a/CVE-2011/CVE-2011-100xx/CVE-2011-10002.json
+++ b/CVE-2011/CVE-2011-100xx/CVE-2011-10002.json
@@ -2,7 +2,7 @@
"id": "CVE-2011-10002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-07T17:15:09.180",
- "lastModified": "2023-11-07T02:06:54.953",
+ "lastModified": "2024-02-29T01:11:40.360",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2011/CVE-2011-100xx/CVE-2011-10003.json b/CVE-2011/CVE-2011-100xx/CVE-2011-10003.json
index f8496977358..f5824e21fcc 100644
--- a/CVE-2011/CVE-2011-100xx/CVE-2011-10003.json
+++ b/CVE-2011/CVE-2011-100xx/CVE-2011-10003.json
@@ -2,7 +2,7 @@
"id": "CVE-2011-10003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-07T21:15:08.917",
- "lastModified": "2023-11-07T02:06:55.127",
+ "lastModified": "2024-02-29T01:11:40.460",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2011/CVE-2011-100xx/CVE-2011-10004.json b/CVE-2011/CVE-2011-100xx/CVE-2011-10004.json
index 394e199c021..a4e94adb4a6 100644
--- a/CVE-2011/CVE-2011-100xx/CVE-2011-10004.json
+++ b/CVE-2011/CVE-2011-100xx/CVE-2011-10004.json
@@ -2,7 +2,7 @@
"id": "CVE-2011-10004",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-17T00:15:10.500",
- "lastModified": "2023-11-07T02:06:55.280",
+ "lastModified": "2024-02-29T01:11:40.540",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2011/CVE-2011-100xx/CVE-2011-10005.json b/CVE-2011/CVE-2011-100xx/CVE-2011-10005.json
index a5e0d9e25fd..7856b1012ae 100644
--- a/CVE-2011/CVE-2011-100xx/CVE-2011-10005.json
+++ b/CVE-2011/CVE-2011-100xx/CVE-2011-10005.json
@@ -2,8 +2,8 @@
"id": "CVE-2011-10005",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-16T08:15:07.933",
- "lastModified": "2024-01-22T21:14:22.763",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:11:40.630",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10002.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10002.json
index e6aee5dfde5..94f7b738ff0 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10002.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10002.json
@@ -2,7 +2,7 @@
"id": "CVE-2012-10002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-03T09:15:09.463",
- "lastModified": "2023-11-07T02:10:08.783",
+ "lastModified": "2024-02-29T01:12:27.267",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10003.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10003.json
index 999d91a01f8..8d6a586484a 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10003.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10003.json
@@ -2,7 +2,7 @@
"id": "CVE-2012-10003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-03T12:15:10.117",
- "lastModified": "2023-11-07T02:10:08.997",
+ "lastModified": "2024-02-29T01:12:27.347",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10004.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10004.json
index c3331ecb154..4ee8ed7d4e9 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10004.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10004.json
@@ -2,7 +2,7 @@
"id": "CVE-2012-10004",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T07:15:09.917",
- "lastModified": "2023-11-07T02:10:09.273",
+ "lastModified": "2024-02-29T01:12:27.423",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10005.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10005.json
index df9d236a585..7a719e040e0 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10005.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10005.json
@@ -2,7 +2,7 @@
"id": "CVE-2012-10005",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-12T16:15:09.257",
- "lastModified": "2023-11-07T02:10:09.453",
+ "lastModified": "2024-02-29T01:12:27.513",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10006.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10006.json
index 1da754c22f2..666a9d977fe 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10006.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10006.json
@@ -2,7 +2,7 @@
"id": "CVE-2012-10006",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T16:15:10.743",
- "lastModified": "2023-11-07T02:10:09.633",
+ "lastModified": "2024-02-29T01:12:27.593",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10007.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10007.json
index f2729fdae4f..bd094a45239 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10007.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10007.json
@@ -2,7 +2,7 @@
"id": "CVE-2012-10007",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-19T16:15:16.357",
- "lastModified": "2023-11-07T02:10:09.817",
+ "lastModified": "2024-02-29T01:12:27.670",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10008.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10008.json
index 970cf6df418..a9f363e6cd7 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10008.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10008.json
@@ -2,7 +2,7 @@
"id": "CVE-2012-10008",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T07:15:21.817",
- "lastModified": "2023-11-07T02:10:10.020",
+ "lastModified": "2024-02-29T01:12:27.757",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10009.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10009.json
index 76b9cd83c90..c8c1861e508 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10009.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10009.json
@@ -2,7 +2,7 @@
"id": "CVE-2012-10009",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-21T00:15:10.163",
- "lastModified": "2023-11-07T02:10:10.217",
+ "lastModified": "2024-02-29T01:12:27.843",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10010.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10010.json
index ddaf07d4ca9..ae914a63b06 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10010.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10010.json
@@ -2,7 +2,7 @@
"id": "CVE-2012-10010",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-09T06:15:10.303",
- "lastModified": "2023-11-07T02:10:10.400",
+ "lastModified": "2024-02-29T01:12:27.933",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10011.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10011.json
index 83c095a3f56..709601d5c0e 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10011.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10011.json
@@ -2,7 +2,7 @@
"id": "CVE-2012-10011",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-09T22:15:07.007",
- "lastModified": "2023-11-07T02:10:10.567",
+ "lastModified": "2024-02-29T01:12:28.013",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10012.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10012.json
index 41be52ff322..b145e1426d4 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10012.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10012.json
@@ -2,7 +2,7 @@
"id": "CVE-2012-10012",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T00:15:08.190",
- "lastModified": "2023-11-07T02:10:10.737",
+ "lastModified": "2024-02-29T01:12:28.093",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10013.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10013.json
index a83f11375ca..ea5237dd046 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10013.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10013.json
@@ -2,7 +2,7 @@
"id": "CVE-2012-10013",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-24T18:15:08.783",
- "lastModified": "2023-11-07T02:10:10.903",
+ "lastModified": "2024-02-29T01:12:28.170",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10014.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10014.json
index eae300cb383..c5d7bac58e2 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10014.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10014.json
@@ -2,7 +2,7 @@
"id": "CVE-2012-10014",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-24T18:15:08.867",
- "lastModified": "2023-11-07T02:10:11.093",
+ "lastModified": "2024-02-29T01:12:28.260",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10015.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10015.json
index 18a34b5b7a0..adf8f23be22 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10015.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10015.json
@@ -2,7 +2,7 @@
"id": "CVE-2012-10015",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T00:15:09.417",
- "lastModified": "2023-11-07T02:10:11.260",
+ "lastModified": "2024-02-29T01:12:28.333",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10016.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10016.json
index d7e8d3babef..ff28602484c 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10016.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10016.json
@@ -2,7 +2,7 @@
"id": "CVE-2012-10016",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-17T00:15:10.603",
- "lastModified": "2023-11-07T02:10:11.430",
+ "lastModified": "2024-02-29T01:12:28.427",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10017.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10017.json
index d30faa360bc..e865bc94d1b 100644
--- a/CVE-2012/CVE-2012-100xx/CVE-2012-10017.json
+++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10017.json
@@ -2,8 +2,8 @@
"id": "CVE-2012-10017",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-26T10:15:07.483",
- "lastModified": "2024-01-04T02:51:03.117",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:12:28.510",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10006.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10006.json
index 1d51747c6b0..04c8b329c10 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10006.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10006.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10006",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-01T17:15:10.090",
- "lastModified": "2023-11-07T02:14:33.513",
+ "lastModified": "2024-02-29T01:13:22.877",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10007.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10007.json
index 0118d4a8d3d..4d2dc76beb0 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10007.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10007.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10007",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-03T11:15:09.987",
- "lastModified": "2023-11-07T02:14:33.710",
+ "lastModified": "2024-02-29T01:13:22.977",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10008.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10008.json
index 8340092d024..1f611516887 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10008.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10008.json
@@ -2,12 +2,16 @@
"id": "CVE-2013-10008",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T22:15:08.900",
- "lastModified": "2023-11-07T02:14:33.880",
+ "lastModified": "2024-02-29T01:13:23.067",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in sheilazpy eShop. It has been classified as critical. Affected is an unknown function. The manipulation leads to sql injection. The name of the patch is e096c5849c4dc09e1074104531014a62a5413884. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217572."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en sheilazpy eShop. Ha sido clasificada como cr\u00edtica. Una funci\u00f3n desconocida es afectada por esta funci\u00f3n. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El nombre del parche es e096c5849c4dc09e1074104531014a62a5413884. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-217572."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10009.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10009.json
index a740f927755..640cae0f2e6 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10009.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10009.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10009",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T20:15:08.887",
- "lastModified": "2023-11-07T02:14:34.053",
+ "lastModified": "2024-02-29T01:13:23.150",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10010.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10010.json
index f41d75bede8..166d757b041 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10010.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10010.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10010",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T16:15:09.510",
- "lastModified": "2023-11-07T02:14:34.220",
+ "lastModified": "2024-02-29T01:13:23.230",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10011.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10011.json
index 46ddae061e8..43f50ecd8d4 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10011.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10011.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10011",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-12T16:15:09.347",
- "lastModified": "2023-11-07T02:14:34.390",
+ "lastModified": "2024-02-29T01:13:23.323",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10012.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10012.json
index 2e158b90c20..71ba4ff00f6 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10012.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10012.json
@@ -2,12 +2,16 @@
"id": "CVE-2013-10012",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T11:15:10.037",
- "lastModified": "2023-11-07T02:14:34.597",
+ "lastModified": "2024-02-29T01:13:23.410",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in antonbolling clan7ups. Affected is an unknown function of the component Login/Session. The manipulation leads to sql injection. The name of the patch is 25afad571c488291033958d845830ba0a1710764. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218388."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en antonbolling clan7ups y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del componente Login/Session es afectada por esta funci\u00f3n. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El nombre del parche es 25afad571c488291033958d845830ba0a1710764. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-218388."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10013.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10013.json
index 1afa2cd2f9b..6c137ed06dd 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10013.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10013.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10013",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T16:15:16.060",
- "lastModified": "2023-11-07T02:14:34.793",
+ "lastModified": "2024-02-29T01:13:23.497",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10014.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10014.json
index 97522a5cd1f..4644bb3a6ce 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10014.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10014.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10014",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-19T10:15:10.483",
- "lastModified": "2023-11-07T02:14:34.970",
+ "lastModified": "2024-02-29T01:13:23.583",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10015.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10015.json
index aeb3447fd27..650b4298eae 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10015.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10015.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10015",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-03T20:15:09.340",
- "lastModified": "2023-11-07T02:14:35.130",
+ "lastModified": "2024-02-29T01:13:23.667",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10016.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10016.json
index 9a2c8408f51..9bbe34aeb44 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10016.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10016.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10016",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-03T20:15:09.913",
- "lastModified": "2023-11-07T02:14:35.320",
+ "lastModified": "2024-02-29T01:13:23.763",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10017.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10017.json
index 4edca602c56..3fa96b16a5a 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10017.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10017.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10017",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-04T00:15:08.660",
- "lastModified": "2023-11-07T02:14:35.487",
+ "lastModified": "2024-02-29T01:13:23.840",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10018.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10018.json
index 7a59eb58e72..b4b6a08124e 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10018.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10018.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10018",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-04T00:15:08.830",
- "lastModified": "2023-11-07T02:14:35.657",
+ "lastModified": "2024-02-29T01:13:23.920",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10019.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10019.json
index 854e021af8d..68abae807e2 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10019.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10019.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10019",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T07:15:22.357",
- "lastModified": "2023-11-07T02:14:35.820",
+ "lastModified": "2024-02-29T01:13:24.000",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10020.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10020.json
index 54b9d0189f0..f9638537a2e 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10020.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10020.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10020",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-10T01:15:11.693",
- "lastModified": "2023-11-07T02:14:35.997",
+ "lastModified": "2024-02-29T01:13:24.120",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10021.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10021.json
index 299a5081131..08556588d81 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10021.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10021.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10021",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-11T21:15:09.247",
- "lastModified": "2023-11-07T02:14:36.180",
+ "lastModified": "2024-02-29T01:13:24.223",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10022.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10022.json
index 60fc313b487..2b1bbbd9575 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10022.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10022.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10022",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T13:15:06.830",
- "lastModified": "2023-11-07T02:14:36.390",
+ "lastModified": "2024-02-29T01:13:24.327",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10023.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10023.json
index ca6999b46f4..14837c53ae3 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10023.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10023.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10023",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T09:15:07.000",
- "lastModified": "2023-11-07T02:14:36.587",
+ "lastModified": "2024-02-29T01:13:24.417",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10024.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10024.json
index 5258bd82a03..ba2069aa89a 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10024.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10024.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10024",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T17:15:06.920",
- "lastModified": "2023-11-07T02:14:36.760",
+ "lastModified": "2024-02-29T01:13:24.497",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10025.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10025.json
index f1083c40ff4..966e64b3d1f 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10025.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10025.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10025",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T17:15:06.987",
- "lastModified": "2023-11-07T02:14:36.940",
+ "lastModified": "2024-02-29T01:13:24.573",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10026.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10026.json
index 75b333a6516..07c9ad1b520 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10026.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10026.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10026",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T02:15:27.267",
- "lastModified": "2023-11-07T02:14:37.107",
+ "lastModified": "2024-02-29T01:13:24.653",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10027.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10027.json
index f6386d37a65..6f20f8bf289 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10027.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10027.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10027",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-04T14:15:09.397",
- "lastModified": "2023-11-07T02:14:37.290",
+ "lastModified": "2024-02-29T01:13:24.743",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10028.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10028.json
index de5110e96f0..bf7a27cc324 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10028.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10028.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10028",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-04T19:15:09.620",
- "lastModified": "2023-11-07T02:14:37.477",
+ "lastModified": "2024-02-29T01:13:24.833",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10029.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10029.json
index def6de1f318..76c3e426175 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10029.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10029.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10029",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-05T21:15:09.250",
- "lastModified": "2023-11-07T02:14:37.657",
+ "lastModified": "2024-02-29T01:13:24.910",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10030.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10030.json
index baf4d71930f..9b70f0e7af1 100644
--- a/CVE-2013/CVE-2013-100xx/CVE-2013-10030.json
+++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10030.json
@@ -2,7 +2,7 @@
"id": "CVE-2013-10030",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-05T22:15:09.260",
- "lastModified": "2023-11-07T02:14:37.853",
+ "lastModified": "2024-02-29T01:13:24.997",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125027.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125027.json
index 305356c8e8b..1072f1a3264 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125027.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125027.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125027",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-31T16:15:08.650",
- "lastModified": "2023-11-07T02:18:32.803",
+ "lastModified": "2024-02-29T01:14:30.970",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Yuna Scatari TBDev up to 2.1.17 and classified as problematic. Affected by this vulnerability is the function get_user_icons of the file usersearch.php. The manipulation of the argument n/r/r2/em/ip/co/ma/d/d2/ul/ul2/ls/ls2/dl/dl2 leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.1.18 is able to address this issue. The patch is named 0ba3fd4be29dd48fa4455c236a9403b3149a4fd4. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217147."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Yuna Scatari TBDev hasta 2.1.17 y clasificada como problem\u00e1tica. La funci\u00f3n get_user_icons del archivo usersearch.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento n/r/r2/em/ip/co/ma/d/d2/ul/ul2/ls/ls2/dl/dl2 conduce a cross-site scripting. El ataque se puede lanzar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 2.1.18 puede solucionar este problema. El nombre del parche es 0ba3fd4be29dd48fa4455c236a9403b3149a4fd4. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-217147."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125028.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125028.json
index cce19927b7d..d42af510200 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125028.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125028.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125028",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-31T20:15:08.507",
- "lastModified": "2023-11-07T02:18:32.983",
+ "lastModified": "2024-02-29T01:14:31.073",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in valtech IDP Test Client and classified as problematic. Affected by this issue is some unknown functionality of the file python-flask/main.py. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The name of the patch is f1e7b3d431c8681ec46445557125890c14fa295f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217148."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en valtech IDP Test Client y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo python-flask/main.py es afectada por este problema. La manipulaci\u00f3n conduce a la Cross-Site Request Forgery (CSRF). El ataque puede lanzarse de forma remota. El nombre del parche es f1e7b3d431c8681ec46445557125890c14fa295f. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-217148."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125029.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125029.json
index 07d61dd2fc7..8c6fc5686f5 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125029.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125029.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125029",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T22:15:08.637",
- "lastModified": "2023-11-07T02:18:33.177",
+ "lastModified": "2024-02-29T01:14:31.167",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125030.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125030.json
index 0c0dc8b50b6..f16ed70b7b1 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125030.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125030.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125030",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-01T09:15:09.463",
- "lastModified": "2023-11-07T02:18:33.357",
+ "lastModified": "2024-02-29T01:14:31.253",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125031.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125031.json
index 8e60b0bdb4b..618ba13c358 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125031.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125031.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125031",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T08:15:09.583",
- "lastModified": "2023-11-07T02:18:33.580",
+ "lastModified": "2024-02-29T01:14:31.360",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125032.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125032.json
index 9758ac2e01e..56d26aaa2e1 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125032.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125032.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125032",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T08:15:09.827",
- "lastModified": "2023-11-07T02:18:33.780",
+ "lastModified": "2024-02-29T01:14:31.460",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125033.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125033.json
index d56c7613460..3c1b0be46df 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125033.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125033.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125033",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T08:15:09.930",
- "lastModified": "2023-11-07T02:18:33.947",
+ "lastModified": "2024-02-29T01:14:31.557",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125034.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125034.json
index 9f9895a0a10..24f18d83bd7 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125034.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125034.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125034",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T11:15:09.963",
- "lastModified": "2023-11-07T02:18:34.110",
+ "lastModified": "2024-02-29T01:14:31.653",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125035.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125035.json
index 10eda0a500f..cd5aa692ef5 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125035.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125035.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125035",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T16:15:10.330",
- "lastModified": "2023-11-07T02:18:34.273",
+ "lastModified": "2024-02-29T01:14:31.743",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125036.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125036.json
index bddcc87e3ad..dd0ef2a7920 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125036.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125036.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125036",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T19:15:10.280",
- "lastModified": "2023-11-07T02:18:34.510",
+ "lastModified": "2024-02-29T01:14:31.830",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125037.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125037.json
index c2219c7087a..4ca2dc68d0d 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125037.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125037.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125037",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T18:15:18.787",
- "lastModified": "2023-11-07T02:18:34.703",
+ "lastModified": "2024-02-29T01:14:31.923",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125038.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125038.json
index 7d5924af23d..debe241fb30 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125038.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125038.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125038",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T18:15:18.913",
- "lastModified": "2023-11-07T02:18:34.883",
+ "lastModified": "2024-02-29T01:14:32.020",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125039.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125039.json
index 58a6c2f25d1..e10a3837f7c 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125039.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125039.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125039",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T10:15:10.100",
- "lastModified": "2023-11-07T02:18:35.070",
+ "lastModified": "2024-02-29T01:14:32.110",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in kkokko NeoXplora. Affected by this issue is some unknown functionality of the component Trainer Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is dce1aecd6ee050a29f953ffd8f02f21c7c13f1e6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217352."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en kkokko NeoXplora y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del componente Trainer Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a cross site scripting. El ataque puede lanzarse de forma remota. El nombre del parche es dce1aecd6ee050a29f953ffd8f02f21c7c13f1e6. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-217352."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125040.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125040.json
index 3318e49839b..e8b60f8f076 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125040.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125040.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125040",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T14:15:08.517",
- "lastModified": "2023-11-07T02:18:35.240",
+ "lastModified": "2024-02-29T01:14:32.197",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125041.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125041.json
index 3455c34b93a..0d04ac31936 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125041.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125041.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125041",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T15:15:10.177",
- "lastModified": "2023-11-07T02:18:35.420",
+ "lastModified": "2024-02-29T01:14:32.313",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125044.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125044.json
index f747557058b..ce0045fe49e 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125044.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125044.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125044",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T20:15:18.150",
- "lastModified": "2023-11-07T02:18:35.653",
+ "lastModified": "2024-02-29T01:14:32.413",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125045.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125045.json
index 3a03e1aae84..f12883a8e0e 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125045.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125045.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125045",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T22:15:08.700",
- "lastModified": "2023-11-07T02:18:35.843",
+ "lastModified": "2024-02-29T01:14:32.507",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125046.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125046.json
index 27c800ef059..b0fb7bac75c 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125046.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125046.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125046",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T10:15:09.437",
- "lastModified": "2023-11-07T02:18:36.007",
+ "lastModified": "2024-02-29T01:14:32.607",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125047.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125047.json
index c2ae3c94973..c13fd087142 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125047.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125047.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125047",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T12:15:08.657",
- "lastModified": "2023-11-07T02:18:36.170",
+ "lastModified": "2024-02-29T01:14:32.693",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in tbezman school-store. This affects an unknown part. The manipulation leads to sql injection. The identifier of the patch is 2957fc97054216d3a393f1775efd01ae2b072001. It is recommended to apply a patch to fix this issue. The identifier VDB-217557 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en la tienda de la escuela de tbezman y clasificada como cr\u00edtica. Esto afecta a una parte desconocida. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El identificador del parche es 2957fc97054216d3a393f1775efd01ae2b072001. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217557."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125048.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125048.json
index 8d1c7621c9b..05c2d5786d1 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125048.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125048.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125048",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T13:15:09.670",
- "lastModified": "2023-11-07T02:18:36.327",
+ "lastModified": "2024-02-29T01:14:32.787",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in kassi xingwall. This issue affects some unknown processing of the file app/controllers/oauth.js. The manipulation leads to session fixiation. The patch is named e9f0d509e1408743048e29d9c099d36e0e1f6ae7. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217559."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en kassi xingwall y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo app/controllers/oauth.js. La manipulaci\u00f3n conduce a la fijaci\u00f3n de la sesi\u00f3n. El parche se llama e9f0d509e1408743048e29d9c099d36e0e1f6ae7. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-217559."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.5
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125049.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125049.json
index c1d9443a6d0..eafb0283b87 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125049.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125049.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125049",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T13:15:09.750",
- "lastModified": "2023-11-07T02:18:36.510",
+ "lastModified": "2024-02-29T01:14:32.877",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in typcn Blogile. Affected is the function getNav of the file server.js. The manipulation of the argument query leads to sql injection. The name of the patch is cfec31043b562ffefe29fe01af6d3c5ed1bf8f7d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217560. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ },
+ {
+ "lang": "es",
+ "value": "** NO SOPORTADO CUANDO ASIGNADO ** Una vulnerabilidad clasificada como cr\u00edtica fue encontrada en typcn Blogile. La funci\u00f3n getNav del archivo server.js es afectada por la vulnerabilidad. La manipulaci\u00f3n del argumento query conduce a la inyecci\u00f3n de SQL. El nombre del parche es cfec31043b562ffefe29fe01af6d3c5ed1bf8f7d. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-217560. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125050.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125050.json
index 88e7f8ca37c..ea9c87f3e18 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125050.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125050.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125050",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T17:15:08.870",
- "lastModified": "2023-11-07T02:18:36.670",
+ "lastModified": "2024-02-29T01:14:32.963",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ScottTZhang voter-js and classified as critical. Affected by this issue is some unknown functionality of the file main.js. The manipulation leads to sql injection. The patch is identified as 6317c67a56061aeeaeed3cf9ec665fd9983d8044. It is recommended to apply a patch to fix this issue. VDB-217562 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en ScottTZhang voter-js y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo main.js es afectada por este problema. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El parche se identifica como 6317c67a56061aeaeed3cf9ec665fd9983d8044. Se recomienda aplicar un parche para solucionar este problema. VDB-217562 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125051.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125051.json
index 8e022303f50..1b377b0cc76 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125051.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125051.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125051",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T17:15:08.977",
- "lastModified": "2023-11-07T02:18:36.830",
+ "lastModified": "2024-02-29T01:14:33.050",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in himiklab yii2-jqgrid-widget up to 1.0.7. It has been declared as critical. This vulnerability affects the function addSearchOptionsRecursively of the file JqGridAction.php. The manipulation leads to sql injection. Upgrading to version 1.0.8 is able to address this issue. The name of the patch is a117e0f2df729e3ff726968794d9a5ac40e660b9. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217564."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en himiklab yii2-jqgrid-widget hasta 1.0.7. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n addSearchOptionsRecursively del archivo JqGridAction.php. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. La actualizaci\u00f3n a la versi\u00f3n 1.0.8 puede solucionar este problema. El nombre del parche es a117e0f2df729e3ff726968794d9a5ac40e660b9. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-217564."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125052.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125052.json
index 04fde91bd65..8d420045c58 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125052.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125052.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125052",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T21:15:09.060",
- "lastModified": "2023-11-07T02:18:36.990",
+ "lastModified": "2024-02-29T01:14:33.137",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in JervenBolleman sparql-identifiers and classified as critical. This issue affects some unknown processing of the file src/main/java/org/identifiers/db/RegistryDao.java. The manipulation leads to sql injection. The patch is named 44bb0db91c064e305b192fc73521d1dfd25bde52. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217571."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en JervenBolleman sparql-identifiers y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo src/main/java/org/identifiers/db/RegistryDao.java. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El parche se llama 44bb0db91c064e305b192fc73521d1dfd25bde52. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-217571."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125053.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125053.json
index 724aeb211f8..c67e5201166 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125053.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125053.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125053",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T23:15:09.483",
- "lastModified": "2023-11-07T02:18:37.150",
+ "lastModified": "2024-02-29T01:14:33.217",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Piwigo-Guest-Book up to 1.3.0. It has been declared as critical. This vulnerability affects unknown code of the file include/guestbook.inc.php of the component Navigation Bar. The manipulation of the argument start leads to sql injection. Upgrading to version 1.3.1 is able to address this issue. The patch is identified as 0cdd1c388edf15089c3a7541cefe7756e560581d. It is recommended to upgrade the affected component. VDB-217582 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Piwigo-Guest-Book hasta 1.3.0. Ha sido declarada cr\u00edtica. Una vulnerabilidad desconocida afecta a un c\u00f3digo desconocido del archivo include/guestbook.inc.php del componente Navigation Bar. La manipulaci\u00f3n del argumento start conduce a la inyecci\u00f3n de SQL. La actualizaci\u00f3n a la versi\u00f3n 1.3.1 puede solucionar este problema. El parche se identifica como 0cdd1c388edf15089c3a7541cefe7756e560581d. Se recomienda actualizar el componente afectado. VDB-217582 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125054.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125054.json
index 5635eb1251e..0c6dd6900c8 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125054.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125054.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125054",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T09:15:21.197",
- "lastModified": "2023-11-07T02:18:37.317",
+ "lastModified": "2024-02-29T01:14:33.300",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in koroket RedditOnRails. This vulnerability affects unknown code of the component Vote Handler. The manipulation leads to improper access controls. The attack can be initiated remotely. The patch is identified as 7f3c7407d95d532fcc342b00d68d0ea09ca71030. It is recommended to apply a patch to fix this issue. VDB-217594 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en koroket RedditOnRails y clasificada como cr\u00edtica. C\u00f3digo desconocido del componente Vote Handler es afectado por esta vulnerabilidad. La manipulaci\u00f3n conduce a controles de acceso inadecuados. El ataque se puede iniciar de forma remota. El parche se identifica como 7f3c7407d95d532fcc342b00d68d0ea09ca71030. Se recomienda aplicar un parche para solucionar este problema. VDB-217594 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125055.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125055.json
index d15d09e232d..172c58e4a16 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125055.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125055.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125055",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T09:15:21.470",
- "lastModified": "2023-11-07T02:18:37.480",
+ "lastModified": "2024-02-29T01:14:33.390",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in agnivade easy-scrypt. Affected is the function VerifyPassphrase of the file scrypt.go. The manipulation leads to observable timing discrepancy. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 1.0.0 is able to address this issue. The name of the patch is 477c10cf3b144ddf96526aa09f5fdea613f21812. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217596."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en agnivade easy-scrypt y clasificada como problem\u00e1tica. La funci\u00f3n VerifyPassphrase del archivo scrypt.go es afectada por la vulnerabilidad. La manipulaci\u00f3n conduce a una discrepancia temporal observable. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. La actualizaci\u00f3n a la versi\u00f3n 1.0.0 puede solucionar este problema. El nombre del parche es 477c10cf3b144ddf96526aa09f5fdea613f21812. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-217596."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125056.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125056.json
index 68a62690636..d6197c951c4 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125056.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125056.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125056",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T10:15:08.753",
- "lastModified": "2023-11-07T02:18:37.647",
+ "lastModified": "2024-02-29T01:14:33.487",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Pylons horus and classified as problematic. Affected by this issue is some unknown functionality of the file horus/flows/local/services.py. The manipulation leads to observable timing discrepancy. The complexity of an attack is rather high. The exploitation is known to be difficult. The patch is identified as fd56ccb62ce3cbdab0484fe4f9c25c4eda6c57ec. It is recommended to apply a patch to fix this issue. VDB-217598 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Pylons horus y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo horus/flows/local/services.py es afectada por este problema. La manipulaci\u00f3n conduce a una discrepancia temporal observable. La complejidad de un ataque es bastante alta. Se sabe que la explotaci\u00f3n es dif\u00edcil. El parche se identifica como fd56ccb62ce3cbdab0484fe4f9c25c4eda6c57ec. Se recomienda aplicar un parche para solucionar este problema. VDB-217598 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125057.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125057.json
index 0a3383311f0..44da184a903 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125057.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125057.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125057",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T10:15:09.260",
- "lastModified": "2023-11-07T02:18:37.807",
+ "lastModified": "2024-02-29T01:14:33.570",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in mrobit robitailletheknot. It has been classified as problematic. This affects an unknown part of the file app/filters.php of the component CSRF Token Handler. The manipulation of the argument _token leads to incorrect comparison. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 6b2813696ccb88d0576dfb305122ee880eb36197. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217599."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en mrobit robitailletheknot. Ha sido clasificada como problem\u00e1tica. Una parte desconocida del archivo app/filters.php del componente CSRF Token Handler afecta a una parte desconocida. La manipulaci\u00f3n del argumento _token conduce a una comparaci\u00f3n incorrecta. Es posible iniciar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. El parche se llama 6b2813696ccb88d0576dfb305122ee880eb36197. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-217599."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125058.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125058.json
index 31a32d84c2d..e252c97dc52 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125058.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125058.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125058",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T11:15:08.787",
- "lastModified": "2023-11-07T02:18:37.983",
+ "lastModified": "2024-02-29T01:14:33.660",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in LearnMeSomeCodes project3 and classified as critical. This issue affects the function search_first_name of the file search.rb. The manipulation leads to sql injection. The patch is named d3efa17ae9f6b2fc25a6bbcf165cefed17c7035e. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217607. NOTE: Maintainer is aware of this issue as remarked in the source code."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en LearnMeSomeCodes project3 y clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n search_first_name del archivo search.rb. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El parche se llama d3efa17ae9f6b2fc25a6bbcf165cefed17c7035e. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-217607. NOTA: El fabricante es consciente de este problema como se indica en el c\u00f3digo fuente."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125059.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125059.json
index 244faedf766..24808e1d8e9 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125059.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125059.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125059",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.040",
- "lastModified": "2023-11-07T02:18:38.150",
+ "lastModified": "2024-02-29T01:14:33.767",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in sternenseemann sternenblog. This issue affects the function blog_index of the file main.c. The manipulation of the argument post_path leads to file inclusion. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. Upgrading to version 0.1.0 is able to address this issue. The identifier of the patch is cf715d911d8ce17969a7926dea651e930c27e71a. It is recommended to upgrade the affected component. The identifier VDB-217613 was assigned to this vulnerability. NOTE: This case is rather theoretical and probably won't happen. Maybe only on obscure Web servers."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad clasificada como problem\u00e1tica fue encontrada en sternenseemann sternenblog. Este problema afecta la funci\u00f3n blog_index del archivo main.c. La manipulaci\u00f3n del argumento post_path conduce a la inclusi\u00f3n del archivo. El ataque puede iniciarse de forma remota. La complejidad de un ataque es bastante alta. Se sabe que la explotaci\u00f3n es dif\u00edcil. La actualizaci\u00f3n a la versi\u00f3n 0.1.0 puede solucionar este problema. El identificador del parche es cf715d911d8ce17969a7926dea651e930c27e71a. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217613. NOTA: Este caso es bastante te\u00f3rico y probablemente no suceder\u00e1. Quiz\u00e1s s\u00f3lo en servidores web oscuros."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125060.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125060.json
index b1b534b283b..248f30d7384 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125060.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125060.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125060",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.127",
- "lastModified": "2023-11-07T02:18:38.347",
+ "lastModified": "2024-02-29T01:14:33.870",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in holdennb CollabCal. Affected is the function handleGet of the file calenderServer.cpp. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The patch is identified as b80f6d1893607c99e5113967592417d0fe310ce6. It is recommended to apply a patch to fix this issue. VDB-217614 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Holdennb CollabCal y clasificada como cr\u00edtica. La funci\u00f3n handleGet del archivo calenderServer.cpp es afectada por la vulnerabilidad. La manipulaci\u00f3n conduce a una autenticaci\u00f3n incorrecta. Es posible lanzar el ataque de forma remota. El parche se identifica como b80f6d1893607c99e5113967592417d0fe310ce6. Se recomienda aplicar un parche para solucionar este problema. VDB-217614 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125061.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125061.json
index 676d1602573..bbf11f121b2 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125061.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125061.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125061",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.210",
- "lastModified": "2023-11-07T02:18:38.680",
+ "lastModified": "2024-02-29T01:14:33.963",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125062.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125062.json
index b8aec0d1b0a..568c5072d7d 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125062.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125062.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125062",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T17:15:09.347",
- "lastModified": "2023-12-08T01:34:14.887",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:34.077",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125063.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125063.json
index c27a808620f..f79f7cdd20c 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125063.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125063.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125063",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T19:15:09.167",
- "lastModified": "2023-12-08T01:35:37.957",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:34.167",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125065.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125065.json
index d8a472b9947..4b1657e5d59 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125065.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125065.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125065",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T20:15:09.040",
- "lastModified": "2023-11-07T02:18:39.493",
+ "lastModified": "2024-02-29T01:14:34.260",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125066.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125066.json
index f38d50a263a..2a88372d249 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125066.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125066.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125066",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T09:15:10.273",
- "lastModified": "2023-11-07T02:18:39.667",
+ "lastModified": "2024-02-29T01:14:34.337",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125067.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125067.json
index dc3981f1f8f..b94197a4d9b 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125067.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125067.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125067",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T10:15:11.433",
- "lastModified": "2023-12-20T01:53:55.867",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:34.430",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125068.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125068.json
index 8dbc81e4404..91893504530 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125068.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125068.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125068",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T11:15:09.917",
- "lastModified": "2023-12-08T01:39:14.127",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:34.520",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125069.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125069.json
index 541950060bc..54b22e88cd4 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125069.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125069.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125069",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T11:15:09.993",
- "lastModified": "2023-11-07T02:18:40.483",
+ "lastModified": "2024-02-29T01:14:34.607",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125070.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125070.json
index bfdd1a30c7d..1345d64e217 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125070.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125070.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125070",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T18:15:09.917",
- "lastModified": "2023-12-08T20:15:51.697",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:34.690",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125071.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125071.json
index 0f0da9af777..9cb4793a733 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125071.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125071.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125071",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T21:15:10.093",
- "lastModified": "2023-11-07T02:18:40.917",
+ "lastModified": "2024-02-29T01:14:34.790",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125072.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125072.json
index 56947ffedb5..465deed9acd 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125072.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125072.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125072",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T22:15:09.873",
- "lastModified": "2023-12-08T20:32:23.447",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:34.877",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125073.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125073.json
index 4088f9970b0..596c36719e6 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125073.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125073.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125073",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-10T16:15:10.657",
- "lastModified": "2023-12-08T20:13:10.693",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:34.973",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125074.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125074.json
index 06e21a1bcd2..2efbcfb8637 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125074.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125074.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125074",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T15:15:08.877",
- "lastModified": "2023-12-20T01:52:28.320",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:35.067",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125075.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125075.json
index 97c3eeeedd7..5aa2ebaaae2 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125075.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125075.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125075",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T19:15:09.013",
- "lastModified": "2023-12-08T21:24:26.043",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:35.160",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125076.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125076.json
index 7faa123b21c..8974e72cf8f 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125076.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125076.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125076",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T19:15:09.160",
- "lastModified": "2023-12-08T20:40:13.590",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:35.247",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125077.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125077.json
index 15887bab979..191fb47e55a 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125077.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125077.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125077",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T09:15:13.613",
- "lastModified": "2023-12-08T20:16:54.423",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:35.327",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in pointhi searx_stats. This issue affects some unknown processing of the file cgi/cron.php. The manipulation leads to sql injection. The patch is named 281bd679a4474ddb222d16c1c380f252839cc18f. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218351."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en pointhi searchx_stats y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo cgi/cron.php. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El parche se llama 281bd679a4474ddb222d16c1c380f252839cc18f. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-218351."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125078.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125078.json
index d2684326685..f770b71713d 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125078.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125078.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125078",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T09:15:13.693",
- "lastModified": "2023-12-08T20:25:22.460",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:35.430",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in yanheven console and classified as problematic. Affected by this issue is some unknown functionality of the file horizon/static/horizon/js/horizon.instances.js. The manipulation leads to cross site scripting. The attack may be launched remotely. The patch is identified as 32a7b713468161282f2ea01d5e2faff980d924cd. It is recommended to apply a patch to fix this issue. VDB-218354 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en la consola yanheven y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo horizon/static/horizon/js/horizon.instances.js es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a cross site scripting. El ataque puede lanzarse de forma remota. El parche se identifica como 32a7b713468161282f2ea01d5e2faff980d924cd. Se recomienda aplicar un parche para solucionar este problema. VDB-218354 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125079.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125079.json
index 94ee36edd83..5caee17e383 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125079.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125079.json
@@ -2,12 +2,16 @@
"id": "CVE-2014-125079",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T09:15:13.780",
- "lastModified": "2023-11-07T02:18:42.910",
+ "lastModified": "2024-02-29T01:14:35.547",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in agy pontifex.http. It has been declared as critical. This vulnerability affects unknown code of the file lib/Http.coffee. The manipulation leads to sql injection. Upgrading to version 0.1.0 is able to address this issue. The name of the patch is e52a758f96861dcef2dabfecb9da191bb2e07761. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218356."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en agy pontifex.http. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo lib/Http.coffee. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. La actualizaci\u00f3n a la versi\u00f3n 0.1.0 puede solucionar este problema. El nombre del parche es e52a758f96861dcef2dabfecb9da191bb2e07761. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-218356."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125080.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125080.json
index ed31329b72c..7ef24fa3547 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125080.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125080.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125080",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T18:15:10.147",
- "lastModified": "2023-12-08T20:14:31.000",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:35.660",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125081.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125081.json
index b7ec29e7cfb..643514bd672 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125081.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125081.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125081",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T23:15:15.173",
- "lastModified": "2023-12-01T22:04:49.620",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:35.747",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125082.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125082.json
index 7a2c7ea1c61..d102c345c30 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125082.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125082.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125082",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T00:15:11.597",
- "lastModified": "2023-11-07T02:18:43.610",
+ "lastModified": "2024-02-29T01:14:35.830",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125083.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125083.json
index ecd2ec7fbd9..ab173a8219e 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125083.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125083.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125083",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-19T10:15:11.490",
- "lastModified": "2023-12-08T20:38:53.043",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:35.913",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125084.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125084.json
index 562e817a071..686bf87dfd0 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125084.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125084.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125084",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T00:15:08.823",
- "lastModified": "2023-12-01T22:03:27.830",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:35.993",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125085.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125085.json
index b4e6fba912a..93907ae0871 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125085.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125085.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125085",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T00:15:08.913",
- "lastModified": "2023-11-18T02:50:01.100",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:36.083",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125086.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125086.json
index 8f045d229cd..9faa65b6a73 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125086.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125086.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125086",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T04:15:07.927",
- "lastModified": "2023-11-18T02:50:38.637",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:36.167",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125087.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125087.json
index 20fd012faf1..7020ccb255c 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125087.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125087.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125087",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-19T17:15:11.103",
- "lastModified": "2024-02-08T10:15:08.567",
+ "lastModified": "2024-02-29T01:14:36.290",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125088.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125088.json
index 71ee807f074..c717921ccd0 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125088.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125088.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125088",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T08:15:10.003",
- "lastModified": "2023-11-07T02:18:45.000",
+ "lastModified": "2024-02-29T01:14:36.387",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125089.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125089.json
index ab3192ab9d7..2e2b443cc63 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125089.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125089.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125089",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T03:15:10.637",
- "lastModified": "2023-11-18T03:19:06.523",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:36.483",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125090.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125090.json
index 0effa460928..51e1b3e0865 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125090.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125090.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125090",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-04T20:15:09.977",
- "lastModified": "2023-11-18T03:03:20.007",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:36.570",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125091.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125091.json
index 3108266a5b7..169078bf89d 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125091.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125091.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125091",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-04T22:15:09.510",
- "lastModified": "2023-11-18T03:05:51.737",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:36.653",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125092.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125092.json
index 2f85b076934..3e02dd9f703 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125092.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125092.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125092",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T21:15:09.840",
- "lastModified": "2023-11-18T03:15:44.410",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:36.750",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125093.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125093.json
index e9d7c900c7e..f5fe87034c5 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125093.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125093.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125093",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-10T02:15:58.147",
- "lastModified": "2023-12-01T22:05:39.367",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:36.837",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125094.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125094.json
index f57a1c0c562..bffe46e66c5 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125094.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125094.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125094",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-06T21:15:07.373",
- "lastModified": "2023-11-07T02:18:46.627",
+ "lastModified": "2024-02-29T01:14:36.927",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125095.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125095.json
index 4b1c208f00d..61ad1ff7b59 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125095.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125095.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125095",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-09T06:15:10.593",
- "lastModified": "2023-12-01T22:08:11.780",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:37.017",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125096.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125096.json
index d92e550ef02..315a87f45e8 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125096.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125096.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125096",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T03:15:07.040",
- "lastModified": "2023-12-01T22:10:36.937",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:37.107",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125097.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125097.json
index 34a59097b35..6deab6f4b5b 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125097.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125097.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125097",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T04:15:07.577",
- "lastModified": "2023-12-20T01:56:08.910",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:37.200",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125098.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125098.json
index b2743cca37a..2d9da9f72c7 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125098.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125098.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125098",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T04:15:08.050",
- "lastModified": "2023-11-07T02:18:47.690",
+ "lastModified": "2024-02-29T01:14:37.307",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1250xx/CVE-2014-125099.json b/CVE-2014/CVE-2014-1250xx/CVE-2014-125099.json
index d357ab32502..0bbbc08b283 100644
--- a/CVE-2014/CVE-2014-1250xx/CVE-2014-125099.json
+++ b/CVE-2014/CVE-2014-1250xx/CVE-2014-125099.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125099",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-20T06:15:06.867",
- "lastModified": "2023-12-20T01:57:02.977",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:37.417",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125100.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125100.json
index bf4e43eab47..f924a52937f 100644
--- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125100.json
+++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125100.json
@@ -2,7 +2,7 @@
"id": "CVE-2014-125100",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T02:15:27.423",
- "lastModified": "2023-11-07T02:18:48.157",
+ "lastModified": "2024-02-29T01:14:37.527",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125101.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125101.json
index 1472f7dc76b..3c0b58b4178 100644
--- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125101.json
+++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125101.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125101",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-28T13:15:09.347",
- "lastModified": "2023-12-08T21:27:02.623",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:37.610",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125102.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125102.json
index 8e821630142..8fe96c290af 100644
--- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125102.json
+++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125102.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125102",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-29T23:15:09.367",
- "lastModified": "2023-11-18T03:13:41.120",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:37.700",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125103.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125103.json
index d81bd8f790f..3102d6707f8 100644
--- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125103.json
+++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125103.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125103",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T03:15:09.077",
- "lastModified": "2023-11-18T03:14:42.700",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:37.800",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125104.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125104.json
index 429aeec3dce..15c1529ebbf 100644
--- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125104.json
+++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125104.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125104",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-01T13:15:10.087",
- "lastModified": "2023-11-18T03:08:57.467",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:37.883",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125105.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125105.json
index e64afe7309d..b00d8048c9c 100644
--- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125105.json
+++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125105.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125105",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-05T01:15:45.637",
- "lastModified": "2023-12-20T02:07:07.190",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:37.977",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125107.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125107.json
index 321181b1a4d..5877cea0998 100644
--- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125107.json
+++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125107.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125107",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-19T03:15:07.433",
- "lastModified": "2023-12-29T17:01:15.660",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:38.070",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125108.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125108.json
index d29ca4e06cb..fb6d03ad1d3 100644
--- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125108.json
+++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125108.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125108",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-23T17:15:07.773",
- "lastModified": "2024-01-03T18:34:51.040",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:38.183",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125109.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125109.json
index d5ed27185b9..7eb440e1045 100644
--- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125109.json
+++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125109.json
@@ -2,8 +2,8 @@
"id": "CVE-2014-125109",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-26T15:15:08.010",
- "lastModified": "2024-01-05T15:15:42.447",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:14:38.277",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10005.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10005.json
index d7659946320..fbf14b62a07 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10005.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10005.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10005",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T09:15:09.400",
- "lastModified": "2023-11-07T02:23:37.337",
+ "lastModified": "2024-02-29T01:16:01.903",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in markdown-it up to 2.x. It has been classified as problematic. Affected is an unknown function of the file lib/common/html_re.js. The manipulation leads to inefficient regular expression complexity. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is 89c8620157d6e38f9872811620d25138fc9d1b0d. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216852."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Markdown-it hasta 2.x. Ha sido clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo lib/common/html_re.js es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una complejidad de expresiones regulares ineficiente. La actualizaci\u00f3n a la versi\u00f3n 3.0.0 puede solucionar este problema. El nombre del parche es 89c8620157d6e38f9872811620d25138fc9d1b0d. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-216852."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10006.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10006.json
index 592b05e13b0..f6c65d9775b 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10006.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10006.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10006",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-01T17:15:10.200",
- "lastModified": "2023-11-07T02:23:37.513",
+ "lastModified": "2024-02-29T01:16:02.020",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10007.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10007.json
index 96eaa2a71c8..cd37248a339 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10007.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10007.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10007",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T11:15:10.413",
- "lastModified": "2023-11-07T02:23:37.683",
+ "lastModified": "2024-02-29T01:16:02.103",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10008.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10008.json
index a22f9d32504..cc4aa081f73 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10008.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10008.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10008",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T11:15:10.623",
- "lastModified": "2023-11-07T02:23:37.853",
+ "lastModified": "2024-02-29T01:16:02.183",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10009.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10009.json
index 2292c5f8b2f..68205c9c72d 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10009.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10009.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10009",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T16:15:10.417",
- "lastModified": "2023-11-07T02:23:38.023",
+ "lastModified": "2024-02-29T01:16:02.267",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10010.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10010.json
index 4a40958f20e..1c764028750 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10010.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10010.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10010",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T21:15:10.207",
- "lastModified": "2023-11-07T02:23:38.183",
+ "lastModified": "2024-02-29T01:16:02.350",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10011.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10011.json
index a2a28fd6b4e..4046c13f5b2 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10011.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10011.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10011",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T22:15:15.323",
- "lastModified": "2023-11-07T02:23:38.360",
+ "lastModified": "2024-02-29T01:16:02.440",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10012.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10012.json
index 8ca309101ae..c30cc4aed29 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10012.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10012.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10012",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-03T09:15:09.707",
- "lastModified": "2023-11-07T02:23:38.540",
+ "lastModified": "2024-02-29T01:16:02.527",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10013.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10013.json
index fc04fbc1ee7..d44325cd107 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10013.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10013.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10013",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T10:15:09.100",
- "lastModified": "2023-11-07T02:23:38.720",
+ "lastModified": "2024-02-29T01:16:02.640",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10014.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10014.json
index ac1dc30ba82..7d6c316d209 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10014.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10014.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10014",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T14:15:08.610",
- "lastModified": "2023-11-07T02:23:38.880",
+ "lastModified": "2024-02-29T01:16:02.723",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10015.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10015.json
index b8c85832199..ba120701db0 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10015.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10015.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10015",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T15:15:10.260",
- "lastModified": "2023-11-07T02:23:39.040",
+ "lastModified": "2024-02-29T01:16:02.807",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10016.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10016.json
index 8239765cd2f..a11ce3e2442 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10016.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10016.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10016",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T10:15:09.917",
- "lastModified": "2023-11-07T02:23:39.200",
+ "lastModified": "2024-02-29T01:16:02.897",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10017.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10017.json
index de240af85df..a38d8ec406d 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10017.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10017.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10017",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T11:15:09.213",
- "lastModified": "2023-11-07T02:23:39.367",
+ "lastModified": "2024-02-29T01:16:02.977",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in HPI-Information-Systems ProLOD and classified as critical. This vulnerability affects unknown code. The manipulation of the argument this leads to sql injection. The name of the patch is 3f710905458d49c77530bd3cbcd8960457566b73. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217552."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en HPI-Information-Systems ProLOD y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a c\u00f3digo desconocido. La manipulaci\u00f3n del argumento this conduce a la inyecci\u00f3n de SQL. El nombre del parche es 3f710905458d49c77530bd3cbcd8960457566b73. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-217552."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10018.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10018.json
index cbd3cf82321..e25a6f2a04f 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10018.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10018.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10018",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T13:15:09.823",
- "lastModified": "2023-11-07T02:23:39.537",
+ "lastModified": "2024-02-29T01:16:03.060",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in DBRisinajumi d2files and classified as critical. Affected by this vulnerability is the function actionUpload/actionDownloadFile of the file controllers/D2filesController.php. The manipulation leads to sql injection. Upgrading to version 1.0.0 is able to address this issue. The identifier of the patch is b5767f2ec9d0f3cbfda7f13c84740e2179c90574. It is recommended to upgrade the affected component. The identifier VDB-217561 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en DBRISinajumi d2files y clasificada como cr\u00edtica. La funci\u00f3n actionUpload/actionDownloadFile del archivo controllers/D2filesController.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. La actualizaci\u00f3n a la versi\u00f3n 1.0.0 puede solucionar este problema. El identificador del parche es b5767f2ec9d0f3cbfda7f13c84740e2179c90574. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217561."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10019.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10019.json
index 1b63593d49e..019913b92a0 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10019.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10019.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10019",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T09:15:21.570",
- "lastModified": "2023-11-07T02:23:39.757",
+ "lastModified": "2024-02-29T01:16:03.143",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in foxoverflow MySimplifiedSQL. This issue affects some unknown processing of the file MySimplifiedSQL_Examples.php. The manipulation of the argument FirstName/LastName leads to cross site scripting. The attack may be initiated remotely. The patch is named 3b7481c72786f88041b7c2d83bb4f219f77f1293. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217595."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en foxoverflow MySimplifiedSQL y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo MySimplifiedSQL_Examples.php. La manipulaci\u00f3n del argumento Nombre/Apellido conduce a cross site scripting. El ataque puede iniciarse de forma remota. El parche se llama 3b7481c72786f88041b7c2d83bb4f219f77f1293. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-217595."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10020.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10020.json
index e8b1071e488..490a228b01a 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10020.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10020.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10020",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-14T21:15:09.207",
- "lastModified": "2023-11-07T02:23:39.923",
+ "lastModified": "2024-02-29T01:16:03.230",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in ssn2013 cis450Project and classified as critical. This vulnerability affects the function addUser of the file HeatMapServer/src/com/datformers/servlet/AddAppUser.java. The manipulation leads to sql injection. The name of the patch is 39b495011437a105c7670e17e071f99195b4922e. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218380."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en ssn2013 cis450Project y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n addUser del archivo HeatMapServer/src/com/datformers/servlet/AddAppUser.java. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El nombre del parche es 39b495011437a105c7670e17e071f99195b4922e. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-218380."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10021.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10021.json
index 293d25ffef5..30358517971 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10021.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10021.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10021",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T12:15:08.647",
- "lastModified": "2023-11-07T02:23:40.080",
+ "lastModified": "2024-02-29T01:16:03.323",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ritterim definely. It has been classified as problematic. Affected is an unknown function of the file src/database.js. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is b31a022ba4d8d17148445a13ebb5a42ad593dbaa. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217608."
+ },
+ {
+ "lang": "es",
+ "value": "Definitivamente se encontr\u00f3 una vulnerabilidad en ritterim. Ha sido clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo src/database.js es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a cross site scripting. Es posible lanzar el ataque de forma remota. El nombre del parche es b31a022ba4d8d17148445a13ebb5a42ad593dbaa. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-217608."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10022.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10022.json
index 4ac266e9df0..641f5914a62 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10022.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10022.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10022",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T12:15:08.730",
- "lastModified": "2023-11-07T02:23:40.253",
+ "lastModified": "2024-02-29T01:16:03.407",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in IISH nlgis2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file scripts/etl/custom_import.pl. The manipulation leads to sql injection. The identifier of the patch is 8bdb6fcf7209584eaf1232437f0f53e735b2b34c. It is recommended to apply a patch to fix this issue. The identifier VDB-217609 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en IISH nlgis2. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo scripts/etl/custom_import.pl es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El identificador del parche es 8bdb6fcf7209584eaf1232437f0f53e735b2b34c. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217609."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10023.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10023.json
index 7efdb90ac6c..fb6efa421aa 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10023.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10023.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10023",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T12:15:08.803",
- "lastModified": "2023-11-07T02:23:40.403",
+ "lastModified": "2024-02-29T01:16:03.493",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Fumon trello-octometric. This affects the function main of the file metrics-ui/server/srv.go. The manipulation of the argument num leads to sql injection. The patch is named a1f1754933fbf21e2221fbc671c81a47de6a04ef. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217611."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en Fumon trello-octometric y clasificada como cr\u00edtica. Esto afecta a la funci\u00f3n main del archivo metrics-ui/server/srv.go. La manipulaci\u00f3n del argumento num conduce a la inyecci\u00f3n de SQL. El parche se llama a1f1754933fbf21e2221fbc671c81a47de6a04ef. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-217611."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10024.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10024.json
index 28be26f0bec..2c658860e2f 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10024.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10024.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10024",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.293",
- "lastModified": "2023-11-07T02:23:40.560",
+ "lastModified": "2024-02-29T01:16:03.610",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10025.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10025.json
index 1374d222553..c5d1a186d46 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10025.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10025.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10025",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.367",
- "lastModified": "2023-11-07T02:23:40.743",
+ "lastModified": "2024-02-29T01:16:03.690",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10026.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10026.json
index 161cac1843f..6b4610cf61f 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10026.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10026.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10026",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.450",
- "lastModified": "2023-11-07T02:23:40.900",
+ "lastModified": "2024-02-29T01:16:03.780",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10027.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10027.json
index 170511d810c..c5fc1846863 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10027.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10027.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10027",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T17:15:09.430",
- "lastModified": "2023-11-07T02:23:41.060",
+ "lastModified": "2024-02-29T01:16:03.880",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10028.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10028.json
index c161fdac3e5..c1d312aeed0 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10028.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10028.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10028",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T19:15:09.260",
- "lastModified": "2023-11-07T02:23:41.217",
+ "lastModified": "2024-02-29T01:16:03.977",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10029.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10029.json
index c8813a1eb8c..45564372612 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10029.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10029.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10029",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T20:15:09.147",
- "lastModified": "2023-11-07T02:23:41.383",
+ "lastModified": "2024-02-29T01:16:04.070",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10030.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10030.json
index ca22e7240aa..ecf84cb184c 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10030.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10030.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10030",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T10:15:11.537",
- "lastModified": "2023-11-07T02:23:41.537",
+ "lastModified": "2024-02-29T01:16:04.157",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10031.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10031.json
index af3cd0910eb..121af0a77b3 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10031.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10031.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10031",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T17:15:17.763",
- "lastModified": "2023-11-07T02:23:41.700",
+ "lastModified": "2024-02-29T01:16:04.240",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10032.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10032.json
index be23a7e818f..93a975877b5 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10032.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10032.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10032",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T09:15:09.757",
- "lastModified": "2023-11-07T02:23:41.860",
+ "lastModified": "2024-02-29T01:16:04.330",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10033.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10033.json
index 0db86264f07..0dbf308f5de 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10033.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10033.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10033",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T21:15:10.210",
- "lastModified": "2023-11-07T02:23:42.030",
+ "lastModified": "2024-02-29T01:16:04.407",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.2
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10034.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10034.json
index 4db3b83070f..e7a15368ace 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10034.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10034.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10034",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T21:15:10.300",
- "lastModified": "2023-11-07T02:23:42.197",
+ "lastModified": "2024-02-29T01:16:04.497",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10035.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10035.json
index 2a587354ca3..7b4d92657cb 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10035.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10035.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10035",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T21:15:10.383",
- "lastModified": "2023-11-07T02:23:42.353",
+ "lastModified": "2024-02-29T01:16:04.577",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10036.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10036.json
index 8ad8671f95d..f6be4a6187b 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10036.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10036.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10036",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T07:15:10.743",
- "lastModified": "2023-11-07T02:23:42.503",
+ "lastModified": "2024-02-29T01:16:04.660",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10037.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10037.json
index 859166d3dc3..97dbc482135 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10037.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10037.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10037",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T07:15:10.963",
- "lastModified": "2023-11-07T02:23:42.660",
+ "lastModified": "2024-02-29T01:16:04.740",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10038.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10038.json
index b47603adb18..96f9554d80c 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10038.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10038.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10038",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T19:15:09.270",
- "lastModified": "2023-11-07T02:23:42.827",
+ "lastModified": "2024-02-29T01:16:04.823",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10039.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10039.json
index 7743747754e..e1bd2aea402 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10039.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10039.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10039",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T19:15:09.363",
- "lastModified": "2023-11-07T02:23:42.983",
+ "lastModified": "2024-02-29T01:16:04.907",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10040.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10040.json
index 8b9895f7e2a..ea969b078e3 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10040.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10040.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10040",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T20:15:08.907",
- "lastModified": "2023-11-07T02:23:43.143",
+ "lastModified": "2024-02-29T01:16:04.983",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10041.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10041.json
index b5914aef9ff..bf5b8e4f4fe 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10041.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10041.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10041",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T20:15:09.837",
- "lastModified": "2023-11-07T02:23:43.310",
+ "lastModified": "2024-02-29T01:16:05.070",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10042.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10042.json
index 771780c844a..371b180d280 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10042.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10042.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10042",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T21:15:08.853",
- "lastModified": "2023-11-07T02:23:43.500",
+ "lastModified": "2024-02-29T01:16:05.150",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10043.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10043.json
index b093d550a27..34c6c90a124 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10043.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10043.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10043",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-14T21:15:09.337",
- "lastModified": "2023-11-07T02:23:43.687",
+ "lastModified": "2024-02-29T01:16:05.227",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in abreen Apollo. This affects an unknown part. The manipulation of the argument file leads to path traversal. The patch is named 6206406630780bbd074aff34f4683fb764faba71. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218307."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en abreen Apollo y clasificada como cr\u00edtica. Esto afecta a una parte desconocida. La manipulaci\u00f3n del archivo de argumentos conduce a path traversal. El parche se llama 6206406630780bbd074aff34f4683fb764faba71. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-218307."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10044.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10044.json
index eee1f6d1014..fab94ba8dda 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10044.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10044.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10044",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T10:15:08.913",
- "lastModified": "2023-11-07T02:23:43.857",
+ "lastModified": "2024-02-29T01:16:05.303",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in gophergala sqldump. This vulnerability affects unknown code. The manipulation leads to sql injection. The patch is identified as 76db54e9073b5248b8863e71a63d66a32d567d21. It is recommended to apply a patch to fix this issue. VDB-218350 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en gophergala sqldump y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a c\u00f3digo desconocido. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El parche se identifica como 76db54e9073b5248b8863e71a63d66a32d567d21. Se recomienda aplicar un parche para solucionar este problema. VDB-218350 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10045.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10045.json
index ea9f49f6344..4c12f5ac3d1 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10045.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10045.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10045",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T10:15:09.497",
- "lastModified": "2023-11-07T02:23:44.010",
+ "lastModified": "2024-02-29T01:16:05.377",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in tutrantta project_todolist. Affected is the function getAffectedRows/where/insert/update in the library library/Database.php. The manipulation leads to sql injection. The name of the patch is 194a0411bbe11aa4813f13c66b9e8ea403539141. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218352."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en tutrantta project_todolist y clasificada como cr\u00edtica. La funci\u00f3n getAffectedRows/where/insert/update de la librer\u00edas library/Database.php es afectada por la vulnerabilidad. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El nombre del parche es 194a0411bbe11aa4813f13c66b9e8ea403539141. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-218352."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10046.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10046.json
index dee3ea6ba98..225933e756e 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10046.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10046.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10046",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T10:15:09.587",
- "lastModified": "2023-11-07T02:23:44.173",
+ "lastModified": "2024-02-29T01:16:05.460",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in lolfeedback and classified as critical. Affected by this vulnerability is an unknown functionality. The manipulation leads to sql injection. The identifier of the patch is 6cf0b5f2228cd8765f734badd37910051000f2b2. It is recommended to apply a patch to fix this issue. The identifier VDB-218353 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en lolfeedback y clasificada como cr\u00edtica. Una funcionalidad desconocida es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El identificador del parche es 6cf0b5f2228cd8765f734badd37910051000f2b2. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-218353."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10047.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10047.json
index 89c0162b633..a5494b588b1 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10047.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10047.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10047",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T10:15:09.663",
- "lastModified": "2023-11-07T02:23:44.333",
+ "lastModified": "2024-02-29T01:16:05.560",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in KYUUBl school-register. It has been classified as critical. This affects an unknown part of the file src/DBManager.java. The manipulation leads to sql injection. The patch is named 1cf7e01b878aee923f2b22cc2535c71a680e4c30. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218355."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en el registro escolar de KYUUBl. Ha sido clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo src/DBManager.java. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El parche se llama 1cf7e01b878aee923f2b22cc2535c71a680e4c30. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-218355."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10048.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10048.json
index 1a0c5174ace..4d466b7da37 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10048.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10048.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10048",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T10:15:09.750",
- "lastModified": "2023-11-07T02:23:44.483",
+ "lastModified": "2024-02-29T01:16:05.643",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in bmattoso desafio_buzz_woody. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The identifier of the patch is cb8220cbae06082c969b1776fcb2fdafb3a1006b. It is recommended to apply a patch to fix this issue. The identifier VDB-218357 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en bmattoso desafio_buzz_woody. Ha sido declarada como cr\u00edtica. Este problema afecta alg\u00fan procesamiento desconocido. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El identificador del parche es cb8220cbae06082c969b1776fcb2fdafb3a1006b. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-218357.0"
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10049.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10049.json
index 7b31021b159..34169ca5855 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10049.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10049.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10049",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T18:15:08.937",
- "lastModified": "2023-11-07T02:23:44.653",
+ "lastModified": "2024-02-29T01:16:05.723",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Overdrive Eletr\u00f4nica course-builder up to 1.7.x and classified as problematic. Affected by this issue is some unknown functionality of the file coursebuilder/modules/oeditor/oeditor.html. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.8.0 is able to address this issue. The name of the patch is e39645fd714adb7e549908780235911ae282b21b. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218372."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Overdrive Eletr\u00f4nica course-builder hasta 1.7.x y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo coursebuilder/modules/oeditor/oeditor.html es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a cross site scripting. El ataque puede lanzarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.8.0 puede solucionar este problema. El nombre del parche es e39645fd714adb7e549908780235911ae282b21b. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-218372."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10050.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10050.json
index 2702c98c599..f99e32eb63d 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10050.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10050.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10050",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T18:15:09.033",
- "lastModified": "2023-11-07T02:23:44.870",
+ "lastModified": "2024-02-29T01:16:05.810",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in brandonfire miRNA_Database_by_PHP_MySql. It has been declared as critical. This vulnerability affects the function __construct/select_single_rna/count_rna of the file inc/model.php. The manipulation leads to sql injection. The patch is identified as 307c5d510841e6142ddcbbdbb93d0e8a0dc3fd6a. It is recommended to apply a patch to fix this issue. VDB-218374 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en brandonfire miRNA_Database_by_PHP_MySql. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n __construct/select_single_rna/count_rna del archivo inc/model.php. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El parche se identifica como 307c5d510841e6142ddcbbdbb93d0e8a0dc3fd6a. Se recomienda aplicar un parche para solucionar este problema. VDB-218374 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10051.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10051.json
index 3b547661aaf..6a9a66f3534 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10051.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10051.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10051",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T18:15:09.110",
- "lastModified": "2023-11-07T02:23:45.030",
+ "lastModified": "2024-02-29T01:16:05.883",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in bony2023 Discussion-Board. Affected by this issue is the function display_all_replies of the file functions/main.php. The manipulation of the argument str leads to sql injection. The patch is identified as 26439bc4c63632d63ba89ebc0f149b25a9010361. It is recommended to apply a patch to fix this issue. VDB-218378 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en bony2023 Discussion-Board y clasificada como cr\u00edtica. La funci\u00f3n display_all_replies del archivo functions/main.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento str conduce a la inyecci\u00f3n de SQL. El parche se identifica como 26439bc4c63632d63ba89ebc0f149b25a9010361. Se recomienda aplicar un parche para solucionar este problema. VDB-218378 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10052.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10052.json
index 8daf90d4580..94ae1306a95 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10052.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10052.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10052",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T19:15:09.070",
- "lastModified": "2023-11-07T02:23:45.183",
+ "lastModified": "2024-02-29T01:16:05.977",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as problematic, was found in calesanz gibb-modul-151. This affects the function bearbeiten/login. The manipulation leads to open redirect. It is possible to initiate the attack remotely. The patch is named 88a517dc19443081210c804b655e72770727540d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218379. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ },
+ {
+ "lang": "es",
+ "value": "** NO SOPORTADO CUANDO EST\u00c1 ASIGNADO ** Una vulnerabilidad clasificada como problem\u00e1tica fue encontrada en calesanz gibb-modul-151. Esto afecta a la funci\u00f3n Bearbeiten/login. La manipulaci\u00f3n conduce a open redirect. Es posible iniciar el ataque de forma remota. El parche se llama 88a517dc19443081210c804b655e72770727540d. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-218379. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10053.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10053.json
index 0fe117fd08f..81151a0900f 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10053.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10053.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10053",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T12:15:16.227",
- "lastModified": "2023-11-07T02:23:45.360",
+ "lastModified": "2024-02-29T01:16:06.070",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in prodigasistemas curupira up to 0.1.3. Affected is an unknown function of the file app/controllers/curupira/passwords_controller.rb. The manipulation leads to sql injection. Upgrading to version 0.1.4 is able to address this issue. The patch is identified as 93a9a77896bb66c949acb8e64bceafc74bc8c271. It is recommended to upgrade the affected component. VDB-218394 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en prodigasistemas curupira hasta 0.1.3 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo app/controllers/curupira/passwords_controller.rb es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. La actualizaci\u00f3n a la versi\u00f3n 0.1.4 puede solucionar este problema. El parche se identifica como 93a9a77896bb66c949acb8e64bceafc74bc8c271. Se recomienda actualizar el componente afectado. VDB-218394 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10054.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10054.json
index fc392f97f9f..ec5f793cee4 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10054.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10054.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10054",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T18:15:10.233",
- "lastModified": "2023-11-07T02:23:45.517",
+ "lastModified": "2024-02-29T01:16:06.153",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10055.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10055.json
index 42e231d807c..be8672bd479 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10055.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10055.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10055",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T18:15:10.310",
- "lastModified": "2023-11-07T02:23:45.713",
+ "lastModified": "2024-02-29T01:16:06.230",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10056.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10056.json
index 0688c62bcc2..c44f02ab652 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10056.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10056.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10056",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T19:15:10.053",
- "lastModified": "2023-11-07T02:23:45.873",
+ "lastModified": "2024-02-29T01:16:06.320",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10057.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10057.json
index d4acd20bb50..2e7160ba960 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10057.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10057.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10057",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T19:15:10.143",
- "lastModified": "2023-11-07T02:23:46.037",
+ "lastModified": "2024-02-29T01:16:06.400",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10058.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10058.json
index 10f1445d475..4ba0cdd78e5 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10058.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10058.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10058",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T13:15:10.217",
- "lastModified": "2023-11-07T02:23:46.193",
+ "lastModified": "2024-02-29T01:16:06.497",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10059.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10059.json
index 00db2261372..531cd687d2e 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10059.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10059.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10059",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T13:15:10.330",
- "lastModified": "2023-11-07T02:23:46.360",
+ "lastModified": "2024-02-29T01:16:06.580",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10060.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10060.json
index a76a2f4abfb..55cc238b279 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10060.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10060.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10060",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T13:15:10.410",
- "lastModified": "2023-11-07T02:23:46.533",
+ "lastModified": "2024-02-29T01:16:06.670",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10061.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10061.json
index a50ea7a9e98..1904ac9e6c4 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10061.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10061.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10061",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T16:15:16.283",
- "lastModified": "2023-11-07T02:23:46.753",
+ "lastModified": "2024-02-29T01:16:06.763",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10062.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10062.json
index 2b69f4827a9..c4a2a42581f 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10062.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10062.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10062",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T19:15:10.953",
- "lastModified": "2023-11-07T02:23:46.907",
+ "lastModified": "2024-02-29T01:16:06.847",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10063.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10063.json
index 1af4428f22e..1eb3edae94a 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10063.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10063.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10063",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T19:15:11.067",
- "lastModified": "2023-11-07T02:23:47.063",
+ "lastModified": "2024-02-29T01:16:06.973",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10064.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10064.json
index 90fe62e76f6..53cb35d2042 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10064.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10064.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10064",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T19:15:11.163",
- "lastModified": "2023-11-07T02:23:47.233",
+ "lastModified": "2024-02-29T01:16:07.117",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10065.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10065.json
index 1c0112593ca..b5c0a13a6fe 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10065.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10065.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10065",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T23:15:15.313",
- "lastModified": "2023-11-07T02:23:47.390",
+ "lastModified": "2024-02-29T01:16:07.210",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10066.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10066.json
index 01daf9b3b5e..0d16c6f2aca 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10066.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10066.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10066",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T00:15:11.697",
- "lastModified": "2023-11-07T02:23:47.550",
+ "lastModified": "2024-02-29T01:16:07.310",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10067.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10067.json
index 3fc6cd1604b..2397a404097 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10067.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10067.json
@@ -2,12 +2,16 @@
"id": "CVE-2015-10067",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T01:15:11.337",
- "lastModified": "2023-11-07T02:23:47.710",
+ "lastModified": "2024-02-29T01:16:07.420",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in oznetmaster SSharpSmartThreadPool. It has been classified as problematic. This affects an unknown part of the file SSharpSmartThreadPool/SmartThreadPool.cs. The manipulation leads to race condition within a thread. The complexity of an attack is rather high. The exploitability is told to be difficult. The patch is named 0e58073c831093aad75e077962e9fb55cad0dc5f. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218463."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en oznetmaster SSharpSmartThreadPool. Ha sido clasificada como problem\u00e1tica. Esto afecta a una parte desconocida del archivo SSharpSmartThreadPool/SmartThreadPool.cs. La manipulaci\u00f3n conduce a una condici\u00f3n de ejecuci\u00f3n dentro de un hilo. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. El parche se llama 0e58073c831093aad75e077962e9fb55cad0dc5f. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-218463."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10068.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10068.json
index ad862131ac8..cb8357d2047 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10068.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10068.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10068",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T08:15:09.660",
- "lastModified": "2023-11-07T02:23:47.873",
+ "lastModified": "2024-02-29T01:16:07.523",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10069.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10069.json
index ced53603b3a..e3d78363c14 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10069.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10069.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10069",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-19T08:15:10.033",
- "lastModified": "2023-11-07T02:23:48.040",
+ "lastModified": "2024-02-29T01:16:07.613",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10070.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10070.json
index 6c90bc9affa..70fe9c89d89 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10070.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10070.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10070",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-19T10:15:11.597",
- "lastModified": "2023-11-07T02:23:48.200",
+ "lastModified": "2024-02-29T01:16:07.710",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10071.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10071.json
index 2166af67b5d..827f52f5238 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10071.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10071.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10071",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-19T10:15:11.697",
- "lastModified": "2023-11-07T02:23:48.353",
+ "lastModified": "2024-02-29T01:16:07.817",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10072.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10072.json
index 54ba2721acd..bc31a10da4e 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10072.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10072.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10072",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-04T04:15:08.727",
- "lastModified": "2023-11-07T02:23:48.510",
+ "lastModified": "2024-02-29T01:16:07.910",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10073.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10073.json
index 347054dcca4..3ebe34e9e7f 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10073.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10073.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10073",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T20:15:10.667",
- "lastModified": "2023-11-07T02:23:48.740",
+ "lastModified": "2024-02-29T01:16:07.997",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 6.0
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10074.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10074.json
index 149d61b4ea8..2ac345296b0 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10074.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10074.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10074",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-07T10:15:52.147",
- "lastModified": "2023-11-07T02:23:48.927",
+ "lastModified": "2024-02-29T01:16:08.100",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10075.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10075.json
index 4aff8b6124d..5a97aee22cf 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10075.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10075.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10075",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-07T12:15:08.653",
- "lastModified": "2023-11-07T02:23:49.123",
+ "lastModified": "2024-02-29T01:16:08.183",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10076.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10076.json
index 51af9d4cc8a..587b0a5c2ef 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10076.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10076.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10076",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-09T23:15:11.017",
- "lastModified": "2023-11-07T02:23:49.300",
+ "lastModified": "2024-02-29T01:16:08.263",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10077.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10077.json
index bdeccc8dea1..f33672f85b2 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10077.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10077.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10077",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-10T15:15:11.490",
- "lastModified": "2023-11-07T02:23:49.470",
+ "lastModified": "2024-02-29T01:16:08.363",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10078.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10078.json
index f56dfbd7fcc..6ec13099703 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10078.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10078.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10078",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-12T14:15:10.427",
- "lastModified": "2023-11-07T02:23:49.653",
+ "lastModified": "2024-02-29T01:16:08.467",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10079.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10079.json
index d8c919d74dd..89c9959647a 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10079.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10079.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10079",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-13T22:15:12.000",
- "lastModified": "2023-11-07T02:23:49.873",
+ "lastModified": "2024-02-29T01:16:08.570",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10080.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10080.json
index 324452bd6c7..57216aa8ed5 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10080.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10080.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10080",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T10:15:12.217",
- "lastModified": "2023-11-07T02:23:50.047",
+ "lastModified": "2024-02-29T01:16:08.697",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10081.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10081.json
index b6f866cede6..8543b6cde75 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10081.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10081.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10081",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T17:15:11.173",
- "lastModified": "2023-11-07T02:23:50.227",
+ "lastModified": "2024-02-29T01:16:08.780",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10082.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10082.json
index f8d202cff5d..503273ad39b 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10082.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10082.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10082",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T07:15:10.173",
- "lastModified": "2023-11-07T02:23:50.383",
+ "lastModified": "2024-02-29T01:16:08.860",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10083.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10083.json
index 7e45eff230b..7c3e2ee65d7 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10083.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10083.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10083",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T15:15:10.527",
- "lastModified": "2023-11-07T02:23:50.640",
+ "lastModified": "2024-02-29T01:16:08.943",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10084.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10084.json
index 4669a8ca17c..26b59fbac5d 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10084.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10084.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10084",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T15:15:10.783",
- "lastModified": "2023-11-07T02:23:50.893",
+ "lastModified": "2024-02-29T01:16:09.033",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10085.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10085.json
index 8d4c0ccb662..4fb9229306c 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10085.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10085.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10085",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T18:15:11.480",
- "lastModified": "2023-11-07T02:23:51.100",
+ "lastModified": "2024-02-29T01:16:09.110",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10086.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10086.json
index 1dc6114adca..28c4fbe2c25 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10086.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10086.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10086",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-28T00:15:09.840",
- "lastModified": "2023-11-07T02:23:51.287",
+ "lastModified": "2024-02-29T01:16:09.197",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10087.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10087.json
index a0d9697c302..35831ba2c88 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10087.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10087.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10087",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-07T15:15:10.423",
- "lastModified": "2023-12-20T02:39:30.293",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:09.290",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10088.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10088.json
index 3c9472ad1c2..d2d53980b84 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10088.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10088.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10088",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T05:15:09.210",
- "lastModified": "2024-02-15T20:09:13.783",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:09.393",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10089.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10089.json
index 617eeb1b99f..a0d6472c75a 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10089.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10089.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10089",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T14:15:08.953",
- "lastModified": "2023-12-20T02:14:11.337",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:09.493",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10090.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10090.json
index 277777a0956..6f552e82a3e 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10090.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10090.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10090",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T00:15:10.160",
- "lastModified": "2023-12-20T02:08:35.603",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:09.590",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10091.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10091.json
index 106dcbe9fea..79df2b88b09 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10091.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10091.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10091",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T04:15:08.190",
- "lastModified": "2023-12-20T02:05:19.350",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:09.673",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10092.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10092.json
index 246993169c7..b6fe75aa605 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10092.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10092.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10092",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T06:15:09.733",
- "lastModified": "2023-12-08T21:29:35.770",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:09.760",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10093.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10093.json
index 648a95f7f10..12046d55a26 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10093.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10093.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10093",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T07:15:10.103",
- "lastModified": "2023-12-20T02:00:45.167",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:09.843",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10094.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10094.json
index 32ef8feeac7..620ff786905 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10094.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10094.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10094",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T15:15:09.863",
- "lastModified": "2023-12-20T01:50:32.030",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:09.930",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10095.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10095.json
index 6e1de9c80e2..cbf85b4abeb 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10095.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10095.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10095",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T21:15:10.150",
- "lastModified": "2023-11-18T03:23:45.160",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:10.013",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10096.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10096.json
index d2516041619..89795c7d34b 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10096.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10096.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10096",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-20T05:15:11.163",
- "lastModified": "2024-02-16T17:21:44.257",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:10.110",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10097.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10097.json
index a1b38ad4f83..c30e5bf7075 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10097.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10097.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10097",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-25T18:15:09.387",
- "lastModified": "2023-12-20T02:27:39.773",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:10.207",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10098.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10098.json
index 56397c84584..3cb70d5fc5d 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10098.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10098.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10098",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T09:15:07.470",
- "lastModified": "2023-12-20T02:25:03.753",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:10.303",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-100xx/CVE-2015-10099.json b/CVE-2015/CVE-2015-100xx/CVE-2015-10099.json
index 6b51eabf581..2233e47a52f 100644
--- a/CVE-2015/CVE-2015-100xx/CVE-2015-10099.json
+++ b/CVE-2015/CVE-2015-100xx/CVE-2015-10099.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10099",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T12:15:07.093",
- "lastModified": "2023-12-20T02:36:46.687",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:10.380",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10100.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10100.json
index 279b9ae1acb..2cbeff04728 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10100.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10100.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10100",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T18:15:07.873",
- "lastModified": "2023-12-20T02:34:00.733",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:10.467",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10101.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10101.json
index 26c7339a2f6..25f05b82682 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10101.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10101.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10101",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T21:15:06.800",
- "lastModified": "2023-12-20T02:30:01.257",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:10.557",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10102.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10102.json
index a7e6c45199b..0af71250d15 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10102.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10102.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10102",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-17T18:15:07.197",
- "lastModified": "2023-12-20T02:41:18.450",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:10.653",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10103.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10103.json
index 55c6ac81f17..914bf93e139 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10103.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10103.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10103",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-17T19:15:07.227",
- "lastModified": "2024-01-09T02:18:56.097",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:10.740",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10104.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10104.json
index bd4e59eb4c5..150987ac7db 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10104.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10104.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10104",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-30T21:15:30.740",
- "lastModified": "2023-11-07T02:23:57.457",
+ "lastModified": "2024-02-29T01:16:10.830",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10105.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10105.json
index 1f156cee8b7..7be12169af7 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10105.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10105.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10105",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-01T02:15:39.197",
- "lastModified": "2023-12-20T02:47:11.533",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:10.910",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10106.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10106.json
index a267b82bcab..02c4d063fbe 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10106.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10106.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10106",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-28T13:15:09.850",
- "lastModified": "2024-02-16T16:06:54.993",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:10.997",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10107.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10107.json
index 1a230c74a52..c4658dac043 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10107.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10107.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10107",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T03:15:09.157",
- "lastModified": "2023-12-22T21:37:33.253",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:11.090",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10108.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10108.json
index 7230df5f534..64b66a5867a 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10108.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10108.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10108",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T19:15:11.720",
- "lastModified": "2023-11-07T02:23:58.590",
+ "lastModified": "2024-02-29T01:16:11.177",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10109.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10109.json
index 35c57e02bf9..428a2bd1d96 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10109.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10109.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10109",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-01T13:15:10.180",
- "lastModified": "2023-11-07T02:23:58.780",
+ "lastModified": "2024-02-29T01:16:11.260",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10110.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10110.json
index 120549d5f14..8f503de4802 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10110.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10110.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10110",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-02T00:15:09.303",
- "lastModified": "2023-11-07T02:23:58.990",
+ "lastModified": "2024-02-29T01:16:11.333",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10111.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10111.json
index f99e461bce7..958c9e7c898 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10111.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10111.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10111",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-04T12:15:09.237",
- "lastModified": "2023-11-07T02:23:59.217",
+ "lastModified": "2024-02-29T01:16:11.417",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10112.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10112.json
index 0d68a756742..285eead33ec 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10112.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10112.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10112",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-05T08:15:09.380",
- "lastModified": "2023-11-07T02:23:59.403",
+ "lastModified": "2024-02-29T01:16:11.497",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10113.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10113.json
index afceaecf7d0..bd22bff090c 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10113.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10113.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10113",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-05T16:15:09.207",
- "lastModified": "2023-11-07T02:23:59.603",
+ "lastModified": "2024-02-29T01:16:11.580",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10114.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10114.json
index a4367c41b0f..e4d4c7bc6ad 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10114.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10114.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10114",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-05T16:15:09.280",
- "lastModified": "2023-11-07T02:23:59.810",
+ "lastModified": "2024-02-29T01:16:11.657",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10115.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10115.json
index 9dbbb321dad..7d8f80a07fa 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10115.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10115.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10115",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-05T18:15:09.417",
- "lastModified": "2023-11-07T02:24:00.013",
+ "lastModified": "2024-02-29T01:16:11.737",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10116.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10116.json
index 2144b6a4dd8..e087d7f67fe 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10116.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10116.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10116",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-06T01:15:40.430",
- "lastModified": "2023-11-07T02:24:00.243",
+ "lastModified": "2024-02-29T01:16:11.813",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10117.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10117.json
index 09e4c09aa10..747f48fdab7 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10117.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10117.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10117",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-06T02:15:08.830",
- "lastModified": "2023-11-07T02:24:00.450",
+ "lastModified": "2024-02-29T01:16:11.890",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10118.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10118.json
index 84b1ab3636f..f2cf9544768 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10118.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10118.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10118",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-12T07:15:09.000",
- "lastModified": "2023-11-07T02:24:00.670",
+ "lastModified": "2024-02-29T01:16:11.967",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10119.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10119.json
index 50f4351377c..ee660dc216e 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10119.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10119.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10119",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:47.183",
- "lastModified": "2023-11-07T02:24:00.893",
+ "lastModified": "2024-02-29T01:16:12.070",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10120.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10120.json
index f54814011ca..2c1ae66ca92 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10120.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10120.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10120",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:47.297",
- "lastModified": "2023-11-07T02:24:01.127",
+ "lastModified": "2024-02-29T01:16:12.167",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10121.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10121.json
index 20653e1d5c7..486f04928cc 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10121.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10121.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10121",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:47.357",
- "lastModified": "2023-11-07T02:24:01.347",
+ "lastModified": "2024-02-29T01:16:12.260",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10122.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10122.json
index 45fb763d027..1fa414605d1 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10122.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10122.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10122",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-18T05:15:09.603",
- "lastModified": "2023-11-07T02:24:01.543",
+ "lastModified": "2024-02-29T01:16:12.333",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10124.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10124.json
index 9b5b399f2a7..61ec786458c 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10124.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10124.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10124",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-02T14:15:09.757",
- "lastModified": "2023-11-07T02:24:01.763",
+ "lastModified": "2024-02-29T01:16:12.430",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10125.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10125.json
index 5ba6c6c8ecb..938b4f359a4 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10125.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10125.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10125",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-05T23:15:09.330",
- "lastModified": "2023-11-07T02:24:01.987",
+ "lastModified": "2024-02-29T01:16:12.533",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10126.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10126.json
index 7367a71b100..292fc18f42d 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10126.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10126.json
@@ -2,7 +2,7 @@
"id": "CVE-2015-10126",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-06T08:15:43.293",
- "lastModified": "2023-11-07T02:24:02.207",
+ "lastModified": "2024-02-29T01:16:12.620",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10127.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10127.json
index 2fbdffab6b3..c52a987343c 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10127.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10127.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10127",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-26T17:15:07.923",
- "lastModified": "2024-01-05T15:06:16.647",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:12.707",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10128.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10128.json
index 0bf11cd9693..2b689cd9d8e 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10128.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10128.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10128",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-02T14:15:07.810",
- "lastModified": "2024-01-09T14:11:20.080",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:12.793",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10129.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10129.json
index 72a9fcf6ba1..283adc263fe 100644
--- a/CVE-2015/CVE-2015-101xx/CVE-2015-10129.json
+++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10129.json
@@ -2,8 +2,8 @@
"id": "CVE-2015-10129",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-04T05:15:49.087",
- "lastModified": "2024-02-12T19:02:51.977",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:16:12.903",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15006.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15006.json
index a6e5f766335..4b6b87267a6 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15006.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15006.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15006",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T08:15:10.033",
- "lastModified": "2023-11-07T02:29:44.927",
+ "lastModified": "2024-02-29T01:17:42.800",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15007.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15007.json
index 665519278ba..7b0d547a029 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15007.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15007.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15007",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T19:15:10.387",
- "lastModified": "2023-11-07T02:29:45.093",
+ "lastModified": "2024-02-29T01:17:42.897",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15008.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15008.json
index 49f98e6d6bc..096e6ddad79 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15008.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15008.json
@@ -2,12 +2,16 @@
"id": "CVE-2016-15008",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T10:15:10.197",
- "lastModified": "2023-11-07T02:29:45.250",
+ "lastModified": "2024-02-29T01:17:42.977",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in oxguy3 coebot-www and classified as problematic. This issue affects the function displayChannelCommands/displayChannelQuotes/displayChannelAutoreplies/showChannelHighlights/showChannelBoir of the file js/channel.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. The patch is named c1a6c44092585da4236237e0e7da94ee2996a0ca. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217355."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en oxguy3 coebot-www y clasificada como problem\u00e1tica. Este problema afecta la funci\u00f3n displayChannelCommands/displayChannelQuotes/displayChannelAutoreplies/showChannelHighlights/showChannelBoir del archivo js/channel.js. La manipulaci\u00f3n conduce a cross site scripting. El ataque puede iniciarse de forma remota. El parche se llama c1a6c44092585da4236237e0e7da94ee2996a0ca. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-217355."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15009.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15009.json
index 773b1d5bcc8..2882b755348 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15009.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15009.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15009",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T09:15:08.290",
- "lastModified": "2023-11-07T02:29:45.413",
+ "lastModified": "2024-02-29T01:17:43.057",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15010.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15010.json
index 8c020f1f43f..6c7fdd4a7c9 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15010.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15010.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15010",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T09:15:08.380",
- "lastModified": "2023-11-07T02:29:45.580",
+ "lastModified": "2024-02-29T01:17:43.150",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15011.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15011.json
index e9e0f0f6e85..03d242f83b2 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15011.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15011.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15011",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T10:15:09.997",
- "lastModified": "2023-11-07T02:29:45.750",
+ "lastModified": "2024-02-29T01:17:43.233",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15012.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15012.json
index ed3df76610f..1fbfaab0e9d 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15012.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15012.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15012",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.530",
- "lastModified": "2023-11-07T02:29:45.923",
+ "lastModified": "2024-02-29T01:17:43.317",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15013.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15013.json
index de95d7eec35..744959a8991 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15013.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15013.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15013",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T20:15:09.233",
- "lastModified": "2023-11-07T02:29:46.097",
+ "lastModified": "2024-02-29T01:17:43.397",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15014.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15014.json
index b826867bac2..87704f1bfc9 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15014.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15014.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15014",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T20:15:09.310",
- "lastModified": "2023-11-07T02:29:46.260",
+ "lastModified": "2024-02-29T01:17:43.473",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15015.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15015.json
index 5300c7c9b66..567dbb5ec16 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15015.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15015.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15015",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T18:15:10.023",
- "lastModified": "2023-11-07T02:29:46.427",
+ "lastModified": "2024-02-29T01:17:43.577",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15016.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15016.json
index a752d3d21bc..cc0517e8500 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15016.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15016.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15016",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T18:15:10.117",
- "lastModified": "2023-11-07T02:29:46.600",
+ "lastModified": "2024-02-29T01:17:43.657",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15017.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15017.json
index 52e2367bfbc..63ab7a3a681 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15017.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15017.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15017",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-10T15:15:11.100",
- "lastModified": "2023-11-07T02:29:46.770",
+ "lastModified": "2024-02-29T01:17:43.733",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15018.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15018.json
index ebe1d3feecc..584e59347a7 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15018.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15018.json
@@ -2,12 +2,16 @@
"id": "CVE-2016-15018",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T19:15:09.167",
- "lastModified": "2023-11-07T02:29:46.927",
+ "lastModified": "2024-02-29T01:17:43.810",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in krail-jpa up to 0.9.1. It has been classified as critical. This affects an unknown part. The manipulation leads to sql injection. Upgrading to version 0.9.2 is able to address this issue. The identifier of the patch is c1e848665492e21ef6cc9be443205e36b9a1f6be. It is recommended to upgrade the affected component. The identifier VDB-218373 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en krail-jpa hasta 0.9.1. Ha sido clasificada como cr\u00edtica. Esto afecta a una parte desconocida. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. La actualizaci\u00f3n a la versi\u00f3n 0.9.2 puede solucionar este problema. El identificador del parche es c1e848665492e21ef6cc9be443205e36b9a1f6be. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-218373."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15019.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15019.json
index 39c4a08b2e5..216afb95468 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15019.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15019.json
@@ -2,12 +2,16 @@
"id": "CVE-2016-15019",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T19:15:09.247",
- "lastModified": "2023-11-07T02:29:47.080",
+ "lastModified": "2024-02-29T01:17:43.887",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in tombh jekbox. It has been rated as problematic. This issue affects some unknown processing of the file lib/server.rb. The manipulation leads to exposure of information through directory listing. The attack may be initiated remotely. The patch is named 64eb2677671018fc08b96718b81e3dbc83693190. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218375."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Tombh Jekbox. Ha sido calificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo lib/server.rb. La manipulaci\u00f3n conduce a la exposici\u00f3n de informaci\u00f3n a trav\u00e9s de listados de directorios. El ataque puede iniciarse de forma remota. El parche se llama 64eb2677671018fc08b96718b81e3dbc83693190. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-218375."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15020.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15020.json
index b5932236cc8..4508adbdc95 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15020.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15020.json
@@ -2,12 +2,16 @@
"id": "CVE-2016-15020",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T11:15:10.147",
- "lastModified": "2023-11-07T02:29:47.250",
+ "lastModified": "2024-02-29T01:17:43.967",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in liftkit database up to 2.13.1. It has been classified as critical. This affects the function processOrderBy of the file src/Query/Query.php. The manipulation leads to sql injection. Upgrading to version 2.13.2 is able to address this issue. The patch is named 42ec8f2b22e0b0b98fb5b4444ed451c1b21d125a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218391."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en la base de datos de liftkit hasta 2.13.1. Ha sido clasificada como cr\u00edtica. Esto afecta la funci\u00f3n ProcessOrderBy del archivo src/Query/Query.php. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. La actualizaci\u00f3n a la versi\u00f3n 2.13.2 puede solucionar este problema. El parche se llama 42ec8f2b22e0b0b98fb5b4444ed451c1b21d125a. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-218391."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15021.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15021.json
index 098b0a1c8d8..ee797494621 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15021.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15021.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15021",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T16:15:16.383",
- "lastModified": "2023-11-07T02:29:47.410",
+ "lastModified": "2024-02-29T01:17:44.053",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15022.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15022.json
index 31fab6998b5..ce035a3b53f 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15022.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15022.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15022",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-29T19:15:08.940",
- "lastModified": "2023-11-07T02:29:47.570",
+ "lastModified": "2024-02-29T01:17:44.130",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15023.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15023.json
index 951844b7cdc..4d62abcba37 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15023.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15023.json
@@ -2,12 +2,16 @@
"id": "CVE-2016-15023",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-31T20:15:09.467",
- "lastModified": "2023-11-07T02:29:47.740",
+ "lastModified": "2024-02-29T01:17:44.210",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in SiteFusion Application Server up to 6.6.6. This affects an unknown part of the file getextension.php of the component Extension Handler. The manipulation leads to path traversal. Upgrading to version 6.6.7 is able to address this issue. The identifier of the patch is 49fff155c303d6cd06ce8f97bba56c9084bf08ac. It is recommended to upgrade the affected component. The identifier VDB-219765 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en SiteFusion Application Server hasta 6.6.6 y clasificada como problem\u00e1tica. Una parte desconocida del archivo getextension.php del componente Extension Handler es afectada por una funci\u00f3n desconocida. La manipulaci\u00f3n conduce al path traversal. La actualizaci\u00f3n a la versi\u00f3n 6.6.7 puede solucionar este problema. El identificador del parche es 49fff155c303d6cd06ce8f97bba56c9084bf08ac. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-219765."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15024.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15024.json
index 572cfe567bd..e7123e13c70 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15024.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15024.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15024",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-19T18:15:10.067",
- "lastModified": "2023-11-07T02:29:47.910",
+ "lastModified": "2024-02-29T01:17:44.297",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15025.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15025.json
index 5d67ca5f71a..95a08a5407d 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15025.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15025.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15025",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T10:15:12.773",
- "lastModified": "2023-11-07T02:29:48.080",
+ "lastModified": "2024-02-29T01:17:44.380",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15026.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15026.json
index e01b9c6795f..ee9ba636d29 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15026.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15026.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15026",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T11:15:12.617",
- "lastModified": "2023-11-07T02:29:48.240",
+ "lastModified": "2024-02-29T01:17:44.467",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15027.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15027.json
index bd7c8fa865c..7e62d241f3e 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15027.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15027.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15027",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T17:15:11.273",
- "lastModified": "2023-11-07T02:29:48.407",
+ "lastModified": "2024-02-29T01:17:44.550",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15028.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15028.json
index 7275277d3d6..d2078e4c4f6 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15028.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15028.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15028",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-12T15:15:28.117",
- "lastModified": "2023-11-07T02:29:48.580",
+ "lastModified": "2024-02-29T01:17:44.633",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15029.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15029.json
index 095d39d7015..7391f51c188 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15029.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15029.json
@@ -2,8 +2,8 @@
"id": "CVE-2016-15029",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-21T11:15:10.103",
- "lastModified": "2023-12-20T02:21:36.473",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:17:44.727",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15030.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15030.json
index 9b733a1434e..420a06c4546 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15030.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15030.json
@@ -2,8 +2,8 @@
"id": "CVE-2016-15030",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-25T18:15:09.467",
- "lastModified": "2023-12-20T02:23:41.077",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:17:44.817",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15031.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15031.json
index a96cae364c4..98146ecdd12 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15031.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15031.json
@@ -2,8 +2,8 @@
"id": "CVE-2016-15031",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-06T01:15:08.827",
- "lastModified": "2024-01-09T02:17:52.587",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:17:44.910",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15032.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15032.json
index 89f215a6fbc..950caf08381 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15032.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15032.json
@@ -2,8 +2,8 @@
"id": "CVE-2016-15032",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-02T00:15:09.443",
- "lastModified": "2023-12-20T03:05:04.720",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:17:45.007",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15034.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15034.json
index e572af4cb66..86892a40b86 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15034.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15034.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15034",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T18:15:10.260",
- "lastModified": "2023-11-07T02:29:50.093",
+ "lastModified": "2024-02-29T01:17:45.093",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15035.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15035.json
index 41ac3518cdd..464b6e8732a 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15035.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15035.json
@@ -2,7 +2,7 @@
"id": "CVE-2016-15035",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-28T04:15:08.573",
- "lastModified": "2023-11-07T02:29:50.273",
+ "lastModified": "2024-02-29T01:17:45.180",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15036.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15036.json
index 9e7374aa8bc..70e2c954d2b 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15036.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15036.json
@@ -2,8 +2,8 @@
"id": "CVE-2016-15036",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-23T20:15:37.930",
- "lastModified": "2024-01-03T20:48:43.957",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:17:45.273",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -11,7 +11,7 @@
},
{
"lang": "es",
- "value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Se encontr\u00f3 una vulnerabilidad en Deis Workflow Manager hasta 2.3.2. Ha sido clasificada como problem\u00e1tica. Esto afecta a una parte desconocida. La manipulaci\u00f3n conduce a la condici\u00f3n de ejecuci\u00f3n. La complejidad del ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. La actualizaci\u00f3n a la versi\u00f3n 2.3.3 puede solucionar este problema. El parche se llama 31fe3bccbdde134a185752e53380330d16053f7f. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-248847. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor."
+ "value": "** NO SOPORTADO CUANDO SE ASIGN\u00d3 ** Se encontr\u00f3 una vulnerabilidad en Deis Workflow Manager hasta 2.3.2. Ha sido clasificada como problem\u00e1tica. Esto afecta a una parte desconocida. La manipulaci\u00f3n conduce a la condici\u00f3n de ejecuci\u00f3n. La complejidad del ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. La actualizaci\u00f3n a la versi\u00f3n 2.3.3 puede solucionar este problema. El parche se llama 31fe3bccbdde134a185752e53380330d16053f7f. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-248847. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante."
}
],
"metrics": {
diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15037.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15037.json
index a5b9e73db18..d9d404aa0e2 100644
--- a/CVE-2016/CVE-2016-150xx/CVE-2016-15037.json
+++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15037.json
@@ -2,8 +2,8 @@
"id": "CVE-2016-15037",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-21T06:15:08.600",
- "lastModified": "2024-01-26T17:50:23.433",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:17:45.357",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20150.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20150.json
index 2ec9f0a8cca..247e6d3d5d7 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20150.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20150.json
@@ -2,12 +2,16 @@
"id": "CVE-2017-20150",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T19:15:08.837",
- "lastModified": "2023-11-07T02:43:18.823",
+ "lastModified": "2024-02-29T01:20:27.163",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in challenge website. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. The name of the patch is f1644b1d3502e5aa5284f31ea80d2623817f4d42. It is recommended to apply a patch to fix this issue. The identifier VDB-216989 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en el sitio web Challenge. Ha sido calificado como cr\u00edtico. Este problema afecta alg\u00fan procesamiento desconocido. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El nombre del parche es f1644b1d3502e5aa5284f31ea80d2623817f4d42. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216989."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20151.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20151.json
index fc9e2f5cdf4..8b63a64469e 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20151.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20151.json
@@ -2,12 +2,16 @@
"id": "CVE-2017-20151",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T12:15:08.730",
- "lastModified": "2023-11-18T02:49:16.017",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:20:27.257",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in iText RUPS. This vulnerability affects unknown code of the file src/main/java/com/itextpdf/rups/model/XfaFile.java. The manipulation leads to xml external entity reference. The patch is identified as ac5590925874ef810018a6b60fec216eee54fb32. It is recommended to apply a patch to fix this issue. VDB-217054 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en iText RUPS y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo src/main/java/com/itextpdf/rups/model/XfaFile.java. La manipulaci\u00f3n conduce a una referencia de entidad externa xml. El nombre del parche es ac5590925874ef810018a6b60fec216eee54fb32. Se recomienda aplicar un parche para solucionar este problema. VDB-217054 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20152.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20152.json
index 3e19c317491..34a37ca2931 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20152.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20152.json
@@ -2,12 +2,16 @@
"id": "CVE-2017-20152",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T12:15:08.817",
- "lastModified": "2023-11-07T02:43:19.240",
+ "lastModified": "2024-02-29T01:20:27.340",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in aerouk imageserve. Affected is an unknown function of the file public/viewer.php of the component File Handler. The manipulation of the argument filelocation leads to path traversal. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is bd23c784f0e5cb12f66d15c100248449f87d72e2. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217056."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en aerouk imageserve y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo public/viewer.php del componente File Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento ubicaci\u00f3n del archivo conduce a un path traversal. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El nombre del parche es bd23c784f0e5cb12f66d15c100248449f87d72e2. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-217056."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20153.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20153.json
index 7c68a270fd3..68c95f62eca 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20153.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20153.json
@@ -2,12 +2,16 @@
"id": "CVE-2017-20153",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T12:15:08.910",
- "lastModified": "2023-11-07T02:43:19.440",
+ "lastModified": "2024-02-29T01:20:27.427",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in aerouk imageserve and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument REQUEST_URI leads to cross site scripting. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 2ac3cd4f90b4df66874fab171376ca26868604c4. It is recommended to apply a patch to fix this issue. The identifier VDB-217057 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en aerouk imageserve y clasificada como problem\u00e1tica. Una funcionalidad desconocida es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento REQUEST_URI conduce a Cross-Site Scripting (XSS). El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El nombre del parche es 2ac3cd4f90b4df66874fab171376ca26868604c4. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217057."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20154.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20154.json
index 44e4e603238..c1c06f8b13a 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20154.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20154.json
@@ -2,12 +2,16 @@
"id": "CVE-2017-20154",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T21:15:09.787",
- "lastModified": "2023-11-07T02:43:19.660",
+ "lastModified": "2024-02-29T01:20:27.513",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ghostlander Phoenixcoin. It has been classified as problematic. Affected is the function CTxMemPool::accept of the file src/main.cpp. The manipulation leads to denial of service. Upgrading to version 0.6.6.1-pxc is able to address this issue. The name of the patch is 987dd68f71a7d8276cef3b6c3d578fd4845b5699. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217068."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en ghostlander Phoenixcoin. Ha sido clasificada como problem\u00e1tica. La funci\u00f3n CTxMemPool::accept del fichero src/main.cpp es afectada por la vulnerabilidad. La manipulaci\u00f3n conduce a la denegaci\u00f3n del servicio. La actualizaci\u00f3n a la versi\u00f3n 0.6.6.1-pxc puede solucionar este problema. El nombre del parche es 987dd68f71a7d8276cef3b6c3d578fd4845b5699. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-217068."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20155.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20155.json
index 6f22996eef5..3564033968c 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20155.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20155.json
@@ -2,12 +2,16 @@
"id": "CVE-2017-20155",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T23:15:08.883",
- "lastModified": "2023-12-01T22:07:13.797",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:20:27.593",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Sterc Google Analytics Dashboard for MODX up to 1.0.5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file core/components/analyticsdashboardwidget/elements/tpl/widget.analytics.tpl of the component Internal Search. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.0.6 is able to address this issue. The identifier of the patch is 855d9560d3782c105568eedf9b22a769fbf29cc0. It is recommended to upgrade the affected component. The identifier VDB-217069 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Sterc Google Analytics Dashboard para MODX hasta 1.0.5. Ha sido declarada problem\u00e1tica. Una funci\u00f3n desconocida del archivo core/components/analyticsdashboardwidget/elements/tpl/widget.analytics.tpl del componente Internal Search es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a cross-site scripting. El ataque se puede lanzar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.0.6 puede solucionar este problema. El nombre del parche es 855d9560d3782c105568eedf9b22a769fbf29cc0. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217069."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20156.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20156.json
index eac070d1a78..6f6f637c1e5 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20156.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20156.json
@@ -2,12 +2,16 @@
"id": "CVE-2017-20156",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-31T10:15:09.183",
- "lastModified": "2023-12-01T22:09:35.407",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:20:27.680",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Exciting Printer and classified as critical. This issue affects some unknown processing of the file lib/printer/jobs/prepare_page.rb of the component Argument Handler. The manipulation of the argument URL leads to command injection. The patch is named 5f8c715d6e2cc000f621a6833f0a86a673462136. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217139."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Exciting Printer y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo lib/printer/jobs/prepare_page.rb del componente Argument Handler. La manipulaci\u00f3n del argumento URL conduce a la inyecci\u00f3n de comandos. El nombre del parche es 5f8c715d6e2cc000f621a6833f0a86a673462136. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-217139."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20157.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20157.json
index 77c2d5fca76..ab2de8d6d7c 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20157.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20157.json
@@ -2,12 +2,16 @@
"id": "CVE-2017-20157",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-31T10:15:13.073",
- "lastModified": "2023-11-07T02:43:20.383",
+ "lastModified": "2024-02-29T01:20:27.763",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Ariadne Component Library up to 2.x. It has been classified as critical. Affected is an unknown function of the file src/url/Url.php. The manipulation leads to server-side request forgery. Upgrading to version 3.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217140."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Ariadne Component Library hasta 2.x. Ha sido clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo src/url/Url.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a server-side request forgery. La actualizaci\u00f3n a la versi\u00f3n 3.0 puede solucionar este problema. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-217140."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20158.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20158.json
index ec55e54dfd8..9f7aae2e953 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20158.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20158.json
@@ -2,8 +2,8 @@
"id": "CVE-2017-20158",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-31T11:15:08.587",
- "lastModified": "2023-12-22T21:33:15.120",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:20:27.843",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20159.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20159.json
index f33e51af26f..672d4de4c59 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20159.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20159.json
@@ -2,12 +2,16 @@
"id": "CVE-2017-20159",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-31T11:15:10.750",
- "lastModified": "2023-12-20T02:16:20.700",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:20:27.927",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in rf Keynote up to 0.x on Rails. It has been rated as problematic. Affected by this issue is some unknown functionality of the file lib/keynote/rumble.rb. The manipulation of the argument value leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.0.0 is able to address this issue. The patch is identified as 05be4356b0a6ca7de48da926a9b997beb5ffeb4a. It is recommended to upgrade the affected component. VDB-217142 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en rf Keynote hasta 0.x. Ha sido calificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo lib/keynote/rumble.rb es afectada por este problema. La manipulaci\u00f3n del valor del argumento conduce a cross-site scripting. El ataque puede lanzarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.0.0 puede solucionar este problema. El nombre del parche es 05be4356b0a6ca7de48da926a9b997beb5ffeb4a. Se recomienda actualizar el componente afectado. VDB-217142 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20160.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20160.json
index 4c7e50ac0f3..f708c384d1d 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20160.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20160.json
@@ -2,12 +2,16 @@
"id": "CVE-2017-20160",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-31T20:15:08.693",
- "lastModified": "2023-11-07T02:43:21.110",
+ "lastModified": "2024-02-29T01:20:28.003",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in flitto express-param up to 0.x. It has been classified as critical. This affects an unknown part of the file lib/fetchParams.js. The manipulation leads to improper handling of extra parameters. It is possible to initiate the attack remotely. Upgrading to version 1.0.0 is able to address this issue. The identifier of the patch is db94f7391ad0a16dcfcba8b9be1af385b25c42db. It is recommended to upgrade the affected component. The identifier VDB-217149 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en flitto express-param hasta 0.x. Ha sido clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo lib/fetchParams.js. La manipulaci\u00f3n conduce a un manejo inadecuado de par\u00e1metros adicionales. Es posible iniciar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.0.0 puede solucionar este problema. El nombre del parche es db94f7391ad0a16dcfcba8b9be1af385b25c42db. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217149."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20161.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20161.json
index d88fe3d124d..86ba36946da 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20161.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20161.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20161",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T16:15:10.530",
- "lastModified": "2023-11-07T02:43:21.280",
+ "lastModified": "2024-02-29T01:20:28.087",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20162.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20162.json
index 3cc4c65c2a0..54a938ac3c7 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20162.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20162.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20162",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T12:15:09.167",
- "lastModified": "2023-11-07T02:43:21.437",
+ "lastModified": "2024-02-29T01:20:28.167",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20163.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20163.json
index 7e2bb2b7a79..5b8301e5c34 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20163.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20163.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20163",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T20:15:18.333",
- "lastModified": "2023-11-07T02:43:21.700",
+ "lastModified": "2024-02-29T01:20:28.257",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20164.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20164.json
index 7dc397c9c9d..28d296ca9c6 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20164.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20164.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20164",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T20:15:09.407",
- "lastModified": "2023-11-07T02:43:21.857",
+ "lastModified": "2024-02-29T01:20:28.343",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20165.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20165.json
index 6e10208ee58..e1d35e0e370 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20165.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20165.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20165",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T10:15:10.447",
- "lastModified": "2023-11-07T02:43:22.020",
+ "lastModified": "2024-02-29T01:20:28.437",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20167.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20167.json
index 3f7de6359c4..0658d39d7aa 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20167.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20167.json
@@ -2,12 +2,16 @@
"id": "CVE-2017-20167",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-14T20:15:09.390",
- "lastModified": "2023-12-20T02:10:43.700",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:20:28.530",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in Minichan. This affects an unknown part of the file reports.php. The manipulation of the argument headline leads to cross site scripting. It is possible to initiate the attack remotely. The identifier of the patch is fc0e732e58630cba318d6bf49d1388a7aa9d390e. It is recommended to apply a patch to fix this issue. The identifier VDB-217785 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Minichan y clasificada como problem\u00e1tica. Una parte desconocida del archivo reports.php afecta a esta vulnerabilidad. La manipulaci\u00f3n del argumento title conduce a cross site scripting. Es posible iniciar el ataque de forma remota. El identificador del parche es fc0e732e58630cba318d6bf49d1388a7aa9d390e. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217785."
}
],
"metrics": {
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20168.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20168.json
index 89b270d1e21..779bcd744ff 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20168.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20168.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20168",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T15:15:09.000",
- "lastModified": "2023-11-07T02:43:22.530",
+ "lastModified": "2024-02-29T01:20:28.633",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20169.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20169.json
index 5d6bc2783e9..9aa121b51b9 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20169.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20169.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20169",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T21:15:15.207",
- "lastModified": "2023-11-07T02:43:22.690",
+ "lastModified": "2024-02-29T01:20:28.713",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20170.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20170.json
index f716e458080..f8ef2c73c3b 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20170.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20170.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20170",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T14:15:10.613",
- "lastModified": "2023-11-07T02:43:22.847",
+ "lastModified": "2024-02-29T01:20:28.797",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20171.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20171.json
index 5390a580c17..94bb61cc98d 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20171.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20171.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20171",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T23:15:15.417",
- "lastModified": "2023-11-07T02:43:23.003",
+ "lastModified": "2024-02-29T01:20:28.873",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20172.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20172.json
index fe767bfcc55..b77adb1950b 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20172.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20172.json
@@ -2,8 +2,8 @@
"id": "CVE-2017-20172",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T15:15:11.083",
- "lastModified": "2023-12-08T21:31:12.723",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:20:28.947",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20173.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20173.json
index a300c741bca..b0b057d6c79 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20173.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20173.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20173",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T16:15:10.863",
- "lastModified": "2023-11-07T02:43:23.417",
+ "lastModified": "2024-02-29T01:20:29.030",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20174.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20174.json
index 17fa30ccacc..95a624d8361 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20174.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20174.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20174",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-19T08:15:12.620",
- "lastModified": "2023-11-07T02:43:23.583",
+ "lastModified": "2024-02-29T01:20:29.113",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20175.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20175.json
index 76b395a51b2..84f33c42867 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20175.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20175.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20175",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-05T20:15:08.393",
- "lastModified": "2023-11-07T02:43:23.743",
+ "lastModified": "2024-02-29T01:20:29.200",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20176.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20176.json
index 251577ff68c..7a91dccb253 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20176.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20176.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20176",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T04:15:08.043",
- "lastModified": "2023-11-07T02:43:23.913",
+ "lastModified": "2024-02-29T01:20:29.287",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20177.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20177.json
index 856897ff6ae..b0caf861f9d 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20177.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20177.json
@@ -2,8 +2,8 @@
"id": "CVE-2017-20177",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T20:15:10.763",
- "lastModified": "2023-11-16T01:15:29.783",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:20:29.363",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20178.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20178.json
index 5c9d9c34431..3c1e4b2fbf8 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20178.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20178.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20178",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T18:15:11.600",
- "lastModified": "2023-11-07T02:43:24.353",
+ "lastModified": "2024-02-29T01:20:29.453",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20179.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20179.json
index 2627472709e..2c98b49227c 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20179.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20179.json
@@ -2,8 +2,8 @@
"id": "CVE-2017-20179",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T21:15:10.713",
- "lastModified": "2023-11-16T01:23:18.960",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:20:29.540",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20180.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20180.json
index d10a13977b0..bd86158dce8 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20180.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20180.json
@@ -2,8 +2,8 @@
"id": "CVE-2017-20180",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T11:15:09.813",
- "lastModified": "2023-12-20T02:45:34.063",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:20:29.620",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20181.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20181.json
index a189798de93..bffadc883f3 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20181.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20181.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20181",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-07T00:15:09.040",
- "lastModified": "2023-11-07T02:43:25.113",
+ "lastModified": "2024-02-29T01:20:29.740",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20182.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20182.json
index 558a00b8dfe..82e70cebb86 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20182.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20182.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20182",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-10T02:15:58.250",
- "lastModified": "2023-11-07T02:43:25.293",
+ "lastModified": "2024-02-29T01:20:29.827",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20183.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20183.json
index fff603d9a73..398c2d01cb4 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20183.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20183.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20183",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-05T01:15:08.550",
- "lastModified": "2023-11-07T02:43:25.487",
+ "lastModified": "2024-02-29T01:20:29.907",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20185.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20185.json
index 509af456fd2..bf7149ce0d9 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20185.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20185.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20185",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-06T02:15:09.473",
- "lastModified": "2023-11-07T02:43:25.690",
+ "lastModified": "2024-02-29T01:20:30.007",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20186.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20186.json
index 6529d82240c..ac96d6ed679 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20186.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20186.json
@@ -2,7 +2,7 @@
"id": "CVE-2017-20186",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-28T13:15:08.937",
- "lastModified": "2023-11-07T02:43:25.870",
+ "lastModified": "2024-02-29T01:20:30.087",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20187.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20187.json
index 269458a26b3..c90b5c0f4ff 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20187.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20187.json
@@ -2,8 +2,8 @@
"id": "CVE-2017-20187",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-05T21:15:09.190",
- "lastModified": "2023-11-14T14:44:43.743",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:20:30.167",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2017/CVE-2017-201xx/CVE-2017-20188.json b/CVE-2017/CVE-2017-201xx/CVE-2017-20188.json
index ca4558a341d..ad9bf12f175 100644
--- a/CVE-2017/CVE-2017-201xx/CVE-2017-20188.json
+++ b/CVE-2017/CVE-2017-201xx/CVE-2017-20188.json
@@ -2,8 +2,8 @@
"id": "CVE-2017-20188",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-02T15:15:08.377",
- "lastModified": "2024-01-09T14:28:14.867",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:20:30.267",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25034.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25034.json
index 4d17e4c2561..c87f9f55c33 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25034.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25034.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25034",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-06-12T08:15:07.057",
- "lastModified": "2023-11-07T02:56:26.580",
+ "lastModified": "2024-02-29T01:23:11.100",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25049.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25049.json
index 262f945d325..9f4d57e68dd 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25049.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25049.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25049",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T09:15:09.557",
- "lastModified": "2023-11-07T02:56:26.897",
+ "lastModified": "2024-02-29T01:23:11.403",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in email-existence. It has been rated as problematic. Affected by this issue is some unknown functionality of the file index.js. The manipulation leads to inefficient regular expression complexity. The name of the patch is 0029ba71b6ad0d8ec0baa2ecc6256d038bdd9b56. It is recommended to apply a patch to fix this issue. VDB-216854 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en email-existence. Ha sido calificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo index.js es afectada por este problema. La manipulaci\u00f3n conduce a una complejidad de expresiones regulares ineficiente. El nombre del parche es 0029ba71b6ad0d8ec0baa2ecc6256d038bdd9b56. Se recomienda aplicar un parche para solucionar este problema. VDB-216854 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25050.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25050.json
index 6b103545c8b..84b5447bd85 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25050.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25050.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25050",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T10:15:08.783",
- "lastModified": "2023-11-07T02:56:27.067",
+ "lastModified": "2024-02-29T01:23:11.487",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in Harvest Chosen up to 1.8.6. Affected by this issue is the function AbstractChosen of the file coffee/lib/abstract-chosen.coffee. The manipulation of the argument group_label leads to cross site scripting. The attack may be launched remotely. Upgrading to version 1.8.7 is able to address this issue. The name of the patch is 77fd031d541e77510268d1041ed37798fdd1017e. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216956."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Harvest Chosen hasta 1.8.6 y clasificada como problem\u00e1tica. La funci\u00f3n AbstractChosen del archivo coffee/lib/abstract-chosen.coffee es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento gorup_label conduce a cross site scripting. El ataque puede lanzarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.8.7 puede solucionar este problema. El nombre del parche es 77fd031d541e77510268d1041ed37798fdd1017e. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-216956."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25051.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25051.json
index 3b3b00016af..11e45e260d1 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25051.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25051.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25051",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T12:15:08.527",
- "lastModified": "2023-11-07T02:56:27.253",
+ "lastModified": "2024-02-29T01:23:11.587",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in JmPotato Pomash. This affects an unknown part of the file Pomash/theme/clean/templates/editor.html. The manipulation of the argument article.title/content.title/article.tag leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is be1914ef0a6808e00f51618b2de92496a3604415. It is recommended to apply a patch to fix this issue. The identifier VDB-216957 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en JmPotato Pomash y clasificada como problem\u00e1tica. Esto afecta a una parte desconocida del archivo Pomash/theme/clean/templates/editor.html. La manipulaci\u00f3n del argumento article.title/content.title/article.tag conduce a Cross-Site Scripting (XSS). Es posible iniciar el ataque de forma remota. El nombre del parche es be1914ef0a6808e00f51618b2de92496a3604415. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216957."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25052.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25052.json
index f1c0280c8d5..7440a1cf0fd 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25052.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25052.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25052",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T12:15:08.607",
- "lastModified": "2023-11-07T02:56:27.410",
+ "lastModified": "2024-02-29T01:23:11.683",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Catalyst-Plugin-Session up to 0.40 and classified as problematic. This vulnerability affects the function _load_sessionid of the file lib/Catalyst/Plugin/Session.pm of the component Session ID Handler. The manipulation of the argument sid leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.41 is able to address this issue. The name of the patch is 88d1b599e1163761c9bd53bec53ba078f13e09d4. It is recommended to upgrade the affected component. VDB-216958 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Catalyst-Plugin-Session hasta 0.40 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta la funci\u00f3n _load_sessionid del archivo lib/Catalyst/Plugin/Session.pm del componente Session ID Handler. La manipulaci\u00f3n del argumento sid conduce a Cross-Site Scripting (XSS). El ataque se puede iniciar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 0.41 puede solucionar este problema. El nombre del parche es 88d1b599e1163761c9bd53bec53ba078f13e09d4. Se recomienda actualizar el componente afectado. VDB-216958 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25053.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25053.json
index 528c6bbff3a..1f4b9acc26a 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25053.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25053.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25053",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T12:15:08.680",
- "lastModified": "2023-11-07T02:56:27.573",
+ "lastModified": "2024-02-29T01:23:11.777",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in moappi Json2html up to 1.1.x and classified as problematic. This issue affects some unknown processing of the file json2html.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.2.0 is able to address this issue. The name of the patch is 2d3d24d971b19a8ed1fb823596300b9835d55801. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216959."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en moappi Json2html hasta 1.1.x y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo json2html.js. La manipulaci\u00f3n conduce a cross site scripting. El ataque puede iniciarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.2.0 puede solucionar este problema. El nombre del parche es 2d3d24d971b19a8ed1fb823596300b9835d55801. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216959."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25054.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25054.json
index f575adbec07..e1cae81c2ba 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25054.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25054.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25054",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T12:15:08.753",
- "lastModified": "2023-11-07T02:56:27.743",
+ "lastModified": "2024-02-29T01:23:11.870",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in shred cilla. It has been classified as problematic. Affected is an unknown function of the file cilla-xample/src/main/webapp/WEB-INF/jsp/view/search.jsp of the component Search Handler. The manipulation of the argument details leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is d345e6bc7798bd717a583ec7f545ca387819d5c7. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216960."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en shred cilla. Ha sido clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo cilla-xample/src/main/webapp/WEB-INF/jsp/view/search.jsp del componente Search Handler es afectada por una funci\u00f3n desconocida. La manipulaci\u00f3n del argumento details conduce a cross site scripting. Es posible lanzar el ataque de forma remota. El nombre del parche es d345e6bc7798bd717a583ec7f545ca387819d5c7. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-216960."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25055.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25055.json
index 5c8c137699b..82f2614a394 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25055.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25055.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25055",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T12:15:08.820",
- "lastModified": "2023-11-07T02:56:27.903",
+ "lastModified": "2024-02-29T01:23:11.960",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in FarCry Solr Pro Plugin up to 1.5.x. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file packages/forms/solrProSearch.cfc of the component Search Handler. The manipulation of the argument suggestion leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is b8f3d61511c9b02b781ec442bfb803cbff8e08d5. It is recommended to upgrade the affected component. The identifier VDB-216961 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en FarCry Solr Pro Plugin hasta 1.5.x. Ha sido declarada problem\u00e1tica. Una funci\u00f3n desconocida del archivo packages/forms/solrProSearch.cfc del componente Search Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento suggestion conduce a cross site scripting. El ataque se puede lanzar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.6.0 puede solucionar este problema. El nombre del parche es b8f3d61511c9b02b781ec442bfb803cbff8e08d5. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216961."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25056.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25056.json
index 2f08c650440..a4cbb1a0b8b 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25056.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25056.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25056",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T12:15:08.893",
- "lastModified": "2023-11-07T02:56:28.060",
+ "lastModified": "2024-02-29T01:23:12.053",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in yolapi. Affected is the function render_description of the file yolapi/pypi/metadata.py. The manipulation of the argument text leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is a0fe129055a99f429133a5c40cb13b44611ff796. It is recommended to apply a patch to fix this issue. VDB-216966 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en yolapi y clasificada como problem\u00e1tica. La funci\u00f3n render_description del archivo yolapi/pypi/metadata.py es afectada por la vulnerabilidad. La manipulaci\u00f3n del argumento text conduce a cross site scripting. Es posible lanzar el ataque de forma remota. El nombre del parche es a0fe129055a99f429133a5c40cb13b44611ff796. Se recomienda aplicar un parche para solucionar este problema. VDB-216966 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25057.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25057.json
index 9e4af123259..0f89909dc01 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25057.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25057.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25057",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T21:15:09.077",
- "lastModified": "2023-11-07T02:56:28.220",
+ "lastModified": "2024-02-29T01:23:12.147",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in simple_php_link_shortener. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument $link[\"id\"] leads to sql injection. The name of the patch is b26ac6480761635ed94ccb0222ba6b732de6e53f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216996."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en simple_php_link_shortener. Ha sido clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo index.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento $link[\"id\"] conduce a la inyecci\u00f3n SQL. El nombre del parche es b26ac6480761635ed94ccb0222ba6b732de6e53f. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-216996."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25058.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25058.json
index 7ddad8f121d..69affc6967b 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25058.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25058.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25058",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-29T08:15:08.620",
- "lastModified": "2023-11-07T02:56:28.383",
+ "lastModified": "2024-02-29T01:23:12.240",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in Twitter-Post-Fetcher up to 17.x. This affects an unknown part of the file js/twitterFetcher.js of the component Link Target Handler. The manipulation leads to use of web link to untrusted target with window.opener access. It is possible to initiate the attack remotely. Upgrading to version 18.0.0 is able to address this issue. The name of the patch is 7d281c6fb5acbc29a2cad295262c1f0c19ca56f3. It is recommended to upgrade the affected component. The identifier VDB-217017 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad clasificada como problem\u00e1tica ha sido encontrada en Twitter-Post-Fetcher hasta 17.x. Una parte desconocida del archivo js/twitterFetcher.js del componente Link Target Handler afecta a una parte desconocida. La manipulaci\u00f3n conduce al uso de un enlace web a un objetivo que no es de confianza con acceso a window.opener. Es posible iniciar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 18.0.0 puede solucionar este problema. El nombre del parche es 7d281c6fb5acbc29a2cad295262c1f0c19ca56f3. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217017."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25059.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25059.json
index 42856451c9a..72c0ce4eae6 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25059.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25059.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25059",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T11:15:10.130",
- "lastModified": "2023-11-07T02:56:28.623",
+ "lastModified": "2024-02-29T01:23:12.340",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in pastebinit up to 0.2.2 and classified as problematic. Affected by this issue is the function pasteHandler of the file server.go. The manipulation of the argument r.URL.Path leads to path traversal. Upgrading to version 0.2.3 is able to address this issue. The name of the patch is 1af2facb6d95976c532b7f8f82747d454a092272. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217040."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Pastebinit hasta 0.2.2 y clasificada como problem\u00e1tica. La funci\u00f3n pasteHandler del archivo server.go es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento r.URL.Path conduce a un path traversal. La actualizaci\u00f3n a la versi\u00f3n 0.2.3 puede solucionar este problema. El nombre del parche es 1af2facb6d95976c532b7f8f82747d454a092272. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-217040."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25060.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25060.json
index 956b3470654..12b796bda00 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25060.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25060.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25060",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T12:15:09.103",
- "lastModified": "2023-11-07T02:56:28.780",
+ "lastModified": "2024-02-29T01:23:12.440",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Macaron csrf and classified as problematic. Affected by this issue is some unknown functionality of the file csrf.go. The manipulation of the argument Generate leads to sensitive cookie without secure attribute. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The patch is identified as dadd1711a617000b70e5e408a76531b73187031c. It is recommended to apply a patch to fix this issue. VDB-217058 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Macaron csrf y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo csrf.go es afectada por este problema. La manipulaci\u00f3n del argumento Generar conduce a una cookie confidencial sin atributo seguro. El ataque puede lanzarse de forma remota. La complejidad de un ataque es bastante alta. Se sabe que la explotaci\u00f3n es dif\u00edcil. El parche se identifica como dadd1711a617000b70e5e408a76531b73187031c. Se recomienda aplicar un parche para solucionar este problema. VDB-217058 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25061.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25061.json
index 28fcb19f159..b331ebcfe9b 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25061.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25061.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25061",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-31T20:15:08.817",
- "lastModified": "2023-11-15T03:17:21.437",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:23:12.543",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in rgb2hex up to 0.1.5. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to inefficient regular expression complexity. The attack may be initiated remotely. Upgrading to version 0.1.6 is able to address this issue. The patch is named 9e0c38594432edfa64136fdf7bb651835e17c34f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217151."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en rgb2hex hasta 0.1.5. Ha sido calificada como problem\u00e1tica. Este problema afecta alg\u00fan procesamiento desconocido. La manipulaci\u00f3n conduce a una complejidad de expresiones regulares ineficiente. El ataque puede iniciarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 0.1.6 puede solucionar este problema. El nombre del parche es 9e0c38594432edfa64136fdf7bb651835e17c34f. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-217151."
}
],
"metrics": {
@@ -82,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25062.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25062.json
index b7c98ffd053..0abe276129b 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25062.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25062.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25062",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-01T09:15:09.690",
- "lastModified": "2023-11-07T02:56:29.203",
+ "lastModified": "2024-02-29T01:23:12.647",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25063.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25063.json
index b75be4a07c4..b319e6e8180 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25063.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25063.json
@@ -2,8 +2,8 @@
"id": "CVE-2018-25063",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-01T09:15:09.780",
- "lastModified": "2023-11-15T03:25:21.917",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:23:12.743",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25064.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25064.json
index 0fc3e515e22..1bc4df2a4ee 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25064.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25064.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25064",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T09:15:08.493",
- "lastModified": "2023-11-07T02:56:29.627",
+ "lastModified": "2024-02-29T01:23:12.843",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25065.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25065.json
index d45332c0bef..7e61b9946e1 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25065.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25065.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25065",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T10:15:09.657",
- "lastModified": "2023-11-07T02:56:29.787",
+ "lastModified": "2024-02-29T01:23:12.943",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25066.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25066.json
index 97a559dbdf4..033861d41de 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25066.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25066.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25066",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T11:15:09.320",
- "lastModified": "2023-11-07T02:56:29.953",
+ "lastModified": "2024-02-29T01:23:13.037",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PeterMu nodebatis up to 2.1.x. It has been classified as critical. Affected is an unknown function. The manipulation leads to sql injection. Upgrading to version 2.2.0 is able to address this issue. The patch is identified as 6629ff5b7e3d62ad8319007a54589ec1f62c7c35. It is recommended to upgrade the affected component. VDB-217554 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en PeterMu nodebatis hasta 2.1.x. Ha sido clasificada como cr\u00edtica. Una funci\u00f3n desconocida es afectada por esta funci\u00f3n. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. La actualizaci\u00f3n a la versi\u00f3n 2.2.0 puede solucionar este problema. El parche se identifica como 6629ff5b7e3d62ad8319007a54589ec1f62c7c35. Se recomienda actualizar el componente afectado. VDB-217554 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25067.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25067.json
index 4365b26e709..f60cc8780fc 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25067.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25067.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25067",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T21:15:09.167",
- "lastModified": "2023-11-07T02:56:30.120",
+ "lastModified": "2024-02-29T01:23:13.133",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in JoomGallery up to 3.3.3. This affects an unknown part of the file administrator/components/com_joomgallery/views/config/tmpl/default.php of the component Image Sort Handler. The manipulation leads to sql injection. Upgrading to version 3.3.4 is able to address this issue. The identifier of the patch is dc414ee954e849082260f8613e15a1c1e1d354a1. It is recommended to upgrade the affected component. The identifier VDB-217569 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en JoomGallery hasta 3.3.3 y clasificada como cr\u00edtica. Una parte desconocida del archivo administrator/components/com_joomgallery/views/config/tmpl/default.php del componente Image Sort Handler. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. La actualizaci\u00f3n a la versi\u00f3n 3.3.4 puede solucionar este problema. El identificador del parche es dc414ee954e849082260f8613e15a1c1e1d354a1. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217569."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25068.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25068.json
index 3b2fa4bc3c8..836bc2ea1e3 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25068.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25068.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25068",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T21:15:09.243",
- "lastModified": "2023-11-07T02:56:30.290",
+ "lastModified": "2024-02-29T01:23:13.213",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in devent globalpom-utils up to 4.5.0 and classified as critical. This vulnerability affects the function createTmpDir of the file globalpomutils-fileresources/src/main/java/com/anrisoftware/globalpom/fileresourcemanager/FileResourceManagerProvider.java. The manipulation leads to insecure temporary file. The attack can be initiated remotely. Upgrading to version 4.5.1 is able to address this issue. The patch is identified as 77a820bac2f68e662ce261ecb050c643bd7ee560. It is recommended to upgrade the affected component. VDB-217570 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en devent globalpom-utils hasta 4.5.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n createTmpDir del archivo globalpomutils-fileresources/src/main/java/com/anrisoftware/globalpom/fileresourcemanager/FileResourceManagerProvider.java. La manipulaci\u00f3n conduce a un archivo temporal inseguro. El ataque se puede iniciar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 4.5.1 puede solucionar este problema. El parche se identifica como 77a820bac2f68e662ce261ecb050c643bd7ee560. Se recomienda actualizar el componente afectado. VDB-217570 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25069.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25069.json
index f020a7a7453..5e4eb0c68da 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25069.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25069.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25069",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T09:15:21.683",
- "lastModified": "2023-11-07T02:56:30.453",
+ "lastModified": "2024-02-29T01:23:13.320",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Netis Netcore Router. This affects an unknown part. The manipulation leads to use of hard-coded password. It is possible to initiate the attack remotely. The identifier VDB-217593 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en Netis Netcore Router y clasificada como cr\u00edtica. Esto afecta a una parte desconocida. La manipulaci\u00f3n conduce al uso de una contrase\u00f1a codificada. Es posible iniciar el ataque de forma remota. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217593."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25070.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25070.json
index 57f363f876e..d81d8ff6230 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25070.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25070.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25070",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T11:15:08.910",
- "lastModified": "2023-11-07T02:56:30.617",
+ "lastModified": "2024-02-29T01:23:13.413",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in polterguy Phosphorus Five up to 8.2 and classified as critical. This vulnerability affects the function csv.Read of the file plugins/extras/p5.mysql/NonQuery.cs of the component CSV Import. The manipulation leads to sql injection. Upgrading to version 8.3 is able to address this issue. The patch is identified as c179a3d0703db55cfe0cb939b89593f2e7a87246. It is recommended to upgrade the affected component. VDB-217606 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en polterguy Phosphorus Five hasta 8.2 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n csv.Read del archivo plugins/extras/p5.mysql/NonQuery.cs del componente CSV Import. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. La actualizaci\u00f3n a la versi\u00f3n 8.3 puede solucionar este problema. El parche se identifica como c179a3d0703db55cfe0cb939b89593f2e7a87246. Se recomienda actualizar el componente afectado. VDB-217606 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25071.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25071.json
index 00113a50b39..ef245a4f28c 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25071.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25071.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25071",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T12:15:08.900",
- "lastModified": "2023-11-07T02:56:30.803",
+ "lastModified": "2024-02-29T01:23:13.530",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in roxlukas LMeve up to 0.1.58. It has been rated as critical. Affected by this issue is the function insert_log of the file wwwroot/ccpwgl/proxy.php. The manipulation of the argument fetch leads to sql injection. Upgrading to version 0.1.59-beta is able to address this issue. The patch is identified as c25ff7fe83a2cda1fcb365b182365adc3ffae332. It is recommended to upgrade the affected component. VDB-217610 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en roxlukas LMeve hasta 0.1.58. Ha sido declarada como cr\u00edtica. La funci\u00f3n insert_log del archivo wwwroot/ccpwgl/proxy.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento buscar conduce a la inyecci\u00f3n SQL. La actualizaci\u00f3n a la versi\u00f3n 0.1.59-beta puede solucionar este problema. El parche se identifica como c25ff7fe83a2cda1fcb365b182365adc3ffae332. Se recomienda actualizar el componente afectado. VDB-217610 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25072.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25072.json
index 42b07cfe709..fe43c8dc7d8 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25072.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25072.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25072",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T13:15:09.877",
- "lastModified": "2023-11-07T02:56:30.967",
+ "lastModified": "2024-02-29T01:23:13.627",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25073.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25073.json
index fc8d9da5a25..a2edf857843 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25073.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25073.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25073",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T14:15:08.930",
- "lastModified": "2023-11-07T02:56:31.133",
+ "lastModified": "2024-02-29T01:23:13.720",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25074.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25074.json
index 9768e87d81d..50949ecb33d 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25074.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25074.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25074",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T15:15:09.097",
- "lastModified": "2023-11-07T02:56:31.300",
+ "lastModified": "2024-02-29T01:23:13.807",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25075.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25075.json
index 3e04fa65e1b..5fe1d1c1ef0 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25075.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25075.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25075",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T20:15:09.260",
- "lastModified": "2023-11-07T02:56:31.480",
+ "lastModified": "2024-02-29T01:23:13.900",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in karsany OBridge up to 1.3. Affected is the function getAllStandaloneProcedureAndFunction of the file obridge-main/src/main/java/org/obridge/dao/ProcedureDao.java. The manipulation leads to sql injection. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 1.4 is able to address this issue. The name of the patch is 52eca4ad05f3c292aed3178b2f58977686ffa376. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218376."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en karsany OBridge hasta 1.3 y clasificada como cr\u00edtica. La funci\u00f3n getAllStandaloneProcedureAndFunction del archivo obridge-main/src/main/java/org/obridge/dao/ProcedureDao.java es afectada por la vulnerabilidad. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. La actualizaci\u00f3n a la versi\u00f3n 1.4 puede solucionar este problema. El nombre del parche es 52eca4ad05f3c292aed3178b2f58977686ffa376. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-218376."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25076.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25076.json
index 4d35220529a..43d060329b6 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25076.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25076.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25076",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T12:15:16.347",
- "lastModified": "2023-11-07T02:56:31.660",
+ "lastModified": "2024-02-29T01:23:13.990",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Events Extension on BigTree. Affected by this vulnerability is the function getRandomFeaturedEventByDate/getUpcomingFeaturedEventsInCategoriesWithSubcategories/recacheEvent/searchResults of the file classes/events.php. The manipulation leads to sql injection. The patch is named 11169e48ab1249109485fdb1e0c9fca3d25ba01d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218395."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Events Extension en BigTree y clasificada como cr\u00edtica. La funci\u00f3n getRandomFeaturedEventByDate/getUpcomingFeaturedEventsInCategoriesWithSubcategories/recacheEvent/searchResults del archivo Classes/events.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El parche se llama 11169e48ab1249109485fdb1e0c9fca3d25ba01d. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-218395."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25077.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25077.json
index 61277100734..098238b5ffd 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25077.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25077.json
@@ -2,12 +2,16 @@
"id": "CVE-2018-25077",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T01:15:11.653",
- "lastModified": "2023-11-07T02:56:31.817",
+ "lastModified": "2024-02-29T01:23:14.087",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in melnaron mel-spintax. It has been rated as problematic. Affected by this issue is some unknown functionality of the file lib/spintax.js. The manipulation of the argument text leads to inefficient regular expression complexity. The name of the patch is 37767617846e27b87b63004e30216e8f919637d3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218456."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en melnaron mel-spintax. Ha sido calificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo lib/spintax.js es afectada por este problema. La manipulaci\u00f3n del texto del argumento conduce a una complejidad de expresi\u00f3n regular ineficiente. El nombre del parche es 37767617846e27b87b63004e30216e8f919637d3. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-218456."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25079.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25079.json
index 84b7492ea06..839bb7d302e 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25079.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25079.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25079",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-04T04:15:08.867",
- "lastModified": "2023-11-07T02:56:31.993",
+ "lastModified": "2024-02-29T01:23:14.187",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25080.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25080.json
index e268207e314..093737f7f6a 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25080.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25080.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25080",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-04T08:15:07.607",
- "lastModified": "2023-11-07T02:56:33.010",
+ "lastModified": "2024-02-29T01:23:14.273",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25082.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25082.json
index cece92d5cbe..453b8d6e960 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25082.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25082.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25082",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-21T18:15:11.677",
- "lastModified": "2023-11-07T02:56:33.253",
+ "lastModified": "2024-02-29T01:23:14.380",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25084.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25084.json
index a694475baf3..72f60aaaaf8 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25084.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25084.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25084",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T18:15:07.993",
- "lastModified": "2023-11-07T02:56:33.427",
+ "lastModified": "2024-02-29T01:23:14.497",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25085.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25085.json
index 7c11e5575c3..cdea33e32a3 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25085.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25085.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25085",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-01T05:15:08.633",
- "lastModified": "2023-11-07T02:56:33.590",
+ "lastModified": "2024-02-29T01:23:14.580",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25086.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25086.json
index 42a40ebb5f2..9a7cdfa8ef4 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25086.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25086.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25086",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-01T07:15:08.860",
- "lastModified": "2023-11-07T02:56:33.757",
+ "lastModified": "2024-02-29T01:23:14.673",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25087.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25087.json
index 33e21b11129..bf32dacb925 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25087.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25087.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25087",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-06T03:15:08.947",
- "lastModified": "2023-11-07T02:56:33.923",
+ "lastModified": "2024-02-29T01:23:14.767",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25088.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25088.json
index 517bc3faf4c..a7a720a8ce6 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25088.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25088.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25088",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-18T13:15:11.187",
- "lastModified": "2023-11-07T02:56:34.083",
+ "lastModified": "2024-02-29T01:23:14.860",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25089.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25089.json
index 720029c8c75..66d567d783d 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25089.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25089.json
@@ -2,7 +2,7 @@
"id": "CVE-2018-25089",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-28T13:15:09.100",
- "lastModified": "2023-11-07T02:56:34.253",
+ "lastModified": "2024-02-29T01:23:14.960",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25092.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25092.json
index 92b1fa2211c..50a6e717963 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25092.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25092.json
@@ -2,8 +2,8 @@
"id": "CVE-2018-25092",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-05T21:15:09.357",
- "lastModified": "2023-11-14T15:20:42.777",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:23:15.070",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25093.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25093.json
index 0483160c9e6..1047dd6b2e6 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25093.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25093.json
@@ -2,8 +2,8 @@
"id": "CVE-2018-25093",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-06T01:15:08.690",
- "lastModified": "2023-11-14T15:23:21.597",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:23:15.163",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25094.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25094.json
index 7bdf214e5e3..1357d657a68 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25094.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25094.json
@@ -2,12 +2,12 @@
"id": "CVE-2018-25094",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-03T11:15:07.537",
- "lastModified": "2023-12-07T02:08:09.830",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:23:15.297",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in ???????????????? Online Accounting System up to 1.4.0 and classified as problematic. This issue affects some unknown processing of the file ckeditor/filemanager/browser/default/image.php. The manipulation of the argument fid with the input ../../../etc/passwd leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.0 is able to address this issue. The identifier of the patch is 9d9618422b980335bb30be612ea90f4f56cb992c. It is recommended to upgrade the affected component. The identifier VDB-246641 was assigned to this vulnerability."
+ "value": "A vulnerability was found in \u0e23\u0e30\u0e1a\u0e1a\u0e1a\u0e31\u0e0d\u0e0a\u0e35\u0e2d\u0e2d\u0e19\u0e44\u0e25\u0e19\u0e4c Online Accounting System up to 1.4.0 and classified as problematic. This issue affects some unknown processing of the file ckeditor/filemanager/browser/default/image.php. The manipulation of the argument fid with the input ../../../etc/passwd leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. Upgrading to version 2.0.0 is able to address this issue. The identifier of the patch is 9d9618422b980335bb30be612ea90f4f56cb992c. It is recommended to upgrade the affected component. The identifier VDB-246641 was assigned to this vulnerability."
},
{
"lang": "es",
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25096.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25096.json
index 09f9ab2fe58..4f657b08c60 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25096.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25096.json
@@ -2,8 +2,8 @@
"id": "CVE-2018-25096",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-30T10:15:08.837",
- "lastModified": "2024-01-08T14:53:38.617",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:23:15.437",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25097.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25097.json
index ebc05884712..26adc308ab0 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25097.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25097.json
@@ -2,8 +2,8 @@
"id": "CVE-2018-25097",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-02T16:15:11.100",
- "lastModified": "2024-01-09T15:30:05.440",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:23:15.543",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2018/CVE-2018-250xx/CVE-2018-25098.json b/CVE-2018/CVE-2018-250xx/CVE-2018-25098.json
index aa5f87f2974..cf01907a386 100644
--- a/CVE-2018/CVE-2018-250xx/CVE-2018-25098.json
+++ b/CVE-2018/CVE-2018-250xx/CVE-2018-25098.json
@@ -2,8 +2,8 @@
"id": "CVE-2018-25098",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-04T17:15:07.880",
- "lastModified": "2024-02-13T00:39:20.100",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:23:15.647",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25067.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25067.json
index f812e500f26..636ec0f07d2 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25067.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25067.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-25067",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-06-09T17:15:08.313",
- "lastModified": "2024-02-16T05:15:08.247",
+ "lastModified": "2024-02-29T01:25:39.140",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25070.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25070.json
index a2d8a771a05..9830b2d4740 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25070.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25070.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-25070",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-06-09T17:15:08.483",
- "lastModified": "2023-11-07T03:09:16.240",
+ "lastModified": "2024-02-29T01:25:39.270",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -82,7 +82,7 @@
"userInteractionRequired": true
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -118,7 +118,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25084.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25084.json
index 47704c15050..9f0f6614c56 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25084.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25084.json
@@ -2,12 +2,16 @@
"id": "CVE-2019-25084",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T18:15:10.363",
- "lastModified": "2023-11-07T03:09:17.253",
+ "lastModified": "2024-02-29T01:25:39.463",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in Hide Files on GitHub up to 2.x. This issue affects the function addEventListener of the file extension/options.js. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is 9de0c57df81db1178e0e79431d462f6d9842742e. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216767."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad clasificada como problem\u00e1tica fue encontrada en Hide Files en GitHub hasta 2.x. Este problema afecta a la funci\u00f3n addEventListener de la extensi\u00f3n del archivo/options.js. La manipulaci\u00f3n conduce a Cross-Site Scripting (XSS). El ataque puede iniciarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 3.0.0 puede solucionar este problema. El nombre del parche es 9de0c57df81db1178e0e79431d462f6d9842742e. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216767."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25085.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25085.json
index 86ba5531e6b..757132d4828 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25085.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25085.json
@@ -2,12 +2,16 @@
"id": "CVE-2019-25085",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-26T07:15:09.713",
- "lastModified": "2023-11-07T03:09:17.427",
+ "lastModified": "2024-02-29T01:25:39.557",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in GNOME gvdb. It has been classified as critical. This affects the function gvdb_table_write_contents_async of the file gvdb-builder.c. The manipulation leads to use after free. It is possible to initiate the attack remotely. The name of the patch is d83587b2a364eb9a9a53be7e6a708074e252de14. It is recommended to apply a patch to fix this issue. The identifier VDB-216789 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en GNOME gvdb. Ha sido clasificado como cr\u00edtico. Esto afecta a la funci\u00f3n gvdb_table_write_contents_async del fichero gvdb-builder.c. La manipulaci\u00f3n conduce al use after free. Es posible iniciar el ataque de forma remota. El nombre del parche es d83587b2a364eb9a9a53be7e6a708074e252de14. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216789."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25086.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25086.json
index cf11f1c6cd4..60c9f656359 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25086.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25086.json
@@ -2,12 +2,16 @@
"id": "CVE-2019-25086",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T09:15:09.647",
- "lastModified": "2023-11-07T03:09:17.607",
+ "lastModified": "2024-02-29T01:25:39.650",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in IET-OU Open Media Player up to 1.5.0. It has been declared as problematic. This vulnerability affects the function webvtt of the file application/controllers/timedtext.php. The manipulation of the argument ttml_url leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.5.1 is able to address this issue. The name of the patch is 3f39f2d68d11895929c04f7b49b97a734ae7cd1f. It is recommended to upgrade the affected component. VDB-216862 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en IET-OU Open Media Player hasta 1.5.0. Ha sido declarada problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n webvtt del archivo application/controllers/timedtext.php. La manipulaci\u00f3n del argumento ttml_url conduce a Cross-Site Scripting. El ataque se puede iniciar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.5.1 puede solucionar este problema. El nombre del parche es 3f39f2d68d11895929c04f7b49b97a734ae7cd1f. Se recomienda actualizar el componente afectado. VDB-216862 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25087.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25087.json
index c7cab58ae5f..c0006cda2a9 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25087.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25087.json
@@ -2,12 +2,16 @@
"id": "CVE-2019-25087",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T09:15:09.730",
- "lastModified": "2023-11-07T03:09:17.780",
+ "lastModified": "2024-02-29T01:25:39.753",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in RamseyK httpserver. It has been rated as critical. This issue affects the function ResourceHost::getResource of the file src/ResourceHost.cpp of the component URI Handler. The manipulation of the argument uri leads to path traversal: '../filedir'. The attack may be initiated remotely. The name of the patch is 1a0de56e4dafff9c2f9c8f6b130a764f7a50df52. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216863."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en RamseyK httpserver. Ha sido calificado como cr\u00edtico. Este problema afecta la funci\u00f3n ResourceHost::getResource del archivo src/ResourceHost.cpp del componente URI Handler. La manipulaci\u00f3n del argumento uri conduce a path traversal: '../filedir'. El ataque puede iniciarse de forma remota. El nombre del parche es 1a0de56e4dafff9c2f9c8f6b130a764f7a50df52. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-216863."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25088.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25088.json
index 7f1612d5f9e..68af2fabf1f 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25088.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25088.json
@@ -2,12 +2,16 @@
"id": "CVE-2019-25088",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T10:15:10.573",
- "lastModified": "2023-11-07T03:09:17.950",
+ "lastModified": "2024-02-29T01:25:39.847",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ytti Oxidized Web. It has been classified as problematic. Affected is an unknown function of the file lib/oxidized/web/views/conf_search.haml. The manipulation of the argument to_research leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 55ab9bdc68b03ebce9280b8746ef31d7fdedcc45. It is recommended to apply a patch to fix this issue. VDB-216870 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en ytti Oxidized Web. Ha sido clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo lib/oxidized/web/views/conf_search.haml es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento to_research conduce a Cross-Site Scripting. Es posible lanzar el ataque de forma remota. El nombre del parche es 55ab9bdc68b03ebce9280b8746ef31d7fdedcc45. Se recomienda aplicar un parche para solucionar este problema. VDB-216870 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25089.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25089.json
index ac1d8ab2720..5e0f6631701 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25089.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25089.json
@@ -2,12 +2,16 @@
"id": "CVE-2019-25089",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T12:15:10.837",
- "lastModified": "2023-11-07T03:09:18.110",
+ "lastModified": "2024-02-29T01:25:39.937",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Morgawr Muon 0.1.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file src/muon/handler.clj. The manipulation leads to insufficiently random values. The attack can be launched remotely. Upgrading to version 0.2.0-indev is able to address this issue. The name of the patch is c09ed972c020f759110c707b06ca2644f0bacd7f. It is recommended to upgrade the affected component. The identifier VDB-216877 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Morgawr Muon 0.1.1 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo src/muon/handler.clj es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a valores insuficientemente aleatorios. El ataque se puede lanzar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 0.2.0-indev puede solucionar este problema. El nombre del parche es c09ed972c020f759110c707b06ca2644f0bacd7f. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216877."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25090.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25090.json
index 01356dac66b..501b0314cb6 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25090.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25090.json
@@ -2,12 +2,16 @@
"id": "CVE-2019-25090",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T13:15:10.703",
- "lastModified": "2023-11-07T03:09:18.277",
+ "lastModified": "2024-02-29T01:25:40.033",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in FreePBX arimanager up to 13.0.5.3 and classified as problematic. Affected by this issue is some unknown functionality of the component Views Handler. The manipulation of the argument dataurl leads to cross site scripting. The attack may be launched remotely. Upgrading to version 13.0.5.4 is able to address this issue. The name of the patch is 199dea7cc7020d3c469a86a39fbd80f5edd3c5ab. It is recommended to upgrade the affected component. VDB-216878 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en FreePBX arimanager hasta 13.0.5.3 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del componente Views Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento dataurl conduce a Cross-Site Scripting. El ataque puede lanzarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 13.0.5.4 puede solucionar este problema. El nombre del parche es 199dea7cc7020d3c469a86a39fbd80f5edd3c5ab. Se recomienda actualizar el componente afectado. VDB-216878 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25091.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25091.json
index 667dd42b780..9e9bd3c865c 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25091.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25091.json
@@ -2,12 +2,16 @@
"id": "CVE-2019-25091",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T23:15:10.263",
- "lastModified": "2023-11-07T03:09:18.453",
+ "lastModified": "2024-02-29T01:25:40.137",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in nsupdate.info. This affects an unknown part of the file src/nsupdate/settings/base.py of the component CSRF Cookie Handler. The manipulation of the argument CSRF_COOKIE_HTTPONLY leads to cookie without 'httponly' flag. It is possible to initiate the attack remotely. The name of the patch is 60a3fe559c453bc36b0ec3e5dd39c1303640a59a. It is recommended to apply a patch to fix this issue. The identifier VDB-216909 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en nsupdate.info y clasificada como problem\u00e1tica. Una parte desconocida del archivo src/nsupdate/settings/base.py del componente CSRF Cookie Handler afecta a una parte desconocida. La manipulaci\u00f3n del argumento CSRF_COOKIE_HTTPONLY conduce a una cookie sin el indicador 'httponly'. Es posible iniciar el ataque de forma remota. El nombre del parche es 60a3fe559c453bc36b0ec3e5dd39c1303640a59a. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216909."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25092.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25092.json
index 6351b3bf176..c42f63b7b1b 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25092.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25092.json
@@ -2,12 +2,16 @@
"id": "CVE-2019-25092",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T09:15:07.910",
- "lastModified": "2023-11-07T03:09:18.620",
+ "lastModified": "2024-02-29T01:25:40.253",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in Nakiami Mellivora up to 2.1.x. Affected by this vulnerability is the function print_user_ip_log of the file include/layout/user.inc.php of the component Admin Panel. The manipulation of the argument $entry['ip'] leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.2.0 is able to address this issue. The name of the patch is e0b6965f8dde608a3d2621617c05695eb406cbb9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216955."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Nakiami Mellivora hasta 2.1.x y clasificada como problem\u00e1tica. La funci\u00f3n print_user_ip_log del archivo include/layout/user.inc.php del componente Admin Panel es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento $entry['ip'] conduce a cross site scripting. El ataque se puede lanzar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 2.2.0 puede solucionar este problema. El nombre del parche es e0b6965f8dde608a3d2621617c05695eb406cbb9. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216955."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25093.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25093.json
index db362461c17..79c7080ba4b 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25093.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25093.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-25093",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T11:15:10.760",
- "lastModified": "2023-11-07T03:09:18.790",
+ "lastModified": "2024-02-29T01:25:40.343",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25094.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25094.json
index 3f85d88a15c..78ef2d305f3 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25094.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25094.json
@@ -2,12 +2,16 @@
"id": "CVE-2019-25094",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T10:15:10.300",
- "lastModified": "2023-11-07T03:09:18.990",
+ "lastModified": "2024-02-29T01:25:40.437",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in innologi appointments Extension up to 2.0.5 on TYPO3. This affects an unknown part of the component Appointment Handler. The manipulation of the argument formfield leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.6 is able to address this issue. The identifier of the patch is 986d3cb34e5e086c6f04e061f600ffc5837abe7f. It is recommended to upgrade the affected component. The identifier VDB-217353 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad clasificada como problem\u00e1tica fue encontrada en innologi quotes Extension hasta 2.0.5 en TYPO3. Una parte desconocida del componente Appointment Handler afecta a una parte desconocida. La manipulaci\u00f3n del argumento formfield conduce a cross site scripting. Es posible iniciar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 2.0.6 puede solucionar este problema. El identificador del parche es 986d3cb34e5e086c6f04e061f600ffc5837abe7f. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217353."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25095.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25095.json
index 310e2c270d4..de6d5342a3a 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25095.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25095.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-25095",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T08:15:08.273",
- "lastModified": "2023-11-07T03:09:19.157",
+ "lastModified": "2024-02-29T01:25:40.530",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25096.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25096.json
index f97ea8d9c97..a38ffd90da0 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25096.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25096.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-25096",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T08:15:08.510",
- "lastModified": "2023-11-07T03:09:19.327",
+ "lastModified": "2024-02-29T01:25:40.620",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25097.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25097.json
index 24e7b83b615..5204a476743 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25097.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25097.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-25097",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T08:15:08.587",
- "lastModified": "2023-11-07T03:09:19.500",
+ "lastModified": "2024-02-29T01:25:40.713",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25098.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25098.json
index 47e20011e7a..490a13b0cbc 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25098.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25098.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-25098",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T08:15:08.673",
- "lastModified": "2023-11-07T03:09:19.660",
+ "lastModified": "2024-02-29T01:25:40.857",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-250xx/CVE-2019-25099.json b/CVE-2019/CVE-2019-250xx/CVE-2019-25099.json
index 4d18071db9d..05fc65225a4 100644
--- a/CVE-2019/CVE-2019-250xx/CVE-2019-25099.json
+++ b/CVE-2019/CVE-2019-250xx/CVE-2019-25099.json
@@ -2,12 +2,16 @@
"id": "CVE-2019-25099",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T13:15:09.927",
- "lastModified": "2023-11-07T03:09:19.817",
+ "lastModified": "2024-02-29T01:25:40.983",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in Arthmoor QSF-Portal. This vulnerability affects unknown code of the file index.php. The manipulation of the argument a leads to path traversal. The patch is identified as ea4f61e23ecb83247d174bc2e2cbab521c751a7d. It is recommended to apply a patch to fix this issue. VDB-217558 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Arthmoor QSF-Portal y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo index.php. La manipulaci\u00f3n del argumento a conduce a path traversal. El parche se identifica como ea4f61e23ecb83247d174bc2e2cbab521c751a7d. Se recomienda aplicar un parche para solucionar este problema. VDB-217558 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25100.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25100.json
index cdfeffec23c..3352d252288 100644
--- a/CVE-2019/CVE-2019-251xx/CVE-2019-25100.json
+++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25100.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-25100",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T11:15:10.130",
- "lastModified": "2023-11-07T03:09:19.983",
+ "lastModified": "2024-02-29T01:25:41.077",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25101.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25101.json
index 06ebaa94d61..60012795a42 100644
--- a/CVE-2019/CVE-2019-251xx/CVE-2019-25101.json
+++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25101.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-25101",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-04T08:15:07.870",
- "lastModified": "2023-11-07T03:09:20.183",
+ "lastModified": "2024-02-29T01:25:41.167",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25102.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25102.json
index f7bf039f6ef..158f67390c3 100644
--- a/CVE-2019/CVE-2019-251xx/CVE-2019-25102.json
+++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25102.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-25102",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-12T14:15:11.003",
- "lastModified": "2023-11-07T03:09:20.373",
+ "lastModified": "2024-02-29T01:25:41.267",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25103.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25103.json
index 42789c1d240..7885b0e3479 100644
--- a/CVE-2019/CVE-2019-251xx/CVE-2019-25103.json
+++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25103.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-25103",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-12T15:15:10.610",
- "lastModified": "2023-11-07T03:09:20.543",
+ "lastModified": "2024-02-29T01:25:41.357",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25104.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25104.json
index aa6bb8c1efe..9d172e312cf 100644
--- a/CVE-2019/CVE-2019-251xx/CVE-2019-25104.json
+++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25104.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-25104",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-20T18:15:10.387",
- "lastModified": "2023-11-07T03:09:20.733",
+ "lastModified": "2024-02-29T01:25:41.450",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25105.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25105.json
index 376bee64578..1cc9247bb9f 100644
--- a/CVE-2019/CVE-2019-251xx/CVE-2019-25105.json
+++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25105.json
@@ -2,7 +2,7 @@
"id": "CVE-2019-25105",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-26T08:15:09.547",
- "lastModified": "2023-11-07T03:09:20.900",
+ "lastModified": "2024-02-29T01:25:41.543",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25156.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25156.json
index 34d2306aa5c..81c48067065 100644
--- a/CVE-2019/CVE-2019-251xx/CVE-2019-25156.json
+++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25156.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-25156",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-07T06:15:07.783",
- "lastModified": "2023-11-13T19:45:13.710",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:25:41.840",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25157.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25157.json
index c08a0ff82b6..1961a6a9599 100644
--- a/CVE-2019/CVE-2019-251xx/CVE-2019-25157.json
+++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25157.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-25157",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-19T03:15:07.693",
- "lastModified": "2023-12-29T17:04:07.403",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:25:41.940",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25158.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25158.json
index b01606ccbfa..ef949c63371 100644
--- a/CVE-2019/CVE-2019-251xx/CVE-2019-25158.json
+++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25158.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-25158",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-19T13:15:43.133",
- "lastModified": "2023-12-28T17:15:25.970",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:25:42.023",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25159.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25159.json
index 08696e69031..9801c0f4c95 100644
--- a/CVE-2019/CVE-2019-251xx/CVE-2019-25159.json
+++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25159.json
@@ -2,8 +2,8 @@
"id": "CVE-2019-25159",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-04T06:15:07.383",
- "lastModified": "2024-02-12T19:52:18.067",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:25:42.107",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36620.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36620.json
index cb2706171c0..0e5a7965b07 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36620.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36620.json
@@ -2,12 +2,16 @@
"id": "CVE-2020-36620",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-21T19:15:11.753",
- "lastModified": "2023-11-07T03:22:18.603",
+ "lastModified": "2024-02-29T01:28:41.817",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Brondahl EnumStringValues up to 4.0.0. It has been declared as problematic. This vulnerability affects the function GetStringValuesWithPreferences_Uncache of the file EnumStringValues/EnumExtensions.cs. The manipulation leads to resource consumption. Upgrading to version 4.0.1 is able to address this issue. The name of the patch is c0fc7806beb24883cc2f9543ebc50c0820297307. It is recommended to upgrade the affected component. VDB-216466 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Brondahl EnumStringValues hasta 4.0.0. Ha sido declarada problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n GetStringValuesWithPreferences_Uncache del archivo EnumStringValues/EnumExtensions.cs. La manipulaci\u00f3n conduce al consumo de recursos. La actualizaci\u00f3n a la versi\u00f3n 4.0.1 puede solucionar este problema. El nombre del parche es c0fc7806beb24883cc2f9543ebc50c0820297307. Se recomienda actualizar el componente afectado. VDB-216466 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36624.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36624.json
index e19d11afdf6..e8875002c92 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36624.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36624.json
@@ -2,12 +2,16 @@
"id": "CVE-2020-36624",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-22T10:15:08.853",
- "lastModified": "2023-11-07T03:22:19.110",
+ "lastModified": "2024-02-29T01:28:41.970",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ahorner text-helpers up to 1.0.x. It has been declared as critical. This vulnerability affects unknown code of the file lib/text_helpers/translation.rb. The manipulation of the argument link leads to use of web link to untrusted target with window.opener access. The attack can be initiated remotely. Upgrading to version 1.1.0 is able to address this issue. The name of the patch is 184b60ded0e43c985788582aca2d1e746f9405a3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216520."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en ahorner text-helpers hasta 1.0.x. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo lib/text_helpers/translation.rb. La manipulaci\u00f3n del argumento link conduce al uso de un enlace web a un objetivo que no es de confianza con acceso a window.opener. El ataque se puede iniciar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.1.0 puede solucionar este problema. El nombre del parche es 184b60ded0e43c985788582aca2d1e746f9405a3. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-216520."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36627.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36627.json
index 810dce9285a..82d6641c584 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36627.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36627.json
@@ -2,12 +2,16 @@
"id": "CVE-2020-36627",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T11:15:10.087",
- "lastModified": "2023-11-07T03:22:19.510",
+ "lastModified": "2024-02-29T01:28:42.093",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Macaron i18n. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file i18n.go. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 0.5.0 is able to address this issue. The name of the patch is 329b0c4844cc16a5a253c011b55180598e707735. It is recommended to upgrade the affected component. The identifier VDB-216745 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Macaron i18n. Ha sido declarado problem\u00e1tico. Una funci\u00f3n desconocida del archivo i18n.go es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una redirecci\u00f3n abierta. El ataque se puede lanzar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 0.5.0 puede solucionar este problema. El nombre del parche es 329b0c4844cc16a5a253c011b55180598e707735. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216745."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36628.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36628.json
index 3655fe58d50..d0c2480072e 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36628.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36628.json
@@ -2,12 +2,16 @@
"id": "CVE-2020-36628",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T11:15:10.763",
- "lastModified": "2023-11-07T03:22:19.680",
+ "lastModified": "2024-02-29T01:28:42.170",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Calsign APDE. This affects the function handleExtract of the file APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java of the component ZIP File Handler. The manipulation leads to path traversal. Upgrading to version 0.5.2-pre2-alpha is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216747."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en Calsign APDE y clasificada como cr\u00edtica. Esto afecta a la funci\u00f3n handleExtract del archivo APDE/src/main/java/com/calsignlabs/apde/build/dag/CopyBuildTask.java del componente ZIP File Handler. La manipulaci\u00f3n conduce a path traversal. La actualizaci\u00f3n a la versi\u00f3n 0.5.2-pre2-alpha puede solucionar este problema. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216747."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36629.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36629.json
index 630324c080a..e2f29d0de1d 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36629.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36629.json
@@ -2,12 +2,16 @@
"id": "CVE-2020-36629",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T11:15:10.840",
- "lastModified": "2023-11-07T03:22:19.840",
+ "lastModified": "2024-02-29T01:28:42.263",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in SimbCo httpster. This vulnerability affects the function fs.realpathSync of the file src/server.coffee. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. The name of the patch is d3055b3e30b40b65d30c5a06d6e053dffa7f35d0. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216748."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en SimbCo httpster y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n fs.realpathSync del archivo src/server.coffee. La manipulaci\u00f3n conduce al path traversal. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El nombre del parche es d3055b3e30b40b65d30c5a06d6e053dffa7f35d0. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-216748."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36630.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36630.json
index dae0216516b..649e12bb03b 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36630.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36630.json
@@ -2,12 +2,16 @@
"id": "CVE-2020-36630",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T20:15:25.100",
- "lastModified": "2023-11-07T03:22:20.000",
+ "lastModified": "2024-02-29T01:28:42.353",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in FreePBX cdr 14.0. It has been classified as critical. This affects the function ajaxHandler of the file ucp/Cdr.class.php. The manipulation of the argument limit/offset leads to sql injection. Upgrading to version 14.0.5.21 is able to address this issue. The name of the patch is f1a9eea2dfff30fb99d825bac194a676a82b9ec8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216771."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en FreePBX cdr 14.0. Ha sido clasificada como cr\u00edtica. Esto afecta a la funci\u00f3n ajaxHandler del archivo ucp/Cdr.class.php. La manipulaci\u00f3n del l\u00edmite/desplazamiento del argumento conduce a la inyecci\u00f3n de SQL. La actualizaci\u00f3n a la versi\u00f3n 14.0.5.21 puede solucionar este problema. El nombre del parche es f1a9eea2dfff30fb99d825bac194a676a82b9ec8. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216771."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36631.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36631.json
index 7cac0c507fa..6fc21348ef9 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36631.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36631.json
@@ -2,12 +2,16 @@
"id": "CVE-2020-36631",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T20:15:25.210",
- "lastModified": "2023-11-07T03:22:20.163",
+ "lastModified": "2024-02-29T01:28:42.457",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in barronwaffles dwc_network_server_emulator. It has been declared as critical. This vulnerability affects the function update_profile of the file gamespy/gs_database.py. The manipulation of the argument firstname/lastname leads to sql injection. The attack can be initiated remotely. The name of the patch is f70eb21394f75019886fbc2fb536de36161ba422. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216772."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en barronwaffles dwc_network_server_emulator. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n update_profile del archivo gamespy/gs_database.py. La manipulaci\u00f3n del argumento nombre/apellido conduce a la inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. El nombre del parche es f70eb21394f75019886fbc2fb536de36161ba422. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-216772."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36632.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36632.json
index f6ca4fae49b..d3162dcb539 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36632.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36632.json
@@ -2,12 +2,16 @@
"id": "CVE-2020-36632",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T20:15:25.287",
- "lastModified": "2023-11-07T03:22:20.363",
+ "lastModified": "2024-02-29T01:28:42.583",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in hughsk flat up to 5.0.0. This affects the function unflatten of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to initiate the attack remotely. Upgrading to version 5.0.1 is able to address this issue. The name of the patch is 20ef0ef55dfa028caddaedbcb33efbdb04d18e13. It is recommended to upgrade the affected component. The identifier VDB-216777 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en hughsk flat hasta 5.0.0 y clasificada como cr\u00edtica. Esto afecta a la funci\u00f3n desacoplar del archivo index.js. La manipulaci\u00f3n conduce a una modificaci\u00f3n controlada inadecuadamente de los atributos del prototipo del objeto (\"contaminaci\u00f3n del prototipo\"). Es posible iniciar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 5.0.1 puede solucionar este problema. El nombre del parche es 20ef0ef55dfa028caddaedbcb33efbdb04d18e13. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216777."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36633.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36633.json
index df8bda58479..fd331a624bb 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36633.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36633.json
@@ -2,12 +2,16 @@
"id": "CVE-2020-36633",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T13:15:10.907",
- "lastModified": "2023-11-07T03:22:20.563",
+ "lastModified": "2024-02-29T01:28:42.693",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in moodle-block_sitenews 1.0. It has been classified as problematic. This affects the function get_content of the file block_sitenews.php. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 1.1 is able to address this issue. The name of the patch is cd18d8b1afe464ae6626832496f4e070bac4c58f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216879."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en moodle-block_sitenews 1.0. Ha sido clasificada como problem\u00e1tica. Esto afecta a la funci\u00f3n get_content del archivo block_sitenews.php. La manipulaci\u00f3n conduce a la Cross-Site Request Forgery (CSRF). Es posible iniciar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.1 puede solucionar este problema. El nombre del parche es cd18d8b1afe464ae6626832496f4e070bac4c58f. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216879."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36634.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36634.json
index 59dfac0bef1..b0d97ac2266 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36634.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36634.json
@@ -2,12 +2,16 @@
"id": "CVE-2020-36634",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T13:15:11.047",
- "lastModified": "2023-11-07T03:22:20.750",
+ "lastModified": "2024-02-29T01:28:42.793",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in Indeed Engineering util up to 1.0.33. Affected is the function visit/appendTo of the file varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.0.34 is able to address this issue. The name of the patch is c0952a9db51a880e9544d9fac2a2218a6bfc9c63. It is recommended to upgrade the affected component. VDB-216882 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en Indeed Engineering util hasta 1.0.33 y clasificada como problem\u00e1tica. La funci\u00f3n visit/appendTo del archivo varexport/src/main/java/com/indeed/util/varexport/servlet/ViewExportedVariablesServlet.java es afectada por la vulnerabilidad. La manipulaci\u00f3n conduce a Cross-Site Scripting. Es posible lanzar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.0.34 puede solucionar este problema. El nombre del parche es c0952a9db51a880e9544d9fac2a2218a6bfc9c63. Se recomienda actualizar el componente afectado. VDB-216882 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36635.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36635.json
index cca2898c8f2..f52455a6f34 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36635.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36635.json
@@ -2,12 +2,16 @@
"id": "CVE-2020-36635",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T23:15:10.430",
- "lastModified": "2023-11-07T03:22:20.923",
+ "lastModified": "2024-02-29T01:28:42.897",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in OpenMRS Appointment Scheduling Module up to 1.12.x. It has been classified as problematic. This affects the function validateFieldName of the file api/src/main/java/org/openmrs/module/appointmentscheduling/validator/AppointmentTypeValidator.java. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.13.0 is able to address this issue. The name of the patch is 34213c3f6ea22df427573076fb62744694f601d8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216915."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en OpenMRS Appointment Scheduling Module hasta la versi\u00f3n 1.12.x. Ha sido clasificada como problem\u00e1tica. Esto afecta la funci\u00f3n validateFieldName del archivo api/src/main/java/org/openmrs/module/appointmentscheduling/validator/AppointmentTypeValidator.java. La manipulaci\u00f3n conduce a cross site scripting. Es posible iniciar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.13.0 puede solucionar este problema. El nombre del parche es 34213c3f6ea22df427573076fb62744694f601d8. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216915."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36636.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36636.json
index 7c63dbc0c9d..551f000a121 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36636.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36636.json
@@ -2,12 +2,16 @@
"id": "CVE-2020-36636",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T23:15:10.507",
- "lastModified": "2023-11-07T03:22:21.107",
+ "lastModified": "2024-02-29T01:28:42.993",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in OpenMRS Admin UI Module up to 1.4.x. Affected is the function sendErrorMessage of the file omod/src/main/java/org/openmrs/module/adminui/page/controller/systemadmin/accounts/AccountPageController.java of the component Account Setup Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.5.0 is able to address this issue. The name of the patch is 702fbfdac7c4418f23bb5f6452482b4a88020061. It is recommended to upgrade the affected component. VDB-216918 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en OpenMRS Admin UI Module hasta 1.4.x y clasificada como problem\u00e1tica. La funci\u00f3n sendErrorMessage del archivo omod/src/main/java/org/openmrs/module/adminui/page/controller/systemadmin/accounts/AccountPageController.java del componente Account Setup Handler es afectada por la vulnerabilidad. La manipulaci\u00f3n conduce a cross site scripting. Es posible lanzar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.5.0 puede solucionar este problema. El nombre del parche es 702fbfdac7c4418f23bb5f6452482b4a88020061. Se recomienda actualizar el componente afectado. VDB-216918 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36637.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36637.json
index b1766c8eeab..c0e19e4e212 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36637.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36637.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-36637",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T12:15:09.217",
- "lastModified": "2023-12-20T01:46:33.117",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:28:43.080",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36638.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36638.json
index 3fbc1746313..410350ea491 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36638.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36638.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-36638",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T12:15:09.300",
- "lastModified": "2023-12-20T01:48:34.637",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:28:43.163",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36639.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36639.json
index 38ccdf8c3ce..65e56cbfef8 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36639.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36639.json
@@ -2,12 +2,16 @@
"id": "CVE-2020-36639",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T10:15:10.383",
- "lastModified": "2023-12-08T01:26:49.777",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:28:43.263",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in AlliedModders AMX Mod X on Windows and classified as critical. This vulnerability affects the function cmdVoteMap of the file plugins/adminvote.sma of the component Console Command Handler. The manipulation of the argument amx_votemap leads to path traversal. The patch is identified as a5f2b5539f6d61050b68df8b22ebb343a2862681. It is recommended to apply a patch to fix this issue. VDB-217354 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en AlliedModders AMX Mod X en Windows y se clasific\u00f3 como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n cmdVoteMap del archivo plugins/adminvote.sma del componente Console Command Handler. La manipulaci\u00f3n del argumento amx_votemap conduce a path traversal. El parche se identifica como a5f2b5539f6d61050b68df8b22ebb343a2862681. Se recomienda aplicar un parche para solucionar este problema. VDB-217354 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -82,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36640.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36640.json
index 08937c026af..f82c190773a 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36640.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36640.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-36640",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T10:15:09.773",
- "lastModified": "2023-11-16T02:25:03.037",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:28:43.370",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36641.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36641.json
index 3f3f28cc89a..12979bfe6f8 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36641.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36641.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-36641",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T12:15:09.287",
- "lastModified": "2024-02-13T21:15:08.020",
+ "lastModified": "2024-02-29T01:28:43.467",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36642.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36642.json
index 0d63cce5a3b..23d875016f0 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36642.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36642.json
@@ -2,12 +2,16 @@
"id": "CVE-2020-36642",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T11:15:09.443",
- "lastModified": "2023-11-18T03:20:11.747",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:28:43.563",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in trampgeek jobe up to 1.6.x and classified as critical. This issue affects the function run_in_sandbox of the file application/libraries/LanguageTask.php. The manipulation leads to command injection. Upgrading to version 1.7.0 is able to address this issue. The identifier of the patch is 8f43daf50c943b98eaf0c542da901a4a16e85b02. It is recommended to upgrade the affected component. The identifier VDB-217553 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en trampgeek jobe hasta 1.6.x y clasificada como cr\u00edtica. Este problema afecta la funci\u00f3n run_in_sandbox del archivo application/libraries/LanguageTask.php. La manipulaci\u00f3n conduce a la inyecci\u00f3n de comandos. La actualizaci\u00f3n a la versi\u00f3n 1.7.0 puede solucionar este problema. El identificador del parche es 8f43daf50c943b98eaf0c542da901a4a16e85b02. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217553."
}
],
"metrics": {
@@ -82,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36644.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36644.json
index 6a90c990d4f..2d36d91247e 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36644.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36644.json
@@ -2,12 +2,16 @@
"id": "CVE-2020-36644",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T10:15:09.417",
- "lastModified": "2023-11-18T03:21:40.897",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:28:43.680",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in jamesmartin Inline SVG up to 1.7.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file lib/inline_svg/action_view/helpers.rb of the component URL Parameter Handler. The manipulation of the argument filename leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.7.2 is able to address this issue. The identifier of the patch is f5363b351508486021f99e083c92068cf2943621. It is recommended to upgrade the affected component. The identifier VDB-217597 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en jamesmartin Inline SVG hasta 1.7.1 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo lib/inline_svg/action_view/helpers.rb del componente URL Parameter Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento nombre de archivo conduce a cross site scripting. El ataque se puede lanzar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.7.2 puede solucionar este problema. El identificador del parche es f5363b351508486021f99e083c92068cf2943621. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217597."
}
],
"metrics": {
@@ -82,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36645.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36645.json
index 5c4638a0cc3..1649a1989c7 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36645.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36645.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-36645",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T19:15:09.383",
- "lastModified": "2023-11-16T02:35:36.107",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:28:43.800",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36646.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36646.json
index 8f890858ce1..0e62c111661 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36646.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36646.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-36646",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T20:15:09.523",
- "lastModified": "2023-12-08T01:27:58.400",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:28:43.907",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36647.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36647.json
index 22135757a4d..db9b725bd97 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36647.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36647.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-36647",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T10:15:11.707",
- "lastModified": "2023-11-07T03:22:23.983",
+ "lastModified": "2024-02-29T01:28:44.010",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36648.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36648.json
index 5f3f34071b8..235b0d6fc7c 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36648.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36648.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-36648",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T10:15:11.793",
- "lastModified": "2023-11-07T03:22:24.157",
+ "lastModified": "2024-02-29T01:28:44.100",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36649.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36649.json
index 56fefc83334..a2fb9496796 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36649.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36649.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-36649",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T15:15:09.207",
- "lastModified": "2023-11-07T03:22:24.323",
+ "lastModified": "2024-02-29T01:28:44.180",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36650.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36650.json
index 6395678ed85..5b181a9ff71 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36650.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36650.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-36650",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T18:15:09.003",
- "lastModified": "2023-11-07T03:22:24.493",
+ "lastModified": "2024-02-29T01:28:44.277",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36651.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36651.json
index 2ee2cf03221..2406b8a65c1 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36651.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36651.json
@@ -2,12 +2,16 @@
"id": "CVE-2020-36651",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T01:15:11.800",
- "lastModified": "2023-11-07T03:22:24.657",
+ "lastModified": "2024-02-29T01:28:44.377",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in youngerheart nodeserver and classified as critical. Affected by this vulnerability is an unknown functionality of the file nodeserver.js. The manipulation leads to path traversal. The identifier of the patch is c4c0f0138ab5afbac58e03915d446680421bde28. It is recommended to apply a patch to fix this issue. The identifier VDB-218461 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en youngerheart nodeserver y se clasific\u00f3 como cr\u00edtica. Una funci\u00f3n desconocida del archivo nodeserver.js es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce al path traversal. El identificador del parche es c4c0f0138ab5afbac58e03915d446680421bde28. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-218461."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36653.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36653.json
index 4e55c590660..b8b14ce33fb 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36653.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36653.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-36653",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T08:15:09.957",
- "lastModified": "2023-11-07T03:22:24.903",
+ "lastModified": "2024-02-29T01:28:44.570",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36654.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36654.json
index f67d8f035c6..af940cc5f6a 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36654.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36654.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-36654",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-18T08:15:10.073",
- "lastModified": "2023-11-07T03:22:25.083",
+ "lastModified": "2024-02-29T01:28:44.657",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36660.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36660.json
index 8614e24bfd1..c59d8963e67 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36660.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36660.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-36660",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T17:15:09.437",
- "lastModified": "2023-11-16T01:11:53.000",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:28:44.793",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36661.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36661.json
index 2898da2ea75..9b227c283de 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36661.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36661.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-36661",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-12T21:15:10.650",
- "lastModified": "2023-11-16T01:18:06.773",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:28:44.883",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36663.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36663.json
index 506c17b6267..093317214ad 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36663.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36663.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-36663",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-04T07:15:08.690",
- "lastModified": "2023-11-07T03:22:25.890",
+ "lastModified": "2024-02-29T01:28:44.980",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36664.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36664.json
index 26f213dc5a0..fae3d61bd17 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36664.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36664.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-36664",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-04T17:15:10.713",
- "lastModified": "2023-11-07T03:22:26.050",
+ "lastModified": "2024-02-29T01:28:45.090",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36665.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36665.json
index a73cb34738a..51aa62fe841 100644
--- a/CVE-2020/CVE-2020-366xx/CVE-2020-36665.json
+++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36665.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-36665",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-04T19:15:10.193",
- "lastModified": "2023-11-07T03:22:26.287",
+ "lastModified": "2024-02-29T01:28:45.187",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36762.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36762.json
index 9401b044871..3c9edb0630d 100644
--- a/CVE-2020/CVE-2020-367xx/CVE-2020-36762.json
+++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36762.json
@@ -2,7 +2,7 @@
"id": "CVE-2020-36762",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-18T15:15:11.133",
- "lastModified": "2023-11-07T03:22:33.700",
+ "lastModified": "2024-02-29T01:28:46.110",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36768.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36768.json
index 5dd1708b941..85ff19e18bd 100644
--- a/CVE-2020/CVE-2020-367xx/CVE-2020-36768.json
+++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36768.json
@@ -2,8 +2,8 @@
"id": "CVE-2020-36768",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-03T11:15:08.443",
- "lastModified": "2023-12-07T02:14:31.593",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:28:46.253",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2021/CVE-2021-330xx/CVE-2021-33072.json b/CVE-2021/CVE-2021-330xx/CVE-2021-33072.json
index 44bbee1f4f4..7ff83c2223f 100644
--- a/CVE-2021/CVE-2021-330xx/CVE-2021-33072.json
+++ b/CVE-2021/CVE-2021-330xx/CVE-2021-33072.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33072",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:08.440",
- "lastModified": "2024-02-26T16:27:42.903",
+ "lastModified": "2024-02-29T01:31:32.513",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-330xx/CVE-2021-33084.json b/CVE-2021/CVE-2021-330xx/CVE-2021-33084.json
index 9f5209ba6e2..02be1d3875c 100644
--- a/CVE-2021/CVE-2021-330xx/CVE-2021-33084.json
+++ b/CVE-2021/CVE-2021-330xx/CVE-2021-33084.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33084",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:08.510",
- "lastModified": "2024-02-26T16:27:43.457",
+ "lastModified": "2024-02-29T01:31:32.650",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-330xx/CVE-2021-33085.json b/CVE-2021/CVE-2021-330xx/CVE-2021-33085.json
index 1e3e2cc1101..b4ec8190fc6 100644
--- a/CVE-2021/CVE-2021-330xx/CVE-2021-33085.json
+++ b/CVE-2021/CVE-2021-330xx/CVE-2021-33085.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33085",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:08.550",
- "lastModified": "2024-02-26T16:27:43.497",
+ "lastModified": "2024-02-29T01:31:32.683",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-330xx/CVE-2021-33099.json b/CVE-2021/CVE-2021-330xx/CVE-2021-33099.json
index 53ecad792d3..5fae535eacb 100644
--- a/CVE-2021/CVE-2021-330xx/CVE-2021-33099.json
+++ b/CVE-2021/CVE-2021-330xx/CVE-2021-33099.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33099",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:08.590",
- "lastModified": "2024-02-26T16:27:43.533",
+ "lastModified": "2024-02-29T01:31:32.820",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33100.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33100.json
index 704576d9fff..89e8cfff7a0 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33100.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33100.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33100",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:08.633",
- "lastModified": "2024-02-26T16:27:43.567",
+ "lastModified": "2024-02-29T01:31:32.860",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33102.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33102.json
index eadbdf3c99b..767ae413da8 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33102.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33102.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33102",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:08.673",
- "lastModified": "2024-02-26T16:27:43.603",
+ "lastModified": "2024-02-29T01:31:32.900",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33109.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33109.json
index fa85c933ce9..fb4e92cb5a5 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33109.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33109.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33109",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:08.707",
- "lastModified": "2024-02-26T16:27:43.637",
+ "lastModified": "2024-02-29T01:31:33.007",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33111.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33111.json
index 9a1bca4f1dd..c31876c681a 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33111.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33111.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33111",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:08.743",
- "lastModified": "2024-02-26T16:27:43.670",
+ "lastModified": "2024-02-29T01:31:33.047",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33112.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33112.json
index b293619b7b7..a2c99af9a09 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33112.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33112.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33112",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:08.787",
- "lastModified": "2024-02-26T16:27:43.700",
+ "lastModified": "2024-02-29T01:31:33.080",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33116.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33116.json
index bc6636b1f07..c7f0c290f54 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33116.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33116.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33116",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:08.827",
- "lastModified": "2024-02-26T16:27:43.733",
+ "lastModified": "2024-02-29T01:31:33.137",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33121.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33121.json
index 2aeed5dbb29..a9e94f224ca 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33121.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33121.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33121",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:08.867",
- "lastModified": "2024-02-26T16:27:43.770",
+ "lastModified": "2024-02-29T01:31:33.197",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33125.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33125.json
index 1d4af4d66b8..112c27988ee 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33125.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33125.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33125",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:08.907",
- "lastModified": "2024-02-26T16:27:43.800",
+ "lastModified": "2024-02-29T01:31:33.250",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33127.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33127.json
index 91fd8747fbf..a246f5c97c5 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33127.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33127.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33127",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:08.943",
- "lastModified": "2024-02-26T16:27:43.837",
+ "lastModified": "2024-02-29T01:31:33.290",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33131.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33131.json
index 475097ae167..fa800415147 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33131.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33131.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33131",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:08.980",
- "lastModified": "2024-02-26T16:27:43.867",
+ "lastModified": "2024-02-29T01:31:33.343",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33132.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33132.json
index 2044350b139..153cde101df 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33132.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33132.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33132",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.023",
- "lastModified": "2024-02-26T16:27:43.897",
+ "lastModified": "2024-02-29T01:31:33.370",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33133.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33133.json
index cba2ff27db7..f332d3a7b9d 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33133.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33133.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33133",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.063",
- "lastModified": "2024-02-26T16:27:43.927",
+ "lastModified": "2024-02-29T01:31:33.407",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33134.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33134.json
index 1c59472efd4..343d658fbc2 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33134.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33134.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33134",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.100",
- "lastModified": "2024-02-26T16:27:43.963",
+ "lastModified": "2024-02-29T01:31:33.437",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33136.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33136.json
index 1a016dc1729..ed1af658edd 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33136.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33136.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33136",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.140",
- "lastModified": "2024-02-26T16:27:43.993",
+ "lastModified": "2024-02-29T01:31:33.480",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33138.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33138.json
index c44b3715d88..d650827da29 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33138.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33138.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33138",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.180",
- "lastModified": "2024-02-26T16:27:44.023",
+ "lastModified": "2024-02-29T01:31:33.517",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33140.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33140.json
index 2b676a1cd0a..74c903f1f31 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33140.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33140.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33140",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.223",
- "lastModified": "2024-02-26T16:27:44.050",
+ "lastModified": "2024-02-29T01:31:33.557",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33141.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33141.json
index 1ca22a9472c..176be08d43a 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33141.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33141.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33141",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.257",
- "lastModified": "2024-02-26T16:27:44.080",
+ "lastModified": "2024-02-29T01:31:33.590",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33142.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33142.json
index 08cb5d089fc..d0e61b31c37 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33142.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33142.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33142",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.297",
- "lastModified": "2024-02-26T16:27:44.110",
+ "lastModified": "2024-02-29T01:31:33.627",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33143.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33143.json
index 239c062ed94..05a75482e1c 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33143.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33143.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33143",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.333",
- "lastModified": "2024-02-26T16:27:44.143",
+ "lastModified": "2024-02-29T01:31:33.660",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33144.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33144.json
index 246221c064a..bd3fe708e64 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33144.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33144.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33144",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.373",
- "lastModified": "2024-02-26T16:27:44.177",
+ "lastModified": "2024-02-29T01:31:33.693",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33145.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33145.json
index 619963825da..c7c4fbde7df 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33145.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33145.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33145",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.410",
- "lastModified": "2024-02-26T16:27:44.210",
+ "lastModified": "2024-02-29T01:31:33.720",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33146.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33146.json
index b09ff8597a1..a2a92e6a5f2 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33146.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33146.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33146",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.443",
- "lastModified": "2024-02-26T16:27:44.240",
+ "lastModified": "2024-02-29T01:31:33.757",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33148.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33148.json
index 795873125ae..59ea93d9aa3 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33148.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33148.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33148",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.480",
- "lastModified": "2024-02-26T16:27:44.273",
+ "lastModified": "2024-02-29T01:31:33.800",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33151.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33151.json
index 8a9203dea48..aa84a24940d 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33151.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33151.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33151",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.520",
- "lastModified": "2024-02-26T16:27:44.303",
+ "lastModified": "2024-02-29T01:31:33.863",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33152.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33152.json
index 1de07c0184a..90289eba23a 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33152.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33152.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33152",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.560",
- "lastModified": "2024-02-26T16:27:44.340",
+ "lastModified": "2024-02-29T01:31:33.900",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33153.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33153.json
index 98de48401c6..dac40962e71 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33153.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33153.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33153",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.600",
- "lastModified": "2024-02-26T16:27:44.390",
+ "lastModified": "2024-02-29T01:31:33.933",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33154.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33154.json
index ff3837d9bee..5d6f17065b9 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33154.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33154.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33154",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.637",
- "lastModified": "2024-02-26T16:27:44.427",
+ "lastModified": "2024-02-29T01:31:33.970",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33156.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33156.json
index 216e16a6f1d..519715ee71f 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33156.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33156.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33156",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.677",
- "lastModified": "2024-02-26T16:27:44.467",
+ "lastModified": "2024-02-29T01:31:34.017",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33157.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33157.json
index 6804f700ac4..41fa16f1ca7 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33157.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33157.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33157",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.713",
- "lastModified": "2024-02-26T16:27:44.497",
+ "lastModified": "2024-02-29T01:31:34.053",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33158.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33158.json
index bf7336cec07..eec710e0422 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33158.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33158.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33158",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.753",
- "lastModified": "2024-02-26T16:27:44.530",
+ "lastModified": "2024-02-29T01:31:34.113",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33160.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33160.json
index 418ac04cb16..1a1bd164709 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33160.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33160.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33160",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.793",
- "lastModified": "2024-02-26T16:27:44.560",
+ "lastModified": "2024-02-29T01:31:34.183",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33161.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33161.json
index febe14e320b..5213f534270 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33161.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33161.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33161",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.837",
- "lastModified": "2024-02-26T16:27:44.593",
+ "lastModified": "2024-02-29T01:31:34.220",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33162.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33162.json
index bd8dcd8d5a0..a441bacbcd7 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33162.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33162.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33162",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.877",
- "lastModified": "2024-02-26T16:27:44.627",
+ "lastModified": "2024-02-29T01:31:34.257",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33163.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33163.json
index 5f2466ca3aa..34e5a151d9f 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33163.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33163.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33163",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.913",
- "lastModified": "2024-02-26T16:27:44.657",
+ "lastModified": "2024-02-29T01:31:34.287",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33165.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33165.json
index 82131452416..440dd2197d1 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33165.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33165.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33165",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.953",
- "lastModified": "2024-02-26T16:27:44.687",
+ "lastModified": "2024-02-29T01:31:34.393",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-331xx/CVE-2021-33167.json b/CVE-2021/CVE-2021-331xx/CVE-2021-33167.json
index 52c31ab7077..ee100e92da1 100644
--- a/CVE-2021/CVE-2021-331xx/CVE-2021-33167.json
+++ b/CVE-2021/CVE-2021-331xx/CVE-2021-33167.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-33167",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:09.993",
- "lastModified": "2024-02-26T16:27:44.720",
+ "lastModified": "2024-02-29T01:31:34.440",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-374xx/CVE-2021-37405.json b/CVE-2021/CVE-2021-374xx/CVE-2021-37405.json
index 75e25e2b1b2..e7a3dbcaf45 100644
--- a/CVE-2021/CVE-2021-374xx/CVE-2021-37405.json
+++ b/CVE-2021/CVE-2021-374xx/CVE-2021-37405.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-37405",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:10.030",
- "lastModified": "2024-02-26T16:27:44.750",
+ "lastModified": "2024-02-29T01:31:59.100",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-38xx/CVE-2021-3885.json b/CVE-2021/CVE-2021-38xx/CVE-2021-3885.json
index 85782e23b87..291e54a9703 100644
--- a/CVE-2021/CVE-2021-38xx/CVE-2021-3885.json
+++ b/CVE-2021/CVE-2021-38xx/CVE-2021-3885.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-3885",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:10.070",
- "lastModified": "2024-02-26T16:27:44.783",
+ "lastModified": "2024-02-29T01:32:22.633",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-390xx/CVE-2021-39077.json b/CVE-2021/CVE-2021-390xx/CVE-2021-39077.json
index c3b9165dc35..f6d523f5bbb 100644
--- a/CVE-2021/CVE-2021-390xx/CVE-2021-39077.json
+++ b/CVE-2021/CVE-2021-390xx/CVE-2021-39077.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-39077",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2022-11-03T20:15:24.037",
- "lastModified": "2023-11-18T03:06:44.563",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:32:09.590",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "\nIBM Security Guardium 10.5, 10.6, 11.0, 11.1, 11.2, 11.3, and 11.4 stores user credentials in plain clear text which can be read by a local privileged user. IBM X-Force ID: 215587.\n\n?"
+ "value": "\nIBM Security Guardium 10.5, 10.6, 11.0, 11.1, 11.2, 11.3, and 11.4 stores user credentials in plain clear text which can be read by a local privileged user. IBM X-Force ID: 215587.\n\n\u2003"
},
{
"lang": "es",
diff --git a/CVE-2021/CVE-2021-418xx/CVE-2021-41851.json b/CVE-2021/CVE-2021-418xx/CVE-2021-41851.json
index cbb03684ddb..cf1db34a5f4 100644
--- a/CVE-2021/CVE-2021-418xx/CVE-2021-41851.json
+++ b/CVE-2021/CVE-2021-418xx/CVE-2021-41851.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-41851",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:10.110",
- "lastModified": "2024-02-26T16:27:44.813",
+ "lastModified": "2024-02-29T01:32:35.147",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-418xx/CVE-2021-41852.json b/CVE-2021/CVE-2021-418xx/CVE-2021-41852.json
index 7f586660b42..d6f39fedca7 100644
--- a/CVE-2021/CVE-2021-418xx/CVE-2021-41852.json
+++ b/CVE-2021/CVE-2021-418xx/CVE-2021-41852.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-41852",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:10.150",
- "lastModified": "2024-02-26T16:27:44.843",
+ "lastModified": "2024-02-29T01:32:35.180",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-418xx/CVE-2021-41853.json b/CVE-2021/CVE-2021-418xx/CVE-2021-41853.json
index 93b2a04e2b0..20e5fe9a0cc 100644
--- a/CVE-2021/CVE-2021-418xx/CVE-2021-41853.json
+++ b/CVE-2021/CVE-2021-418xx/CVE-2021-41853.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-41853",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:10.190",
- "lastModified": "2024-02-26T16:27:44.870",
+ "lastModified": "2024-02-29T01:32:35.210",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-418xx/CVE-2021-41854.json b/CVE-2021/CVE-2021-418xx/CVE-2021-41854.json
index 493dae691a4..4f3f60ae39b 100644
--- a/CVE-2021/CVE-2021-418xx/CVE-2021-41854.json
+++ b/CVE-2021/CVE-2021-418xx/CVE-2021-41854.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-41854",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:10.227",
- "lastModified": "2024-02-26T16:27:44.903",
+ "lastModified": "2024-02-29T01:32:35.237",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-418xx/CVE-2021-41855.json b/CVE-2021/CVE-2021-418xx/CVE-2021-41855.json
index d3c2ced66a7..ff8da493721 100644
--- a/CVE-2021/CVE-2021-418xx/CVE-2021-41855.json
+++ b/CVE-2021/CVE-2021-418xx/CVE-2021-41855.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-41855",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:10.270",
- "lastModified": "2024-02-26T16:27:44.933",
+ "lastModified": "2024-02-29T01:32:35.263",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-418xx/CVE-2021-41856.json b/CVE-2021/CVE-2021-418xx/CVE-2021-41856.json
index d2a1138813e..d9034cf3fdf 100644
--- a/CVE-2021/CVE-2021-418xx/CVE-2021-41856.json
+++ b/CVE-2021/CVE-2021-418xx/CVE-2021-41856.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-41856",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:10.310",
- "lastModified": "2024-02-26T16:27:44.973",
+ "lastModified": "2024-02-29T01:32:35.290",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-418xx/CVE-2021-41857.json b/CVE-2021/CVE-2021-418xx/CVE-2021-41857.json
index 8ae86a58500..002c09d26a7 100644
--- a/CVE-2021/CVE-2021-418xx/CVE-2021-41857.json
+++ b/CVE-2021/CVE-2021-418xx/CVE-2021-41857.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-41857",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:10.350",
- "lastModified": "2024-02-26T16:27:45.020",
+ "lastModified": "2024-02-29T01:32:35.317",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-418xx/CVE-2021-41858.json b/CVE-2021/CVE-2021-418xx/CVE-2021-41858.json
index 2fb609f8ae8..7316297763d 100644
--- a/CVE-2021/CVE-2021-418xx/CVE-2021-41858.json
+++ b/CVE-2021/CVE-2021-418xx/CVE-2021-41858.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-41858",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:10.390",
- "lastModified": "2024-02-26T16:27:45.067",
+ "lastModified": "2024-02-29T01:32:35.347",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-418xx/CVE-2021-41859.json b/CVE-2021/CVE-2021-418xx/CVE-2021-41859.json
index 730da65e665..cdc601ba89d 100644
--- a/CVE-2021/CVE-2021-418xx/CVE-2021-41859.json
+++ b/CVE-2021/CVE-2021-418xx/CVE-2021-41859.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-41859",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:10.430",
- "lastModified": "2024-02-26T16:27:45.110",
+ "lastModified": "2024-02-29T01:32:35.377",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-418xx/CVE-2021-41860.json b/CVE-2021/CVE-2021-418xx/CVE-2021-41860.json
index d1592714929..cfe9a5f6396 100644
--- a/CVE-2021/CVE-2021-418xx/CVE-2021-41860.json
+++ b/CVE-2021/CVE-2021-418xx/CVE-2021-41860.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-41860",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:10.470",
- "lastModified": "2024-02-26T16:27:45.140",
+ "lastModified": "2024-02-29T01:32:35.403",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4250.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4250.json
index 32caeb9c4a2..3fb2233a205 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4250.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4250.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4250",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-18T22:15:10.080",
- "lastModified": "2023-11-07T03:40:26.287",
+ "lastModified": "2024-02-29T01:33:05.610",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in cgriego active_attr up to 0.15.2. This affects the function call of the file lib/active_attr/typecasting/boolean_typecaster.rb of the component Regex Handler. The manipulation of the argument value leads to denial of service. The exploit has been disclosed to the public and may be used. Upgrading to version 0.15.3 is able to address this issue. The name of the patch is dab95e5843b01525444b82bd7b336ef1d79377df. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216207."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en cgriego active_attr hasta 0.15.2 y clasificada como problem\u00e1tica. Esto afecta a la llamada de funci\u00f3n del archivo lib/active_attr/typecasting/boolean_typecaster.rb del componente Regex Handler. La manipulaci\u00f3n del argumento value conduce a la Denegaci\u00f3n de Servicio (DoS). La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 0.15.3 puede solucionar este problema. El nombre del parche es dab95e5843b01525444b82bd7b336ef1d79377df. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216207."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4259.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4259.json
index b3f14690b20..d530175d96c 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4259.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4259.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4259",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-19T14:15:10.497",
- "lastModified": "2023-11-07T03:40:27.607",
+ "lastModified": "2024-02-29T01:33:05.793",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in phpRedisAdmin up to 1.16.1. It has been classified as problematic. This affects the function authHttpDigest of the file includes/login.inc.php. The manipulation of the argument response leads to use of wrong operator in string comparison. Upgrading to version 1.16.2 is able to address this issue. The name of the patch is 31aa7661e6db6f4dffbf9a635817832a0a11c7d9. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216267."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en phpRedisAdmin hasta 1.16.1. Ha sido clasificada como problem\u00e1tica. Esto afecta la funci\u00f3n authHttpDigest del archivo include/login.inc.php. La manipulaci\u00f3n del argumento response conduce al uso de un operador incorrecto en la comparaci\u00f3n de cadenas. La actualizaci\u00f3n a la versi\u00f3n 1.16.2 puede solucionar este problema. El nombre del parche es 31aa7661e6db6f4dffbf9a635817832a0a11c7d9. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216267."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4263.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4263.json
index 172155bf76a..8d84b1d720a 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4263.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4263.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4263",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-21T19:15:12.350",
- "lastModified": "2023-11-16T01:33:12.510",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:33:05.917",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in leanote 2.6.1. This issue affects the function define of the file public/js/plugins/history.js. The manipulation of the argument content leads to cross site scripting. The attack may be initiated remotely. The identifier of the patch is 0f9733c890077942150696dcc6d2b1482b7a0a19. It is recommended to apply a patch to fix this issue. The identifier VDB-216461 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en leanote 2.6.1 y clasificada como problem\u00e1tica. Este problema afecta la funci\u00f3n de definici\u00f3n del archivo public/js/plugins/history.js. La manipulaci\u00f3n del argumento content conduce a Cross-Site Scripting. El ataque puede iniciarse de forma remota. El nombre del parche es 0f9733c890077942150696dcc6d2b1482b7a0a19. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216461."
}
],
"metrics": {
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4264.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4264.json
index 5570528fa43..61f01ba403c 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4264.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4264.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4264",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-21T19:15:12.520",
- "lastModified": "2023-11-07T03:40:28.547",
+ "lastModified": "2024-02-29T01:33:06.000",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in LinkedIn dustjs up to 2.x and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is ddb6523832465d38c9d80189e9de60519ac307c3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216464."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en LinkedIndustjs hasta 2.x y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida es afectada por este problema. La manipulaci\u00f3n conduce a una modificaci\u00f3n controlada inadecuadamente de los atributos del prototipo del objeto (\"prototype pollution\"). El ataque puede lanzarse de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 3.0.0 puede solucionar este problema. El nombre del parche es ddb6523832465d38c9d80189e9de60519ac307c3. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-216464."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4276.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4276.json
index 8861c397cf9..543421e31c8 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4276.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4276.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4276",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T11:15:10.940",
- "lastModified": "2023-11-07T03:40:30.380",
+ "lastModified": "2024-02-29T01:33:06.207",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in dns-stats hedgehog. It has been rated as problematic. Affected by this issue is the function DSCIOManager::dsc_import_input_from_source of the file src/DSCIOManager.cpp. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 58922c345d3d1fe89bb2020111873a3e07ca93ac. It is recommended to apply a patch to fix this issue. VDB-216746 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: We do assume that the Data Manager server can only be accessed by authorised users. Because of this, we don\u2019t believe this specific attack is possible without such a compromise of the Data Manager server."
+ },
+ {
+ "lang": "es",
+ "value": "** NO SOPORTADO CUANDO EST\u00c1 ASIGNADO ** Se encontr\u00f3 una vulnerabilidad en dns-stats hedgehog. Ha sido calificada como problem\u00e1tica. La funci\u00f3n DSCIOManager::dsc_import_input_from_source del archivo src/DSCIOManager.cpp es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. Por el momento todav\u00eda se duda de la existencia real de esta vulnerabilidad. El nombre del parche es 58922c345d3d1fe89bb2020111873a3e07ca93ac. Se recomienda aplicar un parche para solucionar este problema. VDB-216746 es el identificador asignado a esta vulnerabilidad. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante. NOTA: Asumimos que solo usuarios autorizados pueden acceder al servidor de Data Manager. Debido a esto, no creemos que este ataque espec\u00edfico sea posible sin comprometer el servidor de Data Manager."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4277.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4277.json
index 3854225e55f..742f7494a70 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4277.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4277.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4277",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T11:15:11.027",
- "lastModified": "2023-11-07T03:40:30.627",
+ "lastModified": "2024-02-29T01:33:06.287",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in fredsmith utils. This issue affects some unknown processing of the file screenshot_sync of the component Filename Handler. The manipulation leads to predictable from observable state. The name of the patch is dbab1b66955eeb3d76b34612b358307f5c4e3944. It is recommended to apply a patch to fix this issue. The identifier VDB-216749 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en fredsmith utils y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo capture_sync_sync del componente Filename Handler. La manipulaci\u00f3n conduce a un estado predecible a partir de un estado observable. El nombre del parche es dbab1b66955eeb3d76b34612b358307f5c4e3944. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216749."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4278.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4278.json
index 1747d09871f..60f96433cb8 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4278.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4278.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4278",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T16:15:10.400",
- "lastModified": "2023-11-07T03:40:30.853",
+ "lastModified": "2024-02-29T01:33:06.370",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in cronvel tree-kit up to 0.6.x. This affects an unknown part. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). Upgrading to version 0.7.0 is able to address this issue. The name of the patch is a63f559c50d70e8cb2eaae670dec25d1dbc4afcd. It is recommended to upgrade the affected component. The identifier VDB-216765 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en cronvel tree-kit hasta 0.6.x y clasificada como problem\u00e1tica. Esto afecta a una parte desconocida. La manipulaci\u00f3n conduce a una modificaci\u00f3n controlada inadecuadamente de los atributos del prototipo del objeto (\"contaminaci\u00f3n del prototipo\"). La actualizaci\u00f3n a la versi\u00f3n 0.7.0 puede solucionar este problema. El nombre del parche es a63f559c50d70e8cb2eaae670dec25d1dbc4afcd. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216765."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4279.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4279.json
index fbcf1c0b0d6..f1635b86ce0 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4279.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4279.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4279",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T20:15:25.610",
- "lastModified": "2023-11-07T03:40:31.090",
+ "lastModified": "2024-02-29T01:33:06.453",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Starcounter-Jack JSON-Patch up to 3.1.0 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.1 is able to address this issue. The name of the patch is 7ad6af41eabb2d799f698740a91284d762c955c9. It is recommended to upgrade the affected component. VDB-216778 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en Starcounter-Jack JSON-Patch hasta 3.1.0 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a c\u00f3digo desconocido. La manipulaci\u00f3n conduce a una modificaci\u00f3n controlada inadecuadamente de los atributos del prototipo del objeto (\"contaminaci\u00f3n del prototipo\"). El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 3.1.1 puede solucionar este problema. El nombre del parche es 7ad6af41eabb2d799f698740a91284d762c955c9. Se recomienda actualizar el componente afectado. VDB-216778 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4280.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4280.json
index 78280125a12..b5f18c0eb78 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4280.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4280.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4280",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T20:15:25.687",
- "lastModified": "2023-11-07T03:40:31.347",
+ "lastModified": "2024-02-29T01:33:06.543",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in styler_praat_scripts. It has been classified as problematic. Affected is an unknown function of the file file_segmenter.praat of the component Slash Handler. The manipulation leads to denial of service. It is possible to launch the attack remotely. The name of the patch is 0cad44aa4a3eb0ecdba071c10eaff16023d8b35f. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216780."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en styler_praat_scripts. Ha sido clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo file_segmenter.praat del componente Slash Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la denegaci\u00f3n del servicio. Es posible lanzar el ataque de forma remota. El nombre del parche es 0cad44aa4a3eb0ecdba071c10eaff16023d8b35f. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-216780."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4281.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4281.json
index b6ef4c89da1..35fe26f8945 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4281.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4281.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4281",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-26T20:15:10.580",
- "lastModified": "2023-11-07T03:40:31.593",
+ "lastModified": "2024-02-29T01:33:06.630",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Brave UX for-the-badge and classified as critical. Affected by this issue is some unknown functionality of the file .github/workflows/combine-prs.yml. The manipulation leads to os command injection. The name of the patch is 55b5a234c0fab935df5fb08365bc8fe9c37cf46b. It is recommended to apply a patch to fix this issue. VDB-216842 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Brave UX for-the-badge y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo .github/workflows/combine-prs.yml es afectada por este problema. La manipulaci\u00f3n conduce a la inyecci\u00f3n de comandos del sistema operativo. El nombre del parche es 55b5a234c0fab935df5fb08365bc8fe9c37cf46b. Se recomienda aplicar un parche para solucionar este problema. VDB-216842 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4282.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4282.json
index 886673eb9cf..36aceb94cd9 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4282.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4282.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4282",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T10:15:11.390",
- "lastModified": "2023-11-07T03:40:31.837",
+ "lastModified": "2024-02-29T01:33:06.713",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in FreePBX voicemail. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file page.voicemail.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 14.0.6.25 is able to address this issue. The name of the patch is 12e1469ef9208eda9d8955206e78345949236ee6. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216871."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en el correo de voz de FreePBX. Ha sido declarado problem\u00e1tico. Una funci\u00f3n desconocida del archivo page.voicemail.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a Cross-Site Scripting. El ataque se puede lanzar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 14.0.6.25 puede solucionar este problema. El nombre del parche es 12e1469ef9208eda9d8955206e78345949236ee6. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216871."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4283.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4283.json
index 7389a2b6eb1..81ec26422e3 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4283.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4283.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4283",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T10:15:11.620",
- "lastModified": "2023-11-07T03:40:32.127",
+ "lastModified": "2024-02-29T01:33:06.810",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in FreeBPX voicemail. It has been rated as problematic. Affected by this issue is some unknown functionality of the file views/ssettings.php of the component Settings Handler. The manipulation of the argument key leads to cross site scripting. The attack may be launched remotely. Upgrading to version 14.0.6.25 is able to address this issue. The name of the patch is ffce4882016076acd16fe0f676246905aa3cb2f3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216872."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en FreeBPX voicemail. Ha sido calificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo views/ssettings.php del componente Settings Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento key conduce a Cross-Site Scripting. El ataque puede lanzarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 14.0.6.25 puede solucionar este problema. El nombre del parche es ffce4882016076acd16fe0f676246905aa3cb2f3. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-216872."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4284.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4284.json
index 8bf9bdc3d31..fde0eb7b7ce 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4284.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4284.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4284",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T10:15:11.750",
- "lastModified": "2023-11-07T03:40:32.403",
+ "lastModified": "2024-02-29T01:33:07.010",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in OpenMRS HTML Form Entry UI Framework Integration Module up to 1.x. This affects an unknown part. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.0 is able to address this issue. The name of the patch is 811990972ea07649ae33c4b56c61c3b520895f07. It is recommended to upgrade the affected component. The identifier VDB-216873 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en OpenMRS HTML Form Entry UI Framework Integration Module hasta 1.x y clasificada como problem\u00e1tica. Esto afecta a una parte desconocida. La manipulaci\u00f3n conduce a Cross-Site Scripting. Es posible iniciar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 2.0.0 puede solucionar este problema. El nombre del parche es 811990972ea07649ae33c4b56c61c3b520895f07. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216873."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4285.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4285.json
index 081eac4f194..2f17ddfc016 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4285.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4285.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4285",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T11:15:10.480",
- "lastModified": "2023-11-07T03:40:32.653",
+ "lastModified": "2024-02-29T01:33:07.117",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in Nagios NCPA. This vulnerability affects unknown code of the file agent/listener/templates/tail.html. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 2.4.0 is able to address this issue. The name of the patch is 5abbcd7aa26e0fc815e6b2b0ffe1c15ef3e8fab5. It is recommended to upgrade the affected component. VDB-216874 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Nagios NCPA y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo agent/listener/templates/tail.html. La manipulaci\u00f3n del argumento name conduce a Cross-Site Scripting. El ataque se puede iniciar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 2.4.0 puede solucionar este problema. El nombre del parche es 5abbcd7aa26e0fc815e6b2b0ffe1c15ef3e8fab5. Se recomienda actualizar el componente afectado. VDB-216874 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4286.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4286.json
index 0dfa6fb1754..79ee57954a8 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4286.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4286.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4286",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T11:15:10.557",
- "lastModified": "2023-11-07T03:40:32.900",
+ "lastModified": "2024-02-29T01:33:07.213",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in cocagne pysrp up to 1.0.16. This issue affects the function calculate_x of the file srp/_ctsrp.py. The manipulation leads to information exposure through discrepancy. Upgrading to version 1.0.17 is able to address this issue. The name of the patch is dba52642f5e95d3da7af1780561213ee6053195f. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216875."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en cocagne pysrp hasta 1.0.16 y clasificada como problem\u00e1tica. Este problema afecta la funci\u00f3n calculate_x del archivo srp/_ctsrp.py. La manipulaci\u00f3n conduce a la exposici\u00f3n de la informaci\u00f3n a trav\u00e9s de la discrepancia. La actualizaci\u00f3n a la versi\u00f3n 1.0.17 puede solucionar este problema. El nombre del parche es dba52642f5e95d3da7af1780561213ee6053195f. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216875."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4287.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4287.json
index 21598adb604..cbfc77694a0 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4287.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4287.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4287",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T11:15:10.640",
- "lastModified": "2023-11-07T03:40:33.137",
+ "lastModified": "2024-02-29T01:33:07.310",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in ReFirm Labs binwalk up to 2.3.2. Affected is an unknown function of the file src/binwalk/modules/extractor.py of the component Archive Extraction Handler. The manipulation leads to symlink following. It is possible to launch the attack remotely. Upgrading to version 2.3.3 is able to address this issue. The name of the patch is fa0c0bd59b8588814756942fe4cb5452e76c1dcd. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216876."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en ReFirm Labs binwalk hasta 2.3.2 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo src/binwalk/modules/extractor.py del componente Archive Extraction Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce al seguimiento de enlaces simb\u00f3licos. Es posible lanzar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 2.3.3 puede solucionar este problema. El nombre del parche es fa0c0bd59b8588814756942fe4cb5452e76c1dcd. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-216876."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4288.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4288.json
index 0616f93f093..f845d459072 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4288.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4288.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4288",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T13:15:11.147",
- "lastModified": "2023-11-07T03:40:33.390",
+ "lastModified": "2024-02-29T01:33:07.407",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in OpenMRS openmrs-module-referenceapplication up to 2.11.x. It has been rated as problematic. This issue affects some unknown processing of the file omod/src/main/webapp/pages/userApp.gsp. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.12.0 is able to address this issue. The name of the patch is 35f81901a4cb925747a9615b8706f5079d2196a1. It is recommended to upgrade the affected component. The identifier VDB-216881 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en la aplicaci\u00f3n OpenMRS openmrs-module-reference hasta 2.11.x. Ha sido calificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo omod/src/main/webapp/pages/userApp.gsp. La manipulaci\u00f3n conduce a Cross-Site Scripting. El ataque puede iniciarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 2.12.0 puede solucionar este problema. El nombre del parche es 35f81901a4cb925747a9615b8706f5079d2196a1. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216881."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4289.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4289.json
index 29a464cae27..55345b7f304 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4289.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4289.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4289",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T13:15:11.227",
- "lastModified": "2023-11-07T03:40:33.650",
+ "lastModified": "2024-02-29T01:33:07.520",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in OpenMRS openmrs-module-referenceapplication up to 2.11.x. Affected by this vulnerability is the function post of the file omod/src/main/java/org/openmrs/module/referenceapplication/page/controller/UserAppPageController.java of the component User App Page. The manipulation of the argument AppId leads to cross site scripting. The attack can be launched remotely. Upgrading to version 2.12.0 is able to address this issue. The name of the patch is 0410c091d46eed3c132fe0fcafe5964182659f74. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216883."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en OpenMRS openmrs-module-referenceapplication hasta 2.11.x y clasificada como problem\u00e1tica. La funci\u00f3n post del archivo omod/src/main/java/org/openmrs/module/referenceapplication/page/controller/UserAppPageController.java del componente User App Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento AppId conduce a Cross-Site Scripting. El ataque se puede lanzar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 2.12.0 puede solucionar este problema. El nombre del parche es 0410c091d46eed3c132fe0fcafe5964182659f74. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216883."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4290.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4290.json
index 7ac9f0d666a..316c7f585c0 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4290.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4290.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4290",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T23:15:10.607",
- "lastModified": "2023-11-07T03:40:33.927",
+ "lastModified": "2024-02-29T01:33:07.610",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in DHBW Fallstudie. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file app/config/passport.js of the component Login. The manipulation of the argument id/email leads to sql injection. The name of the patch is 5c13c6a972ef4c07c5f35b417916e0598af9e123. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216907."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en DHBW Fallstudie. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del archivo app/config/passport.js del componente Login es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento id/email conduce a la inyecci\u00f3n de SQL. El nombre del parche es 5c13c6a972ef4c07c5f35b417916e0598af9e123. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-216907."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4291.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4291.json
index 856bbd67210..04a3194c653 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4291.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4291.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4291",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T23:15:10.677",
- "lastModified": "2023-11-07T03:40:34.193",
+ "lastModified": "2024-02-29T01:33:07.707",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in OpenMRS Admin UI Module up to 1.5.x. It has been declared as problematic. This vulnerability affects unknown code of the file omod/src/main/webapp/pages/metadata/locations/location.gsp. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.6.0 is able to address this issue. The name of the patch is a7eefb5f69f6c50a3bffcb138bb8ea57cb41a9b6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216916."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en el m\u00f3dulo de interfaz de usuario de administraci\u00f3n de OpenMRS hasta 1.5.x. Ha sido declarada problem\u00e1tica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo omod/src/main/webapp/pages/metadata/locations/location.gsp. La manipulaci\u00f3n conduce a cross site scripting. El ataque se puede iniciar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.6.0 puede solucionar este problema. El nombre del parche es a7eefb5f69f6c50a3bffcb138bb8ea57cb41a9b6. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-216916."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4292.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4292.json
index 8162c51b9da..cdd30dc2653 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4292.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4292.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4292",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T23:15:10.747",
- "lastModified": "2023-11-07T03:40:34.470",
+ "lastModified": "2024-02-29T01:33:07.803",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in OpenMRS Admin UI Module up to 1.4.x. It has been rated as problematic. This issue affects some unknown processing of the file omod/src/main/webapp/pages/metadata/privileges/privilege.gsp of the component Manage Privilege Page. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.5.0 is able to address this issue. The name of the patch is 4f8565425b7c74128dec9ca46dfbb9a3c1c24911. It is recommended to upgrade the affected component. The identifier VDB-216917 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en el m\u00f3dulo de interfaz de usuario de administraci\u00f3n de OpenMRS hasta 1.4.x. Ha sido calificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo omod/src/main/webapp/pages/metadata/privileges/privilege.gsp del componente Administrar p\u00e1gina de privilegios. La manipulaci\u00f3n conduce a cross site scripting. El ataque puede iniciarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.5.0 puede solucionar este problema. El nombre del parche es 4f8565425b7c74128dec9ca46dfbb9a3c1c24911. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216917."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4293.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4293.json
index f206b5dafb8..5d2bf055310 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4293.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4293.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4293",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T09:15:08.070",
- "lastModified": "2023-11-07T03:40:34.720",
+ "lastModified": "2024-02-29T01:33:07.923",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic has been found in gnuboard youngcart5 up to 5.4.5.1. Affected is an unknown function of the file adm/menu_list_update.php. The manipulation of the argument me_link leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 5.4.5.2 is able to address this issue. The name of the patch is 70daa537adfa47b87af12d85f1e698fff01785ff. It is recommended to upgrade the affected component. VDB-216954 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ },
+ {
+ "lang": "es",
+ "value": "** NO SOPORTADO CUANDO ASIGNADO ** Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en gnuboard youngcart5 hasta 5.4.5.1. Una funci\u00f3n desconocida del archivo adm/menu_list_update.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento me_link conduce a cross site scripting. Es posible lanzar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 5.4.5.2 puede solucionar este problema. El nombre del parche es 70daa537adfa47b87af12d85f1e698fff01785ff. Se recomienda actualizar el componente afectado. VDB-216954 es el identificador asignado a esta vulnerabilidad. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4294.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4294.json
index 9dd7c20c971..ea42af5afe2 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4294.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4294.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4294",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T17:15:09.067",
- "lastModified": "2023-11-07T03:40:34.963",
+ "lastModified": "2024-02-29T01:33:08.010",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in OpenShift OSIN. It has been classified as problematic. This affects the function ClientSecretMatches/CheckClientSecret. The manipulation of the argument secret leads to observable timing discrepancy. The name of the patch is 8612686d6dda34ae9ef6b5a974e4b7accb4fea29. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216987."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en OpenShift OSIN. Ha sido clasificada como problem\u00e1tica. Esto afecta a la funci\u00f3n ClientSecretMatches/CheckClientSecret. La manipulaci\u00f3n del secreto argumental conduce a una discrepancia temporal observable. El nombre del parche es 8612686d6dda34ae9ef6b5a974e4b7accb4fea29. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-216987."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4295.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4295.json
index 4179f878b60..c6998b4a50b 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4295.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4295.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4295",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-29T09:15:08.223",
- "lastModified": "2023-11-07T03:40:35.227",
+ "lastModified": "2024-02-29T01:33:08.107",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in ONC code-validator-api up to 1.0.30. This vulnerability affects the function vocabularyValidationConfigurations of the file src/main/java/org/sitenv/vocabularies/configuration/CodeValidatorApiConfiguration.java of the component XML Handler. The manipulation leads to xml external entity reference. Upgrading to version 1.0.31 is able to address this issue. The name of the patch is fbd8ea121755a2d3d116b13f235bc8b61d8449af. It is recommended to upgrade the affected component. VDB-217018 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en ONC code-validator-api hasta 1.0.30 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n vocabularioValidationConfigurations del archivo src/main/java/org/sitenv/vocabularies/configuration/CodeValidatorApiConfiguration.java del componente XML Handler. La manipulaci\u00f3n conduce a una referencia de entidad externa xml. La actualizaci\u00f3n a la versi\u00f3n 1.0.31 puede solucionar este problema. El nombre del parche es fbd8ea121755a2d3d116b13f235bc8b61d8449af. Se recomienda actualizar el componente afectado. VDB-217018 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4296.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4296.json
index 6665da6f58e..dbb1e1971cd 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4296.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4296.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4296",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-29T09:15:08.313",
- "lastModified": "2023-11-07T03:40:35.480",
+ "lastModified": "2024-02-29T01:33:08.190",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in w3c Unicorn. This issue affects the function ValidatorNuMessage of the file src/org/w3c/unicorn/response/impl/ValidatorNuMessage.java. The manipulation of the argument message leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 51f75c31f7fc33859a9a571311c67ae4e95d9c68. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217019."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en w3c Unicorn y clasificada como problem\u00e1tica. Este problema afecta la funci\u00f3n ValidatorNuMessage del archivo src/org/w3c/unicorn/response/impl/ValidatorNuMessage.java. La manipulaci\u00f3n del mensaje de argumento conduce a Cross-Site Scripting (XSS). El ataque puede iniciarse de forma remota. El nombre del parche es 51f75c31f7fc33859a9a571311c67ae4e95d9c68. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-217019."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4297.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4297.json
index 84cb7ed11e8..ff872fef94f 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4297.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4297.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-4297",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-01T19:15:10.453",
- "lastModified": "2023-11-16T01:47:16.233",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:33:08.270",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4298.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4298.json
index 455e22bd672..2070c9cea9b 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4298.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4298.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-4298",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T08:15:10.197",
- "lastModified": "2023-11-16T02:15:38.070",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:33:08.340",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2021/CVE-2021-42xx/CVE-2021-4299.json b/CVE-2021/CVE-2021-42xx/CVE-2021-4299.json
index 25c2c0dc5e3..bb845b44bda 100644
--- a/CVE-2021/CVE-2021-42xx/CVE-2021-4299.json
+++ b/CVE-2021/CVE-2021-42xx/CVE-2021-4299.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4299",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-02T08:15:10.277",
- "lastModified": "2023-11-07T03:40:36.527",
+ "lastModified": "2024-02-29T01:33:08.427",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-433xx/CVE-2021-43351.json b/CVE-2021/CVE-2021-433xx/CVE-2021-43351.json
index 14118d41240..34e3d027598 100644
--- a/CVE-2021/CVE-2021-433xx/CVE-2021-43351.json
+++ b/CVE-2021/CVE-2021-433xx/CVE-2021-43351.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-43351",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:10.510",
- "lastModified": "2024-02-26T16:27:45.180",
+ "lastModified": "2024-02-29T01:32:43.190",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4300.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4300.json
index 84998f1eb00..9880ec7f7e3 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4300.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4300.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-4300",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T22:15:08.903",
- "lastModified": "2023-12-08T01:23:26.550",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:33:08.520",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4301.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4301.json
index 3557fabe443..a37d3ce612c 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4301.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4301.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4301",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T22:15:08.800",
- "lastModified": "2023-11-07T03:40:37.203",
+ "lastModified": "2024-02-29T01:33:08.620",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4302.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4302.json
index 003883d8bdb..6b21335c3dd 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4302.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4302.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-4302",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T22:15:09.000",
- "lastModified": "2023-11-16T02:21:50.130",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:33:08.713",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4303.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4303.json
index 0cc5103d07c..a738dfc12e1 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4303.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4303.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4303",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T09:15:08.647",
- "lastModified": "2023-11-07T03:40:37.893",
+ "lastModified": "2024-02-29T01:33:08.803",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4304.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4304.json
index 148433fde89..57f061b9d86 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4304.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4304.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-4304",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T10:15:09.887",
- "lastModified": "2023-11-16T02:28:29.293",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:33:08.897",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4305.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4305.json
index 9f923384474..2f35d0fa7e1 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4305.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4305.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4305",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T11:15:09.120",
- "lastModified": "2023-11-07T03:40:38.627",
+ "lastModified": "2024-02-29T01:33:08.993",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4306.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4306.json
index 6b58f157faf..9967e5c964b 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4306.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4306.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4306",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T17:15:09.580",
- "lastModified": "2023-11-07T03:40:38.900",
+ "lastModified": "2024-02-29T01:33:09.080",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4307.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4307.json
index 29251698bc1..37b06ee4c4e 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4307.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4307.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-4307",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T20:15:09.623",
- "lastModified": "2023-12-08T01:32:17.050",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:33:09.167",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4308.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4308.json
index 5ee33e28801..c45c458b1c7 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4308.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4308.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4308",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T10:15:11.903",
- "lastModified": "2023-11-07T03:40:39.573",
+ "lastModified": "2024-02-29T01:33:09.263",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4309.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4309.json
index ea489a4169a..851a8e1d93a 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4309.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4309.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4309",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T17:15:17.947",
- "lastModified": "2023-11-07T03:40:39.847",
+ "lastModified": "2024-02-29T01:33:09.390",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4310.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4310.json
index 5a4379b3093..236f1812f12 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4310.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4310.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4310",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T09:15:09.940",
- "lastModified": "2023-11-07T03:40:40.127",
+ "lastModified": "2024-02-29T01:33:09.490",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4311.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4311.json
index 7060e939b0b..18fde4271e1 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4311.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4311.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4311",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T12:15:15.587",
- "lastModified": "2023-11-07T03:40:40.397",
+ "lastModified": "2024-02-29T01:33:09.573",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4312.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4312.json
index a4df32eb3a9..0645dc3ecb1 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4312.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4312.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4312",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T18:15:10.833",
- "lastModified": "2023-11-07T03:40:40.673",
+ "lastModified": "2024-02-29T01:33:09.657",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4313.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4313.json
index 21dff9e0199..2671275d3fb 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4313.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4313.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4313",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T12:15:16.480",
- "lastModified": "2023-11-07T03:40:40.947",
+ "lastModified": "2024-02-29T01:33:09.733",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in NethServer phonenehome. It has been rated as critical. This issue affects the function get_info/get_country_coor of the file server/index.php. The manipulation leads to sql injection. The identifier of the patch is 759c30b0ddd7d493836bbdf695cf71624b377391. It is recommended to apply a patch to fix this issue. The identifier VDB-218393 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en NethServer phonenehome. Ha sido declarada como cr\u00edtica. Este problema afecta la funci\u00f3n get_info/get_country_coor del archivo server/index.php. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El identificador del parche es 759c30b0ddd7d493836bbdf695cf71624b377391. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-218393."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4315.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4315.json
index b04736dea70..5cc567081b2 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4315.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4315.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4315",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-28T23:15:08.687",
- "lastModified": "2023-11-07T03:40:41.267",
+ "lastModified": "2024-02-29T01:33:09.827",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4325.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4325.json
index 475590e5dd6..0e8fc897c88 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4325.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4325.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4325",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-22T00:15:11.113",
- "lastModified": "2023-11-07T03:40:41.583",
+ "lastModified": "2024-02-29T01:33:09.967",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4327.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4327.json
index fbc54a5004c..9193a954075 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4327.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4327.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4327",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-01T11:15:12.817",
- "lastModified": "2023-11-07T03:40:41.880",
+ "lastModified": "2024-02-29T01:33:10.060",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4328.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4328.json
index b578904d506..2057e85ca31 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4328.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4328.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4328",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-02T19:15:10.193",
- "lastModified": "2023-11-07T03:40:42.183",
+ "lastModified": "2024-02-29T01:33:10.147",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4329.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4329.json
index 3d3cef1f323..e8800f67b3d 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4329.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4329.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4329",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T19:15:10.260",
- "lastModified": "2023-11-07T03:40:42.480",
+ "lastModified": "2024-02-29T01:33:10.230",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4336.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4336.json
index b4494a48315..479597cbc10 100644
--- a/CVE-2021/CVE-2021-43xx/CVE-2021-4336.json
+++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4336.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4336",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-28T22:15:09.337",
- "lastModified": "2023-11-07T03:40:43.560",
+ "lastModified": "2024-02-29T01:33:10.373",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-444xx/CVE-2021-44457.json b/CVE-2021/CVE-2021-444xx/CVE-2021-44457.json
index a81bf15701f..f0c65dcf646 100644
--- a/CVE-2021/CVE-2021-444xx/CVE-2021-44457.json
+++ b/CVE-2021/CVE-2021-444xx/CVE-2021-44457.json
@@ -2,12 +2,12 @@
"id": "CVE-2021-44457",
"sourceIdentifier": "secure@intel.com",
"published": "2024-02-23T21:15:10.550",
- "lastModified": "2024-02-26T16:27:45.223",
+ "lastModified": "2024-02-29T01:32:49.847",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
- "value": ""
+ "value": "Rejected reason: This is unused."
}
],
"metrics": {},
diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4428.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4428.json
index 813e89bca2b..1a04e270348 100644
--- a/CVE-2021/CVE-2021-44xx/CVE-2021-4428.json
+++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4428.json
@@ -2,7 +2,7 @@
"id": "CVE-2021-4428",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-18T17:15:11.140",
- "lastModified": "2023-11-07T03:40:55.520",
+ "lastModified": "2024-02-29T01:33:11.360",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4430.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4430.json
index 904af90dd95..00ee8797c6a 100644
--- a/CVE-2021/CVE-2021-44xx/CVE-2021-4430.json
+++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4430.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-4430",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-06T08:15:21.343",
- "lastModified": "2023-11-14T18:04:16.900",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:33:11.460",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4431.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4431.json
index 20a1b3550be..2e83938cbc2 100644
--- a/CVE-2021/CVE-2021-44xx/CVE-2021-4431.json
+++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4431.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-4431",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-07T11:15:10.070",
- "lastModified": "2023-11-14T19:57:53.390",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:33:11.550",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4432.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4432.json
index 518d607a204..7f55ec8a24d 100644
--- a/CVE-2021/CVE-2021-44xx/CVE-2021-4432.json
+++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4432.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-4432",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-16T15:15:08.280",
- "lastModified": "2024-01-23T20:27:55.653",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:33:11.673",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4433.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4433.json
index 6fa9609ae36..f8c61a66571 100644
--- a/CVE-2021/CVE-2021-44xx/CVE-2021-4433.json
+++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4433.json
@@ -2,8 +2,8 @@
"id": "CVE-2021-4433",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-18T01:15:43.460",
- "lastModified": "2024-01-24T20:35:23.303",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:33:11.760",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4437.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4437.json
index 0bb4b3697f9..14b21b945de 100644
--- a/CVE-2021/CVE-2021-44xx/CVE-2021-4437.json
+++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4437.json
@@ -2,12 +2,16 @@
"id": "CVE-2021-4437",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-12T20:15:07.993",
- "lastModified": "2024-02-12T20:39:09.773",
+ "lastModified": "2024-02-29T01:33:11.883",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in dbartholomae lambda-middleware frameguard up to 1.0.4. Affected by this issue is some unknown functionality of the file packages/json-deserializer/src/JsonDeserializer.ts of the component JSON Mime-Type Handler. The manipulation leads to inefficient regular expression complexity. Upgrading to version 1.1.0 is able to address this issue. The patch is identified as f689404d830cbc1edd6a1018d3334ff5f44dc6a6. It is recommended to upgrade the affected component. VDB-253406 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad clasificada como problem\u00e1tica fue encontrada en dbartholomae lambda-middleware frameguard hasta 1.0.4. Una funci\u00f3n desconocida del archivo packages/json-deserializer/src/JsonDeserializer.ts del componente JSON Mime-Type Handler es afectado por esta vulnerabilidad. La manipulaci\u00f3n conduce a una complejidad de expresiones regulares ineficiente. La actualizaci\u00f3n a la versi\u00f3n 1.1.0 puede solucionar este problema. El parche se identifica como f689404d830cbc1edd6a1018d3334ff5f44dc6a6. Se recomienda actualizar el componente afectado. VDB-253406 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
diff --git a/CVE-2022/CVE-2022-11xx/CVE-2022-1101.json b/CVE-2022/CVE-2022-11xx/CVE-2022-1101.json
index 2c03cdbe739..23e5783bb1a 100644
--- a/CVE-2022/CVE-2022-11xx/CVE-2022-1101.json
+++ b/CVE-2022/CVE-2022-11xx/CVE-2022-1101.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-1101",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T22:15:08.873",
- "lastModified": "2023-11-07T03:41:44.643",
+ "lastModified": "2024-02-29T01:33:21.167",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-11xx/CVE-2022-1102.json b/CVE-2022/CVE-2022-11xx/CVE-2022-1102.json
index 7f915126f94..66e49f1a254 100644
--- a/CVE-2022/CVE-2022-11xx/CVE-2022-1102.json
+++ b/CVE-2022/CVE-2022-11xx/CVE-2022-1102.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-1102",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T22:15:08.947",
- "lastModified": "2023-11-07T03:41:44.857",
+ "lastModified": "2024-02-29T01:33:21.353",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-19xx/CVE-2022-1958.json b/CVE-2022/CVE-2022-19xx/CVE-2022-1958.json
index 331f7ea471a..0e363d92087 100644
--- a/CVE-2022/CVE-2022-19xx/CVE-2022-1958.json
+++ b/CVE-2022/CVE-2022-19xx/CVE-2022-1958.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-1958",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-06-15T10:15:10.647",
- "lastModified": "2023-11-07T03:42:20.403",
+ "lastModified": "2024-02-29T01:33:28.793",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-26xx/CVE-2022-2666.json b/CVE-2022/CVE-2022-26xx/CVE-2022-2666.json
index 76c4b2e87f5..cdacc3457aa 100644
--- a/CVE-2022/CVE-2022-26xx/CVE-2022-2666.json
+++ b/CVE-2022/CVE-2022-26xx/CVE-2022-2666.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-2666",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T22:15:09.020",
- "lastModified": "2023-11-07T03:46:50.703",
+ "lastModified": "2024-02-29T01:34:45.653",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-274xx/CVE-2022-27404.json b/CVE-2022/CVE-2022-274xx/CVE-2022-27404.json
index bac22484bc6..6f3976bfd14 100644
--- a/CVE-2022/CVE-2022-274xx/CVE-2022-27404.json
+++ b/CVE-2022/CVE-2022-274xx/CVE-2022-27404.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-27404",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-22T14:15:09.423",
- "lastModified": "2023-11-07T03:45:19.523",
+ "lastModified": "2024-02-29T01:34:23.613",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -148,6 +148,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/",
"source": "cve@mitre.org"
+ },
+ {
+ "url": "https://security.gentoo.org/glsa/202402-06",
+ "source": "cve@mitre.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-274xx/CVE-2022-27405.json b/CVE-2022/CVE-2022-274xx/CVE-2022-27405.json
index d2ebeee355a..157a0c95a97 100644
--- a/CVE-2022/CVE-2022-274xx/CVE-2022-27405.json
+++ b/CVE-2022/CVE-2022-274xx/CVE-2022-27405.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-27405",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-22T14:15:09.483",
- "lastModified": "2023-11-07T03:45:19.597",
+ "lastModified": "2024-02-29T01:34:23.723",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -153,6 +153,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/",
"source": "cve@mitre.org"
+ },
+ {
+ "url": "https://security.gentoo.org/glsa/202402-06",
+ "source": "cve@mitre.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-274xx/CVE-2022-27406.json b/CVE-2022/CVE-2022-274xx/CVE-2022-27406.json
index 182f91ba151..db902b4bb97 100644
--- a/CVE-2022/CVE-2022-274xx/CVE-2022-27406.json
+++ b/CVE-2022/CVE-2022-274xx/CVE-2022-27406.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-27406",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-22T14:15:09.537",
- "lastModified": "2023-11-07T03:45:19.667",
+ "lastModified": "2024-02-29T01:34:23.797",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -154,6 +154,10 @@
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCEMWCM46PKM4U5ENRASPKQD6JDOLKRU/",
"source": "cve@mitre.org"
+ },
+ {
+ "url": "https://security.gentoo.org/glsa/202402-06",
+ "source": "cve@mitre.org"
}
]
}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-28xx/CVE-2022-2841.json b/CVE-2022/CVE-2022-28xx/CVE-2022-2841.json
index dce75b8c11c..0a3ffa2830a 100644
--- a/CVE-2022/CVE-2022-28xx/CVE-2022-2841.json
+++ b/CVE-2022/CVE-2022-28xx/CVE-2022-2841.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-2841",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-08-22T08:15:07.617",
- "lastModified": "2023-11-07T03:46:56.590",
+ "lastModified": "2024-02-29T01:34:47.297",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -70,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34269.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34269.json
new file mode 100644
index 00000000000..330085481db
--- /dev/null
+++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34269.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2022-34269",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:35:13.213",
+ "lastModified": "2024-02-29T01:35:13.213",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in RWS WorldServer before 11.7.3. An authenticated, remote attacker can perform a ws-legacy/load_dtd?system_id= blind SSRF attack to deploy JSP code to the Apache Axis service running on the localhost interface, leading to command execution."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.rws.com/localization/products/trados-enterprise/worldserver/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-342xx/CVE-2022-34270.json b/CVE-2022/CVE-2022-342xx/CVE-2022-34270.json
new file mode 100644
index 00000000000..d41ce70e954
--- /dev/null
+++ b/CVE-2022/CVE-2022-342xx/CVE-2022-34270.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2022-34270",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:35:13.267",
+ "lastModified": "2024-02-29T01:35:13.267",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in RWS WorldServer before 11.7.3. Regular users can create users with the Administrator role via UserWSUserManager."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.rws.com/localization/products/trados-enterprise/worldserver/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.triskelelabs.com/vulnerabilities-in-rws-worldserver",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-366xx/CVE-2022-36677.json b/CVE-2022/CVE-2022-366xx/CVE-2022-36677.json
new file mode 100644
index 00000000000..2b92798cf6b
--- /dev/null
+++ b/CVE-2022/CVE-2022-366xx/CVE-2022-36677.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2022-36677",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:35:29.187",
+ "lastModified": "2024-02-29T01:35:29.187",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Obsidian Mind Map v1.1.0 allows attackers to execute arbitrary code via a crafted payload injected into an uploaded document."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/JoJenH/Note4SelfVul/blob/main/obsidian-mind-map.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/lynchjames/obsidian-mind-map/issues/87",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2022/CVE-2022-36xx/CVE-2022-3629.json b/CVE-2022/CVE-2022-36xx/CVE-2022-3629.json
index eecf2f24ed0..b89c06e6481 100644
--- a/CVE-2022/CVE-2022-36xx/CVE-2022-3629.json
+++ b/CVE-2022/CVE-2022-36xx/CVE-2022-3629.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-3629",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-10-21T06:15:09.710",
- "lastModified": "2023-11-07T03:51:32.400",
+ "lastModified": "2024-02-29T01:35:51.743",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-36xx/CVE-2022-3633.json b/CVE-2022/CVE-2022-36xx/CVE-2022-3633.json
index 04c91b773bb..a5de7ea00f0 100644
--- a/CVE-2022/CVE-2022-36xx/CVE-2022-3633.json
+++ b/CVE-2022/CVE-2022-36xx/CVE-2022-3633.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-3633",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-10-21T11:15:09.473",
- "lastModified": "2023-11-07T03:51:32.960",
+ "lastModified": "2024-02-29T01:35:51.897",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-36xx/CVE-2022-3647.json b/CVE-2022/CVE-2022-36xx/CVE-2022-3647.json
index 3b25d30dbe6..1d208a20fc9 100644
--- a/CVE-2022/CVE-2022-36xx/CVE-2022-3647.json
+++ b/CVE-2022/CVE-2022-36xx/CVE-2022-3647.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-3647",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-10-21T18:15:10.183",
- "lastModified": "2024-02-07T18:05:53.950",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:35:52.087",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-38xx/CVE-2022-3844.json b/CVE-2022/CVE-2022-38xx/CVE-2022-3844.json
index 5a701add0a1..091828ddc0f 100644
--- a/CVE-2022/CVE-2022-38xx/CVE-2022-3844.json
+++ b/CVE-2022/CVE-2022-38xx/CVE-2022-3844.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-3844",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-11-02T20:15:11.023",
- "lastModified": "2023-11-16T01:34:34.367",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:35:53.843",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3979.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3979.json
index 8181d694851..cae197fd103 100644
--- a/CVE-2022/CVE-2022-39xx/CVE-2022-3979.json
+++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3979.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-3979",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-11-13T23:15:09.810",
- "lastModified": "2024-02-08T02:15:12.213",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:35:55.007",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4065.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4065.json
index 3152f2197e1..c9444df1d40 100644
--- a/CVE-2022/CVE-2022-40xx/CVE-2022-4065.json
+++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4065.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4065",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-11-19T19:15:10.433",
- "lastModified": "2023-11-07T03:56:50.883",
+ "lastModified": "2024-02-29T01:36:38.233",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4228.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4228.json
index be0af4e785d..c51b8d40481 100644
--- a/CVE-2022/CVE-2022-42xx/CVE-2022-4228.json
+++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4228.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4228",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-11-30T12:15:10.140",
- "lastModified": "2023-11-07T03:57:15.093",
+ "lastModified": "2024-02-29T01:36:39.587",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4229.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4229.json
index b12b6ede785..3c889a4b949 100644
--- a/CVE-2022/CVE-2022-42xx/CVE-2022-4229.json
+++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4229.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4229",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-11-30T12:15:10.330",
- "lastModified": "2023-11-07T03:57:15.480",
+ "lastModified": "2024-02-29T01:36:39.690",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -70,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-44xx/CVE-2022-4495.json b/CVE-2022/CVE-2022-44xx/CVE-2022-4495.json
index a0acd0623e0..de3335ac8df 100644
--- a/CVE-2022/CVE-2022-44xx/CVE-2022-4495.json
+++ b/CVE-2022/CVE-2022-44xx/CVE-2022-4495.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4495",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-14T15:15:10.897",
- "lastModified": "2023-11-07T03:57:59.503",
+ "lastModified": "2024-02-29T01:36:41.737",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in collective.dms.basecontent up to 1.6. This issue affects the function renderCell of the file src/collective/dms/basecontent/browser/column.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.7 is able to address this issue. The name of the patch is 6c4d616fcc771822a14ebae5e23f3f6d96d134bd. It is recommended to upgrade the affected component. The identifier VDB-215813 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad clasificada como problem\u00e1tica fue encontrada en collective.dms.basecontent hasta 1.6. Este problema afecta la funci\u00f3n renderCell del archivo src/collective/dms/basecontent/browser/column.py. La manipulaci\u00f3n conduce a cross site scripting. El ataque puede iniciarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.7 puede solucionar este problema. El nombre del parche es 6c4d616fcc771822a14ebae5e23f3f6d96d134bd. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-215813."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45365.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45365.json
index ff540a79d32..13eb3f8377f 100644
--- a/CVE-2022/CVE-2022-453xx/CVE-2022-45365.json
+++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45365.json
@@ -2,12 +2,12 @@
"id": "CVE-2022-45365",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-14T15:15:07.357",
- "lastModified": "2023-12-19T17:37:40.560",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:36:23.627",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aleksandar Uro\u0161evi? Stock Ticker allows Reflected XSS.This issue affects Stock Ticker: from n/a through 3.23.2.\n\n"
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aleksandar Uro\u0161evi\u0107 Stock Ticker allows Reflected XSS.This issue affects Stock Ticker: from n/a through 3.23.2.\n\n"
},
{
"lang": "es",
diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4521.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4521.json
index ac20054c1cd..b3f3d14d4ab 100644
--- a/CVE-2022/CVE-2022-45xx/CVE-2022-4521.json
+++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4521.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4521",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-15T21:15:12.773",
- "lastModified": "2023-11-07T03:58:03.643",
+ "lastModified": "2024-02-29T01:36:42.027",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in WSO2 carbon-registry up to 4.8.6. This affects an unknown part of the component Request Parameter Handler. The manipulation of the argument parentPath/path/username/path/profile_menu leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 4.8.7 is able to address this issue. The name of the patch is 9f967abfde9317bee2cda469dbc09b57d539f2cc. It is recommended to upgrade the affected component. The identifier VDB-215901 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad clasificada como problem\u00e1tica fue encontrada en WSO2 carbon-registry hasta 4.8.6. Una parte desconocida del componente Request Parameter Handler afecta a una parte desconocida. La manipulaci\u00f3n del argumento parentPath/path/username/path/profile_menu conduce a Cross-Site Scripting. Es posible iniciar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 4.8.7 puede solucionar este problema. El nombre del parche es 9f967abfde9317bee2cda469dbc09b57d539f2cc. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-215901."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4524.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4524.json
index 5b6fbdbe4cc..2fa74f38a56 100644
--- a/CVE-2022/CVE-2022-45xx/CVE-2022-4524.json
+++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4524.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4524",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-15T21:15:13.017",
- "lastModified": "2023-11-07T03:58:04.507",
+ "lastModified": "2024-02-29T01:36:42.170",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in Roots soil Plugin up to 4.0.x. Affected is the function language_attributes of the file src/Modules/CleanUpModule.php. The manipulation of the argument language leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 4.1.0 is able to address this issue. The name of the patch is 0c9151e00ab047da253e5cdbfccb204dd423269d. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215904."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad clasificada como problem\u00e1tica fue encontrada en Roots soil Plugin hasta 4.0.x. La funci\u00f3n language_attributes del archivo src/Modules/CleanUpModule.php es afectada por la vulnerabilidad. La manipulaci\u00f3n del argumento language conduce a Cross-Site Scripting. Es posible lanzar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 4.1.0 puede solucionar este problema. El nombre del parche es 0c9151e00ab047da253e5cdbfccb204dd423269d. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-215904."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4525.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4525.json
index e7a323d950f..d5baf15b9fb 100644
--- a/CVE-2022/CVE-2022-45xx/CVE-2022-4525.json
+++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4525.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4525",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-15T21:15:13.120",
- "lastModified": "2023-11-07T03:58:04.853",
+ "lastModified": "2024-02-29T01:36:42.273",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in National Sleep Research Resource sleepdata.org up to 58.x and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 59.0.0.rc is able to address this issue. The name of the patch is da44a3893b407087829b006d09339780919714cd. It is recommended to upgrade the affected component. The identifier VDB-215905 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en National Sleep Research Resource sleepdata.org hasta 58.x y clasificada como problem\u00e1tica. Una funcionalidad desconocida es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a Cross-Site Scripting. El ataque se puede lanzar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 59.0.0.rc puede solucionar este problema. El nombre del parche es da44a3893b407087829b006d09339780919714cd. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-215905."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4527.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4527.json
index 7d0aa425779..cf3333102ff 100644
--- a/CVE-2022/CVE-2022-45xx/CVE-2022-4527.json
+++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4527.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4527",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-15T21:15:13.290",
- "lastModified": "2023-11-07T03:58:05.450",
+ "lastModified": "2024-02-29T01:36:42.370",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in collective.task up to 3.0.8. It has been classified as problematic. This affects the function renderCell/AssignedGroupColumn of the file src/collective/task/browser/table.py. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 3.0.9 is able to address this issue. The name of the patch is 1aac7f83fa2c2b41d59ba02748912953461f3fac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215907."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en collective.task hasta 3.0.8. Ha sido clasificada como problem\u00e1tica. Esto afecta a la funci\u00f3n renderCell/AssignedGroupColumn del archivo src/collective/task/browser/table.py. La manipulaci\u00f3n conduce a Cross-Site Scripting. Es posible iniciar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 3.0.9 puede solucionar este problema. El nombre del parche es 1aac7f83fa2c2b41d59ba02748912953461f3fac. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-215907."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4560.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4560.json
index e44830ec202..23c5f55c4cc 100644
--- a/CVE-2022/CVE-2022-45xx/CVE-2022-4560.json
+++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4560.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4560",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-16T17:15:09.030",
- "lastModified": "2023-11-07T03:58:09.563",
+ "lastModified": "2024-02-29T01:36:42.627",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Joget up to 7.0.31. It has been rated as problematic. This issue affects the function getInternalJsCssLib of the file wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java of the component wflow-core. The manipulation of the argument key leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 7.0.32 is able to address this issue. The name of the patch is ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-215963."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Joget hasta 7.0.31. Ha sido calificada como problem\u00e1tica. Este problema afecta la funci\u00f3n getInternalJsCssLib del archivo wflow-core/src/main/java/org/joget/plugin/enterprise/UniversalTheme.java del componente wflow-core. La manipulaci\u00f3n de la clave del argumento conduce a Cross-Site Scripting. El ataque puede iniciarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 7.0.32 puede solucionar este problema. El nombre del parche es ecf8be8f6f0cb725c18536ddc726d42a11bdaa1b. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-215963."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4564.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4564.json
index fec40341ea8..42c74dcf862 100644
--- a/CVE-2022/CVE-2022-45xx/CVE-2022-4564.json
+++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4564.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4564",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-16T17:15:09.253",
- "lastModified": "2023-11-07T03:58:10.640",
+ "lastModified": "2024-02-29T01:36:42.743",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in University of Central Florida Materia up to 9.0.0. This affects the function before of the file fuel/app/classes/controller/api.php of the component API Controller. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 9.0.1-alpha1 is able to address this issue. The name of the patch is af259115d2e8f17068e61902151ee8a9dbac397b. It is recommended to upgrade the affected component. The identifier VDB-215973 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en University of Central Florida Materia hasta 9.0.0 y clasificada como problem\u00e1tica. Esto afecta la funci\u00f3n anterior del archivo fuel/app/classes/controller/api.php del componente API Controller. La manipulaci\u00f3n conduce a la Cross-Site Request Forgery (CSRF). Es posible iniciar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 9.0.1-alpha1 puede solucionar este problema. El nombre del parche es af259115d2e8f17068e61902151ee8a9dbac397b. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-215973."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4584.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4584.json
index 07f497c74e6..3c1284e9cb2 100644
--- a/CVE-2022/CVE-2022-45xx/CVE-2022-4584.json
+++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4584.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4584",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-17T13:15:09.483",
- "lastModified": "2023-11-07T03:58:14.083",
+ "lastModified": "2024-02-29T01:36:43.000",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Axiomatic Bento4 up to 1.6.0-639. It has been rated as critical. Affected by this issue is some unknown functionality of the component mp42aac. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-216170 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Axiomatic Bento4 hasta 1.6.0-639. Ha sido calificada como cr\u00edtica. Una funci\u00f3n desconocida del componente mp42aac es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a un desbordamiento de b\u00fafer de almacenamiento din\u00e1mico. El ataque puede lanzarse de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. VDB-216170 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4588.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4588.json
index 390a86630e7..eb333db0a65 100644
--- a/CVE-2022/CVE-2022-45xx/CVE-2022-4588.json
+++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4588.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4588",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-17T13:15:09.807",
- "lastModified": "2023-11-07T03:58:15.150",
+ "lastModified": "2024-02-29T01:36:43.130",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in Boston Sleep slice up to 84.1.x. Affected is an unknown function of the component Layout Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 84.2.0 is able to address this issue. The name of the patch is 6523bb17d889e2ab13d767f38afefdb37083f1d0. It is recommended to upgrade the affected component. VDB-216174 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad clasificada como problem\u00e1tica fue encontrada en Boston Sleep slice hasta 84.1.x. Una funci\u00f3n desconocida del componente Layout Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a Cross-Site Scripting. Es posible lanzar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 84.2.0 puede solucionar este problema. El nombre del parche es 6523bb17d889e2ab13d767f38afefdb37083f1d0. Se recomienda actualizar el componente afectado. VDB-216174 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4589.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4589.json
index 545b3846847..b223cc828f2 100644
--- a/CVE-2022/CVE-2022-45xx/CVE-2022-4589.json
+++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4589.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4589",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-17T13:15:09.883",
- "lastModified": "2023-11-07T03:58:15.513",
+ "lastModified": "2024-02-29T01:36:43.207",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in cyface Terms and Conditions Module up to 2.0.9 and classified as problematic. Affected by this vulnerability is the function returnTo of the file termsandconditions/views.py. The manipulation leads to open redirect. The attack can be launched remotely. Upgrading to version 2.0.10 is able to address this issue. The name of the patch is 03396a1c2e0af95e12a45c5faef7e47a4b513e1a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216175."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en Cyface Terms and Conditions Module hasta 2.0.9 y clasificada como problem\u00e1tica. La funci\u00f3n returnTo del archivo Termsandconditions/views.py es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una redirecci\u00f3n abierta. El ataque se puede lanzar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 2.0.10 puede solucionar este problema. El nombre del parche es 03396a1c2e0af95e12a45c5faef7e47a4b513e1a. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216175."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4604.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4604.json
index 8d4927aea75..e0f53774853 100644
--- a/CVE-2022/CVE-2022-46xx/CVE-2022-4604.json
+++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4604.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4604",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-18T11:15:11.170",
- "lastModified": "2023-11-07T03:58:19.803",
+ "lastModified": "2024-02-29T01:36:43.457",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in wp-english-wp-admin Plugin up to 1.5.1. Affected by this vulnerability is the function register_endpoints of the file english-wp-admin.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. Upgrading to version 1.5.2 is able to address this issue. The name of the patch is ad4ba171c974c65c3456e7c6228f59f40783b33d. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216199."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en wp-english-wp-admin Plugin hasta 1.5.1 y clasificada como problem\u00e1tica. La funci\u00f3n Register_endpoints del archivo english-wp-admin.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a Cross-Site Request Forgery (CSRF). El ataque se puede lanzar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.5.2 puede solucionar este problema. El nombre del parche es ad4ba171c974c65c3456e7c6228f59f40783b33d. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216199."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4607.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4607.json
index e9ab44e5d49..c1f7d93af5b 100644
--- a/CVE-2022/CVE-2022-46xx/CVE-2022-4607.json
+++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4607.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4607",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-18T22:15:10.723",
- "lastModified": "2023-11-07T03:58:20.293",
+ "lastModified": "2024-02-29T01:36:43.570",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 3D City Database OGC Web Feature Service up to 5.2.0. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to xml external entity reference. Upgrading to version 5.2.1 is able to address this issue. The name of the patch is 246f4e2a97ad81491c00a7ed72ce5e7c7f75050a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216215."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en 3D City Database OGC Web Feature Service hasta 5.2.0. Ha sido calificada como problem\u00e1tica. Este problema afecta alg\u00fan procesamiento desconocido. La manipulaci\u00f3n conduce a una referencia de entidad externa xml. La actualizaci\u00f3n a la versi\u00f3n 5.2.1 puede solucionar este problema. El nombre del parche es 246f4e2a97ad81491c00a7ed72ce5e7c7f75050a. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216215."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4611.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4611.json
index 60bb7bf3583..6bc23158b57 100644
--- a/CVE-2022/CVE-2022-46xx/CVE-2022-4611.json
+++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4611.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4611",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-19T15:15:10.347",
- "lastModified": "2023-11-07T03:58:20.847",
+ "lastModified": "2024-02-29T01:36:43.683",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in Click Studios Passwordstate and Passwordstate Browser Extension Chrome. This affects an unknown part. The manipulation leads to hard-coded credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The identifier VDB-216273 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Click Studios Passwordstate y Passwordstate Browser Extension Chrome y clasificada como problem\u00e1tica. Esto afecta a una parte desconocida. La manipulaci\u00f3n conduce a credenciales codificadas. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216273."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4632.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4632.json
index 67e7fd15d21..71070c4a8bf 100644
--- a/CVE-2022/CVE-2022-46xx/CVE-2022-4632.json
+++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4632.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4632",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-21T19:15:15.207",
- "lastModified": "2023-11-07T03:58:24.623",
+ "lastModified": "2024-02-29T01:36:43.930",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Auto Upload Images up to 3.3.0 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 3.3.1 is able to address this issue. The name of the patch is 895770ee93887ec78429c78ffdfb865bee6f9436. It is recommended to upgrade the affected component. The identifier VDB-216481 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en Auto Upload Images hasta 3.3.0 y clasificada como problem\u00e1tica. Una funcionalidad desconocida es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a Cross-Site Scripting. El ataque se puede lanzar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 3.3.1 puede solucionar este problema. El nombre del parche es 895770ee93887ec78429c78ffdfb865bee6f9436. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216481."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4633.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4633.json
index 68cd44c6620..0acc7a4f7e5 100644
--- a/CVE-2022/CVE-2022-46xx/CVE-2022-4633.json
+++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4633.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4633",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-21T19:15:15.300",
- "lastModified": "2023-11-07T03:58:24.943",
+ "lastModified": "2024-02-29T01:36:44.010",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Auto Upload Images up to 3.3.0 and classified as problematic. Affected by this issue is some unknown functionality of the file src/setting-page.php of the component Settings Handler. The manipulation leads to cross-site request forgery. The attack may be launched remotely. Upgrading to version 3.3.1 is able to address this issue. The name of the patch is 895770ee93887ec78429c78ffdfb865bee6f9436. It is recommended to upgrade the affected component. VDB-216482 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Auto Upload Images hasta 3.3.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo src/setting-page.php del componente Settings Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a Cross-Site Request Forgery (CSRF). El ataque puede lanzarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 3.3.1 puede solucionar este problema. El nombre del parche es 895770ee93887ec78429c78ffdfb865bee6f9436. Se recomienda actualizar el componente afectado. VDB-216482 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4637.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4637.json
index 5cce500d866..5cf41730257 100644
--- a/CVE-2022/CVE-2022-46xx/CVE-2022-4637.json
+++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4637.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4637",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-21T22:15:08.480",
- "lastModified": "2023-11-07T03:58:25.710",
+ "lastModified": "2024-02-29T01:36:44.117",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in ep3-bs up to 1.7.x. This affects an unknown part. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.8.0 is able to address this issue. The name of the patch is ef49e709c8adecc3a83cdc6164a67162991d2213. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216495."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en ep3-bs hasta 1.7.x y clasificada como problem\u00e1tica. Esto afecta a una parte desconocida. La manipulaci\u00f3n conduce a Cross-Site Scripting. Es posible iniciar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.8.0 puede solucionar este problema. El nombre del parche es ef49e709c8adecc3a83cdc6164a67162991d2213. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216495."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4643.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4643.json
index 12db067cfbd..31d5f46a482 100644
--- a/CVE-2022/CVE-2022-46xx/CVE-2022-4643.json
+++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4643.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4643",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-21T22:15:08.987",
- "lastModified": "2023-11-07T03:58:26.960",
+ "lastModified": "2024-02-29T01:36:44.243",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in docconv up to 1.2.0. It has been declared as critical. This vulnerability affects the function ConvertPDFImages of the file pdf_ocr.go. The manipulation of the argument path leads to os command injection. The attack can be initiated remotely. Upgrading to version 1.2.1 is able to address this issue. The name of the patch is b19021ade3d0b71c89d35cb00eb9e589a121faa5. It is recommended to upgrade the affected component. VDB-216502 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en docconv hasta 1.2.0. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n ConvertPDFImages del archivo pdf_ocr.go. La manipulaci\u00f3n del argumento path conduce a la inyecci\u00f3n de comandos del sistema operativo. El ataque se puede iniciar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.2.1 puede solucionar este problema. El nombre del parche es b19021ade3d0b71c89d35cb00eb9e589a121faa5. Se recomienda actualizar el componente afectado. VDB-216502 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4725.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4725.json
index dbf6decde53..4a8453d7865 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4725.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4725.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4725",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T15:15:12.130",
- "lastModified": "2023-11-07T03:58:41.497",
+ "lastModified": "2024-02-29T01:36:45.017",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in AWS SDK 2.59.0. It has been rated as critical. This issue affects the function XpathUtils of the file aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java of the component XML Parser. The manipulation leads to server-side request forgery. Upgrading to version 2.59.1 is able to address this issue. The name of the patch is c3e6d69422e1f0c80fe53f2d757b8df97619af2b. It is recommended to upgrade the affected component. The identifier VDB-216737 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en AWS SDK 2.59.0. Ha sido calificada como cr\u00edtica. Este problema afecta la funci\u00f3n XpathUtils del archivo aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java del componente XML Parser. La manipulaci\u00f3n conduce a server-side request forgery. La actualizaci\u00f3n a la versi\u00f3n 2.59.1 puede solucionar este problema. El nombre del parche es c3e6d69422e1f0c80fe53f2d757b8df97619af2b. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216737."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4731.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4731.json
index fe5b33938b3..e2bf2b001b9 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4731.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4731.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4731",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T11:15:11.113",
- "lastModified": "2023-11-07T03:58:43.343",
+ "lastModified": "2024-02-29T01:36:45.157",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in myapnea up to 29.0.x. Affected is an unknown function of the component Title Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 29.1.0 is able to address this issue. The name of the patch is 99934258530d761bd5d09809bfa6c14b598f8d18. It is recommended to upgrade the affected component. VDB-216750 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad clasificada como problem\u00e1tica fue encontrada en myapnea hasta 29.0.x. Una funci\u00f3n desconocida del componente Title Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a Cross-Site Scripting (XSS). Es posible lanzar el ataque de forma remota. La actualizaci\u00f3n a la versi\u00f3n 29.1.0 puede solucionar este problema. El nombre del parche es 99934258530d761bd5d09809bfa6c14b598f8d18. Se recomienda actualizar el componente afectado. VDB-216750 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4735.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4735.json
index 955754eb697..9429e8eee8d 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4735.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4735.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4735",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T16:15:10.497",
- "lastModified": "2023-11-07T03:58:43.810",
+ "lastModified": "2024-02-29T01:36:45.257",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in asrashley dash-live. This vulnerability affects the function ready of the file static/js/media.js of the component DOM Node Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 24d01757a5319cc14c4aa1d8b53d1ab24d48e451. It is recommended to apply a patch to fix this issue. VDB-216766 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en asrashley dash-live y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n ready del archivo static/js/media.js del componente DOM Node Handler. La manipulaci\u00f3n conduce a Cross-Site Scripting (XSS). El ataque se puede iniciar de forma remota. El nombre del parche es 24d01757a5319cc14c4aa1d8b53d1ab24d48e451. Se recomienda aplicar un parche para solucionar este problema. VDB-216766 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4736.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4736.json
index 17c29fa2d9d..822724a4e19 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4736.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4736.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4736",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T20:15:25.783",
- "lastModified": "2023-11-07T03:58:44.080",
+ "lastModified": "2024-02-29T01:36:45.343",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Venganzas del Pasado and classified as problematic. Affected by this issue is some unknown functionality. The manipulation of the argument the_title leads to cross site scripting. The attack may be launched remotely. The name of the patch is 62339b2ec445692c710b804bdf07aef4bd247ff7. It is recommended to apply a patch to fix this issue. VDB-216770 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Venganzas del Pasado y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida es afectada por este problema. La manipulaci\u00f3n del argumento the_title conduce a Cross-Site Scripting (XSS). El ataque puede lanzarse de forma remota. El nombre del parche es 62339b2ec445692c710b804bdf07aef4bd247ff7. Se recomienda aplicar un parche para solucionar este problema. VDB-216770 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4737.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4737.json
index da4bc45e5f4..3383bb823c9 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4737.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4737.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4737",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T20:15:25.860",
- "lastModified": "2023-11-07T03:58:44.410",
+ "lastModified": "2024-02-29T01:36:45.430",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Blood Bank Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack may be initiated remotely. The identifier VDB-216773 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Blood Bank Management System 1.0. Ha sido calificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo login.php. La manipulaci\u00f3n del argumento nombre de usuario/contrase\u00f1a conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216773."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4738.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4738.json
index 9fbd95fc44c..8fc2d3e7411 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4738.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4738.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4738",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T20:15:25.933",
- "lastModified": "2023-11-07T03:58:44.757",
+ "lastModified": "2024-02-29T01:36:45.503",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in SourceCodester Blood Bank Management System 1.0. Affected is an unknown function of the file index.php?page=users of the component User Registration Handler. The manipulation of the argument Name leads to cross site scripting. It is possible to launch the attack remotely. VDB-216774 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en SourceCodester Blood Bank Management System 1.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo index.php?page=users del componente User Registration Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento Nombre conduce a Cross-Site Scripting (XSS). Es posible lanzar el ataque de forma remota. VDB-216774 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4739.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4739.json
index 989fc598800..ebec548877a 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4739.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4739.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4739",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T20:15:26.007",
- "lastModified": "2023-11-07T03:58:45.110",
+ "lastModified": "2024-02-29T01:36:45.577",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in SourceCodester School Dormitory Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Admin Login. The manipulation leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-216775."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en SourceCodester School Dormitory Management System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del componente Admin Login es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota. El identificador asociado de esta vulnerabilidad es VDB-216775."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4740.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4740.json
index 06e857f7bb1..b01e86db1fc 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4740.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4740.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4740",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T20:15:26.080",
- "lastModified": "2023-11-07T03:58:45.447",
+ "lastModified": "2024-02-29T01:36:45.650",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in kkFileView. Affected by this issue is the function setWatermarkAttribute of the file /picturesPreview. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-216776."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en kkFileView y clasificada como problem\u00e1tica. La funci\u00f3n setWatermarkAttribute del archivo /picturesPreview es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a Cross-Site Scripting (XSS). El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-216776."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4741.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4741.json
index 6161177b9c9..8ef1d02a938 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4741.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4741.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4741",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-25T20:15:26.160",
- "lastModified": "2023-11-07T03:58:45.807",
+ "lastModified": "2024-02-29T01:36:45.730",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in docconv up to 1.2.0 and classified as problematic. This issue affects the function ConvertDocx/ConvertODT/ConvertPages/ConvertXML/XMLToText. The manipulation leads to uncontrolled memory allocation. The attack may be initiated remotely. Upgrading to version 1.2.1 is able to address this issue. The name of the patch is 42bcff666855ab978e67a9041d0cdea552f20301. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-216779."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en docconv hasta 1.2.0 y clasificada como problem\u00e1tica. Este problema afecta la funci\u00f3n ConvertDocx/ConvertODT/ConvertPages/ConvertXML/XMLToText. La manipulaci\u00f3n conduce a una asignaci\u00f3n de memoria incontrolada. El ataque puede iniciarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.2.1 puede solucionar este problema. El nombre del parche es 42bcff666855ab978e67a9041d0cdea552f20301. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-216779."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4742.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4742.json
index 5998381e163..c375903e93e 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4742.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4742.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4742",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-26T08:15:09.587",
- "lastModified": "2023-11-07T03:58:46.130",
+ "lastModified": "2024-02-29T01:36:45.803",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in json-pointer. Affected by this issue is the function set of the file index.js. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The name of the patch is 859c9984b6c407fc2d5a0a7e47c7274daa681941. It is recommended to apply a patch to fix this issue. VDB-216794 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en json-pointer y clasificada como cr\u00edtica. La funci\u00f3n set del archivo index.js es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una modificaci\u00f3n controlada inadecuadamente de los atributos del prototipo del objeto (\"contaminaci\u00f3n del prototipo\"). El ataque puede lanzarse de forma remota. El nombre del parche es 859c9984b6c407fc2d5a0a7e47c7274daa681941. Se recomienda aplicar un parche para solucionar este problema. VDB-216794 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4748.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4748.json
index ad92c1664c3..d6ec16cf7d0 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4748.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4748.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4748",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T09:15:09.877",
- "lastModified": "2023-11-07T03:58:47.333",
+ "lastModified": "2024-02-29T01:36:45.937",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in FlatPress. It has been classified as critical. This affects the function doItemActions of the file fp-plugins/mediamanager/panels/panel.mediamanager.file.php of the component File Delete Handler. The manipulation of the argument deletefile leads to path traversal. The name of the patch is 5d5c7f6d8f072d14926fc2c3a97cdd763802f170. It is recommended to apply a patch to fix this issue. The identifier VDB-216861 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en FlatPress. Ha sido clasificado como cr\u00edtico. La funci\u00f3n doItemActions del archivo fp-plugins/mediamanager/panels/panel.mediamanager.file.php del componente File Delete Handler afecta a la funci\u00f3n. La manipulaci\u00f3n del argumento deletefile conduce a path traversal. El nombre del parche es 5d5c7f6d8f072d14926fc2c3a97cdd763802f170. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216861."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4755.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4755.json
index 17db40b7acb..8bd38ae5005 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4755.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4755.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4755",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T10:15:11.850",
- "lastModified": "2023-11-07T03:58:48.977",
+ "lastModified": "2024-02-29T01:36:46.070",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in FlatPress and classified as problematic. This issue affects the function main of the file fp-plugins/mediamanager/panels/panel.mediamanager.file.php of the component Media Manager Plugin. The manipulation of the argument mm-newgallery-name leads to cross site scripting. The attack may be initiated remotely. The name of the patch is d3f329496536dc99f9707f2f295d571d65a496f5. It is recommended to apply a patch to fix this issue. The identifier VDB-216869 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en FlatPress y clasificada como problem\u00e1tica. Este problema afecta la funci\u00f3n principal del archivo fp-plugins/mediamanager/panels/panel.mediamanager.file.php del componente Media Manager Plugin. La manipulaci\u00f3n del argumento mm-newgallery-name conduce a Cross-Site Scripting. El ataque puede iniciarse de forma remota. El nombre del parche es d3f329496536dc99f9707f2f295d571d65a496f5. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216869."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4766.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4766.json
index dde0d5bb032..cca2b505437 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4766.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4766.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4766",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T13:15:11.377",
- "lastModified": "2023-11-07T03:58:51.373",
+ "lastModified": "2024-02-29T01:36:46.217",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in dolibarr_project_timesheet up to 4.5.5. It has been declared as problematic. This vulnerability affects unknown code of the component Form Handler. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. Upgrading to version 4.5.6.a is able to address this issue. The name of the patch is 082282e9dab43963e6c8f03cfaddd7921de377f4. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216880."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en dolibarr_project_timesheet hasta 4.5.5. Ha sido declarada problem\u00e1tica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del componente Form Handler. La manipulaci\u00f3n conduce a la Cross-Site Request Forgery (CSRF). El ataque se puede iniciar de forma remota. La actualizaci\u00f3n a la versi\u00f3n 4.5.6.a puede solucionar este problema. El nombre del parche es 082282e9dab43963e6c8f03cfaddd7921de377f4. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-216880."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4768.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4768.json
index 7a7b3303c22..ea8ee8c2624 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4768.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4768.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4768",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T23:15:10.830",
- "lastModified": "2023-11-07T03:58:51.770",
+ "lastModified": "2024-02-29T01:36:46.303",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Dropbox merou. It has been classified as critical. Affected is the function add_public_key of the file grouper/public_key.py of the component SSH Public Key Handler. The manipulation of the argument public_key_str leads to injection. It is possible to launch the attack remotely. The name of the patch is d93087973afa26bc0a2d0a5eb5c0fde748bdd107. It is recommended to apply a patch to fix this issue. VDB-216906 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Dropbox merou. Ha sido clasificada como cr\u00edtica. La funci\u00f3n add_public_key del archivo grouper/public_key.py del componente SSH Public Key Handler es afectada por la vulnerabilidad. La manipulaci\u00f3n del argumento public_key_str conduce a la inyecci\u00f3n. Es posible lanzar el ataque de forma remota. El nombre del parche es d93087973afa26bc0a2d0a5eb5c0fde748bdd107. Se recomienda aplicar un parche para solucionar este problema. VDB-216906 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4772.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4772.json
index f5c887729a5..0fed3a2ec95 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4772.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4772.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4772",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T23:15:10.920",
- "lastModified": "2023-11-07T03:58:52.643",
+ "lastModified": "2024-02-29T01:36:46.437",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Widoco and classified as critical. Affected by this issue is the function unZipIt of the file src/main/java/widoco/WidocoUtils.java. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is f2279b76827f32190adfa9bd5229b7d5a147fa92. It is recommended to apply a patch to fix this issue. VDB-216914 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Widoco y clasificada como cr\u00edtica. La funci\u00f3n unZipIt del archivo src/main/java/widoco/WidocoUtils.java es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a path traversal. Es posible lanzar el ataque al servidor local. El nombre del parche es f2279b76827f32190adfa9bd5229b7d5a147fa92. Se recomienda aplicar un parche para solucionar este problema. VDB-216914 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-47xx/CVE-2022-4773.json b/CVE-2022/CVE-2022-47xx/CVE-2022-4773.json
index dada6be558f..1926e2dd656 100644
--- a/CVE-2022/CVE-2022-47xx/CVE-2022-4773.json
+++ b/CVE-2022/CVE-2022-47xx/CVE-2022-4773.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4773",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T00:15:15.570",
- "lastModified": "2023-11-07T03:58:53.043",
+ "lastModified": "2024-02-29T01:36:46.520",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as problematic was found in cloudsync. Affected by this vulnerability is the function getItem of the file src/main/java/cloudsync/connector/LocalFilesystemConnector.java. The manipulation leads to path traversal. It is possible to launch the attack on the local host. The name of the patch is 3ad796833398af257c28e0ebeade68518e0e612a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216919. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
+ },
+ {
+ "lang": "es",
+ "value": "** NO SOPORTADO CUANDO ASIGNADO ** Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en cloudsync. La funci\u00f3n getItem del archivo src/main/java/cloudsync/connector/LocalFilesystemConnector.java es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a path traversal. Es posible lanzar el ataque al servidor local. El nombre del parche es 3ad796833398af257c28e0ebeade68518e0e612a. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-216919. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el mantenedor."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4817.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4817.json
index 8cb13c569f4..b9096e146b1 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4817.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4817.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4817",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T19:15:09.370",
- "lastModified": "2023-11-07T03:58:58.750",
+ "lastModified": "2024-02-29T01:36:46.977",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in centic9 jgit-cookbook. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to insecure temporary file. The attack can be initiated remotely. The name of the patch is b8cb29b43dc704708d598c60ac1881db7cf8e9c3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-216988."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en centic9 jgit-cookbook. Ha sido declarada problem\u00e1tica. Esta vulnerabilidad afecta a c\u00f3digo desconocido. La manipulaci\u00f3n conduce a un archivo temporal inseguro. El ataque se puede iniciar de forma remota. El nombre del parche es b8cb29b43dc704708d598c60ac1881db7cf8e9c3. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-216988."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4818.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4818.json
index cbceba3f048..b30e1072c89 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4818.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4818.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4818",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T21:15:10.487",
- "lastModified": "2023-11-07T03:58:58.947",
+ "lastModified": "2024-02-29T01:36:47.067",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Talend Open Studio for MDM. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file org.talend.mdm.core/src/com/amalto/core/storage/SystemStorageWrapper.java. The manipulation leads to xml external entity reference. Upgrading to version 20221220_1938 is able to address this issue. The name of the patch is 95590db2ad6a582c371273ceab1a73ad6ed47853. It is recommended to upgrade the affected component. The identifier VDB-216997 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Talend Open Studio para MDM. Ha sido declarada problem\u00e1tica. Una funci\u00f3n desconocida del archivo org.talend.mdm.core/src/com/amalto/core/storage/SystemStorageWrapper.java es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una referencia de entidad externa xml. La actualizaci\u00f3n a la versi\u00f3n 20221220_1938 puede solucionar este problema. El nombre del parche es 95590db2ad6a582c371273ceab1a73ad6ed47853. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-216997."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4819.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4819.json
index 101aa4d9aef..6f304204031 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4819.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4819.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4819",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T21:15:10.603",
- "lastModified": "2023-11-07T03:58:59.280",
+ "lastModified": "2024-02-29T01:36:47.150",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in HotCRP. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. The name of the patch is d4ffdb0ef806453c54ddca7fdda3e5c60356285c. It is recommended to apply a patch to fix this issue. VDB-216998 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en HotCRP. Ha sido calificada como problem\u00e1tica. Una funci\u00f3n desconocida es afectada por este problema. La manipulaci\u00f3n conduce a Cross-Site Scripting (XSS). El ataque puede lanzarse de forma remota. El nombre del parche es d4ffdb0ef806453c54ddca7fdda3e5c60356285c. Se recomienda aplicar un parche para solucionar este problema. VDB-216998 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4820.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4820.json
index ebc653be0db..bc17b93bef8 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4820.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4820.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4820",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T21:15:10.703",
- "lastModified": "2023-11-07T03:58:59.600",
+ "lastModified": "2024-02-29T01:36:47.233",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in FlatPress. This affects an unknown part of the file admin/panels/entry/admin.entry.list.php of the component Admin Area. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 229752b51025e678370298284d42f8ebb231f67f. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216999."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en FlatPress y clasificada como problem\u00e1tica. Una parte desconocida del archivo admin/panels/entry/admin.entry.list.php del componente Admin Area afecta a una parte desconocida. La manipulaci\u00f3n conduce a Cross-Site Scripting (XSS). Es posible iniciar el ataque de forma remota. El nombre del parche es 229752b51025e678370298284d42f8ebb231f67f. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-216999."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4821.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4821.json
index 9f2b06efd92..4dff9519cee 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4821.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4821.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4821",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T21:15:10.840",
- "lastModified": "2023-11-07T03:58:59.950",
+ "lastModified": "2024-02-29T01:36:47.307",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in FlatPress. This vulnerability affects the function onupload of the file admin/panels/uploader/admin.uploader.php of the component XML File Handler/MD File Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The name of the patch is 3cc223dec5260e533a84b5cf5780d3a4fbf21241. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-217000."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en FlatPress y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta la funci\u00f3n onupload del archivo admin/panels/uploader/admin.uploader.php del componente XML File Handler/MD File Handler. La manipulaci\u00f3n conduce a Cross-Site Scripting (XSS). El ataque se puede iniciar de forma remota. El nombre del parche es 3cc223dec5260e533a84b5cf5780d3a4fbf21241. Se recomienda aplicar un parche para solucionar este problema. El identificador de esta vulnerabilidad es VDB-217000."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4822.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4822.json
index 9aaa6c15fbf..d69e84debdf 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4822.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4822.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4822",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T21:15:11.017",
- "lastModified": "2023-11-07T03:59:00.310",
+ "lastModified": "2024-02-29T01:36:47.390",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in FlatPress. This issue affects some unknown processing of the file setup/lib/main.lib.php of the component Setup. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is 5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1. It is recommended to apply a patch to fix this issue. The identifier VDB-217001 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en FlatPress y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo setup/lib/main.lib.php del componente Setup. La manipulaci\u00f3n conduce a Cross-Site Scripting (XSS). El ataque puede iniciarse de forma remota. El nombre del parche es 5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217001."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4823.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4823.json
index cbec0d442de..1570ef6f781 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4823.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4823.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4823",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-28T21:15:11.147",
- "lastModified": "2023-11-07T03:59:00.643",
+ "lastModified": "2024-02-29T01:36:47.477",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in InSTEDD Nuntium. Affected is an unknown function of the file app/controllers/geopoll_controller.rb. The manipulation of the argument signature leads to observable timing discrepancy. It is possible to launch the attack remotely. The name of the patch is 77236f7fd71a0e2eefeea07f9866b069d612cf0d. It is recommended to apply a patch to fix this issue. VDB-217002 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en InSTEDD Nuntium y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo app/controllers/geopoll_controller.rb es afectada por esta vulnerabilidad. La manipulaci\u00f3n de la firma del argumento conduce a una discrepancia temporal observable. Es posible lanzar el ataque de forma remota. El nombre del parche es 77236f7fd71a0e2eefeea07f9866b069d612cf0d. Se recomienda aplicar un parche para solucionar este problema. VDB-217002 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +70,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4855.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4855.json
index c225b20b4c8..2ad62263462 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4855.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4855.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4855",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T09:15:08.247",
- "lastModified": "2023-11-07T03:59:06.127",
+ "lastModified": "2024-02-29T01:36:47.807",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Lead Management System 1.0. Affected is an unknown function of the file login.php. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-217020."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en SourceCodester Lead Management System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo login.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento nombre de usuario conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-217020."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4856.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4856.json
index a0fdeaff031..ebb470afb29 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4856.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4856.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4856",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T10:15:09.530",
- "lastModified": "2023-11-07T03:59:06.517",
+ "lastModified": "2024-02-29T01:36:47.903",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Modbus Tools Modbus Slave up to 7.5.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file mbslave.exe of the component mbs File Handler. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-217021 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en Modbus Tools Modbus Slave hasta 7.5.1 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo mbslave.exe del componente mbs File Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-217021."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -56,7 +60,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4857.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4857.json
index c901660d970..a7be2e069a5 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4857.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4857.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4857",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T10:15:10.103",
- "lastModified": "2023-11-07T03:59:06.847",
+ "lastModified": "2024-02-29T01:36:48.003",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Modbus Tools Modbus Poll up to 9.10.0 and classified as critical. Affected by this issue is some unknown functionality of the file mbpoll.exe of the component mbp File Handler. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-217022 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Modbus Tools Modbus Poll hasta 9.10.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo mbpoll.exe del componente mbp File Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n provoca un desbordamiento del b\u00fafer. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-217022 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4859.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4859.json
index f97623241e1..687e246e423 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4859.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4859.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4859",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T12:15:09.513",
- "lastModified": "2023-11-07T03:59:07.243",
+ "lastModified": "2024-02-29T01:36:48.100",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in Joget up to 7.0.33. This issue affects the function submitForm of the file wflow-core/src/main/java/org/joget/plugin/enterprise/UserProfileMenu.java of the component User Profile Menu. The manipulation of the argument firstName/lastName leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 7.0.34 is able to address this issue. The patch is named 9a77f508a2bf8cf661d588f37a4cc29ecaea4fc8. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217055."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Joget hasta 7.0.33 y clasificada como problem\u00e1tica. Este problema afecta la funci\u00f3n submitForm del archivo wflow-core/src/main/java/org/joget/plugin/enterprise/UserProfileMenu.java del componente User Profile Menu. La manipulaci\u00f3n del argumento nombre/apellido conduce a Cross-Site Scripting (XSS). El ataque puede iniciarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 7.0.34 puede solucionar este problema. El nombre del parche es 9a77f508a2bf8cf661d588f37a4cc29ecaea4fc8. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-217055."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4860.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4860.json
index c40fc01536c..0a0ac688e89 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4860.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4860.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4860",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-30T12:15:09.583",
- "lastModified": "2023-11-07T03:59:07.580",
+ "lastModified": "2024-02-29T01:36:48.187",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in KBase Metrics. It has been classified as critical. This affects the function upload_user_data of the file source/daily_cron_jobs/methods_upload_user_stats.py. The manipulation leads to sql injection. The patch is named 959dfb6b05991e30b0fa972a1ecdcaae8e1dae6d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217059."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en KBase Metrics. Ha sido clasificada como cr\u00edtica. Esto afecta la funci\u00f3n upload_user_data del archivo source/daily_cron_jobs/methods_upload_user_stats.py. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El nombre del parche es 959dfb6b05991e30b0fa972a1ecdcaae8e1dae6d. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-217059."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4869.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4869.json
index b8a5b02b4a7..d0d54681e81 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4869.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4869.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4869",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T09:15:08.753",
- "lastModified": "2023-11-07T03:59:08.413",
+ "lastModified": "2024-02-29T01:36:48.360",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4871.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4871.json
index 14e74366572..d1c8724ad81 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4871.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4871.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4871",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-03T12:15:10.660",
- "lastModified": "2023-11-07T03:59:08.693",
+ "lastModified": "2024-02-29T01:36:48.460",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4875.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4875.json
index 969a633c5e5..2baacd6ec51 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4875.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4875.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4875",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T22:15:09.093",
- "lastModified": "2023-11-07T03:59:09.730",
+ "lastModified": "2024-02-29T01:36:48.567",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4876.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4876.json
index ca09e41e07b..d0a6daa7e15 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4876.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4876.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4876",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-04T23:15:20.037",
- "lastModified": "2023-11-07T03:59:10.110",
+ "lastModified": "2024-02-29T01:36:48.650",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4877.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4877.json
index decb5e4d426..1fc6147fadc 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4877.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4877.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4877",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-05T10:15:10.073",
- "lastModified": "2023-11-07T03:59:10.480",
+ "lastModified": "2024-02-29T01:36:48.737",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4878.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4878.json
index 910a5fe323e..4413fe5eecf 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4878.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4878.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4878",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T10:15:10.507",
- "lastModified": "2023-11-07T03:59:10.883",
+ "lastModified": "2024-02-29T01:36:48.823",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in JATOS. Affected is the function ZipUtil of the file modules/common/app/utils/common/ZipUtil.java of the component ZIP Handler. The manipulation leads to path traversal. Upgrading to version 3.7.5-alpha is able to address this issue. The name of the patch is 2b42519f309d8164e8811392770ce604cdabb5da. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-217548."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en JATOS y clasificada como cr\u00edtica. La funci\u00f3n ZipUtil del archivo module/common/app/utils/common/ZipUtil.java del componente ZIP Handler es afectada por la vulnerabilidad. La manipulaci\u00f3n conduce a path traversal. La actualizaci\u00f3n a la versi\u00f3n 3.7.5-alpha puede solucionar este problema. El nombre del parche es 2b42519f309d8164e8811392770ce604cdabb5da. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-217548."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4879.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4879.json
index d5ba7efc195..1291d8e549b 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4879.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4879.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4879",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-06T11:15:09.557",
- "lastModified": "2023-11-07T03:59:11.250",
+ "lastModified": "2024-02-29T01:36:48.930",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Forged Alliance Forever up to 3746. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Vote Handler. The manipulation leads to improper authorization. Upgrading to version 3747 is able to address this issue. The patch is named 6880971bd3d73d942384aff62d53058c206ce644. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217555."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en Forged Alliance Forever hasta 3746. Ha sido declarada cr\u00edtica. Una funci\u00f3n desconocida del componente Vote Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una autorizaci\u00f3n inadecuada. La actualizaci\u00f3n a la versi\u00f3n 3747 puede solucionar este problema. El parche se llama 6880971bd3d73d942384aff62d53058c206ce644. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-217555."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4880.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4880.json
index c1cf5267674..ac7c8d01eba 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4880.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4880.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4880",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T13:15:09.700",
- "lastModified": "2023-11-07T03:59:11.610",
+ "lastModified": "2024-02-29T01:36:49.017",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4881.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4881.json
index 8091990bfe5..0bf88be9113 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4881.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4881.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4881",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-08T13:15:10.047",
- "lastModified": "2023-11-07T03:59:11.970",
+ "lastModified": "2024-02-29T01:36:49.103",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4882.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4882.json
index e3dd5e20eb0..680fb545875 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4882.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4882.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4882",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T09:15:10.140",
- "lastModified": "2023-11-07T03:59:12.457",
+ "lastModified": "2024-02-29T01:36:49.190",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4885.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4885.json
index 5149ed3cd90..2712b32966e 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4885.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4885.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4885",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-11T18:15:09.227",
- "lastModified": "2023-11-07T03:59:13.170",
+ "lastModified": "2024-02-29T01:36:49.297",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4889.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4889.json
index 0f58ce3659a..ef6ec3824bf 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4889.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4889.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4889",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T08:15:08.210",
- "lastModified": "2023-11-07T03:59:13.770",
+ "lastModified": "2024-02-29T01:36:49.420",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in visegripped Stracker. Affected by this vulnerability is the function getHistory of the file doc_root/public_html/stracker/api.php. The manipulation of the argument symbol/startDate/endDate leads to sql injection. The identifier of the patch is 63e1b040373ee5b6c7d1e165ecf5ae1603d29e0a. It is recommended to apply a patch to fix this issue. The identifier VDB-218377 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en visegripped Stracker y clasificada como cr\u00edtica. La funci\u00f3n getHistory del archivo doc_root/public_html/stracker/api.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento symbol/startDate/endDate conduce a la inyecci\u00f3n de SQL. El identificador del parche es 63e1b040373ee5b6c7d1e165ecf5ae1603d29e0a. Se recomienda aplicar un parche para solucionar este problema. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-218377."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4890.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4890.json
index 142af171623..934a8c9ef17 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4890.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4890.json
@@ -2,12 +2,16 @@
"id": "CVE-2022-4890",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T13:15:10.137",
- "lastModified": "2023-11-07T03:59:14.143",
+ "lastModified": "2024-02-29T01:36:49.533",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in abhilash1985 PredictApp. This issue affects some unknown processing of the file config/initializers/new_framework_defaults_7_0.rb of the component Cookie Handler. The manipulation leads to deserialization. The attack may be initiated remotely. The patch is named b067372f3ee26fe1b657121f0f41883ff4461a06. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-218387."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en abhilash1985 PredictApp y clasificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo config/initializers/new_framework_defaults_7_0.rb del componente Cookie Handler. La manipulaci\u00f3n conduce a la deserializaci\u00f3n. El ataque puede iniciarse de forma remota. El parche se llama b067372f3ee26fe1b657121f0f41883ff4461a06. Se recomienda aplicar un parche para solucionar este problema. El identificador asociado de esta vulnerabilidad es VDB-218387."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4891.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4891.json
index 5f29f17c595..64d34b56b3c 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4891.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4891.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4891",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T20:15:11.757",
- "lastModified": "2023-11-07T03:59:14.510",
+ "lastModified": "2024-02-29T01:36:49.623",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-48xx/CVE-2022-4892.json b/CVE-2022/CVE-2022-48xx/CVE-2022-4892.json
index a66689d491f..fc39804a398 100644
--- a/CVE-2022/CVE-2022-48xx/CVE-2022-4892.json
+++ b/CVE-2022/CVE-2022-48xx/CVE-2022-4892.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4892",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-19T08:15:13.163",
- "lastModified": "2023-11-07T03:59:14.847",
+ "lastModified": "2024-02-29T01:36:49.717",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4902.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4902.json
index bb717ad22a9..077287f78b6 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4902.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4902.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4902",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T19:15:10.090",
- "lastModified": "2023-11-07T03:59:16.780",
+ "lastModified": "2024-02-29T01:36:49.910",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4903.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4903.json
index fcb6d8aca73..32c484cd0f0 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4903.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4903.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-4903",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-10T15:15:11.717",
- "lastModified": "2024-01-12T22:17:50.847",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:36:50.020",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4905.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4905.json
index 88351c674e5..e2ff10f3c4a 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4905.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4905.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4905",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-13T21:15:13.710",
- "lastModified": "2023-11-07T03:59:18.213",
+ "lastModified": "2024-02-29T01:36:50.147",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4927.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4927.json
index e6f92ce9741..168482ccec7 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4927.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4927.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4927",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T20:15:08.873",
- "lastModified": "2023-11-07T03:59:18.877",
+ "lastModified": "2024-02-29T01:36:50.380",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4928.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4928.json
index 267ba8e2c44..67585f78371 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4928.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4928.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4928",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T01:15:09.993",
- "lastModified": "2023-11-07T03:59:19.107",
+ "lastModified": "2024-02-29T01:36:50.467",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4929.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4929.json
index 750197f7af9..718715e249d 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4929.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4929.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4929",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T03:15:08.440",
- "lastModified": "2023-11-07T03:59:19.473",
+ "lastModified": "2024-02-29T01:36:50.550",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4930.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4930.json
index 50a839eaa97..6adf7f5acc1 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4930.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4930.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4930",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T16:15:09.593",
- "lastModified": "2023-11-07T03:59:19.913",
+ "lastModified": "2024-02-29T01:36:50.637",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4933.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4933.json
index 8d03fbb811e..d5d91cd6e6b 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4933.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4933.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4933",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-20T05:15:12.050",
- "lastModified": "2023-11-07T03:59:20.753",
+ "lastModified": "2024-02-29T01:36:50.783",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4942.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4942.json
index 34f7912ea7a..d99c60cc608 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4942.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4942.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-4942",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-20T06:15:07.440",
- "lastModified": "2023-11-15T02:50:38.827",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:36:50.950",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4944.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4944.json
index 5ff8a7f0d5a..5e77e017d27 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4944.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4944.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4944",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-22T18:15:07.133",
- "lastModified": "2023-11-07T03:59:23.570",
+ "lastModified": "2024-02-29T01:36:51.053",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4952.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4952.json
index b99ae59aa3f..509390f1f69 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4952.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4952.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4952",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-17T02:15:09.273",
- "lastModified": "2023-11-07T03:59:25.127",
+ "lastModified": "2024-02-29T01:36:51.210",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4956.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4956.json
index 785f808040b..d9f6a180321 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4956.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4956.json
@@ -2,7 +2,7 @@
"id": "CVE-2022-4956",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T17:15:39.323",
- "lastModified": "2023-11-07T03:59:26.003",
+ "lastModified": "2024-02-29T01:36:51.320",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4957.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4957.json
index 94a9c7fed6e..310a0ee8133 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4957.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4957.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-4957",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-03T19:15:07.950",
- "lastModified": "2023-12-07T02:16:35.563",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:36:51.430",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4958.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4958.json
index f7fa25951a3..a46404d659a 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4958.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4958.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-4958",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-11T12:15:42.767",
- "lastModified": "2024-01-17T22:42:23.587",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:36:51.530",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4959.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4959.json
index a60b55079ca..d81fe63e0a2 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4959.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4959.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-4959",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-11T21:15:09.617",
- "lastModified": "2024-01-18T19:20:46.300",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:36:51.633",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4960.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4960.json
index 1bd93689c59..5fbcae5529e 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4960.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4960.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-4960",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-12T03:15:08.683",
- "lastModified": "2024-01-19T18:54:02.883",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:36:51.727",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4961.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4961.json
index 39f7451f1c9..7d8a14375ef 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4961.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4961.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-4961",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-12T05:15:09.263",
- "lastModified": "2024-01-18T20:31:59.560",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:36:51.813",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4962.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4962.json
index a5397764fcd..ae971d6bfab 100644
--- a/CVE-2022/CVE-2022-49xx/CVE-2022-4962.json
+++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4962.json
@@ -2,8 +2,8 @@
"id": "CVE-2022-4962",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-01-12T22:15:44.877",
- "lastModified": "2024-01-22T16:32:21.483",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:36:51.900",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0029.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0029.json
index 56cb48dd638..2be043ecf72 100644
--- a/CVE-2023/CVE-2023-00xx/CVE-2023-0029.json
+++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0029.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0029",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-01T14:15:09.963",
- "lastModified": "2023-11-07T03:59:28.330",
+ "lastModified": "2024-02-29T01:36:52.373",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0113.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0113.json
index 9b65ed8d1bf..fe554bab420 100644
--- a/CVE-2023/CVE-2023-01xx/CVE-2023-0113.json
+++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0113.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-0113",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T09:15:21.820",
- "lastModified": "2023-11-07T03:59:40.433",
+ "lastModified": "2024-02-29T01:36:53.253",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Netis Netcore Router up to 2.2.6. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file param.file.tgz of the component Backup Handler. The manipulation leads to information disclosure. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-217591."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Netis Netcore Router hasta 2.2.6. Ha sido declarada problem\u00e1tica. Una funci\u00f3n desconocida del archivo param.file.tgz del componente Backup Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a la divulgaci\u00f3n de informaci\u00f3n. El ataque se puede lanzar de forma remota. El identificador asociado de esta vulnerabilidad es VDB-217591."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0114.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0114.json
index 69b6a5e0f4a..657702064fd 100644
--- a/CVE-2023/CVE-2023-01xx/CVE-2023-0114.json
+++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0114.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-0114",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-07T09:15:21.900",
- "lastModified": "2023-11-07T03:59:40.647",
+ "lastModified": "2024-02-29T01:36:53.340",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Netis Netcore Router. It has been rated as problematic. Affected by this issue is some unknown functionality of the file param.file.tgz of the component Backup Handler. The manipulation leads to cleartext storage in a file or on disk. Local access is required to approach this attack. The identifier of this vulnerability is VDB-217592."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en Netis Netcore Router. Ha sido calificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo param.file.tgz del componente Backup Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce al almacenamiento de texto plano en un archivo o en un disco. Se requiere acceso local para abordar este ataque. El identificador de esta vulnerabilidad es VDB-217592."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0125.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0125.json
index c0f4288032c..4346b5f15ed 100644
--- a/CVE-2023/CVE-2023-01xx/CVE-2023-0125.json
+++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0125.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0125",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T21:15:11.070",
- "lastModified": "2024-02-13T08:15:40.783",
+ "lastModified": "2024-02-29T01:36:53.527",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0243.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0243.json
index 5c3cae6d7bc..2a306a53584 100644
--- a/CVE-2023/CVE-2023-02xx/CVE-2023-0243.json
+++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0243.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0243",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-12T15:15:10.430",
- "lastModified": "2023-11-07T03:59:55.810",
+ "lastModified": "2024-02-29T01:36:54.540",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0244.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0244.json
index 396705aa8e9..114162ca244 100644
--- a/CVE-2023/CVE-2023-02xx/CVE-2023-0244.json
+++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0244.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0244",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-12T15:15:10.517",
- "lastModified": "2023-11-07T03:59:56.267",
+ "lastModified": "2024-02-29T01:36:54.617",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0245.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0245.json
index 38813f2fa4f..10c55969b58 100644
--- a/CVE-2023/CVE-2023-02xx/CVE-2023-0245.json
+++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0245.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0245",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-12T15:15:10.597",
- "lastModified": "2023-11-07T03:59:56.720",
+ "lastModified": "2024-02-29T01:36:54.703",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0246.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0246.json
index 860bc6c2481..88e6fb2d6a5 100644
--- a/CVE-2023/CVE-2023-02xx/CVE-2023-0246.json
+++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0246.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0246",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-12T15:15:10.680",
- "lastModified": "2023-11-07T03:59:57.080",
+ "lastModified": "2024-02-29T01:36:54.780",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0256.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0256.json
index 609a0a77b8c..1f0a46b5e8f 100644
--- a/CVE-2023/CVE-2023-02xx/CVE-2023-0256.json
+++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0256.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0256",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-12T22:15:09.670",
- "lastModified": "2023-11-07T03:59:59.233",
+ "lastModified": "2024-02-29T01:36:54.963",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0257.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0257.json
index 5df2a3f9e6f..652eb34b6c6 100644
--- a/CVE-2023/CVE-2023-02xx/CVE-2023-0257.json
+++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0257.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0257",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-12T22:15:09.757",
- "lastModified": "2023-11-07T03:59:59.593",
+ "lastModified": "2024-02-29T01:36:55.043",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0258.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0258.json
index e4ccf08f5f8..5b319b86610 100644
--- a/CVE-2023/CVE-2023-02xx/CVE-2023-0258.json
+++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0258.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0258",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-12T22:15:09.837",
- "lastModified": "2023-11-07T03:59:59.940",
+ "lastModified": "2024-02-29T01:36:55.120",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0281.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0281.json
index 4b990388f18..7639eeb7d3c 100644
--- a/CVE-2023/CVE-2023-02xx/CVE-2023-0281.json
+++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0281.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0281",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T10:15:09.133",
- "lastModified": "2023-11-07T04:00:04.813",
+ "lastModified": "2024-02-29T01:36:55.400",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0283.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0283.json
index 8702f8e9b56..67fdb64dfe6 100644
--- a/CVE-2023/CVE-2023-02xx/CVE-2023-0283.json
+++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0283.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0283",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T10:15:09.707",
- "lastModified": "2023-11-07T04:00:05.400",
+ "lastModified": "2024-02-29T01:36:55.497",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0287.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0287.json
index 94c972a9eae..46b1b667ce6 100644
--- a/CVE-2023/CVE-2023-02xx/CVE-2023-0287.json
+++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0287.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0287",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-13T13:15:08.680",
- "lastModified": "2023-11-07T04:00:06.160",
+ "lastModified": "2024-02-29T01:36:55.603",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0303.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0303.json
index b5807facf0e..24d1b9aad9b 100644
--- a/CVE-2023/CVE-2023-03xx/CVE-2023-0303.json
+++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0303.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-0303",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T12:15:09.270",
- "lastModified": "2023-11-07T04:00:08.990",
+ "lastModified": "2024-02-29T01:36:55.827",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Online Food Ordering System. It has been rated as critical. Affected by this issue is some unknown functionality of the file view_prod.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-218384."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Online Food Ordering System. Ha sido declarada como cr\u00edtica. Una funci\u00f3n desconocida del archivo view_prod.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-218384."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0304.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0304.json
index 0fe36c008f9..95a44096070 100644
--- a/CVE-2023/CVE-2023-03xx/CVE-2023-0304.json
+++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0304.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-0304",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T12:15:09.357",
- "lastModified": "2023-11-07T04:00:09.477",
+ "lastModified": "2024-02-29T01:36:55.920",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester Online Food Ordering System. This affects an unknown part of the file admin_class.php of the component Signup Module. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-218385 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad ha sido encontrada en SourceCodester Online Food Ordering System y clasificada como cr\u00edtica. Una parte desconocida del archivo admin_class.php del componente Signup Module afecta a una parte desconocida. La manipulaci\u00f3n del argumento email conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota.La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-218385."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0305.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0305.json
index 1e683e4f967..a7a6f7be0fd 100644
--- a/CVE-2023/CVE-2023-03xx/CVE-2023-0305.json
+++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0305.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-0305",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-15T12:15:09.440",
- "lastModified": "2023-11-07T04:00:09.837",
+ "lastModified": "2024-02-29T01:36:55.997",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in SourceCodester Online Food Ordering System. This vulnerability affects unknown code of the file admin_class.php of the component Login Module. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-218386 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en SourceCodester Online Food Ordering System y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo admin_class.php del componente Login Module. La manipulaci\u00f3n del argumento nombre de usuario conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. VDB-218386 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0324.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0324.json
index 5503694efa8..0bb102c6502 100644
--- a/CVE-2023/CVE-2023-03xx/CVE-2023-0324.json
+++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0324.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0324",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T15:15:10.473",
- "lastModified": "2024-02-13T08:15:41.180",
+ "lastModified": "2024-02-29T01:36:56.253",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0327.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0327.json
index 1b7230f3ed0..6fb5bb9e0c3 100644
--- a/CVE-2023/CVE-2023-03xx/CVE-2023-0327.json
+++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0327.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0327",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-16T19:15:10.433",
- "lastModified": "2023-11-07T04:00:11.270",
+ "lastModified": "2024-02-29T01:36:56.353",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0332.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0332.json
index d47608ddd7e..086234bdf7f 100644
--- a/CVE-2023/CVE-2023-03xx/CVE-2023-0332.json
+++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0332.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0332",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-17T08:15:10.513",
- "lastModified": "2023-11-07T04:00:12.213",
+ "lastModified": "2024-02-29T01:36:56.477",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0513.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0513.json
index 5658c475505..d82dfc3fc82 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0513.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0513.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0513",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-26T21:18:10.560",
- "lastModified": "2023-11-07T04:00:36.767",
+ "lastModified": "2024-02-29T01:36:58.007",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0515.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0515.json
index 2274f7b5d78..b806343ec32 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0515.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0515.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0515",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-26T21:18:10.727",
- "lastModified": "2024-02-13T08:15:41.447",
+ "lastModified": "2024-02-29T01:36:58.117",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0516.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0516.json
index 7024eca3475..d0867a8de77 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0516.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0516.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0516",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-26T21:18:10.863",
- "lastModified": "2024-02-13T08:15:41.677",
+ "lastModified": "2024-02-29T01:36:58.203",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0527.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0527.json
index 3eeddc8f9b4..0fd080de05e 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0527.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0527.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-0527",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-27T11:15:12.240",
- "lastModified": "2023-11-15T03:09:54.733",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:36:58.357",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Online Security Guards Hiring System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file search-request.php. The manipulation of the argument searchdata with the input \"> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219596."
+ },
+ {
+ "lang": "es",
+ "value": "Una vulnerabilidad fue encontrada en PHPGurukul Online Security Guards Hiring System 1.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo search-request.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento searchdata con la entrada \"> conduce a cross site scripting. El ataque puede lanzarse de forma remota. La explotaci\u00f3n se ha divulgado al p\u00fablico y puede usarse. El identificador de esta vulnerabilidad es VDB-219596."
}
],
"metrics": {
@@ -82,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0528.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0528.json
index c21ade00b66..5a4bd4423c2 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0528.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0528.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0528",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-27T11:15:12.820",
- "lastModified": "2024-02-13T08:15:41.900",
+ "lastModified": "2024-02-29T01:36:58.450",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0529.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0529.json
index 93767a31e93..dd605e9f234 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0529.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0529.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0529",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-27T11:15:13.170",
- "lastModified": "2024-02-13T08:15:42.147",
+ "lastModified": "2024-02-29T01:36:58.530",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0530.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0530.json
index 7db038514bc..1935d603987 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0530.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0530.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0530",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-27T11:15:13.390",
- "lastModified": "2024-02-13T08:15:42.377",
+ "lastModified": "2024-02-29T01:36:58.620",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0531.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0531.json
index 8bae24769a0..e1d801108fa 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0531.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0531.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0531",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-27T11:15:13.627",
- "lastModified": "2024-02-13T08:15:42.590",
+ "lastModified": "2024-02-29T01:36:58.700",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0532.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0532.json
index c762c0db4b5..3572fd75def 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0532.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0532.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0532",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-27T11:15:13.763",
- "lastModified": "2024-02-13T08:15:42.797",
+ "lastModified": "2024-02-29T01:36:58.783",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0533.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0533.json
index 785efa16bf1..3173a31a67d 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0533.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0533.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0533",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-27T11:15:13.890",
- "lastModified": "2024-02-13T08:15:43.010",
+ "lastModified": "2024-02-29T01:36:58.867",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0534.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0534.json
index d9b90a7ce74..9b941e100f2 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0534.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0534.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0534",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-27T11:15:14.070",
- "lastModified": "2024-02-13T08:15:43.217",
+ "lastModified": "2024-02-29T01:36:58.947",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0549.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0549.json
index ef6a2d50ec6..4f298ed7b2a 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0549.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0549.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0549",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-27T19:15:10.457",
- "lastModified": "2023-11-15T03:34:32.970",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:36:59.127",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0560.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0560.json
index 8ba4c92516b..2ce61b07b00 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0560.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0560.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0560",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-28T17:15:09.003",
- "lastModified": "2024-02-13T08:15:43.430",
+ "lastModified": "2024-02-29T01:36:59.307",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0561.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0561.json
index 4f292bc48f4..0a53c123663 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0561.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0561.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0561",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-28T17:15:09.147",
- "lastModified": "2024-02-13T08:15:43.657",
+ "lastModified": "2024-02-29T01:36:59.397",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0562.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0562.json
index 2ad3953616e..b6feccf6c56 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0562.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0562.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0562",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-28T23:15:08.810",
- "lastModified": "2023-12-28T14:42:15.407",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:36:59.480",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0563.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0563.json
index 957cf922c6a..f1fb0345980 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0563.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0563.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0563",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-28T23:15:08.897",
- "lastModified": "2023-12-28T14:43:54.757",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:36:59.570",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0570.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0570.json
index 62936582f18..002209df916 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0570.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0570.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0570",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-29T18:15:09.000",
- "lastModified": "2024-02-13T08:15:43.880",
+ "lastModified": "2024-02-29T01:36:59.710",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0571.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0571.json
index 9cb0ca5028a..5ae0cb37eb1 100644
--- a/CVE-2023/CVE-2023-05xx/CVE-2023-0571.json
+++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0571.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0571",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-29T18:15:09.097",
- "lastModified": "2023-11-07T04:00:51.130",
+ "lastModified": "2024-02-29T01:36:59.790",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0611.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0611.json
index 1a0240ad318..a7f6bdcc477 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0611.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0611.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0611",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-01T14:15:09.140",
- "lastModified": "2023-11-07T04:00:59.120",
+ "lastModified": "2024-02-29T01:37:00.193",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0612.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0612.json
index d3c1eaa1667..18bc1dc344b 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0612.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0612.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0612",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-01T14:15:09.227",
- "lastModified": "2023-11-07T04:00:59.560",
+ "lastModified": "2024-02-29T01:37:00.310",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0613.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0613.json
index 210ba0aee6a..bca7e4351d2 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0613.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0613.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0613",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-01T14:15:09.303",
- "lastModified": "2023-11-07T04:01:00.040",
+ "lastModified": "2024-02-29T01:37:00.400",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0617.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0617.json
index 319da031050..3181b461ae1 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0617.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0617.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0617",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-01T17:15:09.993",
- "lastModified": "2023-11-07T04:01:00.953",
+ "lastModified": "2024-02-29T01:37:00.517",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0618.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0618.json
index ee26cb6146a..b6de7326283 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0618.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0618.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0618",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-01T17:15:10.087",
- "lastModified": "2023-11-07T04:01:01.293",
+ "lastModified": "2024-02-29T01:37:00.593",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0637.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0637.json
index d188eaf4a2c..a98bf41c95c 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0637.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0637.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0637",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-02T09:15:08.593",
- "lastModified": "2023-11-07T04:01:03.447",
+ "lastModified": "2024-02-29T01:37:00.847",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0638.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0638.json
index e07d32b2f68..b7eb7502262 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0638.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0638.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0638",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-02T09:15:08.693",
- "lastModified": "2023-11-07T04:01:03.793",
+ "lastModified": "2024-02-29T01:37:00.937",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0639.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0639.json
index e004c2272c6..e228ef46956 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0639.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0639.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0639",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-02T09:15:08.787",
- "lastModified": "2023-11-07T04:01:04.133",
+ "lastModified": "2024-02-29T01:37:01.020",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0640.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0640.json
index 8998be1b2e2..73bfc9ff280 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0640.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0640.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0640",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-02T09:15:08.877",
- "lastModified": "2023-11-07T04:01:04.487",
+ "lastModified": "2024-02-29T01:37:01.107",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0641.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0641.json
index acb6fb3a28f..38cf7c07718 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0641.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0641.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0641",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-02T09:15:08.953",
- "lastModified": "2023-11-07T04:01:04.837",
+ "lastModified": "2024-02-29T01:37:01.187",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.2
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0646.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0646.json
index 2de55bfffcb..cbe286dfc6d 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0646.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0646.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0646",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-02T15:17:39.647",
- "lastModified": "2023-11-07T04:01:05.547",
+ "lastModified": "2024-02-29T01:37:01.323",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0647.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0647.json
index 42aa18c828a..b833b3ec7de 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0647.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0647.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0647",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-02T15:17:40.627",
- "lastModified": "2023-11-07T04:01:05.840",
+ "lastModified": "2024-02-29T01:37:01.407",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0648.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0648.json
index 0c4f8312156..b795295e01c 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0648.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0648.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0648",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-02T15:17:41.260",
- "lastModified": "2023-11-07T04:01:06.207",
+ "lastModified": "2024-02-29T01:37:01.493",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0649.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0649.json
index ca620e8cbad..cb352185805 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0649.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0649.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0649",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-02T15:17:41.900",
- "lastModified": "2023-11-07T04:01:06.567",
+ "lastModified": "2024-02-29T01:37:01.570",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0650.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0650.json
index f605b6f5492..abbd7ad8642 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0650.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0650.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0650",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-02T15:17:42.503",
- "lastModified": "2023-11-15T03:15:27.290",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:01.657",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0651.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0651.json
index 5b66dd13d87..f46ce20f62c 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0651.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0651.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0651",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-02T16:19:35.040",
- "lastModified": "2024-02-13T08:15:44.080",
+ "lastModified": "2024-02-29T01:37:01.747",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0658.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0658.json
index 851fbed3d4a..f09ff2f63c0 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0658.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0658.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0658",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-03T00:15:12.297",
- "lastModified": "2023-11-07T04:01:08.013",
+ "lastModified": "2024-02-29T01:37:01.867",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0659.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0659.json
index e052b7554d7..2ace63ee6a7 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0659.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0659.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0659",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-03T18:15:16.060",
- "lastModified": "2023-11-07T04:01:08.340",
+ "lastModified": "2024-02-29T01:37:01.947",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0663.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0663.json
index 2a9750b51a1..fa3f6f22a24 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0663.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0663.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0663",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-03T21:15:10.993",
- "lastModified": "2023-11-07T04:01:09.087",
+ "lastModified": "2024-02-29T01:37:02.053",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0673.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0673.json
index cef6fe8284e..1dee6c9952b 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0673.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0673.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0673",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-04T08:15:08.147",
- "lastModified": "2023-11-07T04:01:10.227",
+ "lastModified": "2024-02-29T01:37:02.250",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0674.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0674.json
index b9d152269a6..c107ab6ef78 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0674.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0674.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0674",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-04T08:15:08.237",
- "lastModified": "2024-02-13T08:15:44.320",
+ "lastModified": "2024-02-29T01:37:02.380",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0675.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0675.json
index a18f9062bc6..16811b084cc 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0675.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0675.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0675",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-04T08:15:08.327",
- "lastModified": "2023-11-07T04:01:10.817",
+ "lastModified": "2024-02-29T01:37:02.473",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0679.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0679.json
index d898f9f3cd0..ee65f7addbf 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0679.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0679.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0679",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T13:15:09.377",
- "lastModified": "2024-02-13T08:15:44.543",
+ "lastModified": "2024-02-29T01:37:02.627",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0686.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0686.json
index 12af4ff5c32..9acb3e1c0bb 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0686.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0686.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-0686",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T20:15:14.367",
- "lastModified": "2024-02-06T20:22:59.393",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:02.763",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been classified as critical. This affects the function update_cart of the file /oews/classes/Master.php?f=update_cart of the component HTTP POST Request Handler. The manipulation of the argument cart_id leads to sql injection. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The identifier VDB-220245 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Online Eyewear Shop 1.0. Ha sido clasificada como cr\u00edtica. Esto afecta a la funci\u00f3n update_cart del archivo /oews/classes/Master.php?f=update_cart del componente HTTP POST Request Handler. La manipulaci\u00f3n del argumento cart_id conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-220245."
}
],
"metrics": {
@@ -82,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0687.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0687.json
index 5fa7fcf3d4c..76ec90cac5f 100644
--- a/CVE-2023/CVE-2023-06xx/CVE-2023-0687.json
+++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0687.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0687",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-06T19:15:10.260",
- "lastModified": "2024-02-14T18:47:42.920",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:02.857",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0706.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0706.json
index a1449615b53..e18ebb48e53 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0706.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0706.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0706",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-07T10:15:52.610",
- "lastModified": "2023-11-07T04:01:16.200",
+ "lastModified": "2024-02-29T01:37:03.117",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0707.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0707.json
index d22a9f90a13..bb59458003b 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0707.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0707.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0707",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-07T13:15:10.053",
- "lastModified": "2023-11-07T04:01:16.413",
+ "lastModified": "2024-02-29T01:37:03.197",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0732.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0732.json
index dd291c36be5..88ae2865a09 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0732.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0732.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0732",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-07T20:15:08.910",
- "lastModified": "2023-11-07T04:01:22.017",
+ "lastModified": "2024-02-29T01:37:03.507",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0758.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0758.json
index 6badd6e5a91..5826d027507 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0758.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0758.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0758",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-09T11:15:10.217",
- "lastModified": "2024-02-13T08:15:44.770",
+ "lastModified": "2024-02-29T01:37:03.800",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0774.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0774.json
index b2efa1e0481..8812e5dda0e 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0774.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0774.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0774",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-10T12:15:11.630",
- "lastModified": "2023-11-07T04:01:26.307",
+ "lastModified": "2024-02-29T01:37:04.003",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0781.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0781.json
index 3af6eb21a5c..3a6ffc88449 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0781.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0781.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0781",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-11T13:15:19.230",
- "lastModified": "2024-02-13T08:15:44.987",
+ "lastModified": "2024-02-29T01:37:04.143",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0782.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0782.json
index 4a7bc884cd8..86a6d8ebf3e 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0782.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0782.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0782",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-11T18:15:11.393",
- "lastModified": "2023-11-07T04:01:27.273",
+ "lastModified": "2024-02-29T01:37:04.227",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0783.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0783.json
index 661241c985a..a0951eb8c24 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0783.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0783.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0783",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-11T18:15:11.480",
- "lastModified": "2023-11-07T04:01:27.843",
+ "lastModified": "2024-02-29T01:37:04.307",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0784.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0784.json
index 78ce3a81693..840355dd722 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0784.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0784.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0784",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-12T08:15:10.200",
- "lastModified": "2023-11-07T04:01:28.280",
+ "lastModified": "2024-02-29T01:37:04.403",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0785.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0785.json
index 7859053c2c1..71ef2fed3b6 100644
--- a/CVE-2023/CVE-2023-07xx/CVE-2023-0785.json
+++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0785.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0785",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-12T08:15:10.310",
- "lastModified": "2024-02-15T19:54:14.340",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:04.490",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0808.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0808.json
index 720e5042dcc..4686679afe7 100644
--- a/CVE-2023/CVE-2023-08xx/CVE-2023-0808.json
+++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0808.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0808",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-13T12:15:11.467",
- "lastModified": "2023-11-07T04:01:29.693",
+ "lastModified": "2024-02-29T01:37:04.780",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0830.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0830.json
index 3342a2acdb1..a66afba974b 100644
--- a/CVE-2023/CVE-2023-08xx/CVE-2023-0830.json
+++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0830.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0830",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-14T17:15:11.133",
- "lastModified": "2023-11-07T04:01:32.437",
+ "lastModified": "2024-02-29T01:37:05.050",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0840.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0840.json
index abef28dbe30..80fb45d5d4e 100644
--- a/CVE-2023/CVE-2023-08xx/CVE-2023-0840.json
+++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0840.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0840",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-15T14:15:13.180",
- "lastModified": "2023-11-07T04:01:34.083",
+ "lastModified": "2024-02-29T01:37:05.223",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0841.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0841.json
index 7b535c70850..803ae0d638a 100644
--- a/CVE-2023/CVE-2023-08xx/CVE-2023-0841.json
+++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0841.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0841",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-15T14:15:13.283",
- "lastModified": "2023-11-07T04:01:34.370",
+ "lastModified": "2024-02-29T01:37:05.303",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0848.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0848.json
index 3e5f747af1e..67e23ae86b2 100644
--- a/CVE-2023/CVE-2023-08xx/CVE-2023-0848.json
+++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0848.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0848",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-15T22:15:12.127",
- "lastModified": "2023-11-07T04:01:35.353",
+ "lastModified": "2024-02-29T01:37:05.460",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0849.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0849.json
index d27d51940bb..e11cb9b444a 100644
--- a/CVE-2023/CVE-2023-08xx/CVE-2023-0849.json
+++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0849.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0849",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-15T22:15:12.233",
- "lastModified": "2023-11-07T04:01:35.713",
+ "lastModified": "2024-02-29T01:37:05.570",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0850.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0850.json
index 2b00ed60260..f07f561e2d4 100644
--- a/CVE-2023/CVE-2023-08xx/CVE-2023-0850.json
+++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0850.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0850",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-15T22:15:12.323",
- "lastModified": "2023-11-07T04:01:36.133",
+ "lastModified": "2024-02-29T01:37:05.653",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0883.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0883.json
index 96c926444b1..b09ae9edbfb 100644
--- a/CVE-2023/CVE-2023-08xx/CVE-2023-0883.json
+++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0883.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0883",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-17T09:15:14.743",
- "lastModified": "2023-11-07T04:01:46.610",
+ "lastModified": "2024-02-29T01:37:06.050",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0887.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0887.json
index c9dd6c8a389..d1116f2eb59 100644
--- a/CVE-2023/CVE-2023-08xx/CVE-2023-0887.json
+++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0887.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0887",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-17T09:15:15.007",
- "lastModified": "2023-11-07T04:01:47.223",
+ "lastModified": "2024-02-29T01:37:06.167",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0902.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0902.json
index a98089860b0..fd37f7268e4 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0902.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0902.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0902",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-18T08:15:42.013",
- "lastModified": "2023-11-07T04:01:50.003",
+ "lastModified": "2024-02-29T01:37:06.367",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0903.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0903.json
index 784a94e0d0a..9d741759ec2 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0903.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0903.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0903",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-18T08:15:42.240",
- "lastModified": "2023-11-07T04:01:50.310",
+ "lastModified": "2024-02-29T01:37:06.457",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0904.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0904.json
index 90a53fa845e..8f33616d935 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0904.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0904.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0904",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-18T08:15:42.330",
- "lastModified": "2023-11-07T04:01:50.693",
+ "lastModified": "2024-02-29T01:37:06.540",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0905.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0905.json
index e48956f6d85..35784ac1262 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0905.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0905.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0905",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-18T08:15:42.407",
- "lastModified": "2023-11-07T04:01:51.043",
+ "lastModified": "2024-02-29T01:37:06.630",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0906.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0906.json
index 31496a76f18..5aa53c54cc7 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0906.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0906.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0906",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-18T08:15:42.493",
- "lastModified": "2023-11-07T04:01:51.390",
+ "lastModified": "2024-02-29T01:37:06.710",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0907.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0907.json
index ca16678ebdf..8790165d14f 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0907.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0907.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0907",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-18T08:15:42.573",
- "lastModified": "2023-11-07T04:01:51.740",
+ "lastModified": "2024-02-29T01:37:06.790",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0908.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0908.json
index bf72734cf4e..c4d1f048ad3 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0908.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0908.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0908",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-18T08:15:42.657",
- "lastModified": "2023-11-07T04:01:52.100",
+ "lastModified": "2024-02-29T01:37:06.870",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0909.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0909.json
index 00d583cce6a..c8aabd2423e 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0909.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0909.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0909",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-18T09:15:10.727",
- "lastModified": "2023-11-07T04:01:52.470",
+ "lastModified": "2024-02-29T01:37:06.953",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0910.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0910.json
index da0f74c58dd..1721abe737d 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0910.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0910.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0910",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-18T09:15:10.823",
- "lastModified": "2023-11-07T04:01:52.830",
+ "lastModified": "2024-02-29T01:37:07.033",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0912.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0912.json
index c85a6481277..7b9d4298b45 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0912.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0912.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0912",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-18T20:15:11.813",
- "lastModified": "2023-11-07T04:01:53.430",
+ "lastModified": "2024-02-29T01:37:07.120",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0913.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0913.json
index 15fbe98d4ad..a148f4539eb 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0913.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0913.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0913",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-18T20:15:11.923",
- "lastModified": "2023-11-07T04:01:53.797",
+ "lastModified": "2024-02-29T01:37:07.197",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0915.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0915.json
index 10586998e61..db9c934a366 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0915.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0915.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0915",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-19T09:15:10.537",
- "lastModified": "2023-11-07T04:01:54.190",
+ "lastModified": "2024-02-29T01:37:07.287",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0916.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0916.json
index a5c8b0df5f1..64a0388ac94 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0916.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0916.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0916",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-19T09:15:11.073",
- "lastModified": "2023-11-07T04:01:54.510",
+ "lastModified": "2024-02-29T01:37:07.367",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0917.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0917.json
index ec6faa37ae3..766652d2f6c 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0917.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0917.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0917",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-19T09:15:11.197",
- "lastModified": "2023-11-07T04:01:54.870",
+ "lastModified": "2024-02-29T01:37:07.440",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0918.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0918.json
index f3790cf9be4..88857d44a75 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0918.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0918.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0918",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-19T09:15:11.307",
- "lastModified": "2023-11-07T04:01:55.240",
+ "lastModified": "2024-02-29T01:37:07.520",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0935.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0935.json
index 23f60335718..df6cbcbc4e5 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0935.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0935.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0935",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T10:15:11.030",
- "lastModified": "2023-11-07T04:01:57.057",
+ "lastModified": "2024-02-29T01:37:07.717",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0936.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0936.json
index ddc390eafe9..103aa0aeb22 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0936.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0936.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0936",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T10:15:11.517",
- "lastModified": "2023-11-07T04:01:57.273",
+ "lastModified": "2024-02-29T01:37:07.793",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0938.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0938.json
index 6a6b867fc23..c0e95ff1d07 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0938.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0938.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0938",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T10:15:11.603",
- "lastModified": "2023-11-07T04:01:58.130",
+ "lastModified": "2024-02-29T01:37:07.880",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0943.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0943.json
index 988f875361e..d0fe64c6782 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0943.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0943.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0943",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T20:15:12.653",
- "lastModified": "2023-11-07T04:01:59.147",
+ "lastModified": "2024-02-29T01:37:08.020",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0945.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0945.json
index f4015bd4478..e5127004aca 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0945.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0945.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0945",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T21:15:10.970",
- "lastModified": "2023-11-07T04:01:59.600",
+ "lastModified": "2024-02-29T01:37:08.107",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0946.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0946.json
index dc83a9565b1..33b4f115f8d 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0946.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0946.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0946",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-21T21:15:11.067",
- "lastModified": "2023-11-07T04:01:59.930",
+ "lastModified": "2024-02-29T01:37:08.193",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0960.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0960.json
index 3055dca6878..814eecaef68 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0960.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0960.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0960",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-22T18:15:10.907",
- "lastModified": "2023-11-07T04:02:01.630",
+ "lastModified": "2024-02-29T01:37:08.400",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0961.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0961.json
index 92bdd75ae3c..e795b318dca 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0961.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0961.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0961",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-22T19:15:11.200",
- "lastModified": "2023-11-07T04:02:02.007",
+ "lastModified": "2024-02-29T01:37:08.480",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0962.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0962.json
index 06ea858ca92..09bf41ee3c7 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0962.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0962.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0962",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-22T19:15:11.283",
- "lastModified": "2023-11-07T04:02:02.357",
+ "lastModified": "2024-02-29T01:37:08.563",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0963.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0963.json
index 8c814935e2b..ea6ebe5e306 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0963.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0963.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0963",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-22T19:15:11.367",
- "lastModified": "2023-11-07T04:02:02.720",
+ "lastModified": "2024-02-29T01:37:08.643",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0964.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0964.json
index cb33f24a79a..c8dfb9a11b5 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0964.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0964.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-0964",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-22T19:15:11.450",
- "lastModified": "2024-02-15T19:48:38.043",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:08.723",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0966.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0966.json
index 5c23917f8ca..1463aad4b71 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0966.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0966.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0966",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-22T20:15:12.490",
- "lastModified": "2023-11-07T04:02:03.623",
+ "lastModified": "2024-02-29T01:37:08.817",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0980.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0980.json
index bf23875b56c..1e11fa96ede 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0980.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0980.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0980",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-23T12:15:09.987",
- "lastModified": "2023-11-07T04:02:05.050",
+ "lastModified": "2024-02-29T01:37:09.023",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0981.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0981.json
index 12074421f50..7ac16312b25 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0981.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0981.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0981",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-23T12:15:10.087",
- "lastModified": "2023-11-07T04:02:05.397",
+ "lastModified": "2024-02-29T01:37:09.107",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0982.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0982.json
index eb15fc0c209..41530982f19 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0982.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0982.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0982",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-23T12:15:10.167",
- "lastModified": "2023-11-07T04:02:05.753",
+ "lastModified": "2024-02-29T01:37:09.193",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0986.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0986.json
index c732c7f02d9..dd99dd7471c 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0986.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0986.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0986",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-23T16:15:11.317",
- "lastModified": "2023-11-07T04:02:06.337",
+ "lastModified": "2024-02-29T01:37:09.293",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0987.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0987.json
index b03760579d4..15c0b178b78 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0987.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0987.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0987",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-23T16:15:11.427",
- "lastModified": "2023-11-07T04:02:06.773",
+ "lastModified": "2024-02-29T01:37:09.400",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0988.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0988.json
index 0ddd6af41ed..afe64fef482 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0988.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0988.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0988",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-23T16:15:11.530",
- "lastModified": "2023-11-07T04:02:07.123",
+ "lastModified": "2024-02-29T01:37:09.487",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0997.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0997.json
index 6738e4b8a6d..60d001440a0 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0997.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0997.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0997",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-24T08:15:10.790",
- "lastModified": "2023-11-07T04:02:08.260",
+ "lastModified": "2024-02-29T01:37:09.640",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0998.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0998.json
index 078b802f1b4..6ca021eecfb 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0998.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0998.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0998",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-24T08:15:11.037",
- "lastModified": "2023-11-07T04:02:08.620",
+ "lastModified": "2024-02-29T01:37:09.720",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0999.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0999.json
index 1c92ee6ac03..81119364a03 100644
--- a/CVE-2023/CVE-2023-09xx/CVE-2023-0999.json
+++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0999.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-0999",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-24T08:15:11.143",
- "lastModified": "2023-11-07T04:02:08.973",
+ "lastModified": "2024-02-29T01:37:09.800",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1002.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1002.json
index 09fd0fda89c..c5afdba1a82 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1002.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1002.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-24T08:15:11.243",
- "lastModified": "2023-11-07T04:02:09.340",
+ "lastModified": "2024-02-29T01:37:09.883",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1003.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1003.json
index 931407c575c..2df3cacc275 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1003.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1003.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-07T20:15:09.010",
- "lastModified": "2023-11-07T04:02:09.703",
+ "lastModified": "2024-02-29T01:37:09.973",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1004.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1004.json
index 455986089cd..b94b96e9d1f 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1004.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1004.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1004",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-24T08:15:11.337",
- "lastModified": "2023-11-07T04:02:10.110",
+ "lastModified": "2024-02-29T01:37:10.070",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1005.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1005.json
index dac2cad6ec3..39a3971c899 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1005.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1005.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1005",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-24T09:15:10.660",
- "lastModified": "2023-11-07T04:02:10.510",
+ "lastModified": "2024-02-29T01:37:10.163",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1006.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1006.json
index 12a77327bfc..375556dba08 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1006.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1006.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1006",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-24T09:15:10.757",
- "lastModified": "2023-11-07T04:02:10.847",
+ "lastModified": "2024-02-29T01:37:10.257",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.5
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1007.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1007.json
index 6523aacdd8a..f4c0a528c2a 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1007.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1007.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1007",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-24T11:15:10.813",
- "lastModified": "2023-11-07T04:02:11.203",
+ "lastModified": "2024-02-29T01:37:10.353",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1008.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1008.json
index f70b17f3fa0..806d1550156 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1008.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1008.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1008",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-24T11:15:10.910",
- "lastModified": "2023-11-07T04:02:11.547",
+ "lastModified": "2024-02-29T01:37:10.443",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1009.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1009.json
index 29d22ba991f..c91408e6984 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1009.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1009.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1009",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-24T11:15:10.997",
- "lastModified": "2023-11-22T21:15:07.590",
+ "lastModified": "2024-02-29T01:37:10.530",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1010.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1010.json
index 932d513853a..78859e48dfe 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1010.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1010.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1010",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-24T11:15:11.090",
- "lastModified": "2023-11-07T04:02:12.243",
+ "lastModified": "2024-02-29T01:37:10.660",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1030.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1030.json
index 97f84dd481e..a5550aa012e 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1030.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1030.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1030",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-24T20:15:16.550",
- "lastModified": "2023-11-07T04:02:16.893",
+ "lastModified": "2024-02-29T01:37:10.917",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1035.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1035.json
index 1ed5e669e62..de3127b539f 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1035.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1035.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1035",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-25T08:15:10.297",
- "lastModified": "2023-11-07T04:02:17.397",
+ "lastModified": "2024-02-29T01:37:11.053",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1036.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1036.json
index 434770677d8..360073ccf24 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1036.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1036.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1036",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-26T12:15:10.540",
- "lastModified": "2023-11-07T04:02:17.643",
+ "lastModified": "2024-02-29T01:37:11.153",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1037.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1037.json
index ccb6c15f92b..2e1d82f7cbc 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1037.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1037.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1037",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-26T12:15:10.963",
- "lastModified": "2023-11-07T04:02:18.000",
+ "lastModified": "2024-02-29T01:37:11.240",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1038.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1038.json
index f82b3543087..e3c29189d3f 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1038.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1038.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1038",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-26T12:15:11.057",
- "lastModified": "2023-11-07T04:02:18.373",
+ "lastModified": "2024-02-29T01:37:11.357",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1039.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1039.json
index 2f932251de7..1f58a748ae1 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1039.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1039.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1039",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-26T12:15:11.140",
- "lastModified": "2023-11-07T04:02:18.733",
+ "lastModified": "2024-02-29T01:37:11.510",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1040.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1040.json
index ba3506749e3..433163930e5 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1040.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1040.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1040",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-26T12:15:11.217",
- "lastModified": "2024-02-13T08:15:45.210",
+ "lastModified": "2024-02-29T01:37:11.610",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1041.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1041.json
index e23118dbf02..2de5db4912f 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1041.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1041.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1041",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-26T12:15:11.303",
- "lastModified": "2023-11-07T04:02:19.440",
+ "lastModified": "2024-02-29T01:37:11.700",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1042.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1042.json
index 9ae8e63a9b5..d03ce27a433 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1042.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1042.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1042",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-26T13:15:10.433",
- "lastModified": "2023-11-07T04:02:19.803",
+ "lastModified": "2024-02-29T01:37:11.793",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1043.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1043.json
index 6ada643a827..cfe98a2c1a3 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1043.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1043.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1043",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-26T13:15:10.523",
- "lastModified": "2023-11-07T04:02:20.143",
+ "lastModified": "2024-02-29T01:37:11.880",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1044.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1044.json
index 5e9ca29f14f..af40d93c200 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1044.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1044.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1044",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-26T13:15:10.610",
- "lastModified": "2023-11-07T04:02:20.507",
+ "lastModified": "2024-02-29T01:37:11.963",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1045.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1045.json
index f1a68e51247..3dd8a89271e 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1045.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1045.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1045",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-26T13:15:10.697",
- "lastModified": "2023-11-07T04:02:20.857",
+ "lastModified": "2024-02-29T01:37:12.037",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.2
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1046.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1046.json
index 019adedfeb6..7e98b1118d7 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1046.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1046.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1046",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-26T13:15:10.797",
- "lastModified": "2023-11-07T04:02:21.207",
+ "lastModified": "2024-02-29T01:37:12.120",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1047.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1047.json
index fdb9654d27c..40341b28fa8 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1047.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1047.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1047",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-26T13:15:10.880",
- "lastModified": "2023-11-07T04:02:21.573",
+ "lastModified": "2024-02-29T01:37:12.203",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1048.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1048.json
index 2a7143c5d0a..01aec880205 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1048.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1048.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1048",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-26T13:15:10.970",
- "lastModified": "2023-11-07T04:02:21.913",
+ "lastModified": "2024-02-29T01:37:12.290",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1053.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1053.json
index 334a7c75ade..683694ee45e 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1053.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1053.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1053",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-27T11:15:11.023",
- "lastModified": "2023-11-07T04:02:22.703",
+ "lastModified": "2024-02-29T01:37:12.417",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1054.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1054.json
index 6ac64e0f347..0ffec560cf5 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1054.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1054.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1054",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-27T11:15:11.173",
- "lastModified": "2023-11-07T04:02:23.083",
+ "lastModified": "2024-02-29T01:37:12.493",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1056.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1056.json
index 3e21722f5c4..9d3eb5c7754 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1056.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1056.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1056",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-27T12:15:10.820",
- "lastModified": "2023-11-07T04:02:23.923",
+ "lastModified": "2024-02-29T01:37:12.577",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1057.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1057.json
index ce89b90c959..2b81dec31df 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1057.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1057.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1057",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-27T12:15:10.923",
- "lastModified": "2023-11-07T04:02:24.283",
+ "lastModified": "2024-02-29T01:37:12.660",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1058.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1058.json
index 510533950b4..43ca7383e04 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1058.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1058.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1058",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-27T12:15:11.013",
- "lastModified": "2023-11-07T04:02:24.627",
+ "lastModified": "2024-02-29T01:37:12.757",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1059.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1059.json
index a76da37c3b2..a448ae85369 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1059.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1059.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1059",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-27T12:15:11.103",
- "lastModified": "2023-11-07T04:02:25.003",
+ "lastModified": "2024-02-29T01:37:12.887",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1061.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1061.json
index dbd733769ec..036480f953e 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1061.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1061.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1061",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-27T12:15:11.197",
- "lastModified": "2023-11-07T04:02:25.570",
+ "lastModified": "2024-02-29T01:37:12.990",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1062.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1062.json
index b3d7376b385..2ab0bf9e885 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1062.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1062.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1062",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-27T12:15:11.287",
- "lastModified": "2023-11-07T04:02:25.903",
+ "lastModified": "2024-02-29T01:37:13.067",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1063.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1063.json
index ead9bcaebbf..fef0d524764 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1063.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1063.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1063",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-27T12:15:11.377",
- "lastModified": "2023-11-07T04:02:26.280",
+ "lastModified": "2024-02-29T01:37:13.153",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1099.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1099.json
index 35bdb94c823..5461d363ed7 100644
--- a/CVE-2023/CVE-2023-10xx/CVE-2023-1099.json
+++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1099.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1099",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-28T21:15:11.823",
- "lastModified": "2023-11-07T04:02:29.957",
+ "lastModified": "2024-02-29T01:37:13.533",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1100.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1100.json
index afab25927f7..41df3e3189c 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1100.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1100.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1100",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-02-28T21:15:11.943",
- "lastModified": "2023-11-07T04:02:30.310",
+ "lastModified": "2024-02-29T01:37:13.627",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1112.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1112.json
index 604d8bf024e..2d2b43d2a66 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1112.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1112.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1112",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-01T10:15:09.700",
- "lastModified": "2023-11-07T04:02:31.473",
+ "lastModified": "2024-02-29T01:37:13.817",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1113.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1113.json
index b7778fcb648..488fd26cdc8 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1113.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1113.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1113",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-01T10:15:10.780",
- "lastModified": "2023-11-07T04:02:31.857",
+ "lastModified": "2024-02-29T01:37:13.900",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1130.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1130.json
index f92e82bf71e..78bfe64109a 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1130.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1130.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1130",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-01T20:15:11.853",
- "lastModified": "2024-02-13T08:15:45.447",
+ "lastModified": "2024-02-29T01:37:14.100",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1131.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1131.json
index 97aa8ff83d5..df33e94f0b5 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1131.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1131.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1131",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-01T20:15:12.423",
- "lastModified": "2024-02-13T08:15:45.677",
+ "lastModified": "2024-02-29T01:37:14.187",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1151.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1151.json
index cb5bf5af5dc..eed17a555b8 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1151.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1151.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1151",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-02T07:15:08.647",
- "lastModified": "2023-11-07T04:02:38.947",
+ "lastModified": "2024-02-29T01:37:14.470",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1156.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1156.json
index 242e2aa968a..c5929922cf2 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1156.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1156.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1156",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-02T19:15:10.493",
- "lastModified": "2023-11-07T04:02:40.090",
+ "lastModified": "2024-02-29T01:37:14.597",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1157.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1157.json
index 185f6360b7a..ac699b4d260 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1157.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1157.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1157",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-02T19:15:10.570",
- "lastModified": "2023-11-07T04:02:40.460",
+ "lastModified": "2024-02-29T01:37:14.677",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1162.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1162.json
index 571f715f880..f18a86bad55 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1162.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1162.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1162",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-03T07:15:09.140",
- "lastModified": "2023-11-22T21:15:07.870",
+ "lastModified": "2024-02-29T01:37:14.797",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1163.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1163.json
index 2a5e4bbc719..b3f2535eb3e 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1163.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1163.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1163",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-03T07:15:09.263",
- "lastModified": "2023-11-22T21:15:08.110",
+ "lastModified": "2024-02-29T01:37:14.873",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1164.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1164.json
index 8fdbaa62dd2..844a0c4211e 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1164.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1164.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1164",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-03T07:15:09.370",
- "lastModified": "2024-02-13T08:15:45.893",
+ "lastModified": "2024-02-29T01:37:14.953",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1165.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1165.json
index 95667b402da..c029d08a4db 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1165.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1165.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1165",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-03T08:15:12.613",
- "lastModified": "2023-11-07T04:02:42.233",
+ "lastModified": "2024-02-29T01:37:15.030",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1179.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1179.json
index efdc8a975b4..8338c522471 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1179.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1179.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1179",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T10:15:09.273",
- "lastModified": "2023-11-07T04:02:45.253",
+ "lastModified": "2024-02-29T01:37:15.227",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1180.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1180.json
index 8211e9187eb..1d05fcae7d2 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1180.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1180.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1180",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-05T10:15:10.377",
- "lastModified": "2023-11-07T04:02:45.770",
+ "lastModified": "2024-02-29T01:37:15.303",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1184.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1184.json
index 7725822c8b7..f24e91c96fb 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1184.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1184.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1184",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T08:15:08.513",
- "lastModified": "2024-02-13T08:15:46.150",
+ "lastModified": "2024-02-29T01:37:15.410",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1185.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1185.json
index 15c32a6a04b..727af27959c 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1185.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1185.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1185",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T08:15:08.610",
- "lastModified": "2024-02-13T08:15:46.373",
+ "lastModified": "2024-02-29T01:37:15.487",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1186.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1186.json
index 3e4bc4b5610..47a5af361ed 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1186.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1186.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1186",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T08:15:08.683",
- "lastModified": "2023-11-07T04:02:47.793",
+ "lastModified": "2024-02-29T01:37:15.563",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1187.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1187.json
index 4f92dbb24c7..7b9a05ecc6e 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1187.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1187.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1187",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T08:15:08.770",
- "lastModified": "2023-11-07T04:02:48.150",
+ "lastModified": "2024-02-29T01:37:15.647",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1188.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1188.json
index f5f5085fab6..15008a716cb 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1188.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1188.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1188",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T08:15:08.850",
- "lastModified": "2023-11-07T04:02:48.540",
+ "lastModified": "2024-02-29T01:37:15.727",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1189.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1189.json
index e34c6a01869..bff2fd9d0ce 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1189.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1189.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1189",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T08:15:08.927",
- "lastModified": "2023-11-07T04:02:48.910",
+ "lastModified": "2024-02-29T01:37:15.830",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1190.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1190.json
index 294ee6c439d..2f8da8b6669 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1190.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1190.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1190",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T08:15:08.997",
- "lastModified": "2023-11-07T04:02:49.250",
+ "lastModified": "2024-02-29T01:37:15.927",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1191.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1191.json
index d21c7f20201..cc7f9d3c804 100644
--- a/CVE-2023/CVE-2023-11xx/CVE-2023-1191.json
+++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1191.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1191",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T08:15:09.083",
- "lastModified": "2023-11-07T04:02:49.617",
+ "lastModified": "2024-02-29T01:37:16.020",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1200.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1200.json
index dcd889dbeaa..b106110e6c9 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1200.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1200.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1200",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-06T16:15:10.090",
- "lastModified": "2024-02-13T08:15:46.597",
+ "lastModified": "2024-02-29T01:37:16.177",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1253.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1253.json
index a916b48a742..f54c452caff 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1253.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1253.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1253",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-07T15:15:11.067",
- "lastModified": "2023-11-07T04:02:55.623",
+ "lastModified": "2024-02-29T01:37:16.790",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1254.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1254.json
index fd1140ca689..e415ad24d85 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1254.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1254.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1254",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-07T15:15:11.150",
- "lastModified": "2023-11-07T04:02:55.990",
+ "lastModified": "2024-02-29T01:37:16.870",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1275.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1275.json
index b77aa5f36d8..7531a144eeb 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1275.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1275.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1275",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-08T18:15:11.667",
- "lastModified": "2023-11-07T04:02:59.673",
+ "lastModified": "2024-02-29T01:37:17.120",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1276.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1276.json
index da46831f87e..5bd3465fa3e 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1276.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1276.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1276",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-08T19:15:10.677",
- "lastModified": "2024-02-13T08:15:46.800",
+ "lastModified": "2024-02-29T01:37:17.207",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1277.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1277.json
index bddab6d000e..c1a6ece7af0 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1277.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1277.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1277",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-08T19:15:10.760",
- "lastModified": "2024-02-13T08:15:47.027",
+ "lastModified": "2024-02-29T01:37:17.290",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1278.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1278.json
index 616c091cfc7..8b98d275750 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1278.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1278.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1278",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-08T19:15:10.847",
- "lastModified": "2023-11-07T04:03:01.247",
+ "lastModified": "2024-02-29T01:37:17.373",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1290.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1290.json
index c4720b720ae..773d261675c 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1290.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1290.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1290",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-09T15:15:09.117",
- "lastModified": "2023-11-07T04:03:02.377",
+ "lastModified": "2024-02-29T01:37:17.550",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1291.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1291.json
index 58c00a536c4..0196193de4d 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1291.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1291.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1291",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-09T15:15:09.217",
- "lastModified": "2023-11-07T04:03:02.727",
+ "lastModified": "2024-02-29T01:37:17.637",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1292.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1292.json
index 64446f0b401..fdd15daee39 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1292.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1292.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1292",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-09T15:15:09.307",
- "lastModified": "2023-11-07T04:03:03.087",
+ "lastModified": "2024-02-29T01:37:17.713",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1293.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1293.json
index f2ca01b5e9d..34698f8b89a 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1293.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1293.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1293",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-09T15:15:09.403",
- "lastModified": "2024-02-16T17:43:36.187",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:17.793",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1294.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1294.json
index 08f7fcd9276..d576313a3c9 100644
--- a/CVE-2023/CVE-2023-12xx/CVE-2023-1294.json
+++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1294.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1294",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-09T15:15:09.517",
- "lastModified": "2023-11-07T04:03:03.957",
+ "lastModified": "2024-02-29T01:37:17.873",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1300.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1300.json
index 9a47c40ee02..8f807f63500 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1300.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1300.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1300",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-09T22:15:51.880",
- "lastModified": "2023-11-07T04:03:04.693",
+ "lastModified": "2024-02-29T01:37:18.030",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1301.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1301.json
index a655a4f1954..ba12b1aeab4 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1301.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1301.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1301",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-09T22:15:51.957",
- "lastModified": "2023-11-07T04:03:04.940",
+ "lastModified": "2024-02-29T01:37:18.113",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1302.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1302.json
index 88d412f42ec..e872bd5adf0 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1302.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1302.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1302",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-09T22:15:52.040",
- "lastModified": "2023-11-07T04:03:05.297",
+ "lastModified": "2024-02-29T01:37:18.187",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1303.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1303.json
index 7e788ad0cb6..f206ac089ac 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1303.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1303.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1303",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-09T22:15:52.120",
- "lastModified": "2023-11-07T04:03:05.660",
+ "lastModified": "2024-02-29T01:37:18.273",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1308.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1308.json
index 2c873a5be7d..6f461f562bc 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1308.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1308.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1308",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-10T08:15:09.997",
- "lastModified": "2023-11-07T04:03:06.607",
+ "lastModified": "2024-02-29T01:37:18.400",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1309.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1309.json
index aed0ac5dbd1..87d3b74213e 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1309.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1309.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1309",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-10T08:15:10.123",
- "lastModified": "2023-11-07T04:03:06.987",
+ "lastModified": "2024-02-29T01:37:18.487",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1310.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1310.json
index b826ec78118..c0cce16e922 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1310.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1310.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1310",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-10T08:15:10.300",
- "lastModified": "2023-11-07T04:03:07.337",
+ "lastModified": "2024-02-29T01:37:18.573",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1311.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1311.json
index b1364b1e561..e542b2784a1 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1311.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1311.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1311",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-10T08:15:10.407",
- "lastModified": "2023-11-07T04:03:07.700",
+ "lastModified": "2024-02-29T01:37:18.683",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1321.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1321.json
index b359dc194c7..dbafba7a782 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1321.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1321.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1321",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-10T16:15:11.090",
- "lastModified": "2023-11-07T04:03:08.627",
+ "lastModified": "2024-02-29T01:37:18.860",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1322.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1322.json
index a811bb77307..6ef31ff702d 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1322.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1322.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1322",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-10T16:15:11.173",
- "lastModified": "2023-11-07T04:03:08.870",
+ "lastModified": "2024-02-29T01:37:18.943",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1328.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1328.json
index 67c7322fc50..2fcaaae27dc 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1328.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1328.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1328",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-10T17:15:09.973",
- "lastModified": "2023-11-07T04:03:09.960",
+ "lastModified": "2024-02-29T01:37:19.067",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1349.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1349.json
index 0a24e80c10b..c8c8f5c5987 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1349.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1349.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1349",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-11T09:15:09.910",
- "lastModified": "2024-02-13T08:15:47.470",
+ "lastModified": "2024-02-29T01:37:19.330",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1350.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1350.json
index 5be40299044..97e0d34b5d7 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1350.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1350.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1350",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-11T09:15:10.197",
- "lastModified": "2023-11-07T04:03:14.727",
+ "lastModified": "2024-02-29T01:37:19.420",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1351.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1351.json
index 4ab9e8e815d..2655ea36756 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1351.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1351.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1351",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-11T12:15:16.253",
- "lastModified": "2023-11-07T04:03:15.110",
+ "lastModified": "2024-02-29T01:37:19.507",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1352.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1352.json
index 15b691032d1..3e912978bbd 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1352.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1352.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1352",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-11T18:15:43.603",
- "lastModified": "2024-02-16T18:38:17.337",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:19.583",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1353.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1353.json
index d110180f334..6d3d59a76a3 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1353.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1353.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1353",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-11T18:15:43.727",
- "lastModified": "2023-11-07T04:03:15.970",
+ "lastModified": "2024-02-29T01:37:19.673",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1354.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1354.json
index 92b2a01e393..fc9a4e1f88d 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1354.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1354.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1354",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-11T18:15:43.817",
- "lastModified": "2023-11-07T04:03:16.337",
+ "lastModified": "2024-02-29T01:37:19.760",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1357.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1357.json
index 13fdd6e5d72..db7f3cb378f 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1357.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1357.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1357",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-12T08:15:09.597",
- "lastModified": "2023-11-07T04:03:16.933",
+ "lastModified": "2024-02-29T01:37:19.860",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1358.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1358.json
index 6bf42546bcd..fb08b7510fa 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1358.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1358.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1358",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-12T08:15:10.170",
- "lastModified": "2023-11-07T04:03:17.407",
+ "lastModified": "2024-02-29T01:37:19.940",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1359.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1359.json
index 092da5a4b55..d21f3b31cd5 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1359.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1359.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1359",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-12T08:15:10.273",
- "lastModified": "2023-11-07T04:03:17.963",
+ "lastModified": "2024-02-29T01:37:20.020",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1360.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1360.json
index f1a70f27975..e91a9f5105f 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1360.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1360.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1360",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-12T09:15:10.183",
- "lastModified": "2023-11-07T04:03:18.563",
+ "lastModified": "2024-02-29T01:37:20.100",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1363.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1363.json
index 12cd1a6a5c5..c11fae57412 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1363.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1363.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1363",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-13T06:15:17.767",
- "lastModified": "2023-11-07T04:03:19.167",
+ "lastModified": "2024-02-29T01:37:20.200",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1364.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1364.json
index 9fc5d2d93ea..8b73f7d7665 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1364.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1364.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1364",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-13T08:15:09.933",
- "lastModified": "2023-11-07T04:03:19.610",
+ "lastModified": "2024-02-29T01:37:20.277",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1365.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1365.json
index 52a5728947e..5062036b1e2 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1365.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1365.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1365",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-13T08:15:10.140",
- "lastModified": "2023-11-07T04:03:19.960",
+ "lastModified": "2024-02-29T01:37:20.363",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1366.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1366.json
index 9f6a2a9d77a..31bbe2b5a28 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1366.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1366.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1366",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-13T09:15:10.600",
- "lastModified": "2023-11-07T04:03:20.337",
+ "lastModified": "2024-02-29T01:37:20.443",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1368.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1368.json
index c27d06004d3..5dc77e23e6c 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1368.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1368.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1368",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-13T09:15:10.807",
- "lastModified": "2024-02-13T08:15:47.670",
+ "lastModified": "2024-02-29T01:37:20.530",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1369.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1369.json
index fd0ba099b89..3c64c7abc5a 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1369.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1369.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1369",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-13T09:15:10.903",
- "lastModified": "2023-11-07T04:03:21.083",
+ "lastModified": "2024-02-29T01:37:20.610",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1378.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1378.json
index ad095f98859..9cb952b469a 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1378.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1378.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1378",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-13T18:15:12.867",
- "lastModified": "2024-02-13T08:15:47.890",
+ "lastModified": "2024-02-29T01:37:20.757",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1379.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1379.json
index 53fbb883222..6528253cd10 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1379.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1379.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1379",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-15T16:15:10.883",
- "lastModified": "2023-11-07T04:03:23.400",
+ "lastModified": "2024-02-29T01:37:20.840",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1391.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1391.json
index 2c8740246f3..f5409c2e138 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1391.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1391.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1391",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-14T15:15:11.677",
- "lastModified": "2023-11-07T04:03:26.573",
+ "lastModified": "2024-02-29T01:37:21.063",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1392.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1392.json
index 550ec33d5e9..becea2d75ba 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1392.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1392.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1392",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-14T15:15:11.770",
- "lastModified": "2023-11-07T04:03:27.017",
+ "lastModified": "2024-02-29T01:37:21.150",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1394.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1394.json
index 44d2f068e62..007652ad23d 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1394.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1394.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1394",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-14T15:15:11.867",
- "lastModified": "2023-11-07T04:03:28.280",
+ "lastModified": "2024-02-29T01:37:21.243",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1395.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1395.json
index 53f3f175127..3b557453eb0 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1395.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1395.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1395",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-14T15:15:11.947",
- "lastModified": "2023-11-07T04:03:28.653",
+ "lastModified": "2024-02-29T01:37:21.353",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1396.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1396.json
index 989c2aed02e..4e9a20a3e36 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1396.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1396.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1396",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-14T15:15:12.037",
- "lastModified": "2023-11-07T04:03:29.003",
+ "lastModified": "2024-02-29T01:37:21.490",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1397.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1397.json
index 950cd8d4a38..a78a6d7706f 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1397.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1397.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1397",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-14T15:15:12.120",
- "lastModified": "2023-11-07T04:03:29.383",
+ "lastModified": "2024-02-29T01:37:21.570",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1398.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1398.json
index d057c59ec1e..456fb590254 100644
--- a/CVE-2023/CVE-2023-13xx/CVE-2023-1398.json
+++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1398.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1398",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-14T15:15:12.210",
- "lastModified": "2023-11-07T04:03:29.730",
+ "lastModified": "2024-02-29T01:37:21.653",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1407.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1407.json
index bfdc96e1add..a84a822f206 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1407.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1407.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1407",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-15T08:15:09.953",
- "lastModified": "2023-11-07T04:03:31.427",
+ "lastModified": "2024-02-29T01:37:21.807",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1415.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1415.json
index 95540f374ab..3b63c148286 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1415.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1415.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1415",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-15T16:15:10.977",
- "lastModified": "2023-11-07T04:03:32.650",
+ "lastModified": "2024-02-29T01:37:21.947",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1416.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1416.json
index a746a62ff81..ca04754167a 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1416.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1416.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1416",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-15T16:15:11.060",
- "lastModified": "2023-11-07T04:03:33.047",
+ "lastModified": "2024-02-29T01:37:22.027",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1418.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1418.json
index d9cf7c7fa11..157a80fd00b 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1418.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1418.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1418",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-15T16:15:11.147",
- "lastModified": "2023-11-07T04:03:33.500",
+ "lastModified": "2024-02-29T01:37:22.113",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1432.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1432.json
index 2ec9d817299..e43379e90f5 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1432.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1432.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1432",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-16T13:15:10.327",
- "lastModified": "2023-11-07T04:03:35.233",
+ "lastModified": "2024-02-29T01:37:22.293",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1433.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1433.json
index 1a9b0731133..186a23f9e7c 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1433.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1433.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1433",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-16T13:15:10.407",
- "lastModified": "2023-11-07T04:03:35.583",
+ "lastModified": "2024-02-29T01:37:22.377",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1439.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1439.json
index dcc4767b7e5..87dece68758 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1439.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1439.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1439",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:09.823",
- "lastModified": "2023-11-07T04:03:36.403",
+ "lastModified": "2024-02-29T01:37:22.490",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1440.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1440.json
index e77293f871b..2249929e059 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1440.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1440.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1440",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:10.183",
- "lastModified": "2023-11-07T04:03:36.727",
+ "lastModified": "2024-02-29T01:37:22.573",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1441.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1441.json
index f4ae7e7a1dc..170e07ad39b 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1441.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1441.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1441",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:10.393",
- "lastModified": "2023-11-07T04:03:37.100",
+ "lastModified": "2024-02-29T01:37:22.657",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1442.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1442.json
index 9c68d6a5c6e..f0b171a6de2 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1442.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1442.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1442",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:10.630",
- "lastModified": "2024-02-13T08:15:48.117",
+ "lastModified": "2024-02-29T01:37:22.743",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1443.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1443.json
index 1466ce1ba23..05d503811de 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1443.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1443.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1443",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:10.847",
- "lastModified": "2023-11-07T04:03:37.797",
+ "lastModified": "2024-02-29T01:37:22.830",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1444.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1444.json
index 967203ed9f7..c4b93cf15d7 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1444.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1444.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1444",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:11.083",
- "lastModified": "2023-11-07T04:03:38.180",
+ "lastModified": "2024-02-29T01:37:22.930",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1445.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1445.json
index 12e22a444fc..ce72b5ee319 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1445.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1445.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1445",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:11.280",
- "lastModified": "2023-11-07T04:03:38.590",
+ "lastModified": "2024-02-29T01:37:23.033",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1446.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1446.json
index cc9769f171a..f3029f821ac 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1446.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1446.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1446",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:11.727",
- "lastModified": "2023-11-07T04:03:38.947",
+ "lastModified": "2024-02-29T01:37:23.133",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1447.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1447.json
index 8d45d1acbe1..adf01a7af2b 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1447.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1447.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1447",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:11.867",
- "lastModified": "2023-11-07T04:03:39.307",
+ "lastModified": "2024-02-29T01:37:23.220",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1448.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1448.json
index 8dd50446d9c..5e13588a850 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1448.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1448.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1448",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:12.093",
- "lastModified": "2023-11-15T03:29:19.863",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:23.303",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1449.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1449.json
index adcb1f4ab0a..ab120cf4e83 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1449.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1449.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1449",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:12.347",
- "lastModified": "2023-11-15T03:31:13.100",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:23.390",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1450.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1450.json
index 34524cb38cb..5ea421adeaf 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1450.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1450.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1450",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:12.560",
- "lastModified": "2023-11-07T04:03:40.637",
+ "lastModified": "2024-02-29T01:37:23.480",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1451.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1451.json
index 8346b7eeb67..f85a618a577 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1451.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1451.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1451",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:12.747",
- "lastModified": "2023-11-07T04:03:40.993",
+ "lastModified": "2024-02-29T01:37:23.560",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1452.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1452.json
index 213a9672c99..a608de30427 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1452.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1452.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1452",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:12.947",
- "lastModified": "2023-11-15T03:13:12.457",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:23.650",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1453.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1453.json
index d0cd5da3322..5e252107198 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1453.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1453.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1453",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:13.213",
- "lastModified": "2023-11-07T04:03:41.840",
+ "lastModified": "2024-02-29T01:37:23.733",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.2
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1454.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1454.json
index 8d116f60e0f..434fd5235db 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1454.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1454.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1454",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:13.573",
- "lastModified": "2024-02-13T08:15:48.323",
+ "lastModified": "2024-02-29T01:37:23.817",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1455.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1455.json
index 8c284bd6578..4bff6c63f78 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1455.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1455.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1455",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T07:15:13.767",
- "lastModified": "2024-02-16T18:45:22.397",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:23.900",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1456.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1456.json
index 2144ea46b8e..222e3ef05b5 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1456.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1456.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1456",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-25T21:15:06.790",
- "lastModified": "2023-11-07T04:03:43.323",
+ "lastModified": "2024-02-29T01:37:23.990",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +66,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1457.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1457.json
index d782c288b0e..7e9f02d8cc8 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1457.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1457.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1457",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-25T21:15:06.850",
- "lastModified": "2023-11-07T04:03:43.680",
+ "lastModified": "2024-02-29T01:37:24.070",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +66,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1458.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1458.json
index 07a739a3ac7..f69ed352e00 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1458.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1458.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1458",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-25T22:15:06.873",
- "lastModified": "2023-11-07T04:03:44.043",
+ "lastModified": "2024-02-29T01:37:24.150",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -66,7 +66,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1459.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1459.json
index 12b561faa36..73616d19d3a 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1459.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1459.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1459",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T08:15:09.900",
- "lastModified": "2024-02-13T08:15:48.520",
+ "lastModified": "2024-02-29T01:37:24.233",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1460.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1460.json
index 08c9eb53581..0b9850a1acb 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1460.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1460.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1460",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T08:15:10.037",
- "lastModified": "2023-11-07T04:03:44.763",
+ "lastModified": "2024-02-29T01:37:24.320",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1461.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1461.json
index 31ca7cb8ceb..72d5026e1ec 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1461.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1461.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1461",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T09:15:12.663",
- "lastModified": "2024-02-13T08:15:48.717",
+ "lastModified": "2024-02-29T01:37:24.420",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1464.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1464.json
index e7682abafba..ddbb62bfcfb 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1464.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1464.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1464",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T12:15:11.987",
- "lastModified": "2023-11-07T04:03:45.733",
+ "lastModified": "2024-02-29T01:37:24.530",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1466.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1466.json
index 05b310d4df5..8f4e9d1ee51 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1466.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1466.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1466",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T12:15:12.067",
- "lastModified": "2023-11-07T04:03:46.287",
+ "lastModified": "2024-02-29T01:37:24.623",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1467.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1467.json
index 5740e646444..7bb053204d0 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1467.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1467.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1467",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T12:15:12.140",
- "lastModified": "2023-11-07T04:03:46.640",
+ "lastModified": "2024-02-29T01:37:24.703",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1468.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1468.json
index 5964e6825f3..78b58ab1106 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1468.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1468.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1468",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T12:15:12.223",
- "lastModified": "2023-11-07T04:03:47.003",
+ "lastModified": "2024-02-29T01:37:24.783",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1474.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1474.json
index 3046c790b33..8ffb4670299 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1474.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1474.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1474",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T15:15:11.977",
- "lastModified": "2023-11-07T04:03:48.553",
+ "lastModified": "2024-02-29T01:37:24.910",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1475.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1475.json
index b299431b8da..0ae147bc7ec 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1475.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1475.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1475",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-17T15:15:12.057",
- "lastModified": "2024-02-13T08:15:48.943",
+ "lastModified": "2024-02-29T01:37:24.990",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1479.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1479.json
index 93d2e6ad1f6..095cffbead5 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1479.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1479.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1479",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-18T09:15:11.253",
- "lastModified": "2023-11-07T04:03:49.777",
+ "lastModified": "2024-02-29T01:37:25.103",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1480.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1480.json
index bb9b84caf81..f4ce98f4651 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1480.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1480.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1480",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-18T09:15:11.770",
- "lastModified": "2023-11-07T04:03:50.153",
+ "lastModified": "2024-02-29T01:37:25.183",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1481.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1481.json
index 518706a639d..19d419aa3aa 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1481.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1481.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1481",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-18T09:15:11.867",
- "lastModified": "2023-11-07T04:03:50.513",
+ "lastModified": "2024-02-29T01:37:25.263",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1482.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1482.json
index 81d38ce430f..895faa25994 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1482.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1482.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1482",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-18T10:15:11.250",
- "lastModified": "2023-11-07T04:03:50.863",
+ "lastModified": "2024-02-29T01:37:25.347",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1483.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1483.json
index 29dc286efe8..bdbbceb2e57 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1483.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1483.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1483",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-18T10:15:11.340",
- "lastModified": "2023-11-07T04:03:51.210",
+ "lastModified": "2024-02-29T01:37:25.427",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1484.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1484.json
index f4501d4f4a1..3115681f132 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1484.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1484.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1484",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-18T10:15:11.417",
- "lastModified": "2023-11-07T04:03:51.600",
+ "lastModified": "2024-02-29T01:37:25.507",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1485.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1485.json
index f91e079e985..bc74d1148fe 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1485.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1485.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1485",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-18T21:15:11.300",
- "lastModified": "2023-11-07T04:03:51.940",
+ "lastModified": "2024-02-29T01:37:25.597",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1486.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1486.json
index 14e8699edbb..f26c765e56f 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1486.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1486.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1486",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-18T21:15:11.377",
- "lastModified": "2023-11-07T04:03:52.290",
+ "lastModified": "2024-02-29T01:37:25.677",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.2
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1487.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1487.json
index c740e8b8e04..34bc518efb3 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1487.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1487.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1487",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-18T21:15:11.460",
- "lastModified": "2023-11-07T04:03:52.647",
+ "lastModified": "2024-02-29T01:37:25.763",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1488.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1488.json
index 07ba8a04dfa..9f9139a3745 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1488.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1488.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1488",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-18T21:15:11.550",
- "lastModified": "2023-11-07T04:03:53.000",
+ "lastModified": "2024-02-29T01:37:25.843",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1489.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1489.json
index f424fcc18aa..bb2511597d1 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1489.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1489.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1489",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-18T22:15:11.440",
- "lastModified": "2023-11-07T04:03:53.373",
+ "lastModified": "2024-02-29T01:37:25.927",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1490.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1490.json
index 502dbc5857d..ce16b5b24f2 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1490.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1490.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1490",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-18T22:15:11.527",
- "lastModified": "2023-11-07T04:03:53.723",
+ "lastModified": "2024-02-29T01:37:26.010",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1491.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1491.json
index c697ce3c9ef..5107d17b368 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1491.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1491.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1491",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-18T22:15:11.610",
- "lastModified": "2023-11-07T04:03:54.057",
+ "lastModified": "2024-02-29T01:37:26.117",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1492.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1492.json
index 6a70a0475cf..5bf142ce4c9 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1492.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1492.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1492",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-18T23:15:11.303",
- "lastModified": "2023-11-07T04:03:54.427",
+ "lastModified": "2024-02-29T01:37:26.220",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1493.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1493.json
index a6a356cf8ed..4ebe7f440dd 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1493.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1493.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1493",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-18T23:15:11.393",
- "lastModified": "2023-11-07T04:03:54.780",
+ "lastModified": "2024-02-29T01:37:26.310",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1494.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1494.json
index c7a6563423d..58233a64f2d 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1494.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1494.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1494",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-18T23:15:11.493",
- "lastModified": "2023-11-07T04:03:55.153",
+ "lastModified": "2024-02-29T01:37:26.403",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1495.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1495.json
index 370129da0af..975b8fa80bd 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1495.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1495.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1495",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-19T00:15:12.677",
- "lastModified": "2023-11-07T04:03:55.500",
+ "lastModified": "2024-02-29T01:37:26.497",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1497.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1497.json
index 41b5ff342b6..17c6e031f84 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1497.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1497.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1497",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-19T19:15:20.130",
- "lastModified": "2023-11-07T04:03:55.943",
+ "lastModified": "2024-02-29T01:37:26.593",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1498.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1498.json
index 048a6e96092..8e831f7311a 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1498.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1498.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1498",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-19T20:15:19.280",
- "lastModified": "2023-11-07T04:03:56.267",
+ "lastModified": "2024-02-29T01:37:26.677",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1499.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1499.json
index f78f611afc2..ebd851f7f24 100644
--- a/CVE-2023/CVE-2023-14xx/CVE-2023-1499.json
+++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1499.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1499",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-19T20:15:19.377",
- "lastModified": "2023-11-07T04:03:56.633",
+ "lastModified": "2024-02-29T01:37:26.757",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1500.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1500.json
index 24ff7e1cc58..9f84d182cc8 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1500.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1500.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1500",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-19T20:15:19.453",
- "lastModified": "2023-11-07T04:03:56.987",
+ "lastModified": "2024-02-29T01:37:26.840",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1501.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1501.json
index ed1159cdcf3..6de1a906dd9 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1501.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1501.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1501",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-19T20:15:19.540",
- "lastModified": "2023-11-07T04:03:57.340",
+ "lastModified": "2024-02-29T01:37:26.927",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1502.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1502.json
index 7c430a928ae..e2e509e6b97 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1502.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1502.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1502",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-20T09:15:12.103",
- "lastModified": "2024-02-16T17:46:13.270",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:27.010",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1503.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1503.json
index bd1d3f4ffea..331cf4cf064 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1503.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1503.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1503",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-20T09:15:12.267",
- "lastModified": "2024-02-01T01:44:58.693",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:27.097",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1504.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1504.json
index 7670d52f194..c4d867772c6 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1504.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1504.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1504",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-20T09:15:12.410",
- "lastModified": "2024-02-01T02:00:08.550",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:27.180",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1505.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1505.json
index e71bd628c94..0778a0c0b00 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1505.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1505.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1505",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-20T09:15:12.540",
- "lastModified": "2024-02-16T17:38:24.393",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:27.263",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1506.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1506.json
index 0ff94b48d02..cdd37c3ccf3 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1506.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1506.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1506",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-20T10:15:11.543",
- "lastModified": "2024-02-02T16:14:33.950",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:27.347",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1507.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1507.json
index 738d79579d8..b1e7d6e01fd 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1507.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1507.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1507",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-20T10:15:11.633",
- "lastModified": "2023-11-07T04:04:00.487",
+ "lastModified": "2024-02-29T01:37:27.447",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1556.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1556.json
index b568264f64b..0fd851366fe 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1556.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1556.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1556",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T11:15:10.163",
- "lastModified": "2023-11-07T04:04:04.013",
+ "lastModified": "2024-02-29T01:37:27.883",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1557.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1557.json
index 078b3c28a7c..ef6615e2693 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1557.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1557.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1557",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T11:15:10.297",
- "lastModified": "2023-11-07T04:04:04.343",
+ "lastModified": "2024-02-29T01:37:27.983",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1558.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1558.json
index 6ae7c3d59ee..e823fadd9ef 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1558.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1558.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1558",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T11:15:10.387",
- "lastModified": "2023-11-07T04:04:04.700",
+ "lastModified": "2024-02-29T01:37:28.067",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1559.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1559.json
index 7181dc91f35..564aaa3819c 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1559.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1559.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1559",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T12:15:10.580",
- "lastModified": "2023-11-07T04:04:05.067",
+ "lastModified": "2024-02-29T01:37:28.157",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1560.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1560.json
index 55d107a0b45..1571cc4e7ac 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1560.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1560.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1560",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T12:15:10.670",
- "lastModified": "2023-11-07T04:04:05.403",
+ "lastModified": "2024-02-29T01:37:28.243",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1561.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1561.json
index 31ad81889f3..32e98304248 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1561.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1561.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1561",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T12:15:10.763",
- "lastModified": "2024-02-13T08:15:49.163",
+ "lastModified": "2024-02-29T01:37:28.347",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1563.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1563.json
index 40f9cb80de0..310fcb9df81 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1563.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1563.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1563",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T13:15:09.813",
- "lastModified": "2023-11-07T04:04:06.300",
+ "lastModified": "2024-02-29T01:37:28.447",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1564.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1564.json
index 6d90fd05049..59cd65dc8dd 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1564.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1564.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1564",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T13:15:09.893",
- "lastModified": "2023-11-07T04:04:06.707",
+ "lastModified": "2024-02-29T01:37:28.540",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1565.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1565.json
index 5dbdb642038..2754ebb9c22 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1565.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1565.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1565",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T13:15:09.970",
- "lastModified": "2023-11-07T04:04:07.060",
+ "lastModified": "2024-02-29T01:37:28.620",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1566.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1566.json
index cdf94444296..7fa7ad99f14 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1566.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1566.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1566",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T14:15:16.183",
- "lastModified": "2023-11-07T04:04:07.417",
+ "lastModified": "2024-02-29T01:37:28.697",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1567.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1567.json
index a29edcd02b9..746a30bf9c9 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1567.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1567.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1567",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T14:15:16.263",
- "lastModified": "2023-11-07T04:04:07.777",
+ "lastModified": "2024-02-29T01:37:28.787",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1568.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1568.json
index a42608bec11..9d173169b84 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1568.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1568.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1568",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T14:15:16.343",
- "lastModified": "2023-11-07T04:04:08.137",
+ "lastModified": "2024-02-29T01:37:28.870",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1569.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1569.json
index 3b5f14dc95a..e6035f38777 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1569.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1569.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1569",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T14:15:16.427",
- "lastModified": "2023-11-07T04:04:08.543",
+ "lastModified": "2024-02-29T01:37:28.950",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1570.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1570.json
index 4fa71c7c943..3024bb65925 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1570.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1570.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1570",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T15:15:10.187",
- "lastModified": "2023-11-07T04:04:08.887",
+ "lastModified": "2024-02-29T01:37:29.040",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1571.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1571.json
index 2becb0208ac..0d9914732e1 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1571.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1571.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1571",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T15:15:10.273",
- "lastModified": "2024-02-13T08:15:49.403",
+ "lastModified": "2024-02-29T01:37:29.133",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1572.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1572.json
index e3fbef85689..ab398b13b4f 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1572.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1572.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1572",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T13:15:10.053",
- "lastModified": "2024-02-13T08:15:49.617",
+ "lastModified": "2024-02-29T01:37:29.227",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1573.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1573.json
index 659f4194edc..a2214a60b32 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1573.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1573.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1573",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-22T16:15:13.437",
- "lastModified": "2024-02-13T08:15:49.963",
+ "lastModified": "2024-02-29T01:37:29.313",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1589.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1589.json
index a8c95991038..808cbddb265 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1589.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1589.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1589",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-23T08:15:12.577",
- "lastModified": "2024-02-13T08:15:50.170",
+ "lastModified": "2024-02-29T01:37:29.530",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1590.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1590.json
index 44f3250f3c6..0b79d82a75b 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1590.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1590.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1590",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-23T08:15:12.683",
- "lastModified": "2024-02-13T08:15:50.423",
+ "lastModified": "2024-02-29T01:37:29.617",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1591.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1591.json
index 72685b5d31c..664f7848496 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1591.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1591.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1591",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-23T09:15:11.707",
- "lastModified": "2023-11-07T04:04:13.967",
+ "lastModified": "2024-02-29T01:37:29.703",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1592.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1592.json
index 7b9345d7f6b..f4cb78045ce 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1592.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1592.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1592",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-23T10:15:12.030",
- "lastModified": "2023-11-07T04:04:14.313",
+ "lastModified": "2024-02-29T01:37:29.793",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1593.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1593.json
index 2c012a83955..82da864fdb1 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1593.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1593.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1593",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-23T10:15:12.250",
- "lastModified": "2023-11-07T04:04:14.673",
+ "lastModified": "2024-02-29T01:37:29.870",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1594.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1594.json
index ab2d21b2d9c..a65ccfa8f3d 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1594.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1594.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1594",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-23T10:15:12.330",
- "lastModified": "2024-02-13T08:15:50.643",
+ "lastModified": "2024-02-29T01:37:29.950",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1595.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1595.json
index 29a2306279e..07cd875d92e 100644
--- a/CVE-2023/CVE-2023-15xx/CVE-2023-1595.json
+++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1595.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1595",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-23T11:15:13.007",
- "lastModified": "2024-02-13T08:15:50.850",
+ "lastModified": "2024-02-29T01:37:30.040",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1606.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1606.json
index a65ef2ac1ca..490cd8d7a48 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1606.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1606.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1606",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-23T19:15:12.953",
- "lastModified": "2024-02-13T08:15:51.070",
+ "lastModified": "2024-02-29T01:37:30.187",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1607.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1607.json
index 91bed1587c2..5ad637ff7f5 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1607.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1607.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1607",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-23T20:15:14.570",
- "lastModified": "2024-02-13T08:15:51.300",
+ "lastModified": "2024-02-29T01:37:30.273",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1608.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1608.json
index 023a5291d1f..7a9d1016dc5 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1608.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1608.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1608",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-23T20:15:14.660",
- "lastModified": "2023-11-07T04:04:18.123",
+ "lastModified": "2024-02-29T01:37:30.353",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1609.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1609.json
index 1418ab0733f..154f5b7c467 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1609.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1609.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1609",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-23T20:15:14.743",
- "lastModified": "2023-11-07T04:04:18.500",
+ "lastModified": "2024-02-29T01:37:30.430",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1610.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1610.json
index 3a9c3493714..b1123a6036b 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1610.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1610.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1610",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-23T20:15:14.850",
- "lastModified": "2023-11-07T04:04:18.840",
+ "lastModified": "2024-02-29T01:37:30.513",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1612.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1612.json
index 6ec160615fa..ca314696a2a 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1612.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1612.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1612",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-23T21:15:19.510",
- "lastModified": "2023-11-07T04:04:19.767",
+ "lastModified": "2024-02-29T01:37:30.600",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1613.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1613.json
index 28a4be56fc6..f31c0d6c550 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1613.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1613.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1613",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-23T21:15:19.597",
- "lastModified": "2023-11-07T04:04:20.283",
+ "lastModified": "2024-02-29T01:37:30.687",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1616.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1616.json
index 105950e6684..c5528460d63 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1616.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1616.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1616",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-24T08:15:07.467",
- "lastModified": "2023-11-07T04:04:21.187",
+ "lastModified": "2024-02-29T01:37:30.793",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1626.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1626.json
index dfa59f9b9c9..0c62771b10f 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1626.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1626.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1626",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-25T12:15:06.880",
- "lastModified": "2024-02-13T08:15:51.530",
+ "lastModified": "2024-02-29T01:37:30.973",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1627.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1627.json
index 1c1bc50cb3e..9510f42ae94 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1627.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1627.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1627",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-25T12:15:06.943",
- "lastModified": "2024-02-13T08:15:51.783",
+ "lastModified": "2024-02-29T01:37:31.057",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1628.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1628.json
index ff5edbcf627..6b72f95104c 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1628.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1628.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1628",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-25T12:15:07.000",
- "lastModified": "2024-02-13T08:15:52.013",
+ "lastModified": "2024-02-29T01:37:31.140",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1629.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1629.json
index 5e8a2a7173d..04bfcf16d91 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1629.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1629.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1629",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-25T11:16:01.577",
- "lastModified": "2023-11-07T04:04:23.757",
+ "lastModified": "2024-02-29T01:37:31.220",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1630.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1630.json
index 57ee744ca6d..21a29f0d314 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1630.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1630.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1630",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-25T12:15:07.057",
- "lastModified": "2023-11-07T04:04:24.097",
+ "lastModified": "2024-02-29T01:37:31.317",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1631.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1631.json
index 73243b27a10..48dc3f963f2 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1631.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1631.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1631",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-25T12:15:07.107",
- "lastModified": "2023-11-07T04:04:24.463",
+ "lastModified": "2024-02-29T01:37:31.447",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1634.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1634.json
index b680a95939f..1af14bd25ba 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1634.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1634.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1634",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-25T19:15:06.933",
- "lastModified": "2023-11-07T04:04:25.267",
+ "lastModified": "2024-02-29T01:37:31.563",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1635.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1635.json
index d5fe81d01ba..5ecc52e97b3 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1635.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1635.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1635",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-25T19:15:06.990",
- "lastModified": "2023-11-07T04:04:25.623",
+ "lastModified": "2024-02-29T01:37:31.650",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1638.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1638.json
index 12e74c61fee..bbb7651410b 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1638.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1638.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1638",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T21:15:06.817",
- "lastModified": "2023-11-07T04:04:26.450",
+ "lastModified": "2024-02-29T01:37:31.753",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1639.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1639.json
index 04429ad7414..a766ae1d744 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1639.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1639.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1639",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T21:15:06.887",
- "lastModified": "2023-11-07T04:04:26.830",
+ "lastModified": "2024-02-29T01:37:31.837",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1640.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1640.json
index fdd5deac32c..40d5453099a 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1640.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1640.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1640",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T22:15:06.893",
- "lastModified": "2023-11-07T04:04:27.197",
+ "lastModified": "2024-02-29T01:37:31.927",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1641.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1641.json
index 87d803cfc07..f56b0e0314f 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1641.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1641.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1641",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T22:15:06.960",
- "lastModified": "2023-11-07T04:04:27.680",
+ "lastModified": "2024-02-29T01:37:32.010",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1642.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1642.json
index 847cdf451c6..fff4cb8b7e8 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1642.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1642.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1642",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T22:15:07.017",
- "lastModified": "2023-11-07T04:04:28.263",
+ "lastModified": "2024-02-29T01:37:32.107",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1643.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1643.json
index 28d87da7a69..5cc673b78d3 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1643.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1643.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1643",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T22:15:07.077",
- "lastModified": "2023-11-07T04:04:28.620",
+ "lastModified": "2024-02-29T01:37:32.190",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1644.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1644.json
index e2ee764b1c1..49e48059345 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1644.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1644.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1644",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T23:15:07.807",
- "lastModified": "2023-11-07T04:04:29.003",
+ "lastModified": "2024-02-29T01:37:32.270",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1645.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1645.json
index 3f54e3b0e55..960ccae8a73 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1645.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1645.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1645",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T23:15:07.880",
- "lastModified": "2023-11-07T04:04:29.373",
+ "lastModified": "2024-02-29T01:37:32.357",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1646.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1646.json
index 944138c332f..653554a03f0 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1646.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1646.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1646",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-26T23:15:07.940",
- "lastModified": "2023-11-07T04:04:29.807",
+ "lastModified": "2024-02-29T01:37:32.453",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1666.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1666.json
index 8f1c00f6d5a..90fa74ff3ff 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1666.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1666.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1666",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-27T21:15:10.677",
- "lastModified": "2023-11-07T04:04:32.193",
+ "lastModified": "2024-02-29T01:37:32.677",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1674.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1674.json
index a5b6eb0f9e5..d47dbe2d1ea 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1674.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1674.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1674",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-28T21:15:10.423",
- "lastModified": "2023-11-07T04:04:34.780",
+ "lastModified": "2024-02-29T01:37:32.830",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1675.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1675.json
index e73ed91055d..345b472145c 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1675.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1675.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1675",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-28T21:15:10.487",
- "lastModified": "2023-11-07T04:04:35.260",
+ "lastModified": "2024-02-29T01:37:32.920",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1676.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1676.json
index cece8736ae8..c2db6772f42 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1676.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1676.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1676",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-28T21:15:10.547",
- "lastModified": "2023-11-07T04:04:35.613",
+ "lastModified": "2024-02-29T01:37:33.010",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1677.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1677.json
index b0666bbe52b..e2250724f4b 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1677.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1677.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1677",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-28T22:15:09.293",
- "lastModified": "2023-11-07T04:04:35.960",
+ "lastModified": "2024-02-29T01:37:33.110",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1678.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1678.json
index d476b795a42..aa5961a3573 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1678.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1678.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1678",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-28T22:15:09.357",
- "lastModified": "2023-11-07T04:04:36.310",
+ "lastModified": "2024-02-29T01:37:33.213",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1679.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1679.json
index a7990288437..254001309cb 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1679.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1679.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1679",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-28T22:15:09.420",
- "lastModified": "2023-11-07T04:04:36.680",
+ "lastModified": "2024-02-29T01:37:33.313",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1680.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1680.json
index 4bfbc1fa7cd..555bf5b1448 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1680.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1680.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1680",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-29T15:15:07.560",
- "lastModified": "2023-11-07T04:04:37.033",
+ "lastModified": "2024-02-29T01:37:33.397",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1681.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1681.json
index 743848964f1..8c0baa2688e 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1681.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1681.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1681",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-28T23:15:09.070",
- "lastModified": "2023-11-07T04:04:37.377",
+ "lastModified": "2024-02-29T01:37:33.483",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1682.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1682.json
index 29fd6035633..196e7ab0fe8 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1682.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1682.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1682",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-29T00:15:08.903",
- "lastModified": "2023-11-07T04:04:37.747",
+ "lastModified": "2024-02-29T01:37:33.570",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1683.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1683.json
index f013acf45f1..ad41e2e26e4 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1683.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1683.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1683",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-29T01:15:10.443",
- "lastModified": "2023-11-07T04:04:38.197",
+ "lastModified": "2024-02-29T01:37:33.653",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1684.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1684.json
index 2a1bdbccc52..21ed9a1e7d5 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1684.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1684.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1684",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-29T04:15:08.257",
- "lastModified": "2023-11-07T04:04:38.557",
+ "lastModified": "2024-02-29T01:37:33.737",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1685.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1685.json
index e2b498398af..2e6f6414d93 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1685.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1685.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1685",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-29T06:15:07.217",
- "lastModified": "2023-11-07T04:04:38.907",
+ "lastModified": "2024-02-29T01:37:33.823",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1686.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1686.json
index 820d07d101b..9b060c90de5 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1686.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1686.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1686",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-29T07:15:08.707",
- "lastModified": "2023-11-07T04:04:39.270",
+ "lastModified": "2024-02-29T01:37:33.910",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1687.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1687.json
index 89719cce168..14b76f8bf5b 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1687.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1687.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1687",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-29T08:15:07.047",
- "lastModified": "2023-11-07T04:04:39.740",
+ "lastModified": "2024-02-29T01:37:34.003",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1688.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1688.json
index eacfd17a6ae..67e98f26f3e 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1688.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1688.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1688",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-29T09:15:08.237",
- "lastModified": "2023-11-07T04:04:40.117",
+ "lastModified": "2024-02-29T01:37:34.083",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1689.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1689.json
index dba7c28698d..142e55e475c 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1689.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1689.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1689",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-29T10:15:06.940",
- "lastModified": "2023-11-07T04:04:40.480",
+ "lastModified": "2024-02-29T01:37:34.167",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1690.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1690.json
index e6886ada70a..750381d6ae4 100644
--- a/CVE-2023/CVE-2023-16xx/CVE-2023-1690.json
+++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1690.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1690",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-29T11:15:07.200",
- "lastModified": "2023-11-07T04:04:40.877",
+ "lastModified": "2024-02-29T01:37:34.250",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1734.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1734.json
index e8f81635ead..db1f58b9f8f 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1734.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1734.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1734",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-30T19:15:06.437",
- "lastModified": "2023-11-07T04:04:43.917",
+ "lastModified": "2024-02-29T01:37:34.760",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1735.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1735.json
index c4dc40b0b4d..b8a0b89ad57 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1735.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1735.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1735",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-30T20:15:06.947",
- "lastModified": "2023-11-07T04:04:44.180",
+ "lastModified": "2024-02-29T01:37:34.863",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1736.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1736.json
index 1488d33c549..eeffd5e6a24 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1736.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1736.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1736",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-30T20:15:07.033",
- "lastModified": "2023-11-07T04:04:44.530",
+ "lastModified": "2024-02-29T01:37:34.973",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1737.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1737.json
index 5755be5a26c..c431ed713eb 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1737.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1737.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1737",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-30T20:15:07.117",
- "lastModified": "2023-11-07T04:04:44.867",
+ "lastModified": "2024-02-29T01:37:35.077",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1738.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1738.json
index 68c11c90466..9ef9115340f 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1738.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1738.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1738",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-30T21:15:06.617",
- "lastModified": "2023-11-07T04:04:45.247",
+ "lastModified": "2024-02-29T01:37:35.167",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1739.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1739.json
index 4045e2ae85e..bdfa00909ff 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1739.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1739.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1739",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-30T21:15:06.680",
- "lastModified": "2023-11-07T04:04:45.620",
+ "lastModified": "2024-02-29T01:37:35.250",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1740.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1740.json
index d96ed39ff15..f4f231d0b22 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1740.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1740.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1740",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-30T21:15:06.737",
- "lastModified": "2023-11-07T04:04:45.967",
+ "lastModified": "2024-02-29T01:37:35.333",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1741.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1741.json
index 93a4a6249db..4d4ee756811 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1741.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1741.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1741",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-30T22:15:06.620",
- "lastModified": "2024-02-13T08:15:52.257",
+ "lastModified": "2024-02-29T01:37:35.427",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1742.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1742.json
index 955baadd1aa..29010c6ae25 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1742.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1742.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1742",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-30T22:15:06.677",
- "lastModified": "2023-11-07T04:04:46.663",
+ "lastModified": "2024-02-29T01:37:35.503",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1743.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1743.json
index 36d90a83623..ade2c396bca 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1743.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1743.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1743",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-30T22:15:06.727",
- "lastModified": "2023-11-07T04:04:47.020",
+ "lastModified": "2024-02-29T01:37:35.590",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1744.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1744.json
index e88d443c1b9..1d64b28ca31 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1744.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1744.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1744",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-30T23:15:06.463",
- "lastModified": "2023-11-07T04:04:47.383",
+ "lastModified": "2024-02-29T01:37:35.707",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1745.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1745.json
index e23f0919fd5..0c86dbe3a7c 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1745.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1745.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1745",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-30T23:15:06.520",
- "lastModified": "2023-11-07T04:04:47.740",
+ "lastModified": "2024-02-29T01:37:35.783",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1746.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1746.json
index 53dd6f152e7..a2cab35c3c9 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1746.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1746.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1746",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-30T23:15:06.583",
- "lastModified": "2023-11-07T04:04:48.083",
+ "lastModified": "2024-02-29T01:37:35.867",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1747.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1747.json
index 36012f00339..07b43193a7e 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1747.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1747.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1747",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-31T00:15:06.373",
- "lastModified": "2023-11-07T04:04:48.447",
+ "lastModified": "2024-02-29T01:37:35.950",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1769.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1769.json
index 453164f2d0e..b3737b75380 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1769.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1769.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1769",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-31T11:15:06.847",
- "lastModified": "2024-02-13T08:15:52.500",
+ "lastModified": "2024-02-29T01:37:36.240",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1770.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1770.json
index 7ddf5474019..7f85d5dcbbd 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1770.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1770.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1770",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-31T12:15:06.433",
- "lastModified": "2024-02-13T08:15:52.730",
+ "lastModified": "2024-02-29T01:37:36.320",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1771.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1771.json
index f0fffb6aa6a..ec1f5c02879 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1771.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1771.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1771",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-31T12:15:06.497",
- "lastModified": "2023-11-07T04:04:52.157",
+ "lastModified": "2024-02-29T01:37:36.477",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1772.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1772.json
index de4632bd65b..88cae3e3f5c 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1772.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1772.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1772",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-31T12:15:06.553",
- "lastModified": "2024-02-13T08:15:52.943",
+ "lastModified": "2024-02-29T01:37:36.593",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1773.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1773.json
index 010d4682b7c..15707d37b3c 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1773.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1773.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1773",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-31T12:15:06.600",
- "lastModified": "2023-11-07T04:04:52.870",
+ "lastModified": "2024-02-29T01:37:36.687",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1784.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1784.json
index 4f53496d4f1..2703070f34d 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1784.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1784.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1784",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-31T20:15:07.277",
- "lastModified": "2023-11-07T04:04:54.450",
+ "lastModified": "2024-02-29T01:37:36.870",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1785.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1785.json
index 5ae88461963..5c495437ca9 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1785.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1785.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1785",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-31T20:15:07.333",
- "lastModified": "2023-11-07T04:04:54.900",
+ "lastModified": "2024-02-29T01:37:36.953",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1790.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1790.json
index 70fac331566..92b6ab9bb70 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1790.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1790.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1790",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-01T09:15:07.267",
- "lastModified": "2024-02-13T08:15:53.167",
+ "lastModified": "2024-02-29T01:37:37.080",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1791.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1791.json
index 0c211ec2210..33600d7baad 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1791.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1791.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1791",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-02T07:15:07.237",
- "lastModified": "2024-02-13T08:15:53.417",
+ "lastModified": "2024-02-29T01:37:37.167",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1792.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1792.json
index 664045233ee..971e402ab13 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1792.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1792.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1792",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-02T07:15:07.663",
- "lastModified": "2023-11-07T04:04:56.067",
+ "lastModified": "2024-02-29T01:37:37.243",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1793.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1793.json
index baeda555a00..3825645ff00 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1793.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1793.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1793",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-02T08:15:06.987",
- "lastModified": "2023-11-07T04:04:56.423",
+ "lastModified": "2024-02-29T01:37:37.320",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1794.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1794.json
index 625e67108b9..aa3ebfb24dc 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1794.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1794.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1794",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-02T08:15:07.047",
- "lastModified": "2023-11-07T04:04:56.793",
+ "lastModified": "2024-02-29T01:37:37.403",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1795.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1795.json
index ebf460d4a43..04fdeb7a734 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1795.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1795.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1795",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-02T09:15:08.720",
- "lastModified": "2023-11-07T04:04:57.157",
+ "lastModified": "2024-02-29T01:37:37.480",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1796.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1796.json
index a5baa3e09b3..5df7c94b4d5 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1796.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1796.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1796",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-02T09:15:09.533",
- "lastModified": "2023-11-07T04:04:57.513",
+ "lastModified": "2024-02-29T01:37:37.567",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1797.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1797.json
index e5af426bd17..f3b203ae6cc 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1797.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1797.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1797",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-02T10:15:06.947",
- "lastModified": "2023-11-07T04:04:58.200",
+ "lastModified": "2024-02-29T01:37:37.643",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1798.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1798.json
index cee31db4272..58e9980a305 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1798.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1798.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1798",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-02T10:15:07.003",
- "lastModified": "2023-11-07T04:04:58.540",
+ "lastModified": "2024-02-29T01:37:37.723",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1799.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1799.json
index 9a4ef1186b5..984f5fe8272 100644
--- a/CVE-2023/CVE-2023-17xx/CVE-2023-1799.json
+++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1799.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1799",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-02T10:15:07.053",
- "lastModified": "2023-11-07T04:04:58.900",
+ "lastModified": "2024-02-29T01:37:37.800",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1800.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1800.json
index d70aa7ed187..d556601aa45 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1800.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1800.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1800",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-02T11:15:06.707",
- "lastModified": "2024-02-13T08:15:53.630",
+ "lastModified": "2024-02-29T01:37:37.890",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1826.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1826.json
index 14ea4b3559f..a2fdb5c27db 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1826.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1826.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1826",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-04T09:15:07.977",
- "lastModified": "2023-11-07T04:05:01.860",
+ "lastModified": "2024-02-29T01:37:38.170",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1827.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1827.json
index 2cf28adfff5..0d5f01e3c0c 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1827.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1827.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1827",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-04T10:15:07.240",
- "lastModified": "2023-11-07T04:05:02.163",
+ "lastModified": "2024-02-29T01:37:38.257",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1845.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1845.json
index 41d824e7397..5a79981b3f8 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1845.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1845.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1845",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T07:15:07.567",
- "lastModified": "2023-11-07T04:05:05.957",
+ "lastModified": "2024-02-29T01:37:38.470",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1846.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1846.json
index 7e4b01cb03e..9a9bab87b6c 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1846.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1846.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1846",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T07:15:07.647",
- "lastModified": "2023-11-07T04:05:06.433",
+ "lastModified": "2024-02-29T01:37:38.557",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1847.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1847.json
index a7ccfe198e0..16237bb658b 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1847.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1847.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1847",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T07:15:07.707",
- "lastModified": "2023-11-07T04:05:06.860",
+ "lastModified": "2024-02-29T01:37:38.640",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1848.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1848.json
index b995661d156..bae7db77177 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1848.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1848.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1848",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T07:15:07.773",
- "lastModified": "2023-11-07T04:05:07.320",
+ "lastModified": "2024-02-29T01:37:38.777",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1849.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1849.json
index d9d02ba23a2..c4a296bbcc8 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1849.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1849.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1849",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T08:15:07.370",
- "lastModified": "2023-11-07T04:05:07.757",
+ "lastModified": "2024-02-29T01:37:38.887",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1850.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1850.json
index a1e8015641f..bab582b4e94 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1850.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1850.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1850",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T08:15:07.423",
- "lastModified": "2023-11-07T04:05:08.200",
+ "lastModified": "2024-02-29T01:37:39.003",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1851.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1851.json
index 889384a2517..436deb35535 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1851.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1851.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1851",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T08:15:07.480",
- "lastModified": "2023-11-07T04:05:08.600",
+ "lastModified": "2024-02-29T01:37:39.127",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1852.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1852.json
index 1b3d885f5e0..bf1f6eb10a1 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1852.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1852.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1852",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T08:15:07.537",
- "lastModified": "2023-11-07T04:05:09.090",
+ "lastModified": "2024-02-29T01:37:39.260",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1853.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1853.json
index 21815b4fdd6..8f8981bfb1d 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1853.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1853.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1853",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T08:15:07.587",
- "lastModified": "2023-11-07T04:05:09.513",
+ "lastModified": "2024-02-29T01:37:39.397",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1854.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1854.json
index edc9abb4db9..b979970cac5 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1854.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1854.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1854",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T08:15:07.640",
- "lastModified": "2023-11-07T04:05:09.963",
+ "lastModified": "2024-02-29T01:37:39.507",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1856.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1856.json
index 72d3c9d1321..c90b8bbe7b4 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1856.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1856.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1856",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T08:15:07.700",
- "lastModified": "2023-11-07T04:05:11.050",
+ "lastModified": "2024-02-29T01:37:39.617",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1857.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1857.json
index 4246cb7d871..4b72386157d 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1857.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1857.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1857",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T08:15:07.750",
- "lastModified": "2023-11-07T04:05:11.620",
+ "lastModified": "2024-02-29T01:37:39.720",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1858.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1858.json
index cef752df89a..10829c8c239 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1858.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1858.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1858",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T09:15:08.597",
- "lastModified": "2023-11-07T04:05:12.280",
+ "lastModified": "2024-02-29T01:37:39.810",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1860.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1860.json
index 58a206bee94..d0e021e50d1 100644
--- a/CVE-2023/CVE-2023-18xx/CVE-2023-1860.json
+++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1860.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1860",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-05T09:15:09.053",
- "lastModified": "2023-11-07T04:05:13.630",
+ "lastModified": "2024-02-29T01:37:39.927",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1908.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1908.json
index d63ecb0ebb8..09c90148af3 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1908.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1908.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1908",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-06T13:15:08.790",
- "lastModified": "2023-11-07T04:05:19.960",
+ "lastModified": "2024-02-29T01:37:40.663",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1909.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1909.json
index a0e07ef8027..56467be210b 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1909.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1909.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1909",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-07T17:15:08.287",
- "lastModified": "2023-12-21T04:01:22.787",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:40.770",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1937.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1937.json
index 2286c01e576..f9923e016a6 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1937.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1937.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1937",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-07T09:15:07.200",
- "lastModified": "2023-11-07T04:05:26.383",
+ "lastModified": "2024-02-29T01:37:41.210",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1940.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1940.json
index f224767b935..12c183594ed 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1940.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1940.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1940",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-07T18:15:07.057",
- "lastModified": "2023-11-07T04:05:26.987",
+ "lastModified": "2024-02-29T01:37:41.367",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.2
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1941.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1941.json
index 8a7b00d3680..38c6078bb28 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1941.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1941.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1941",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-07T18:15:07.117",
- "lastModified": "2023-11-07T04:05:27.320",
+ "lastModified": "2024-02-29T01:37:41.477",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1942.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1942.json
index bb423b131fa..49dfb12e080 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1942.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1942.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1942",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-07T18:15:07.177",
- "lastModified": "2024-02-13T08:15:53.867",
+ "lastModified": "2024-02-29T01:37:41.597",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1946.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1946.json
index d123696573d..be1e9bc79d5 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1946.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1946.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1946",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-07T23:15:08.477",
- "lastModified": "2023-11-07T04:05:28.537",
+ "lastModified": "2024-02-29T01:37:41.760",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1947.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1947.json
index d70b8275d5b..01436289fe7 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1947.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1947.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1947",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-07T23:15:08.547",
- "lastModified": "2023-11-07T04:05:28.783",
+ "lastModified": "2024-02-29T01:37:41.870",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1948.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1948.json
index 09ec3b27aa4..770cbc88759 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1948.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1948.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1948",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T08:15:07.033",
- "lastModified": "2023-12-21T04:01:19.607",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:41.980",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1949.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1949.json
index f5c57071bbe..ebb3c8ea6df 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1949.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1949.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1949",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T08:15:07.237",
- "lastModified": "2023-12-21T04:01:11.710",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:42.067",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1950.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1950.json
index 8f9e2788105..0ee78a0a763 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1950.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1950.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1950",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T08:15:07.303",
- "lastModified": "2023-12-21T04:01:16.593",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:42.160",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1951.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1951.json
index 6a9451e3bc5..d0dd0792cc9 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1951.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1951.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1951",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T08:15:07.357",
- "lastModified": "2024-02-13T08:15:54.117",
+ "lastModified": "2024-02-29T01:37:42.263",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1952.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1952.json
index 05d435ab756..fdf76cfecba 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1952.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1952.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1952",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T09:15:07.623",
- "lastModified": "2024-02-13T08:15:54.333",
+ "lastModified": "2024-02-29T01:37:42.377",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1953.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1953.json
index 087574cdb94..f7bc782a90f 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1953.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1953.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1953",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T10:15:06.977",
- "lastModified": "2024-02-13T08:15:54.557",
+ "lastModified": "2024-02-29T01:37:42.537",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1954.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1954.json
index 77e5e6bcfe5..4dfe0e28128 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1954.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1954.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1954",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T10:15:07.033",
- "lastModified": "2024-02-13T08:15:54.763",
+ "lastModified": "2024-02-29T01:37:42.697",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1955.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1955.json
index 39da974ce2f..7722358f3a3 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1955.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1955.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1955",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T10:15:07.080",
- "lastModified": "2024-02-13T08:15:54.983",
+ "lastModified": "2024-02-29T01:37:42.793",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1956.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1956.json
index 212f53ae7f2..fd140a73a7f 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1956.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1956.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1956",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T10:15:07.127",
- "lastModified": "2024-02-13T08:15:55.233",
+ "lastModified": "2024-02-29T01:37:42.870",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1957.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1957.json
index 9594c073098..1bead05fe30 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1957.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1957.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1957",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T11:15:06.830",
- "lastModified": "2024-02-13T08:15:55.467",
+ "lastModified": "2024-02-29T01:37:42.947",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1958.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1958.json
index 7e76b8e9573..f2d8120128b 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1958.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1958.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1958",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T11:15:06.890",
- "lastModified": "2024-02-13T08:15:55.693",
+ "lastModified": "2024-02-29T01:37:43.037",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1959.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1959.json
index eb36f0663c8..e9a02caffbe 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1959.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1959.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1959",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T11:15:06.943",
- "lastModified": "2024-02-13T08:15:55.917",
+ "lastModified": "2024-02-29T01:37:43.117",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1960.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1960.json
index 19a55e7b871..6302e97ef87 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1960.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1960.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1960",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T12:15:06.953",
- "lastModified": "2024-02-13T08:15:56.150",
+ "lastModified": "2024-02-29T01:37:43.190",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1961.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1961.json
index 7eebc0d4ab7..db83cd88697 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1961.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1961.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1961",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-08T12:15:07.010",
- "lastModified": "2024-02-13T08:15:56.383",
+ "lastModified": "2024-02-29T01:37:43.267",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1962.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1962.json
index f058e409b52..c88e5f5c1b3 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1962.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1962.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1962",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-09T08:15:07.437",
- "lastModified": "2023-11-07T04:05:34.460",
+ "lastModified": "2024-02-29T01:37:43.370",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1963.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1963.json
index 9f7be297181..2f51059c91f 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1963.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1963.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1963",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-09T08:15:07.623",
- "lastModified": "2023-12-21T04:01:03.833",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:43.473",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1964.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1964.json
index 603cb2df04b..a8ffd81a436 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1964.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1964.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-1964",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-09T09:15:07.077",
- "lastModified": "2023-12-21T04:00:50.573",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:37:43.557",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1969.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1969.json
index bf20f65749f..e406f0dac17 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1969.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1969.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1969",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T16:15:07.043",
- "lastModified": "2023-11-07T04:05:35.857",
+ "lastModified": "2024-02-29T01:37:43.687",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1970.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1970.json
index 9e69beabe11..003f5438ad2 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1970.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1970.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1970",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T16:15:07.140",
- "lastModified": "2024-02-13T08:15:56.613",
+ "lastModified": "2024-02-29T01:37:43.770",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1971.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1971.json
index 683a39ec754..09ca4d1b041 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1971.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1971.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1971",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-10T17:15:06.937",
- "lastModified": "2024-02-13T08:15:56.850",
+ "lastModified": "2024-02-29T01:37:43.843",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1983.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1983.json
index 934e591cc51..507efc7f70c 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1983.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1983.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1983",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-11T17:15:07.963",
- "lastModified": "2023-11-07T04:05:37.640",
+ "lastModified": "2024-02-29T01:37:44.010",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1984.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1984.json
index 3fbd9a39e92..c5760c51b74 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1984.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1984.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1984",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-11T18:15:58.547",
- "lastModified": "2023-11-07T04:05:38.003",
+ "lastModified": "2024-02-29T01:37:44.090",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1985.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1985.json
index d8b2dfa1515..f79893e23e3 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1985.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1985.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1985",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-11T18:15:58.633",
- "lastModified": "2024-02-13T08:15:57.077",
+ "lastModified": "2024-02-29T01:37:44.163",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1986.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1986.json
index 8fb9a52b3d9..dcb37aa5e3a 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1986.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1986.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1986",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-11T19:15:08.397",
- "lastModified": "2024-02-13T08:15:57.313",
+ "lastModified": "2024-02-29T01:37:44.243",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1987.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1987.json
index c04ab6915f5..3feeec20ea9 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1987.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1987.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1987",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-11T19:15:08.497",
- "lastModified": "2024-02-13T08:15:57.543",
+ "lastModified": "2024-02-29T01:37:44.330",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1988.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1988.json
index 03c8ca4b4c9..ebdf8e0bbc1 100644
--- a/CVE-2023/CVE-2023-19xx/CVE-2023-1988.json
+++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1988.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-1988",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-11T19:15:08.570",
- "lastModified": "2024-02-13T08:15:57.773",
+ "lastModified": "2024-02-29T01:37:44.430",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2035.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2035.json
index 7b3e66ab886..90efd7b0268 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2035.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2035.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2035",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T07:15:06.920",
- "lastModified": "2023-11-07T04:11:42.380",
+ "lastModified": "2024-02-29T01:38:50.170",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2036.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2036.json
index b0dfb786afd..4626cb1c036 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2036.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2036.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2036",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T07:15:07.040",
- "lastModified": "2023-11-07T04:11:42.610",
+ "lastModified": "2024-02-29T01:38:50.297",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2037.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2037.json
index b37a1fa5b0f..61d36880aa7 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2037.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2037.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2037",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T08:15:07.367",
- "lastModified": "2023-11-07T04:11:42.910",
+ "lastModified": "2024-02-29T01:38:50.417",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2038.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2038.json
index a7d5af2a735..b335a9a15a0 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2038.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2038.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2038",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T08:15:07.430",
- "lastModified": "2023-11-07T04:11:43.187",
+ "lastModified": "2024-02-29T01:38:50.533",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2039.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2039.json
index 24de97c38c8..a4d33c1b78a 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2039.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2039.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2039",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T08:15:07.497",
- "lastModified": "2023-11-07T04:11:43.473",
+ "lastModified": "2024-02-29T01:38:50.640",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2040.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2040.json
index e5b6090d2fb..694cae98f4a 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2040.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2040.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2040",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T09:15:07.453",
- "lastModified": "2023-11-07T04:11:43.817",
+ "lastModified": "2024-02-29T01:38:50.763",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2041.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2041.json
index 01ab8693400..9fff79b0778 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2041.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2041.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2041",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T09:15:07.540",
- "lastModified": "2023-11-07T04:11:44.067",
+ "lastModified": "2024-02-29T01:38:50.890",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2042.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2042.json
index 5d69e5a51ba..0fa32f6724d 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2042.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2042.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2042",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T10:15:09.837",
- "lastModified": "2024-02-13T08:15:58.020",
+ "lastModified": "2024-02-29T01:38:51.010",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2043.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2043.json
index 754f36527be..5fb9238d209 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2043.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2043.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2043",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T10:15:09.897",
- "lastModified": "2023-11-07T04:11:44.967",
+ "lastModified": "2024-02-29T01:38:51.143",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2044.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2044.json
index 357a6b12c25..9caf99eab3d 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2044.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2044.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2044",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T10:15:09.943",
- "lastModified": "2023-11-07T04:11:45.330",
+ "lastModified": "2024-02-29T01:38:51.263",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2047.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2047.json
index ae709840efa..88ef1125da5 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2047.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2047.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2047",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T11:15:06.943",
- "lastModified": "2023-11-07T04:11:45.817",
+ "lastModified": "2024-02-29T01:38:51.420",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2048.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2048.json
index fa78c1e9e0f..46b6b688bd9 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2048.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2048.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2048",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T11:15:07.020",
- "lastModified": "2023-11-07T04:11:46.130",
+ "lastModified": "2024-02-29T01:38:51.547",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2049.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2049.json
index 8ca4b18eb72..1dd2a718468 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2049.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2049.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2049",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T11:15:07.077",
- "lastModified": "2023-11-07T04:11:46.493",
+ "lastModified": "2024-02-29T01:38:51.670",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2050.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2050.json
index 52c36b1fdcb..71bda1e8881 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2050.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2050.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2050",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T12:15:07.847",
- "lastModified": "2023-11-07T04:11:46.860",
+ "lastModified": "2024-02-29T01:38:51.787",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2051.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2051.json
index aceabd58612..aa0edfad64d 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2051.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2051.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2051",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T12:15:07.900",
- "lastModified": "2023-11-07T04:11:47.207",
+ "lastModified": "2024-02-29T01:38:51.913",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2052.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2052.json
index df8edfdec94..8dc4c45e7dc 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2052.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2052.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2052",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T12:15:07.957",
- "lastModified": "2023-11-07T04:11:47.580",
+ "lastModified": "2024-02-29T01:38:52.037",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2053.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2053.json
index 9e685773ba5..745393afcbb 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2053.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2053.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2053",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T13:15:07.977",
- "lastModified": "2023-11-07T04:11:48.023",
+ "lastModified": "2024-02-29T01:38:52.163",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2054.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2054.json
index b82e731beb5..b86bb6c5dcc 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2054.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2054.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2054",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T13:15:08.037",
- "lastModified": "2023-11-07T04:11:48.633",
+ "lastModified": "2024-02-29T01:38:52.270",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2055.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2055.json
index 5da1e013a6e..26fccfde77b 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2055.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2055.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2055",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T13:15:08.087",
- "lastModified": "2023-11-07T04:11:49.117",
+ "lastModified": "2024-02-29T01:38:52.380",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2056.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2056.json
index ca2b4799210..a5cb31b670f 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2056.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2056.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2056",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T14:15:11.793",
- "lastModified": "2023-11-07T04:11:49.510",
+ "lastModified": "2024-02-29T01:38:52.510",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2057.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2057.json
index 61254652add..3708f40747a 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2057.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2057.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2057",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T14:15:11.877",
- "lastModified": "2023-11-07T04:11:49.870",
+ "lastModified": "2024-02-29T01:38:52.630",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2058.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2058.json
index 9ed75aa26a5..18e20f5cc3d 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2058.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2058.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2058",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T14:15:11.960",
- "lastModified": "2023-11-07T04:11:50.243",
+ "lastModified": "2024-02-29T01:38:52.743",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2059.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2059.json
index c6e3591a83c..cefd184d111 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2059.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2059.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2059",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T15:15:07.600",
- "lastModified": "2023-11-07T04:11:50.623",
+ "lastModified": "2024-02-29T01:38:52.860",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2073.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2073.json
index 7cb61222bc9..e3acdba6d76 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2073.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2073.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2073",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T19:15:09.500",
- "lastModified": "2023-11-07T04:11:52.003",
+ "lastModified": "2024-02-29T01:38:53.497",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2074.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2074.json
index 3cdecc822e5..74c8dbafa2e 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2074.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2074.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2074",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T20:15:09.733",
- "lastModified": "2023-11-07T04:11:52.490",
+ "lastModified": "2024-02-29T01:38:53.607",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2075.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2075.json
index eb83980c60b..06003a16535 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2075.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2075.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2075",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T20:15:09.790",
- "lastModified": "2023-11-07T04:11:52.870",
+ "lastModified": "2024-02-29T01:38:53.727",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2076.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2076.json
index baba81fb7b3..c889a174ce7 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2076.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2076.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2076",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T20:15:09.840",
- "lastModified": "2023-11-07T04:11:53.223",
+ "lastModified": "2024-02-29T01:38:53.843",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2077.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2077.json
index 76e1acf1062..b84f90a869e 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2077.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2077.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2077",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-14T20:15:09.897",
- "lastModified": "2023-11-07T04:11:53.690",
+ "lastModified": "2024-02-29T01:38:53.963",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2089.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2089.json
index e452b335b64..170019c81f4 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2089.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2089.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2089",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T08:15:07.603",
- "lastModified": "2023-11-07T04:11:55.557",
+ "lastModified": "2024-02-29T01:38:54.400",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2090.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2090.json
index 4f5808cd813..9b6a4ac8af5 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2090.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2090.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2090",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T09:15:07.143",
- "lastModified": "2023-11-07T04:11:55.817",
+ "lastModified": "2024-02-29T01:38:54.520",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2091.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2091.json
index 77265492950..e4c8b1f6ab0 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2091.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2091.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2091",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T09:15:07.683",
- "lastModified": "2024-02-13T08:15:58.250",
+ "lastModified": "2024-02-29T01:38:54.643",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2092.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2092.json
index 4d215da8cfe..d604d5c1f0a 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2092.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2092.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2092",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T10:15:07.023",
- "lastModified": "2023-11-07T04:11:56.310",
+ "lastModified": "2024-02-29T01:38:54.800",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2093.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2093.json
index 3fb1f4fa82d..f5e7a20dd89 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2093.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2093.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2093",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T10:15:07.087",
- "lastModified": "2023-11-07T04:11:56.563",
+ "lastModified": "2024-02-29T01:38:54.960",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2094.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2094.json
index 5d7776f21e9..ee5c3e06ee7 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2094.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2094.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2094",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T11:15:06.843",
- "lastModified": "2023-11-07T04:11:56.803",
+ "lastModified": "2024-02-29T01:38:55.083",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2095.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2095.json
index 169385db10e..85dd98331de 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2095.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2095.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2095",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T11:15:06.910",
- "lastModified": "2023-11-07T04:11:57.050",
+ "lastModified": "2024-02-29T01:38:55.210",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2096.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2096.json
index b6a036280fe..da4feb0d0fe 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2096.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2096.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2096",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T11:15:06.967",
- "lastModified": "2023-11-07T04:11:57.273",
+ "lastModified": "2024-02-29T01:38:55.320",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2097.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2097.json
index a79a8cef6d6..37aaa1c50f0 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2097.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2097.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2097",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T12:15:07.277",
- "lastModified": "2023-11-07T04:11:57.503",
+ "lastModified": "2024-02-29T01:38:55.453",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2098.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2098.json
index 8e24d808137..f272dd8470f 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2098.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2098.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2098",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T12:15:07.337",
- "lastModified": "2023-11-07T04:11:57.817",
+ "lastModified": "2024-02-29T01:38:55.587",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2099.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2099.json
index 4382c0d3542..ba349c6ecc6 100644
--- a/CVE-2023/CVE-2023-20xx/CVE-2023-2099.json
+++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2099.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2099",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T12:15:07.400",
- "lastModified": "2023-11-07T04:11:58.117",
+ "lastModified": "2024-02-29T01:38:55.703",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2100.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2100.json
index 8cea8ad123e..1e8a9d9fb25 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2100.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2100.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2100",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T13:15:45.033",
- "lastModified": "2023-11-07T04:11:58.350",
+ "lastModified": "2024-02-29T01:38:55.823",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2101.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2101.json
index 98d05fb7323..dfe06c86dc4 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2101.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2101.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2101",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T13:15:45.083",
- "lastModified": "2023-11-07T04:11:58.607",
+ "lastModified": "2024-02-29T01:38:55.933",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2107.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2107.json
index ee2f64f76f4..2be4b01b305 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2107.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2107.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2107",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-15T14:15:07.833",
- "lastModified": "2023-11-07T04:11:58.947",
+ "lastModified": "2024-02-29T01:38:56.120",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2108.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2108.json
index 05a20f3dc18..15effef5d60 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2108.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2108.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2108",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-16T08:15:07.687",
- "lastModified": "2023-11-07T04:11:59.247",
+ "lastModified": "2024-02-29T01:38:56.213",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2130.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2130.json
index 71e64c60699..2b8577fc2ca 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2130.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2130.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2130",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-17T20:15:07.243",
- "lastModified": "2023-11-07T04:12:00.890",
+ "lastModified": "2024-02-29T01:38:56.603",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2144.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2144.json
index 7b2c9016914..3c151a478e9 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2144.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2144.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2144",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-18T11:15:07.480",
- "lastModified": "2023-11-07T04:12:01.520",
+ "lastModified": "2024-02-29T01:38:56.873",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2145.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2145.json
index 847adf1c0e5..40f30b977ac 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2145.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2145.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2145",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-18T11:15:07.550",
- "lastModified": "2023-11-07T04:12:01.767",
+ "lastModified": "2024-02-29T01:38:56.987",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2146.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2146.json
index c026b7663c7..74a507b729e 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2146.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2146.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2146",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-18T12:15:07.593",
- "lastModified": "2023-11-07T04:12:01.997",
+ "lastModified": "2024-02-29T01:38:57.103",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2147.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2147.json
index 8b592fe29fb..72c28685f76 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2147.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2147.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2147",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-18T12:15:07.660",
- "lastModified": "2023-11-07T04:12:02.257",
+ "lastModified": "2024-02-29T01:38:57.250",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2148.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2148.json
index eb47ef76763..df6ae3dec03 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2148.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2148.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2148",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-18T13:15:09.257",
- "lastModified": "2023-11-07T04:12:02.510",
+ "lastModified": "2024-02-29T01:38:57.400",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2149.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2149.json
index a408ba49bda..0b056c31bc7 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2149.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2149.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2149",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-18T13:15:09.330",
- "lastModified": "2023-11-07T04:12:02.767",
+ "lastModified": "2024-02-29T01:38:57.543",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2150.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2150.json
index a1d26b62e2c..baf0f738d12 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2150.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2150.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2150",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-18T13:15:09.393",
- "lastModified": "2023-11-07T04:12:03.043",
+ "lastModified": "2024-02-29T01:38:57.677",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2151.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2151.json
index 867a55ee96b..bbd27b17e4c 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2151.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2151.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2151",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-18T13:15:09.467",
- "lastModified": "2023-11-07T04:12:03.337",
+ "lastModified": "2024-02-29T01:38:57.803",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2152.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2152.json
index 2d3d80d4994..a840a32eedc 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2152.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2152.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2152",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-18T14:15:07.430",
- "lastModified": "2023-11-07T04:12:03.630",
+ "lastModified": "2024-02-29T01:38:57.940",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2153.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2153.json
index 9b4c741df2e..20decb662ae 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2153.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2153.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2153",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-18T14:15:07.503",
- "lastModified": "2023-11-07T04:12:03.900",
+ "lastModified": "2024-02-29T01:38:58.077",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2154.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2154.json
index 971254f139b..1bfa76c60b9 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2154.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2154.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2154",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-18T15:15:07.863",
- "lastModified": "2023-11-07T04:12:04.130",
+ "lastModified": "2024-02-29T01:38:58.217",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2155.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2155.json
index 88180eeb1e0..2afc2f32a76 100644
--- a/CVE-2023/CVE-2023-21xx/CVE-2023-2155.json
+++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2155.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2155",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-18T15:15:07.920",
- "lastModified": "2023-11-07T04:12:04.377",
+ "lastModified": "2024-02-29T01:38:58.357",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2204.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2204.json
index e49f4f6aef6..8621e8e4872 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2204.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2204.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2204",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T07:15:07.260",
- "lastModified": "2023-11-07T04:12:08.470",
+ "lastModified": "2024-02-29T01:38:59.253",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2205.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2205.json
index 93325e71569..a6c88276147 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2205.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2205.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2205",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T07:15:07.410",
- "lastModified": "2023-11-07T04:12:08.830",
+ "lastModified": "2024-02-29T01:38:59.370",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2206.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2206.json
index bf9cefe2d2e..3b9d610ec8c 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2206.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2206.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2206",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T08:15:07.093",
- "lastModified": "2023-11-07T04:12:09.083",
+ "lastModified": "2024-02-29T01:38:59.503",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2207.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2207.json
index 5c10c3075c2..75deb4293b5 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2207.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2207.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2207",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T08:15:07.157",
- "lastModified": "2023-11-07T04:12:09.360",
+ "lastModified": "2024-02-29T01:38:59.633",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2208.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2208.json
index 86c6557773d..f2694e15a86 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2208.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2208.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2208",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T08:15:07.220",
- "lastModified": "2023-11-07T04:12:09.823",
+ "lastModified": "2024-02-29T01:38:59.770",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2209.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2209.json
index d057f99ea2f..751a53175bb 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2209.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2209.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2209",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T09:15:07.837",
- "lastModified": "2023-11-07T04:12:10.160",
+ "lastModified": "2024-02-29T01:38:59.897",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2210.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2210.json
index bf40e3cd873..ee9ec70f114 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2210.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2210.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2210",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T09:15:07.970",
- "lastModified": "2023-11-07T04:12:10.430",
+ "lastModified": "2024-02-29T01:39:00.020",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2211.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2211.json
index 9033f58fc3b..db8048ff723 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2211.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2211.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2211",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T09:15:08.050",
- "lastModified": "2023-11-07T04:12:10.710",
+ "lastModified": "2024-02-29T01:39:00.140",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2212.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2212.json
index 5af33a68d1e..0c8ca1ad0db 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2212.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2212.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2212",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T10:15:07.610",
- "lastModified": "2023-11-07T04:12:10.973",
+ "lastModified": "2024-02-29T01:39:00.267",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2213.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2213.json
index 37c053414dd..598bf140272 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2213.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2213.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2213",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T10:15:07.687",
- "lastModified": "2023-11-07T04:12:11.237",
+ "lastModified": "2024-02-29T01:39:00.390",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2214.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2214.json
index 2452cc0aa57..c1abe8d8866 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2214.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2214.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2214",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T10:15:07.740",
- "lastModified": "2023-11-07T04:12:11.483",
+ "lastModified": "2024-02-29T01:39:00.527",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2215.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2215.json
index 6b44b7d0733..c33bba0eac7 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2215.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2215.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2215",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T10:15:07.803",
- "lastModified": "2023-11-07T04:12:11.767",
+ "lastModified": "2024-02-29T01:39:00.667",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2216.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2216.json
index 22511988788..89128fdc855 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2216.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2216.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2216",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T11:15:06.933",
- "lastModified": "2023-11-07T04:12:12.000",
+ "lastModified": "2024-02-29T01:39:00.800",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2217.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2217.json
index ad4742500eb..db2a62f6955 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2217.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2217.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2217",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T11:15:07.003",
- "lastModified": "2023-11-07T04:12:12.273",
+ "lastModified": "2024-02-29T01:39:00.930",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2218.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2218.json
index f60fafc833b..2d909e29d52 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2218.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2218.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2218",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T11:15:07.060",
- "lastModified": "2023-11-07T04:12:12.563",
+ "lastModified": "2024-02-29T01:39:01.053",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2219.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2219.json
index f372d63dfaa..61e64fc515a 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2219.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2219.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2219",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T11:15:07.113",
- "lastModified": "2023-11-07T04:12:12.890",
+ "lastModified": "2024-02-29T01:39:01.140",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2220.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2220.json
index b996125874a..3f049cbce81 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2220.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2220.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2220",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T12:15:07.533",
- "lastModified": "2023-11-07T04:12:13.150",
+ "lastModified": "2024-02-29T01:39:01.247",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2231.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2231.json
index 4434637ca46..96758d58c90 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2231.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2231.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2231",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-21T15:15:07.823",
- "lastModified": "2023-11-07T04:12:14.240",
+ "lastModified": "2024-02-29T01:39:01.433",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2241.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2241.json
index 17fb0c16bf1..bc229de7906 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2241.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2241.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2241",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-22T16:15:42.050",
- "lastModified": "2023-11-07T04:12:14.750",
+ "lastModified": "2024-02-29T01:39:01.620",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2242.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2242.json
index 13fafb28539..ad8a4393139 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2242.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2242.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2242",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-22T16:15:42.157",
- "lastModified": "2023-11-07T04:12:15.020",
+ "lastModified": "2024-02-29T01:39:01.713",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2243.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2243.json
index 502b5491f50..023e43a4113 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2243.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2243.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2243",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-22T17:15:07.127",
- "lastModified": "2023-11-07T04:12:15.287",
+ "lastModified": "2024-02-29T01:39:01.817",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2244.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2244.json
index 54b416f7411..b5d1c23ee76 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2244.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2244.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2244",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-22T17:15:07.177",
- "lastModified": "2024-02-13T08:15:58.473",
+ "lastModified": "2024-02-29T01:39:01.923",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2245.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2245.json
index 69314da0d56..f0ebbe027a8 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2245.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2245.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2245",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-22T17:15:07.227",
- "lastModified": "2023-11-07T04:12:15.817",
+ "lastModified": "2024-02-29T01:39:02.013",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2246.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2246.json
index 25f86809ddb..12e606393ef 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2246.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2246.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2246",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-23T16:15:07.107",
- "lastModified": "2023-11-07T04:12:16.077",
+ "lastModified": "2024-02-29T01:39:02.100",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2293.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2293.json
index 737340234b6..214db430e1c 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2293.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2293.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2293",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-25T21:15:10.693",
- "lastModified": "2023-11-07T04:12:20.440",
+ "lastModified": "2024-02-29T01:39:02.620",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2294.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2294.json
index 7677a0be8bf..34472391409 100644
--- a/CVE-2023/CVE-2023-22xx/CVE-2023-2294.json
+++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2294.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2294",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-26T06:15:09.283",
- "lastModified": "2023-11-07T04:12:20.737",
+ "lastModified": "2024-02-29T01:39:02.713",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2344.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2344.json
index 348a1773a2b..9dd99b3f955 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2344.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2344.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2344",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-27T14:15:09.240",
- "lastModified": "2023-11-07T04:12:24.370",
+ "lastModified": "2024-02-29T01:39:03.250",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2345.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2345.json
index 45b7904c43d..9316fed9b79 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2345.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2345.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2345",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-27T15:15:13.187",
- "lastModified": "2023-11-07T04:12:24.610",
+ "lastModified": "2024-02-29T01:39:03.353",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2346.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2346.json
index 6a9ae6d4012..70534da01ad 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2346.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2346.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2346",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-27T15:15:13.400",
- "lastModified": "2023-11-07T04:12:24.877",
+ "lastModified": "2024-02-29T01:39:03.457",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2347.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2347.json
index f4eff3fe150..e3987d0084d 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2347.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2347.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2347",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-27T15:15:13.617",
- "lastModified": "2023-11-07T04:12:25.117",
+ "lastModified": "2024-02-29T01:39:03.547",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2348.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2348.json
index 8ade8a14da9..87950dc7da3 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2348.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2348.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2348",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-27T15:15:13.723",
- "lastModified": "2023-11-07T04:12:25.383",
+ "lastModified": "2024-02-29T01:39:03.637",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2349.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2349.json
index 2d273d21183..8b2f7b7c0b6 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2349.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2349.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2349",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-27T16:15:11.063",
- "lastModified": "2023-11-07T04:12:25.680",
+ "lastModified": "2024-02-29T01:39:03.727",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2350.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2350.json
index 1ace1abb76e..3b7dcb10cf3 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2350.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2350.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2350",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-27T16:15:11.207",
- "lastModified": "2023-11-07T04:12:25.923",
+ "lastModified": "2024-02-29T01:39:03.823",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2363.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2363.json
index 8a1a149bc12..2e5cee8cb15 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2363.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2363.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2363",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T11:15:08.847",
- "lastModified": "2023-11-07T04:12:27.107",
+ "lastModified": "2024-02-29T01:39:04.043",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2364.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2364.json
index d8a76cfcaee..cc127d396a3 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2364.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2364.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2364",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T11:15:08.923",
- "lastModified": "2023-11-07T04:12:27.350",
+ "lastModified": "2024-02-29T01:39:04.130",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.5
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2365.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2365.json
index eb8a5a37365..baee860547e 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2365.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2365.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2365",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T12:15:09.877",
- "lastModified": "2023-11-07T04:12:27.590",
+ "lastModified": "2024-02-29T01:39:04.223",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2366.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2366.json
index aa66f0eecf4..275a008e7a8 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2366.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2366.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2366",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T12:15:09.937",
- "lastModified": "2023-11-07T04:12:27.883",
+ "lastModified": "2024-02-29T01:39:04.320",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2367.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2367.json
index 733cabcc6d5..a3fd4c07d59 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2367.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2367.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2367",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T13:15:13.697",
- "lastModified": "2023-11-07T04:12:28.153",
+ "lastModified": "2024-02-29T01:39:04.423",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2368.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2368.json
index 8acf3272a92..6d82a8bdedf 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2368.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2368.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2368",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T13:15:13.797",
- "lastModified": "2023-11-07T04:12:28.410",
+ "lastModified": "2024-02-29T01:39:04.553",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2369.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2369.json
index ca45e5713c6..74bc2699e75 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2369.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2369.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2369",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T13:15:13.863",
- "lastModified": "2023-11-07T04:12:28.660",
+ "lastModified": "2024-02-29T01:39:04.880",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2370.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2370.json
index c9d93423f72..81ab4d640a4 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2370.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2370.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2370",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T14:15:10.807",
- "lastModified": "2023-11-07T04:12:28.907",
+ "lastModified": "2024-02-29T01:39:04.973",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2371.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2371.json
index a305031b5de..0a1eacb76b6 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2371.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2371.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2371",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T14:15:10.863",
- "lastModified": "2023-11-07T04:12:29.137",
+ "lastModified": "2024-02-29T01:39:05.090",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2372.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2372.json
index 369886fb63c..f9975206df7 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2372.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2372.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2372",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T14:15:10.917",
- "lastModified": "2023-11-07T04:12:29.400",
+ "lastModified": "2024-02-29T01:39:05.213",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2373.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2373.json
index 908d1d3a919..4b35087857b 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2373.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2373.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2373",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T14:15:10.977",
- "lastModified": "2023-11-07T04:12:29.633",
+ "lastModified": "2024-02-29T01:39:05.320",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2374.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2374.json
index 57057a95882..91cf2e8e476 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2374.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2374.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2374",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T15:15:10.847",
- "lastModified": "2023-11-07T04:12:29.890",
+ "lastModified": "2024-02-29T01:39:05.443",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2375.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2375.json
index 193d7b9aa8a..1ec04f44eac 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2375.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2375.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2375",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T15:15:10.903",
- "lastModified": "2024-02-13T08:15:58.697",
+ "lastModified": "2024-02-29T01:39:05.560",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2376.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2376.json
index bed814508e3..4dc2d9f0d45 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2376.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2376.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2376",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T16:15:09.933",
- "lastModified": "2024-02-13T08:15:58.947",
+ "lastModified": "2024-02-29T01:39:05.683",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2377.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2377.json
index cce046ed109..d9f75e6fd15 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2377.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2377.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2377",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T16:15:10.003",
- "lastModified": "2024-02-13T08:15:59.213",
+ "lastModified": "2024-02-29T01:39:05.793",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2378.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2378.json
index 06916728f74..769fec076f1 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2378.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2378.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2378",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T16:15:10.063",
- "lastModified": "2023-11-07T04:12:31.030",
+ "lastModified": "2024-02-29T01:39:05.900",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2379.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2379.json
index 635a21649b8..5f8f3c6454d 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2379.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2379.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2379",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T17:15:43.067",
- "lastModified": "2024-02-13T08:15:59.713",
+ "lastModified": "2024-02-29T01:39:06.000",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2380.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2380.json
index 531f00ae654..aedeaa14633 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2380.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2380.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2380",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T17:15:43.130",
- "lastModified": "2024-02-13T08:16:00.203",
+ "lastModified": "2024-02-29T01:39:06.110",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2381.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2381.json
index 21546cb8379..a47ba7043f1 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2381.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2381.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2381",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T17:15:43.187",
- "lastModified": "2023-11-07T04:12:31.780",
+ "lastModified": "2024-02-29T01:39:06.207",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2382.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2382.json
index 3db0bf21691..3caebf708a9 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2382.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2382.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2382",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T17:15:43.240",
- "lastModified": "2024-02-13T08:16:00.493",
+ "lastModified": "2024-02-29T01:39:06.290",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2383.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2383.json
index 7810dc30cb3..c449b945c07 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2383.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2383.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2383",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T18:15:26.457",
- "lastModified": "2024-02-13T08:16:00.757",
+ "lastModified": "2024-02-29T01:39:06.380",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2384.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2384.json
index a8ed1d2f755..e423ddbed89 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2384.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2384.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2384",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T18:15:26.530",
- "lastModified": "2024-02-13T08:16:00.973",
+ "lastModified": "2024-02-29T01:39:06.480",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2385.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2385.json
index f4a3f15288c..5d83a0b38f6 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2385.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2385.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2385",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T18:15:26.607",
- "lastModified": "2024-02-13T08:16:01.207",
+ "lastModified": "2024-02-29T01:39:06.590",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2386.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2386.json
index d34b2356459..a8536f3aced 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2386.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2386.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2386",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T19:15:16.863",
- "lastModified": "2023-11-07T04:12:33.053",
+ "lastModified": "2024-02-29T01:39:06.683",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2387.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2387.json
index fc3d71022bb..1a2d1a075c3 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2387.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2387.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2387",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T19:15:16.923",
- "lastModified": "2023-11-07T04:12:33.303",
+ "lastModified": "2024-02-29T01:39:06.777",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2388.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2388.json
index 221892ba70b..22edf509679 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2388.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2388.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2388",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T20:15:14.020",
- "lastModified": "2024-02-13T08:16:01.450",
+ "lastModified": "2024-02-29T01:39:06.867",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2389.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2389.json
index 341c9e31b44..92abc7fd441 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2389.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2389.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2389",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T20:15:14.090",
- "lastModified": "2024-02-13T08:16:01.760",
+ "lastModified": "2024-02-29T01:39:06.973",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2390.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2390.json
index b97c26c5ec2..e0bd7086db7 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2390.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2390.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2390",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T20:15:14.167",
- "lastModified": "2023-11-07T04:12:34.107",
+ "lastModified": "2024-02-29T01:39:07.063",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2391.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2391.json
index 3c6d73f9539..3ee8a874c45 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2391.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2391.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2391",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T21:15:08.827",
- "lastModified": "2023-11-07T04:12:34.323",
+ "lastModified": "2024-02-29T01:39:07.153",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2392.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2392.json
index f57ed0d97fd..2db41224fed 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2392.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2392.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2392",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T21:15:08.900",
- "lastModified": "2024-02-13T08:16:02.100",
+ "lastModified": "2024-02-29T01:39:07.243",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2393.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2393.json
index 35be4e82aa8..3d679f71cbe 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2393.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2393.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2393",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T21:15:08.963",
- "lastModified": "2024-02-13T08:16:02.347",
+ "lastModified": "2024-02-29T01:39:07.337",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2394.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2394.json
index b6364cfaab6..f0f10f4e84f 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2394.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2394.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2394",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T21:15:09.020",
- "lastModified": "2024-02-13T08:16:02.650",
+ "lastModified": "2024-02-29T01:39:07.453",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2395.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2395.json
index 40d88f0b2b3..66ac2d84858 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2395.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2395.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2395",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T22:15:09.130",
- "lastModified": "2024-02-13T08:16:03.010",
+ "lastModified": "2024-02-29T01:39:07.560",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2396.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2396.json
index 6eded037b27..0a725fe9206 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2396.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2396.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2396",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T22:15:09.190",
- "lastModified": "2024-02-13T08:16:03.277",
+ "lastModified": "2024-02-29T01:39:07.657",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2397.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2397.json
index 255315eb2b5..fa73b59b6fc 100644
--- a/CVE-2023/CVE-2023-23xx/CVE-2023-2397.json
+++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2397.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2397",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T22:15:09.247",
- "lastModified": "2023-11-07T04:12:35.823",
+ "lastModified": "2024-02-29T01:39:07.747",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2408.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2408.json
index 7a59f87117c..fa5c8b41b60 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2408.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2408.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2408",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T23:15:08.267",
- "lastModified": "2023-11-07T04:12:37.180",
+ "lastModified": "2024-02-29T01:39:07.983",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2409.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2409.json
index 02b09d44155..ec5142ff8a9 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2409.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2409.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2409",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T23:15:08.337",
- "lastModified": "2023-11-07T04:12:37.423",
+ "lastModified": "2024-02-29T01:39:08.087",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2410.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2410.json
index b1847da2230..a5a2847d983 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2410.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2410.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2410",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T23:15:08.397",
- "lastModified": "2023-11-07T04:12:37.683",
+ "lastModified": "2024-02-29T01:39:08.177",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2411.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2411.json
index 5b4aeddd9eb..a7a6fe21621 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2411.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2411.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2411",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-28T23:15:08.460",
- "lastModified": "2023-11-07T04:12:37.910",
+ "lastModified": "2024-02-29T01:39:08.277",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2412.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2412.json
index 2d81b0ab1df..1c38386f37b 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2412.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2412.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2412",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-29T00:15:08.857",
- "lastModified": "2023-11-07T04:12:38.153",
+ "lastModified": "2024-02-29T01:39:08.400",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2413.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2413.json
index 84d21914c80..3587f79a608 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2413.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2413.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2413",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-29T00:15:08.937",
- "lastModified": "2023-11-07T04:12:38.397",
+ "lastModified": "2024-02-29T01:39:08.503",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2417.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2417.json
index 46e63b84000..76556fe1132 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2417.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2417.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2417",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-29T01:15:08.867",
- "lastModified": "2023-11-07T04:12:39.117",
+ "lastModified": "2024-02-29T01:39:09.210",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2418.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2418.json
index 1518ab62d1a..370eb97505c 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2418.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2418.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2418",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-29T01:15:08.980",
- "lastModified": "2024-02-13T08:16:03.520",
+ "lastModified": "2024-02-29T01:39:10.223",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2419.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2419.json
index 6212e8e4d1c..ac5723b83d8 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2419.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2419.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2419",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-29T01:15:09.063",
- "lastModified": "2023-11-07T04:12:39.647",
+ "lastModified": "2024-02-29T01:39:10.937",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2420.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2420.json
index 22f07ce4744..a96a356872b 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2420.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2420.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2420",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-29T02:15:09.383",
- "lastModified": "2024-02-13T08:16:03.877",
+ "lastModified": "2024-02-29T01:39:11.047",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2421.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2421.json
index 47e590976b4..2fffc780082 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2421.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2421.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2421",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-29T02:15:09.450",
- "lastModified": "2023-11-07T04:12:40.120",
+ "lastModified": "2024-02-29T01:39:11.157",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2424.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2424.json
index e395af891b0..207b03e0835 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2424.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2424.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2424",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-29T08:15:11.327",
- "lastModified": "2023-11-07T04:12:40.660",
+ "lastModified": "2024-02-29T01:39:11.313",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2425.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2425.json
index e67a241498d..c8a8fdaef56 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2425.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2425.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2425",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-04-29T08:15:11.447",
- "lastModified": "2023-11-07T04:12:40.910",
+ "lastModified": "2024-02-29T01:39:11.417",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2451.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2451.json
index 80ef2d99055..51efa6355e0 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2451.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2451.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2451",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-01T16:15:11.640",
- "lastModified": "2023-11-07T04:12:42.387",
+ "lastModified": "2024-02-29T01:39:11.830",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2473.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2473.json
index 00ee1ac5cae..bf717a7fb21 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2473.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2473.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2473",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T13:15:25.090",
- "lastModified": "2023-11-07T04:12:43.367",
+ "lastModified": "2024-02-29T01:39:12.050",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2474.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2474.json
index 0caad34b272..ad2f2dead1d 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2474.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2474.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2474",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T13:15:25.197",
- "lastModified": "2023-11-07T04:12:43.630",
+ "lastModified": "2024-02-29T01:39:12.137",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2475.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2475.json
index 0ef9572b733..031248fadd6 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2475.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2475.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-2475",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T13:15:25.287",
- "lastModified": "2023-11-16T01:24:26.413",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:39:12.210",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Dromara J2eeFAST up to 2.6.0 and classified as problematic. This issue affects some unknown processing of the component System Message Handler. The manipulation of the argument ?? leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-227867."
+ "value": "A vulnerability was found in Dromara J2eeFAST up to 2.6.0 and classified as problematic. This issue affects some unknown processing of the component System Message Handler. The manipulation of the argument \u4e3b\u9898 leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-227867."
}
],
"metrics": {
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2476.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2476.json
index 9bf790533e3..5c7088567a6 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2476.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2476.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-2476",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T14:15:09.273",
- "lastModified": "2023-11-15T02:38:36.243",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:39:12.297",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability was found in Dromara J2eeFAST up to 2.6.0. It has been classified as problematic. Affected is an unknown function of the component Announcement Handler. The manipulation of the argument ????/???? leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-227868."
+ "value": "A vulnerability was found in Dromara J2eeFAST up to 2.6.0. It has been classified as problematic. Affected is an unknown function of the component Announcement Handler. The manipulation of the argument \u7cfb\u7edf\u5de5\u5177/\u516c\u544a\u7ba1\u7406 leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-227868."
}
],
"metrics": {
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2477.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2477.json
index 7d8173e15ae..50901acf6cc 100644
--- a/CVE-2023/CVE-2023-24xx/CVE-2023-2477.json
+++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2477.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2477",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T14:15:09.353",
- "lastModified": "2023-11-07T04:12:44.640",
+ "lastModified": "2024-02-29T01:39:12.380",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25921.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25921.json
new file mode 100644
index 00000000000..040051852f8
--- /dev/null
+++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25921.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-25921",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2024-02-29T01:38:24.113",
+ "lastModified": "2024-02-29T01:38:24.113",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "\nIBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 allows the attacker to upload or transfer files of dangerous types that can be automatically processed within the product's environment. IBM X-Force ID: 247620.\n\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "HIGH",
+ "availabilityImpact": "HIGH",
+ "baseScore": 8.5,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 6.0
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-434"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/247620",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/6964516",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25926.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25926.json
new file mode 100644
index 00000000000..93cf5b9e10d
--- /dev/null
+++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25926.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-25926",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2024-02-29T01:38:24.377",
+ "lastModified": "2024-02-29T01:38:24.377",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Security Guardium Key Lifecycle Manager 3.0, 3.0.1, 4.0, 4.1, and 4.1.1 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 247599."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 4.2
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-611"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/247599",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/6964516",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25987.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25987.json
index 0005949212e..5a4e68138bb 100644
--- a/CVE-2023/CVE-2023-259xx/CVE-2023-25987.json
+++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25987.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-25987",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-22T18:15:08.283",
- "lastModified": "2023-11-27T21:36:53.977",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:38:25.037",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Cross-Site Request Forgery (CSRF) vulnerability in Aleksandar Uro\u0161evi? My YouTube Channel plugin <=\u00a03.23.3 versions."
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in Aleksandar Uro\u0161evi\u0107 My YouTube Channel plugin <=\u00a03.23.3 versions."
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2519.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2519.json
index 925345226a1..ce4b5712fdc 100644
--- a/CVE-2023/CVE-2023-25xx/CVE-2023-2519.json
+++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2519.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2519",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-04T17:15:13.753",
- "lastModified": "2023-11-07T04:12:49.047",
+ "lastModified": "2024-02-29T01:39:12.803",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2520.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2520.json
index d8b879c0fe9..b1976bfc8dc 100644
--- a/CVE-2023/CVE-2023-25xx/CVE-2023-2520.json
+++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2520.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2520",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-04T17:15:13.843",
- "lastModified": "2023-11-07T04:12:49.330",
+ "lastModified": "2024-02-29T01:39:12.890",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2521.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2521.json
index 2798d687ef6..fba6e248313 100644
--- a/CVE-2023/CVE-2023-25xx/CVE-2023-2521.json
+++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2521.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2521",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-04T17:15:13.917",
- "lastModified": "2023-11-07T04:12:49.650",
+ "lastModified": "2024-02-29T01:39:12.963",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2522.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2522.json
index 1a3afcef350..3d21d3aff58 100644
--- a/CVE-2023/CVE-2023-25xx/CVE-2023-2522.json
+++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2522.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2522",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-04T18:15:09.763",
- "lastModified": "2023-11-07T04:12:49.887",
+ "lastModified": "2024-02-29T01:39:13.040",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2523.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2523.json
index 29e61ecb2b7..ce75bc40800 100644
--- a/CVE-2023/CVE-2023-25xx/CVE-2023-2523.json
+++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2523.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2523",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-04T18:15:10.063",
- "lastModified": "2023-11-07T04:12:50.120",
+ "lastModified": "2024-02-29T01:39:13.120",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2524.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2524.json
index 6bad8a1938a..a1bd45a50b3 100644
--- a/CVE-2023/CVE-2023-25xx/CVE-2023-2524.json
+++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2524.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2524",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-04T19:15:09.123",
- "lastModified": "2023-11-07T04:12:50.353",
+ "lastModified": "2024-02-29T01:39:13.210",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2560.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2560.json
index 7dff8161508..308625898f5 100644
--- a/CVE-2023/CVE-2023-25xx/CVE-2023-2560.json
+++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2560.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2560",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-06T11:15:08.853",
- "lastModified": "2023-11-07T04:12:52.927",
+ "lastModified": "2024-02-29T01:39:13.550",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2565.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2565.json
index 4ad0cca3714..52e38bb5cf2 100644
--- a/CVE-2023/CVE-2023-25xx/CVE-2023-2565.json
+++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2565.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2565",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-07T15:15:08.813",
- "lastModified": "2023-11-07T04:12:53.610",
+ "lastModified": "2024-02-29T01:39:13.690",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2594.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2594.json
index 091f9fb0878..5f495e39c13 100644
--- a/CVE-2023/CVE-2023-25xx/CVE-2023-2594.json
+++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2594.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2594",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-09T13:15:17.910",
- "lastModified": "2023-11-07T04:12:55.343",
+ "lastModified": "2024-02-29T01:39:14.003",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2595.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2595.json
index f5c6357339d..673ba1879c6 100644
--- a/CVE-2023/CVE-2023-25xx/CVE-2023-2595.json
+++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2595.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2595",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-09T13:15:17.980",
- "lastModified": "2023-11-07T04:12:55.657",
+ "lastModified": "2024-02-29T01:39:14.093",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2596.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2596.json
index d774ddc6da4..bd2b5eac141 100644
--- a/CVE-2023/CVE-2023-25xx/CVE-2023-2596.json
+++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2596.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2596",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-09T13:15:18.043",
- "lastModified": "2023-11-07T04:12:55.943",
+ "lastModified": "2024-02-29T01:39:14.170",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26531.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26531.json
index ea5a574ebc9..0883ce96e8e 100644
--- a/CVE-2023/CVE-2023-265xx/CVE-2023-26531.json
+++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26531.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-26531",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T01:15:07.410",
- "lastModified": "2023-11-17T15:41:51.473",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:38:28.747",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Cross-Site Request Forgery (CSRF) vulnerability in ??? ?????????????-??Baidu/Google/Bing/IndexNow/Yandex/?? plugin <=\u00a04.2.7 versions."
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in \u95ea\u7535\u535a \u591a\u5408\u4e00\u641c\u7d22\u81ea\u52a8\u63a8\u9001\u7ba1\u7406\u63d2\u4ef6-\u652f\u6301Baidu/Google/Bing/IndexNow/Yandex/\u5934\u6761 plugin <=\u00a04.2.7 versions."
},
{
"lang": "es",
@@ -61,7 +61,7 @@
"weaknesses": [
{
"source": "audit@patchstack.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2617.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2617.json
index 559b1b30fce..054320dba64 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2617.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2617.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2617",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-10T06:15:16.853",
- "lastModified": "2024-02-23T16:07:41.990",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:39:14.440",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2618.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2618.json
index cd5328ee93e..41629651cc7 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2618.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2618.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2618",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-10T06:15:17.577",
- "lastModified": "2024-02-23T16:02:27.367",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:39:14.530",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2619.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2619.json
index 4981afa9153..6a36e3c926d 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2619.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2619.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2619",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-10T06:15:17.990",
- "lastModified": "2024-02-13T08:16:04.193",
+ "lastModified": "2024-02-29T01:39:14.610",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2641.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2641.json
index d59a7011113..1da749d82fb 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2641.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2641.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2641",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T06:15:09.317",
- "lastModified": "2023-11-07T04:13:00.227",
+ "lastModified": "2024-02-29T01:39:14.877",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2642.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2642.json
index 0b0438833c7..3c1bec132af 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2642.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2642.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2642",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T06:15:09.657",
- "lastModified": "2023-11-07T04:13:00.483",
+ "lastModified": "2024-02-29T01:39:14.967",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2643.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2643.json
index ca50f8600e0..6d6fa5c3803 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2643.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2643.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2643",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T07:15:08.370",
- "lastModified": "2024-02-13T08:16:04.677",
+ "lastModified": "2024-02-29T01:39:15.040",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2644.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2644.json
index 1ac24f84e51..e61c7ae96d6 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2644.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2644.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2644",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T07:15:08.480",
- "lastModified": "2023-11-07T04:13:01.070",
+ "lastModified": "2024-02-29T01:39:15.117",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2645.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2645.json
index ec251e01f10..62f49064622 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2645.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2645.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2645",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T07:15:08.567",
- "lastModified": "2023-11-07T04:13:01.317",
+ "lastModified": "2024-02-29T01:39:15.213",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2646.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2646.json
index ec982ab44c4..5a6d2dd5020 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2646.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2646.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2646",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T08:15:08.620",
- "lastModified": "2023-11-07T04:13:01.580",
+ "lastModified": "2024-02-29T01:39:15.323",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2647.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2647.json
index 60a3a778e5f..5e36396e712 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2647.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2647.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2647",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T08:15:08.700",
- "lastModified": "2023-11-07T04:13:01.823",
+ "lastModified": "2024-02-29T01:39:15.423",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2648.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2648.json
index affd6e3f85c..284f8418136 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2648.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2648.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2648",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T08:15:08.773",
- "lastModified": "2023-11-07T04:13:02.083",
+ "lastModified": "2024-02-29T01:39:15.507",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2649.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2649.json
index d9f6b7fcffe..998d75947d8 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2649.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2649.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2649",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T08:15:08.843",
- "lastModified": "2023-11-07T04:13:02.347",
+ "lastModified": "2024-02-29T01:39:15.590",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2652.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2652.json
index 26f4e418fa1..5137680d519 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2652.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2652.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2652",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T09:15:09.313",
- "lastModified": "2023-11-07T04:13:02.623",
+ "lastModified": "2024-02-29T01:39:15.690",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2653.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2653.json
index c8e0ed2e757..9f357cf87b7 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2653.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2653.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2653",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T09:15:09.723",
- "lastModified": "2023-11-07T04:13:02.857",
+ "lastModified": "2024-02-29T01:39:15.767",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2656.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2656.json
index 7037d17ec48..8527ccb09ba 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2656.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2656.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2656",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T13:15:13.850",
- "lastModified": "2023-11-07T04:13:03.270",
+ "lastModified": "2024-02-29T01:39:15.867",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2657.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2657.json
index a8235c32f60..53855f2b613 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2657.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2657.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2657",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T14:15:20.217",
- "lastModified": "2023-11-07T04:13:03.550",
+ "lastModified": "2024-02-29T01:39:15.957",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2658.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2658.json
index 8358e50d1c9..3e093b6f494 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2658.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2658.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2658",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T14:15:20.653",
- "lastModified": "2023-11-07T04:13:03.823",
+ "lastModified": "2024-02-29T01:39:16.040",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2659.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2659.json
index 5e85e9f337b..2d55eba547e 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2659.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2659.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2659",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T15:15:11.730",
- "lastModified": "2023-11-07T04:13:04.067",
+ "lastModified": "2024-02-29T01:39:16.113",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2660.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2660.json
index 294a8c8374a..c1f371f9889 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2660.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2660.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2660",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T15:15:11.830",
- "lastModified": "2023-11-07T04:13:04.323",
+ "lastModified": "2024-02-29T01:39:16.190",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2661.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2661.json
index 470105dd12f..e5868e12654 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2661.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2661.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2661",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-11T15:15:11.917",
- "lastModified": "2023-11-07T04:13:04.583",
+ "lastModified": "2024-02-29T01:39:16.273",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2667.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2667.json
index 945f9b401ce..68224675b08 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2667.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2667.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2667",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T07:15:08.627",
- "lastModified": "2023-11-15T02:40:56.260",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:39:16.403",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2668.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2668.json
index 32c95fd989c..4db397c4342 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2668.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2668.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2668",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T07:15:08.733",
- "lastModified": "2023-11-07T04:13:05.233",
+ "lastModified": "2024-02-29T01:39:16.500",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2669.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2669.json
index 2d2a10f85bb..532000eadf0 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2669.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2669.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2669",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T08:15:09.063",
- "lastModified": "2023-11-07T04:13:05.500",
+ "lastModified": "2024-02-29T01:39:16.590",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2670.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2670.json
index 7d35b4fa301..91641d36ce1 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2670.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2670.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2670",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T08:15:09.130",
- "lastModified": "2023-11-07T04:13:05.800",
+ "lastModified": "2024-02-29T01:39:16.683",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2671.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2671.json
index 2ec46e96411..4e7557f6b29 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2671.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2671.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2671",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T09:15:10.447",
- "lastModified": "2023-11-07T04:13:06.070",
+ "lastModified": "2024-02-29T01:39:16.760",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2672.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2672.json
index d4d91ac5fdc..55cbd410bb3 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2672.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2672.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2672",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T09:15:10.520",
- "lastModified": "2023-11-07T04:13:06.340",
+ "lastModified": "2024-02-29T01:39:16.837",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2676.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2676.json
index 1be57de425c..c0a05bd1202 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2676.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2676.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2676",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T09:15:10.610",
- "lastModified": "2023-11-07T04:13:06.907",
+ "lastModified": "2024-02-29T01:39:16.950",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2677.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2677.json
index d37d3bd3913..735790a7c90 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2677.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2677.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2677",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T10:15:09.073",
- "lastModified": "2023-11-07T04:13:07.143",
+ "lastModified": "2024-02-29T01:39:17.037",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2678.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2678.json
index 11bfba2aa38..b9add4c5e18 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2678.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2678.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2678",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T10:15:09.140",
- "lastModified": "2023-11-07T04:13:07.413",
+ "lastModified": "2024-02-29T01:39:17.113",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2682.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2682.json
index 0e2095de43d..2ba17391753 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2682.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2682.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2682",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T13:15:09.477",
- "lastModified": "2023-11-07T04:13:07.877",
+ "lastModified": "2024-02-29T01:39:17.220",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2689.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2689.json
index 91e9106fa62..45e1b716af8 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2689.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2689.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2689",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-14T08:15:18.897",
- "lastModified": "2023-11-07T04:13:08.447",
+ "lastModified": "2024-02-29T01:39:17.357",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2690.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2690.json
index 66e358a93bc..d5e4892635e 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2690.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2690.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2690",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-14T08:15:19.170",
- "lastModified": "2023-11-07T04:13:08.723",
+ "lastModified": "2024-02-29T01:39:17.437",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2691.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2691.json
index 7384b666e99..c50d38b7b51 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2691.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2691.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2691",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-14T09:15:09.270",
- "lastModified": "2023-11-07T04:13:08.983",
+ "lastModified": "2024-02-29T01:39:17.517",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2692.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2692.json
index 0626ab351d9..4e1ddc1712b 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2692.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2692.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2692",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-14T09:15:09.677",
- "lastModified": "2023-11-07T04:13:09.247",
+ "lastModified": "2024-02-29T01:39:17.600",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2693.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2693.json
index c2e4828c1fa..c0dcddb3581 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2693.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2693.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2693",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-14T09:15:09.753",
- "lastModified": "2023-11-07T04:13:09.520",
+ "lastModified": "2024-02-29T01:39:17.680",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2694.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2694.json
index 6e948c25cf4..5f7e981f634 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2694.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2694.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2694",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-14T10:15:08.720",
- "lastModified": "2023-11-07T04:13:09.817",
+ "lastModified": "2024-02-29T01:39:17.763",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2695.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2695.json
index dc3e9e41eef..f2bee091ea9 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2695.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2695.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2695",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-14T11:15:08.763",
- "lastModified": "2023-11-07T04:13:10.080",
+ "lastModified": "2024-02-29T01:39:17.840",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2696.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2696.json
index e1293283910..bbf61889e30 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2696.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2696.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2696",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-14T11:15:08.837",
- "lastModified": "2023-11-07T04:13:10.330",
+ "lastModified": "2024-02-29T01:39:17.917",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2697.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2697.json
index 3d89a508f79..7a36896d1ba 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2697.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2697.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2697",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-14T12:15:09.127",
- "lastModified": "2023-11-07T04:13:10.597",
+ "lastModified": "2024-02-29T01:39:18.007",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2698.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2698.json
index 27e4bbb9cf1..c60603a8c74 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2698.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2698.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2698",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-14T12:15:09.207",
- "lastModified": "2023-11-07T04:13:10.843",
+ "lastModified": "2024-02-29T01:39:18.090",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2699.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2699.json
index 252014be0e6..df6230fc0a5 100644
--- a/CVE-2023/CVE-2023-26xx/CVE-2023-2699.json
+++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2699.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2699",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-14T12:15:09.267",
- "lastModified": "2023-11-07T04:13:11.100",
+ "lastModified": "2024-02-29T01:39:18.170",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27151.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27151.json
new file mode 100644
index 00000000000..04476f630b6
--- /dev/null
+++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27151.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-27151",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:38:30.693",
+ "lastModified": "2024-02-29T01:38:30.693",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "openCRX 5.2.0 was discovered to contain an HTML injection vulnerability for Search Criteria-Activity Number (in the Saved Search Activity) via the Name, Description, or Activity Number field."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://www.esecforte.com/cve-2023-27151-html-injection-activity-tracker/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.opencrx.org/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27545.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27545.json
new file mode 100644
index 00000000000..7d628b726d0
--- /dev/null
+++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27545.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-27545",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2024-02-29T02:15:08.920",
+ "lastModified": "2024-02-29T02:15:08.920",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Watson CloudPak for Data Data Stores information disclosure 4.6.0 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 248947."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.0,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.5,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-525"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/248947",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/6965446",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2738.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2738.json
index 96602592efa..55eb3756586 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2738.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2738.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2738",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-16T15:15:09.110",
- "lastModified": "2023-12-16T04:28:21.150",
+ "lastModified": "2024-02-29T01:39:18.577",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2739.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2739.json
index 8a2b7a3890a..f05da58e7be 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2739.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2739.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2739",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-16T16:15:10.027",
- "lastModified": "2023-11-07T04:13:14.667",
+ "lastModified": "2024-02-29T01:39:18.670",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2740.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2740.json
index f122550c692..90aa7fd7101 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2740.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2740.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2740",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-16T17:15:11.433",
- "lastModified": "2023-11-07T04:13:14.947",
+ "lastModified": "2024-02-29T01:39:18.747",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2765.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2765.json
index 099b9720848..e2742967164 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2765.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2765.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2765",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-17T17:15:17.363",
- "lastModified": "2023-11-07T04:13:16.797",
+ "lastModified": "2024-02-29T01:39:19.037",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2766.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2766.json
index bb50edcf88f..a8e430256a4 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2766.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2766.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2766",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-17T17:15:17.443",
- "lastModified": "2023-11-07T04:13:17.050",
+ "lastModified": "2024-02-29T01:39:19.123",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2768.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2768.json
index e7105d5557a..3a766091671 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2768.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2768.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2768",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-17T17:15:17.523",
- "lastModified": "2023-11-07T04:13:17.470",
+ "lastModified": "2024-02-29T01:39:19.217",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2769.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2769.json
index f3d4cd46d06..15b85737ba3 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2769.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2769.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2769",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-17T18:15:09.317",
- "lastModified": "2023-11-07T04:13:17.733",
+ "lastModified": "2024-02-29T01:39:19.297",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2770.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2770.json
index 10a995f1694..22e87c560ab 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2770.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2770.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2770",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-17T18:15:09.377",
- "lastModified": "2023-11-07T04:13:17.997",
+ "lastModified": "2024-02-29T01:39:19.380",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2771.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2771.json
index e0193037ef8..dcb30a410c6 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2771.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2771.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2771",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-17T19:15:09.210",
- "lastModified": "2023-11-07T04:13:18.243",
+ "lastModified": "2024-02-29T01:39:19.470",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2772.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2772.json
index 22958731b1c..b8db8b84bde 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2772.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2772.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2772",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-17T19:15:09.277",
- "lastModified": "2024-02-03T03:17:41.110",
+ "lastModified": "2024-02-29T01:39:19.550",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2773.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2773.json
index 164ca059476..c6f6d95a4ce 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2773.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2773.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2773",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-17T19:15:09.340",
- "lastModified": "2023-11-07T04:13:18.767",
+ "lastModified": "2024-02-29T01:39:19.630",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2774.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2774.json
index 0db4091e107..86586017c1d 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2774.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2774.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2774",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-17T20:15:10.427",
- "lastModified": "2023-11-07T04:13:18.997",
+ "lastModified": "2024-02-29T01:39:19.710",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2775.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2775.json
index d798488b872..256d255ab64 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2775.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2775.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2775",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-17T20:15:10.513",
- "lastModified": "2023-11-07T04:13:19.240",
+ "lastModified": "2024-02-29T01:39:19.793",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2776.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2776.json
index 0ab283c343f..28ec7d6200e 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2776.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2776.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2776",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-17T20:15:10.597",
- "lastModified": "2023-11-07T04:13:19.483",
+ "lastModified": "2024-02-29T01:39:19.870",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2789.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2789.json
index 80bdd8a621f..11d1c0cf9fe 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2789.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2789.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2789",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-18T13:15:09.507",
- "lastModified": "2023-11-07T04:13:20.160",
+ "lastModified": "2024-02-29T01:39:20.060",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2790.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2790.json
index c1e3d21d565..329c3ce2df5 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2790.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2790.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2790",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-18T13:15:09.603",
- "lastModified": "2023-11-07T04:13:20.370",
+ "lastModified": "2024-02-29T01:39:20.150",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2799.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2799.json
index 1de5cede867..6f465baf14a 100644
--- a/CVE-2023/CVE-2023-27xx/CVE-2023-2799.json
+++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2799.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2799",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-18T16:15:09.970",
- "lastModified": "2024-02-13T08:16:05.003",
+ "lastModified": "2024-02-29T01:39:20.297",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2806.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2806.json
index 0611deab560..412ccf4091c 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2806.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2806.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2806",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-19T09:15:09.840",
- "lastModified": "2023-11-07T04:13:21.670",
+ "lastModified": "2024-02-29T01:39:20.437",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2814.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2814.json
index 38e61296c05..eb0cc6acbe3 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2814.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2814.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2814",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-19T17:15:09.163",
- "lastModified": "2023-11-07T04:13:22.400",
+ "lastModified": "2024-02-29T01:39:20.577",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2815.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2815.json
index b5657c4a985..f4b91cfe1c9 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2815.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2815.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2815",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-19T17:15:09.233",
- "lastModified": "2023-11-07T04:13:22.640",
+ "lastModified": "2024-02-29T01:39:20.653",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2822.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2822.json
index fcec44bed0e..7266975ed5d 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2822.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2822.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2822",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-20T07:15:43.913",
- "lastModified": "2023-11-07T04:13:23.247",
+ "lastModified": "2024-02-29T01:39:20.780",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2823.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2823.json
index df72a6520d0..fb5a784d92e 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2823.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2823.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2823",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-20T08:15:08.680",
- "lastModified": "2023-11-07T04:13:23.507",
+ "lastModified": "2024-02-29T01:39:20.863",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2824.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2824.json
index b563d7fdd88..faaabcc572d 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2824.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2824.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2824",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-20T08:15:08.763",
- "lastModified": "2023-11-07T04:13:23.790",
+ "lastModified": "2024-02-29T01:39:20.940",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2826.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2826.json
index 14d3f70f142..a30446d120a 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2826.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2826.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2826",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-21T08:15:08.643",
- "lastModified": "2023-11-07T04:13:24.040",
+ "lastModified": "2024-02-29T01:39:21.040",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2862.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2862.json
index 3f925dd48a1..d240ab44016 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2862.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2862.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2862",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-24T10:15:09.283",
- "lastModified": "2023-11-07T04:13:25.933",
+ "lastModified": "2024-02-29T01:39:21.493",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2863.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2863.json
index 8db0ee93a7f..80c3e20b853 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2863.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2863.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2863",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-24T10:15:09.407",
- "lastModified": "2023-11-07T04:13:26.180",
+ "lastModified": "2024-02-29T01:39:21.593",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2864.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2864.json
index 3166ddfde13..d7e431d40c3 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2864.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2864.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2864",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-24T11:15:09.237",
- "lastModified": "2023-11-07T04:13:26.460",
+ "lastModified": "2024-02-29T01:39:21.683",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2865.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2865.json
index a0eb26f4417..e23bfa0780d 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2865.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2865.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2865",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-24T11:15:09.317",
- "lastModified": "2023-11-07T04:13:26.757",
+ "lastModified": "2024-02-29T01:39:21.760",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2870.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2870.json
index de15b6bf60e..c96e8a43d68 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2870.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2870.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2870",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-24T18:15:10.217",
- "lastModified": "2023-11-07T04:13:27.183",
+ "lastModified": "2024-02-29T01:39:21.870",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2871.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2871.json
index cb2be7bb8ab..9da7efc000e 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2871.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2871.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2871",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-24T18:15:10.337",
- "lastModified": "2023-11-07T04:13:27.420",
+ "lastModified": "2024-02-29T01:39:21.947",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2872.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2872.json
index 3e74d5bd464..d926b5fafe8 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2872.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2872.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2872",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-24T18:15:10.413",
- "lastModified": "2023-11-07T04:13:27.680",
+ "lastModified": "2024-02-29T01:39:22.027",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2873.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2873.json
index 28a7a8a515e..149e6c3762c 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2873.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2873.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2873",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-24T18:15:10.493",
- "lastModified": "2023-11-07T04:13:27.937",
+ "lastModified": "2024-02-29T01:39:22.107",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2874.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2874.json
index d970401e7df..183372d1504 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2874.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2874.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2874",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-24T19:15:09.443",
- "lastModified": "2023-11-07T04:13:28.237",
+ "lastModified": "2024-02-29T01:39:22.190",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2875.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2875.json
index f297fdc6815..e4d4877b5d2 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2875.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2875.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2875",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-24T19:15:09.517",
- "lastModified": "2023-11-07T04:13:28.507",
+ "lastModified": "2024-02-29T01:39:22.270",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2888.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2888.json
index f1a51e154dd..65c7055f002 100644
--- a/CVE-2023/CVE-2023-28xx/CVE-2023-2888.json
+++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2888.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2888",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-25T13:15:09.310",
- "lastModified": "2023-11-07T04:13:29.037",
+ "lastModified": "2024-02-29T01:39:22.473",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2900.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2900.json
index 3f1a93020bf..567ec03940c 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2900.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2900.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2900",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-25T21:15:09.157",
- "lastModified": "2023-11-07T04:13:31.273",
+ "lastModified": "2024-02-29T01:39:22.647",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2901.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2901.json
index d9bf88b4df2..a9cd85138cc 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2901.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2901.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2901",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-25T22:15:09.517",
- "lastModified": "2023-11-07T04:13:31.523",
+ "lastModified": "2024-02-29T01:39:22.743",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2902.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2902.json
index 49c602685c7..8e429461940 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2902.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2902.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2902",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-25T22:15:09.600",
- "lastModified": "2023-11-07T04:13:31.857",
+ "lastModified": "2024-02-29T01:39:22.833",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2903.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2903.json
index 836681cefbf..0f08e8bbfdb 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2903.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2903.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2903",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-25T23:15:09.293",
- "lastModified": "2023-11-07T04:13:32.103",
+ "lastModified": "2024-02-29T01:39:22.913",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2922.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2922.json
index fe95231dd82..7f908c19fff 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2922.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2922.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2922",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-27T08:15:09.577",
- "lastModified": "2023-11-07T04:13:32.870",
+ "lastModified": "2024-02-29T01:39:23.137",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2923.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2923.json
index 4405d8421d6..0d728832532 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2923.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2923.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2923",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-27T08:15:10.297",
- "lastModified": "2023-11-07T04:13:33.150",
+ "lastModified": "2024-02-29T01:39:23.230",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2924.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2924.json
index 0a52c24eb95..44c53c6062b 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2924.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2924.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2924",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-27T08:15:10.377",
- "lastModified": "2023-11-07T04:13:33.403",
+ "lastModified": "2024-02-29T01:39:23.320",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2925.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2925.json
index a1bfb1330c6..4300328fe2c 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2925.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2925.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2925",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-27T09:15:09.487",
- "lastModified": "2023-11-07T04:13:33.693",
+ "lastModified": "2024-02-29T01:39:23.413",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2926.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2926.json
index 10719c91a40..f00d6063827 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2926.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2926.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2926",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-27T09:15:10.157",
- "lastModified": "2023-11-07T04:13:33.957",
+ "lastModified": "2024-02-29T01:39:23.500",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2927.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2927.json
index 9db57afb373..dbc3fe5af44 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2927.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2927.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2927",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-27T09:15:10.240",
- "lastModified": "2024-02-13T08:16:05.267",
+ "lastModified": "2024-02-29T01:39:23.583",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2928.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2928.json
index 9ce17b2340c..2467dabbf0b 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2928.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2928.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2928",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-27T10:15:09.840",
- "lastModified": "2023-11-07T04:13:34.450",
+ "lastModified": "2024-02-29T01:39:23.667",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2951.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2951.json
index dd7e5ad6ffc..49eb59f4090 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2951.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2951.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2951",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-28T06:15:13.013",
- "lastModified": "2023-11-07T04:13:35.030",
+ "lastModified": "2024-02-29T01:39:23.923",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.2
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2955.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2955.json
index 0038286754b..dd361356cce 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2955.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2955.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2955",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-29T07:15:09.820",
- "lastModified": "2023-11-07T04:13:35.293",
+ "lastModified": "2024-02-29T01:39:24.033",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2962.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2962.json
index 7fa137a9d77..3ac0a3c854a 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2962.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2962.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2962",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-29T14:15:09.790",
- "lastModified": "2023-11-07T04:13:35.617",
+ "lastModified": "2024-02-29T01:39:24.163",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2970.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2970.json
index 15c5d76a416..cce5c8cd55e 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2970.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2970.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2970",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-30T06:16:30.853",
- "lastModified": "2023-11-07T04:13:36.123",
+ "lastModified": "2024-02-29T01:39:24.290",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2973.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2973.json
index eb2b8d265ea..2082c86a934 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2973.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2973.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2973",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-30T11:15:09.457",
- "lastModified": "2024-02-13T08:16:05.503",
+ "lastModified": "2024-02-29T01:39:24.393",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2978.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2978.json
index a99c0bff74a..864cf326346 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2978.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2978.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2978",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-30T14:15:09.763",
- "lastModified": "2023-11-07T04:13:37.213",
+ "lastModified": "2024-02-29T01:39:24.527",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2979.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2979.json
index 19018a9d64f..406351bba6e 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2979.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2979.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-2979",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-30T14:15:09.843",
- "lastModified": "2023-11-07T04:13:37.473",
+ "lastModified": "2024-02-29T01:39:24.627",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2980.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2980.json
index 9829985baf3..bbf079b978b 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2980.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2980.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2980",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-30T15:15:09.467",
- "lastModified": "2023-11-15T02:44:13.553",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:39:24.703",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2981.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2981.json
index 0b81577c952..68bbfb81710 100644
--- a/CVE-2023/CVE-2023-29xx/CVE-2023-2981.json
+++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2981.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-2981",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-30T15:15:09.553",
- "lastModified": "2023-11-15T02:46:54.210",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:39:24.783",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3003.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3003.json
index 8b7a92f9a79..8d632e1b59d 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3003.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3003.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T09:15:10.600",
- "lastModified": "2023-11-07T04:17:44.240",
+ "lastModified": "2024-02-29T01:40:19.343",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3004.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3004.json
index 39ad79c7d2b..1dac92fdb3d 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3004.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3004.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3004",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T09:15:10.677",
- "lastModified": "2023-11-07T04:17:44.450",
+ "lastModified": "2024-02-29T01:40:19.447",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3005.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3005.json
index 10abfa6dcc2..26d7433ac44 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3005.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3005.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3005",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T09:15:10.743",
- "lastModified": "2023-11-07T04:17:44.703",
+ "lastModified": "2024-02-29T01:40:19.543",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3007.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3007.json
index d8813de4c24..74181f40f14 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3007.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3007.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3007",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T12:15:09.550",
- "lastModified": "2024-02-13T08:16:05.813",
+ "lastModified": "2024-02-29T01:40:19.663",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3008.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3008.json
index 407d251b305..155231ca375 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3008.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3008.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3008",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T12:15:09.640",
- "lastModified": "2024-02-13T08:16:06.103",
+ "lastModified": "2024-02-29T01:40:19.743",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3014.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3014.json
index 42888723e53..eecf920d381 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3014.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3014.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3014",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T14:15:11.223",
- "lastModified": "2024-02-13T08:16:06.327",
+ "lastModified": "2024-02-29T01:40:19.887",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3015.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3015.json
index f46493e1d42..ec4662b6661 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3015.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3015.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3015",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T14:15:11.290",
- "lastModified": "2024-02-13T08:16:06.567",
+ "lastModified": "2024-02-29T01:40:19.970",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3016.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3016.json
index efc4339a1fc..136c7d6de2f 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3016.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3016.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3016",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T14:15:11.353",
- "lastModified": "2024-02-13T08:16:06.873",
+ "lastModified": "2024-02-29T01:40:20.050",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3017.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3017.json
index f370689518b..25e9c27b423 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3017.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3017.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3017",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T15:15:09.627",
- "lastModified": "2023-11-07T04:17:46.453",
+ "lastModified": "2024-02-29T01:40:20.137",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3018.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3018.json
index 3e497adcb58..45345216987 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3018.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3018.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3018",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T15:15:09.713",
- "lastModified": "2023-12-20T01:37:04.860",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:40:20.230",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -82,7 +82,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3029.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3029.json
index a9a379f61ff..f259687cb5e 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3029.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3029.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3029",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-01T06:15:15.260",
- "lastModified": "2023-11-07T04:17:47.667",
+ "lastModified": "2024-02-29T01:40:20.423",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3035.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3035.json
index 5f23682cb77..121e44f69b1 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3035.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3035.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3035",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-01T14:15:12.317",
- "lastModified": "2023-11-07T04:17:47.950",
+ "lastModified": "2024-02-29T01:40:20.560",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3056.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3056.json
index c6501edd570..89b420f5cf7 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3056.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3056.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3056",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-02T12:15:09.470",
- "lastModified": "2024-02-13T08:16:07.220",
+ "lastModified": "2024-02-29T01:40:20.833",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3057.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3057.json
index 84bc08fbe25..ef9fa73c1fc 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3057.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3057.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3057",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-02T13:15:10.193",
- "lastModified": "2024-02-13T08:16:07.610",
+ "lastModified": "2024-02-29T01:40:20.920",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3058.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3058.json
index e33a06bfd75..dae04786049 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3058.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3058.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3058",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-02T13:15:10.257",
- "lastModified": "2023-11-07T04:17:49.593",
+ "lastModified": "2024-02-29T01:40:21.010",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3059.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3059.json
index 9c02a26aeeb..12a0707b3f3 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3059.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3059.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3059",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-02T13:15:10.323",
- "lastModified": "2023-11-07T04:17:49.833",
+ "lastModified": "2024-02-29T01:40:21.103",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3060.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3060.json
index 22790a63359..4b02cb10fbd 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3060.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3060.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3060",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-02T14:15:09.530",
- "lastModified": "2023-11-07T04:17:50.080",
+ "lastModified": "2024-02-29T01:40:21.203",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3061.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3061.json
index eae9cb4dd13..44a5edfa75e 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3061.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3061.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3061",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-02T14:15:09.597",
- "lastModified": "2023-11-07T04:17:50.330",
+ "lastModified": "2024-02-29T01:40:21.300",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3062.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3062.json
index ddf1e53ed62..0c2f2a73901 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3062.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3062.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3062",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-02T14:15:09.663",
- "lastModified": "2023-11-07T04:17:50.580",
+ "lastModified": "2024-02-29T01:40:21.390",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3068.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3068.json
index 2a03464712c..507b12ba022 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3068.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3068.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3068",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-02T16:15:10.040",
- "lastModified": "2023-11-07T04:17:51.063",
+ "lastModified": "2024-02-29T01:40:21.563",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3085.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3085.json
index 39450037cdc..d56add36d06 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3085.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3085.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3085",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-03T11:15:21.443",
- "lastModified": "2023-12-08T21:16:21.743",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:40:21.803",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3091.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3091.json
index 02e88d3b202..edc4f4edac3 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3091.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3091.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3091",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-04T00:15:09.553",
- "lastModified": "2023-11-07T04:17:53.010",
+ "lastModified": "2024-02-29T01:40:21.973",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3094.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3094.json
index 517ab97577f..7c8d89a04a5 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3094.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3094.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3094",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-04T09:15:09.730",
- "lastModified": "2023-11-07T04:17:53.547",
+ "lastModified": "2024-02-29T01:40:22.090",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3096.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3096.json
index 183d1a7b7c1..6322e612de8 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3096.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3096.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3096",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-05T06:15:09.227",
- "lastModified": "2024-02-13T08:16:07.833",
+ "lastModified": "2024-02-29T01:40:22.197",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3097.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3097.json
index 84b07c15af7..72cb60b7b1d 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3097.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3097.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3097",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-05T06:15:09.463",
- "lastModified": "2024-02-13T08:16:08.220",
+ "lastModified": "2024-02-29T01:40:22.320",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3098.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3098.json
index 3a041a42302..12bfcddde37 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3098.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3098.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3098",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-05T07:15:09.420",
- "lastModified": "2024-02-13T08:16:08.497",
+ "lastModified": "2024-02-29T01:40:22.597",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3099.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3099.json
index 9f619d96cf0..d1ef432db40 100644
--- a/CVE-2023/CVE-2023-30xx/CVE-2023-3099.json
+++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3099.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3099",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-05T07:15:11.143",
- "lastModified": "2024-02-13T08:16:08.810",
+ "lastModified": "2024-02-29T01:40:22.707",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3100.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3100.json
index 4318e75411a..efc186cf344 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3100.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3100.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3100",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-05T08:15:09.667",
- "lastModified": "2023-11-07T04:17:54.917",
+ "lastModified": "2024-02-29T01:40:22.813",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3119.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3119.json
index c572b963c78..cdf8ff0b06a 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3119.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3119.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3119",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-06T11:15:10.063",
- "lastModified": "2023-11-07T04:17:56.127",
+ "lastModified": "2024-02-29T01:40:23.193",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3120.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3120.json
index 6418d26d176..a49b2af575f 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3120.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3120.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3120",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-06T11:15:10.223",
- "lastModified": "2023-11-07T04:17:56.430",
+ "lastModified": "2024-02-29T01:40:23.310",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3121.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3121.json
index 03722215c8a..9b1822a0e4b 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3121.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3121.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3121",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-06T11:15:10.337",
- "lastModified": "2023-11-07T04:17:56.680",
+ "lastModified": "2024-02-29T01:40:23.430",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.5
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3143.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3143.json
index 4d2aaef64ac..ec68b7803a6 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3143.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3143.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3143",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-07T15:15:09.617",
- "lastModified": "2023-11-07T04:17:59.757",
+ "lastModified": "2024-02-29T01:40:23.700",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3144.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3144.json
index 636f92b6bba..fff6ad75b0c 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3144.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3144.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3144",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-07T15:15:09.710",
- "lastModified": "2023-11-07T04:18:00.373",
+ "lastModified": "2024-02-29T01:40:23.787",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3145.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3145.json
index 7e67181c1b1..7dfbe5184a1 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3145.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3145.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3145",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-07T15:15:09.793",
- "lastModified": "2023-11-07T04:18:00.770",
+ "lastModified": "2024-02-29T01:40:23.880",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3146.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3146.json
index c71856d11a1..c3839b14b07 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3146.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3146.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3146",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-07T16:15:09.523",
- "lastModified": "2023-11-07T04:18:01.160",
+ "lastModified": "2024-02-29T01:40:23.970",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3147.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3147.json
index 11495d1fbdc..185c0d283c3 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3147.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3147.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3147",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-07T16:15:09.630",
- "lastModified": "2023-11-07T04:18:01.543",
+ "lastModified": "2024-02-29T01:40:24.060",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3148.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3148.json
index f7ab9b96442..298a1f066b3 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3148.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3148.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3148",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-07T17:15:10.397",
- "lastModified": "2023-11-07T04:18:01.900",
+ "lastModified": "2024-02-29T01:40:24.150",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3149.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3149.json
index 2cdcaf51063..16f64e51c22 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3149.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3149.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3149",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-07T17:15:10.483",
- "lastModified": "2023-11-07T04:18:02.287",
+ "lastModified": "2024-02-29T01:40:24.240",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3150.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3150.json
index 27ebb3b7ca7..a616dd7a584 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3150.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3150.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3150",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-07T18:15:10.050",
- "lastModified": "2023-11-07T04:18:02.657",
+ "lastModified": "2024-02-29T01:40:24.330",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3151.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3151.json
index 12fc4e787eb..98f9df0e7d9 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3151.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3151.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3151",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-07T18:15:10.127",
- "lastModified": "2023-11-07T04:18:03.023",
+ "lastModified": "2024-02-29T01:40:24.420",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3152.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3152.json
index 15a80345c29..50ba15c7d1e 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3152.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3152.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3152",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-07T18:15:10.193",
- "lastModified": "2023-11-07T04:18:03.430",
+ "lastModified": "2024-02-29T01:40:24.533",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3163.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3163.json
index 7e217cf9070..df6d7bd4afc 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3163.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3163.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3163",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-08T14:15:15.910",
- "lastModified": "2023-11-07T04:18:05.110",
+ "lastModified": "2024-02-29T01:40:24.757",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3165.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3165.json
index 05110dab97c..0ce1a2671bc 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3165.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3165.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3165",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-08T17:15:09.987",
- "lastModified": "2023-11-07T04:18:05.717",
+ "lastModified": "2024-02-29T01:40:24.897",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3176.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3176.json
index 8c8548f3ceb..46f7b22faba 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3176.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3176.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3176",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-09T06:16:12.497",
- "lastModified": "2023-11-07T04:18:07.503",
+ "lastModified": "2024-02-29T01:40:25.093",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3177.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3177.json
index 7534c0eb972..d9b204b9814 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3177.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3177.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3177",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-09T06:16:12.870",
- "lastModified": "2023-11-07T04:18:07.917",
+ "lastModified": "2024-02-29T01:40:25.193",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3183.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3183.json
index 884b15cdcf0..55542259136 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3183.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3183.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3183",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-09T13:15:10.087",
- "lastModified": "2023-11-07T04:18:08.953",
+ "lastModified": "2024-02-29T01:40:25.373",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3184.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3184.json
index 41cf970e208..7867bd84c2e 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3184.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3184.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3184",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-09T13:15:10.170",
- "lastModified": "2023-11-07T04:18:09.487",
+ "lastModified": "2024-02-29T01:40:25.480",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3187.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3187.json
index 104daeaae7b..0dea1b9fb04 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3187.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3187.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3187",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-09T21:15:09.583",
- "lastModified": "2023-11-16T01:35:31.690",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:40:25.597",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3189.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3189.json
index a3404a8e68d..59cafd7a121 100644
--- a/CVE-2023/CVE-2023-31xx/CVE-2023-3189.json
+++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3189.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3189",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-14T06:15:08.507",
- "lastModified": "2023-11-07T04:18:10.620",
+ "lastModified": "2024-02-29T01:40:25.700",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32095.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32095.json
index 3a49f02c9da..8e0af4cd938 100644
--- a/CVE-2023/CVE-2023-320xx/CVE-2023-32095.json
+++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32095.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-32095",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-29T09:15:08.750",
- "lastModified": "2024-01-04T21:22:08.900",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:39:35.533",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Milan Dini? Rename Media Files.This issue affects Rename Media Files: from n/a through 1.0.1.\n\n"
+ "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Milan Dini\u0107 Rename Media Files.This issue affects Rename Media Files: from n/a through 1.0.1.\n\n"
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3206.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3206.json
index c04b663b988..c930e8ca76b 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3206.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3206.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3206",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-12T15:15:09.887",
- "lastModified": "2023-11-07T04:18:13.370",
+ "lastModified": "2024-02-29T01:40:25.940",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3208.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3208.json
index 2c31b93c3e3..fb0fe0b93f5 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3208.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3208.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3208",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-12T15:15:09.987",
- "lastModified": "2023-11-07T04:18:13.720",
+ "lastModified": "2024-02-29T01:40:26.027",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3231.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3231.json
index 22b68b9e46c..10c233c7103 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3231.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3231.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3231",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-14T06:15:09.007",
- "lastModified": "2023-11-07T04:18:15.893",
+ "lastModified": "2024-02-29T01:40:26.320",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3232.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3232.json
index 3cc2133918d..55dada29e0e 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3232.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3232.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3232",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-14T06:15:09.080",
- "lastModified": "2024-02-13T08:16:09.170",
+ "lastModified": "2024-02-29T01:40:26.413",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3233.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3233.json
index aaf951ea457..4482d16811f 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3233.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3233.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3233",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-14T07:15:09.337",
- "lastModified": "2024-02-13T08:16:09.410",
+ "lastModified": "2024-02-29T01:40:26.520",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3234.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3234.json
index 737a890f346..48cf4d9c23b 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3234.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3234.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3234",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-14T07:15:09.437",
- "lastModified": "2024-02-13T08:16:09.817",
+ "lastModified": "2024-02-29T01:40:26.623",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3235.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3235.json
index 30e328856f9..f43c495f7ac 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3235.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3235.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3235",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-14T07:15:09.510",
- "lastModified": "2024-02-13T08:16:10.153",
+ "lastModified": "2024-02-29T01:40:26.743",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3236.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3236.json
index fa5f5d8d156..e7bf2ffbd80 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3236.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3236.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3236",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-14T07:15:09.580",
- "lastModified": "2024-02-13T08:16:10.510",
+ "lastModified": "2024-02-29T01:40:26.850",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3237.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3237.json
index 11ae22fec67..f0b7c0d197b 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3237.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3237.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3237",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-14T08:15:09.640",
- "lastModified": "2024-02-13T08:16:10.870",
+ "lastModified": "2024-02-29T01:40:26.947",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3238.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3238.json
index 2d613c95fa2..8ab1127d672 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3238.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3238.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3238",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-14T08:15:09.713",
- "lastModified": "2024-02-13T08:16:11.180",
+ "lastModified": "2024-02-29T01:40:27.047",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3239.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3239.json
index cce16845016..570c755e02f 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3239.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3239.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3239",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-14T09:15:09.333",
- "lastModified": "2024-02-13T08:16:11.400",
+ "lastModified": "2024-02-29T01:40:27.137",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3240.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3240.json
index 9d2264f7fd9..63e6ac8e96d 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3240.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3240.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3240",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-14T09:15:09.717",
- "lastModified": "2024-02-13T08:16:11.833",
+ "lastModified": "2024-02-29T01:40:27.230",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3241.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3241.json
index d5d80afdae2..ca82b01190b 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3241.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3241.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3241",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-14T09:15:09.783",
- "lastModified": "2024-02-13T08:16:12.073",
+ "lastModified": "2024-02-29T01:40:27.330",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3274.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3274.json
index ec3bdd8a408..d18250d22fa 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3274.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3274.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3274",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-15T13:15:09.647",
- "lastModified": "2023-11-07T04:18:22.973",
+ "lastModified": "2024-02-29T01:40:27.737",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3275.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3275.json
index d8bb05d0b32..d35d23828ab 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3275.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3275.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3275",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-15T13:15:09.713",
- "lastModified": "2023-12-20T20:10:40.493",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:40:27.827",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3276.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3276.json
index b1d7f967da5..cf80c36bbd2 100644
--- a/CVE-2023/CVE-2023-32xx/CVE-2023-3276.json
+++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3276.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3276",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-15T13:15:09.773",
- "lastModified": "2023-11-07T04:18:23.753",
+ "lastModified": "2024-02-29T01:40:27.920",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3305.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3305.json
index bbb3d59f13b..597dff3fe8b 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3305.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3305.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3305",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-18T08:15:09.023",
- "lastModified": "2023-11-07T04:18:25.640",
+ "lastModified": "2024-02-29T01:40:28.170",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3306.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3306.json
index 0fac9cedcd2..76343896986 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3306.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3306.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3306",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-18T08:15:09.287",
- "lastModified": "2023-11-07T04:18:25.953",
+ "lastModified": "2024-02-29T01:40:28.260",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3307.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3307.json
index 3289762b0bc..30fe92012b7 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3307.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3307.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3307",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-18T09:15:09.330",
- "lastModified": "2023-11-07T04:18:26.380",
+ "lastModified": "2024-02-29T01:40:28.353",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3308.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3308.json
index fa12de744a4..62e37416e2c 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3308.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3308.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3308",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-18T09:15:09.677",
- "lastModified": "2024-02-13T08:16:12.440",
+ "lastModified": "2024-02-29T01:40:28.480",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3309.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3309.json
index 446f6e1cb28..815437629ed 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3309.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3309.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3309",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-18T12:15:09.267",
- "lastModified": "2023-11-07T04:18:27.127",
+ "lastModified": "2024-02-29T01:40:28.580",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3310.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3310.json
index 76e89fcca2e..009cb84feb1 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3310.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3310.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3310",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-18T12:15:09.347",
- "lastModified": "2023-11-07T04:18:27.483",
+ "lastModified": "2024-02-29T01:40:28.677",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3311.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3311.json
index 0877eab0337..5f2ae3a16f8 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3311.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3311.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3311",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-18T15:15:11.660",
- "lastModified": "2023-11-07T04:18:27.917",
+ "lastModified": "2024-02-29T01:40:28.783",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3318.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3318.json
index 1b1d502f214..d75589024ea 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3318.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3318.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3318",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-19T13:15:10.173",
- "lastModified": "2023-11-07T04:18:29.570",
+ "lastModified": "2024-02-29T01:40:29.040",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3337.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3337.json
index ba487f7f9bc..b53d65615ea 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3337.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3337.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3337",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-20T12:15:09.743",
- "lastModified": "2023-11-07T04:18:31.590",
+ "lastModified": "2024-02-29T01:40:29.337",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3339.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3339.json
index 2d0b5e24551..8b21fb68cd9 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3339.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3339.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3339",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-21T07:15:42.667",
- "lastModified": "2023-11-07T04:18:32.127",
+ "lastModified": "2024-02-29T01:40:29.477",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3340.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3340.json
index 7fc52e0967e..fe29b2e356d 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3340.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3340.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3340",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-20T16:15:09.960",
- "lastModified": "2023-11-07T04:18:32.823",
+ "lastModified": "2024-02-29T01:40:29.563",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3380.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3380.json
index 89bef9c7d57..59e88a17aac 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3380.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3380.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3380",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-23T10:15:10.717",
- "lastModified": "2023-11-07T04:18:37.467",
+ "lastModified": "2024-02-29T01:40:29.977",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3381.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3381.json
index 2c47a4ec521..1f5e929103f 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3381.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3381.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3381",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-23T10:15:10.803",
- "lastModified": "2023-11-07T04:18:37.853",
+ "lastModified": "2024-02-29T01:40:30.070",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3382.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3382.json
index b789fb27526..2d18fdbdc42 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3382.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3382.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3382",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-23T10:15:10.880",
- "lastModified": "2023-11-07T04:18:38.267",
+ "lastModified": "2024-02-29T01:40:30.163",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3383.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3383.json
index 33ab13ce363..b633e24ac22 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3383.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3383.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3383",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-23T11:15:10.030",
- "lastModified": "2023-11-07T04:18:38.680",
+ "lastModified": "2024-02-29T01:40:30.253",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3391.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3391.json
index a80f806038a..4c45b2e1ec9 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3391.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3391.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3391",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-23T16:15:09.693",
- "lastModified": "2024-02-15T21:18:21.387",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:40:30.430",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3396.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3396.json
index c6e74d5b18d..f5d557ea46a 100644
--- a/CVE-2023/CVE-2023-33xx/CVE-2023-3396.json
+++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3396.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3396",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-25T19:15:09.027",
- "lastModified": "2023-11-07T04:18:40.880",
+ "lastModified": "2024-02-29T01:40:30.570",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34169.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34169.json
index 35f486c2089..e43326c8e51 100644
--- a/CVE-2023/CVE-2023-341xx/CVE-2023-34169.json
+++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34169.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-34169",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T20:15:08.393",
- "lastModified": "2023-11-15T02:25:17.183",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:39:48.460",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Cross-Site Request Forgery (CSRF) vulnerability in SAKURA Internet Inc. TS Webfonts for ??????????? plugin <=\u00a03.1.2 versions."
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in SAKURA Internet Inc. TS Webfonts for \u3055\u304f\u3089\u306e\u30ec\u30f3\u30bf\u30eb\u30b5\u30fc\u30d0 plugin <=\u00a03.1.2 versions."
},
{
"lang": "es",
@@ -41,7 +41,7 @@
"weaknesses": [
{
"source": "audit@patchstack.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34198.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34198.json
new file mode 100644
index 00000000000..3ecbb74265b
--- /dev/null
+++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34198.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-34198",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:39:48.740",
+ "lastModified": "2024-02-29T01:39:48.740",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "In Stormshield Network Security (SNS) 1.0.0 through 3.7.36 before 3.7.37, 3.8.0 through 3.11.24 before 3.11.25, 4.0.0 through 4.3.18 before 4.3.19, 4.4.0 through 4.6.5 before 4.6.6, and 4.7.0 before 4.7.1, the usage of a Network object created from an inactive DHCP interface in the filtering slot results in the usage of an object of the :any\" type, which may have unexpected results for access control."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://advisories.stormshield.eu/2023-019",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34412.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34412.json
index d3e984a64cc..2f3236673a6 100644
--- a/CVE-2023/CVE-2023-344xx/CVE-2023-34412.json
+++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34412.json
@@ -2,19 +2,39 @@
"id": "CVE-2023-34412",
"sourceIdentifier": "info@cert.vde.com",
"published": "2023-08-17T14:15:09.700",
- "lastModified": "2023-08-23T21:04:10.520",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:39:49.957",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "A vulnerability in Red Lion Europe mbNET/mbNET.rokey and Helmholz REX 200 and REX 250 devices with firmware lower 7.3.2 allows an\nauthenticated remote attacker to store an arbitrary JavaScript payload on the diagnosis page of the device.\nThat page is loaded immediately after login in to the device and runs the stored payload, allowing the\nattacker to read and write browser data and reduce system performance."
+ "value": "A vulnerability in Red Lion Europe mbNET/mbNET.rokey and Helmholz REX 200 and REX 250 devices with firmware lower 7.3.2 allows an\nauthenticated remote attacker with high privileges to inject malicious HTML or JavaScript code (XSS)."
}
],
"metrics": {
"cvssMetricV31": [
{
- "source": "nvd@nist.gov",
+ "source": "info@cert.vde.com",
"type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 4.8,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.7,
+ "impactScore": 2.7
+ },
+ {
+ "source": "nvd@nist.gov",
+ "type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
@@ -31,26 +51,6 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
- },
- {
- "source": "info@cert.vde.com",
- "type": "Secondary",
- "cvssData": {
- "version": "3.1",
- "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L",
- "attackVector": "NETWORK",
- "attackComplexity": "LOW",
- "privilegesRequired": "HIGH",
- "userInteraction": "REQUIRED",
- "scope": "CHANGED",
- "confidentialityImpact": "HIGH",
- "integrityImpact": "HIGH",
- "availabilityImpact": "LOW",
- "baseScore": 8.3,
- "baseSeverity": "HIGH"
- },
- "exploitabilityScore": 1.7,
- "impactScore": 6.0
}
]
},
diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3449.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3449.json
index 5f592a9c5c2..b68d8553557 100644
--- a/CVE-2023/CVE-2023-34xx/CVE-2023-3449.json
+++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3449.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3449",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-28T18:15:16.607",
- "lastModified": "2023-11-07T04:18:44.520",
+ "lastModified": "2024-02-29T01:40:31.050",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3450.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3450.json
index cb55631da18..45fb3445151 100644
--- a/CVE-2023/CVE-2023-34xx/CVE-2023-3450.json
+++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3450.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3450",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-28T18:15:16.677",
- "lastModified": "2023-11-07T04:18:44.920",
+ "lastModified": "2024-02-29T01:40:31.150",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3457.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3457.json
index 5696d3115d6..3a6e8a5200e 100644
--- a/CVE-2023/CVE-2023-34xx/CVE-2023-3457.json
+++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3457.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3457",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-29T14:15:09.807",
- "lastModified": "2024-02-16T19:42:24.760",
+ "lastModified": "2024-02-29T01:40:31.310",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3458.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3458.json
index 5d6d93ac9bc..d03d547fa64 100644
--- a/CVE-2023/CVE-2023-34xx/CVE-2023-3458.json
+++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3458.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3458",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-29T14:15:09.887",
- "lastModified": "2024-02-16T19:42:24.760",
+ "lastModified": "2024-02-29T01:40:31.400",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3464.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3464.json
index 5321cfbacad..c6cc54e3d07 100644
--- a/CVE-2023/CVE-2023-34xx/CVE-2023-3464.json
+++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3464.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3464",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-29T21:15:09.977",
- "lastModified": "2023-11-07T04:18:47.023",
+ "lastModified": "2024-02-29T01:40:31.553",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3465.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3465.json
index 7f4f09a75e2..4cd4e0eb66a 100644
--- a/CVE-2023/CVE-2023-34xx/CVE-2023-3465.json
+++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3465.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3465",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-29T21:15:10.047",
- "lastModified": "2023-11-07T04:18:47.377",
+ "lastModified": "2024-02-29T01:40:31.640",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3473.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3473.json
index 8bf58694a50..bfe78d70d94 100644
--- a/CVE-2023/CVE-2023-34xx/CVE-2023-3473.json
+++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3473.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3473",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-30T07:15:08.813",
- "lastModified": "2023-11-07T04:18:47.963",
+ "lastModified": "2024-02-29T01:40:31.810",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3474.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3474.json
index bdd9edf6392..4a3908ad66d 100644
--- a/CVE-2023/CVE-2023-34xx/CVE-2023-3474.json
+++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3474.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3474",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-30T07:15:08.927",
- "lastModified": "2023-11-07T04:18:48.197",
+ "lastModified": "2024-02-29T01:40:31.897",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3475.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3475.json
index 2fa28b961fd..60c31538d32 100644
--- a/CVE-2023/CVE-2023-34xx/CVE-2023-3475.json
+++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3475.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3475",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-30T07:15:09.030",
- "lastModified": "2023-11-07T04:18:48.620",
+ "lastModified": "2024-02-29T01:40:31.983",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3476.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3476.json
index 9771c624aee..06b932c0ef3 100644
--- a/CVE-2023/CVE-2023-34xx/CVE-2023-3476.json
+++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3476.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3476",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-30T07:15:09.130",
- "lastModified": "2023-11-07T04:18:49.020",
+ "lastModified": "2024-02-29T01:40:32.077",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3477.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3477.json
index 3de0a4cc9cb..5e859913adc 100644
--- a/CVE-2023/CVE-2023-34xx/CVE-2023-3477.json
+++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3477.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3477",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-30T08:15:21.417",
- "lastModified": "2023-11-07T04:18:49.430",
+ "lastModified": "2024-02-29T01:40:32.167",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3478.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3478.json
index 7b72b278f6d..d9094c2f03a 100644
--- a/CVE-2023/CVE-2023-34xx/CVE-2023-3478.json
+++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3478.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3478",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-30T12:15:09.250",
- "lastModified": "2023-11-07T04:18:49.817",
+ "lastModified": "2024-02-29T01:40:32.263",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3502.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3502.json
index 02fe47aa564..a890aa67120 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3502.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3502.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3502",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-04T14:15:09.573",
- "lastModified": "2024-02-16T19:42:24.760",
+ "lastModified": "2024-02-29T01:40:32.540",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3503.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3503.json
index 7335a406ede..dd548f794f2 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3503.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3503.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3503",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-04T15:15:09.177",
- "lastModified": "2024-02-16T19:42:24.760",
+ "lastModified": "2024-02-29T01:40:32.640",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3504.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3504.json
index e3cd9f5cbbc..64d07ec72ad 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3504.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3504.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3504",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-04T15:15:09.263",
- "lastModified": "2023-11-07T04:18:52.220",
+ "lastModified": "2024-02-29T01:40:32.740",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3505.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3505.json
index 2b64021115d..aa1d0fe8334 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3505.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3505.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3505",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-04T16:15:09.620",
- "lastModified": "2023-11-07T04:18:52.580",
+ "lastModified": "2024-02-29T01:40:32.833",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3506.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3506.json
index 9c8cd74dbd8..762047c0737 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3506.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3506.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3506",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-04T16:15:09.707",
- "lastModified": "2023-11-07T04:18:52.947",
+ "lastModified": "2024-02-29T01:40:32.930",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3528.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3528.json
index ffbe3e7d2f8..7a279190b44 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3528.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3528.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3528",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-06T18:15:17.877",
- "lastModified": "2023-11-07T04:18:54.747",
+ "lastModified": "2024-02-29T01:40:33.223",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3529.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3529.json
index f10b221e90f..c6fdf06205c 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3529.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3529.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3529",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-06T19:15:11.030",
- "lastModified": "2023-11-07T04:18:55.087",
+ "lastModified": "2024-02-29T01:40:33.313",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3534.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3534.json
index 66c47181dd8..eb5fac0890f 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3534.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3534.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3534",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-07T12:15:09.447",
- "lastModified": "2024-02-16T19:42:24.760",
+ "lastModified": "2024-02-29T01:40:33.440",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3535.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3535.json
index 81d5c1af162..d1c7d6a0aa8 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3535.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3535.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3535",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-07T13:15:09.393",
- "lastModified": "2023-11-07T04:18:55.857",
+ "lastModified": "2024-02-29T01:40:33.520",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3536.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3536.json
index e872209ed1f..ba5dae2882c 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3536.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3536.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3536",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-07T13:15:09.477",
- "lastModified": "2023-11-07T04:18:56.257",
+ "lastModified": "2024-02-29T01:40:33.630",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3537.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3537.json
index bce1ac45a61..e10f2eddba8 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3537.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3537.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3537",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-07T14:15:09.757",
- "lastModified": "2023-11-07T04:18:56.640",
+ "lastModified": "2024-02-29T01:40:33.737",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3538.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3538.json
index 39f5a51e00a..70cf93bbc46 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3538.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3538.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3538",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-07T14:15:09.850",
- "lastModified": "2023-11-07T04:18:57.003",
+ "lastModified": "2024-02-29T01:40:33.827",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3539.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3539.json
index 4c764370351..bcf25f107aa 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3539.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3539.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3539",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-07T15:15:10.230",
- "lastModified": "2023-11-07T04:18:57.387",
+ "lastModified": "2024-02-29T01:40:33.913",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3540.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3540.json
index cf6ea70149b..71bae9e60b8 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3540.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3540.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3540",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-07T15:15:10.317",
- "lastModified": "2023-11-07T04:18:57.770",
+ "lastModified": "2024-02-29T01:40:34.003",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3541.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3541.json
index 12b627dd076..8511e784ed1 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3541.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3541.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3541",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-07T16:15:09.870",
- "lastModified": "2023-11-07T04:18:58.200",
+ "lastModified": "2024-02-29T01:40:34.097",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3542.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3542.json
index 3d4cb7667b6..94c2b28de59 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3542.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3542.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3542",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-07T16:15:09.947",
- "lastModified": "2023-11-07T04:18:58.587",
+ "lastModified": "2024-02-29T01:40:34.190",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3543.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3543.json
index 59a19352246..8858d1893a6 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3543.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3543.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3543",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-07T17:15:10.400",
- "lastModified": "2023-11-07T04:18:59.007",
+ "lastModified": "2024-02-29T01:40:34.280",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3544.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3544.json
index 706dec9019f..5bf2c7933fd 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3544.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3544.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3544",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-07T17:15:10.577",
- "lastModified": "2023-11-07T04:18:59.410",
+ "lastModified": "2024-02-29T01:40:34.370",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3554.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3554.json
index 739f57626d9..069abda645f 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3554.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3554.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3554",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:55.623",
- "lastModified": "2023-11-07T04:19:00.217",
+ "lastModified": "2024-02-29T01:40:34.543",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3555.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3555.json
index b55d7eb40ab..117e50c9f63 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3555.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3555.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3555",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:55.683",
- "lastModified": "2023-11-07T04:19:00.450",
+ "lastModified": "2024-02-29T01:40:34.630",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3556.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3556.json
index ae1d11cd6ba..8b93891ea9c 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3556.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3556.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3556",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:55.750",
- "lastModified": "2023-11-07T04:19:00.830",
+ "lastModified": "2024-02-29T01:40:34.713",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3557.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3557.json
index ae86a197c9a..8c5d12589c6 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3557.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3557.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3557",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:55.817",
- "lastModified": "2023-11-07T04:19:01.220",
+ "lastModified": "2024-02-29T01:40:34.803",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3558.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3558.json
index 2f4224bdee2..f3930422502 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3558.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3558.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3558",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:55.887",
- "lastModified": "2023-11-07T04:19:01.600",
+ "lastModified": "2024-02-29T01:40:34.893",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3559.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3559.json
index 3f5e16f3875..aff9014a30a 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3559.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3559.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3559",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:55.950",
- "lastModified": "2023-11-07T04:19:01.953",
+ "lastModified": "2024-02-29T01:40:34.980",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3560.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3560.json
index 0dd6bee18f1..6f5253e9914 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3560.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3560.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3560",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:56.013",
- "lastModified": "2023-11-07T04:19:02.357",
+ "lastModified": "2024-02-29T01:40:35.070",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3561.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3561.json
index 003435b4a3f..2ced3345267 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3561.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3561.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3561",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:56.077",
- "lastModified": "2023-11-07T04:19:02.723",
+ "lastModified": "2024-02-29T01:40:35.163",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3562.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3562.json
index ae6d541541c..06a805c926c 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3562.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3562.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3562",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:56.137",
- "lastModified": "2023-11-07T04:19:03.097",
+ "lastModified": "2024-02-29T01:40:35.250",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3563.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3563.json
index 954650d7ed5..38c2eb06baa 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3563.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3563.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3563",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:56.197",
- "lastModified": "2023-11-07T04:19:03.477",
+ "lastModified": "2024-02-29T01:40:35.340",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3564.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3564.json
index 096a47aa1c4..aa854bc0afe 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3564.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3564.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3564",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:56.257",
- "lastModified": "2023-11-07T04:19:03.847",
+ "lastModified": "2024-02-29T01:40:35.430",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3566.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3566.json
index accd7b046da..54133eeffa1 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3566.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3566.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3566",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:56.380",
- "lastModified": "2023-11-07T04:19:04.367",
+ "lastModified": "2024-02-29T01:40:35.533",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3578.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3578.json
index b8eb8527085..19d2c944917 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3578.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3578.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3578",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:56.597",
- "lastModified": "2023-11-07T04:19:05.857",
+ "lastModified": "2024-02-29T01:40:35.740",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3579.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3579.json
index 44b3f87395e..f480996d098 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3579.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3579.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3579",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T16:15:56.663",
- "lastModified": "2023-11-07T04:19:06.217",
+ "lastModified": "2024-02-29T01:40:35.820",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3599.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3599.json
index 56681912e6d..9431ad76063 100644
--- a/CVE-2023/CVE-2023-35xx/CVE-2023-3599.json
+++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3599.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3599",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T18:15:11.157",
- "lastModified": "2023-11-07T04:19:06.920",
+ "lastModified": "2024-02-29T01:40:36.107",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3605.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3605.json
index d4327dc8973..a26cf79d485 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3605.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3605.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-3605",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T20:15:15.377",
- "lastModified": "2023-12-22T15:16:22.337",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:40:36.240",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3606.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3606.json
index 88130ee2117..82ad58e660d 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3606.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3606.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3606",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T21:15:10.823",
- "lastModified": "2023-11-07T04:19:08.223",
+ "lastModified": "2024-02-29T01:40:36.333",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3607.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3607.json
index fd23c273875..4de9cd65784 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3607.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3607.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3607",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T21:15:10.887",
- "lastModified": "2023-11-07T04:19:08.580",
+ "lastModified": "2024-02-29T01:40:36.427",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3608.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3608.json
index 4b86637b83f..698e83eae8f 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3608.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3608.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3608",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T22:15:09.530",
- "lastModified": "2023-11-07T04:19:09.000",
+ "lastModified": "2024-02-29T01:40:36.530",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3617.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3617.json
index 72ee22b5db3..3d25e0bf134 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3617.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3617.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3617",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-11T15:15:20.527",
- "lastModified": "2023-11-07T04:19:09.690",
+ "lastModified": "2024-02-29T01:40:36.720",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3619.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3619.json
index 3ccdcc946c6..5b7904d5a0d 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3619.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3619.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3619",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-11T16:15:12.150",
- "lastModified": "2023-11-07T04:19:10.210",
+ "lastModified": "2024-02-29T01:40:36.827",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3621.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3621.json
index 1f7fa68de31..c803fc64994 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3621.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3621.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3621",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-11T16:15:12.210",
- "lastModified": "2023-11-07T04:19:10.653",
+ "lastModified": "2024-02-29T01:40:36.950",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3623.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3623.json
index d081a16cc09..ceb0c737688 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3623.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3623.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3623",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-11T17:15:13.440",
- "lastModified": "2023-11-07T04:19:11.030",
+ "lastModified": "2024-02-29T01:40:37.073",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3624.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3624.json
index a8f2585d630..abab150fc96 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3624.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3624.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3624",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-11T17:15:13.510",
- "lastModified": "2023-11-07T04:19:11.383",
+ "lastModified": "2024-02-29T01:40:37.163",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3625.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3625.json
index d9ea654c932..f11f0553e82 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3625.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3625.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3625",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-11T18:15:20.903",
- "lastModified": "2023-11-07T04:19:11.760",
+ "lastModified": "2024-02-29T01:40:37.250",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3626.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3626.json
index e939e950535..eac9e674c48 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3626.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3626.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3626",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-11T18:15:20.967",
- "lastModified": "2023-11-07T04:19:12.143",
+ "lastModified": "2024-02-29T01:40:37.343",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3641.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3641.json
index 7f0731ce4a3..b452fd24b4b 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3641.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3641.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3641",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-12T17:15:08.960",
- "lastModified": "2023-11-07T04:19:13.413",
+ "lastModified": "2024-02-29T01:40:37.560",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3642.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3642.json
index 00929470b3e..324773d2800 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3642.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3642.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3642",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-12T17:15:09.040",
- "lastModified": "2023-11-07T04:19:13.787",
+ "lastModified": "2024-02-29T01:40:37.650",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3643.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3643.json
index af258acf0fe..c6cd14ff739 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3643.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3643.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3643",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-12T18:15:09.487",
- "lastModified": "2023-11-07T04:19:14.207",
+ "lastModified": "2024-02-29T01:40:37.747",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3644.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3644.json
index 370aeb9e8f7..3eb26f474c0 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3644.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3644.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3644",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-12T18:15:09.563",
- "lastModified": "2023-11-07T04:19:14.573",
+ "lastModified": "2024-02-29T01:40:37.843",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3657.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3657.json
index ba2bea6fd89..26f338b4119 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3657.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3657.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3657",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-13T10:15:09.643",
- "lastModified": "2023-11-07T04:19:15.643",
+ "lastModified": "2024-02-29T01:40:38.063",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3658.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3658.json
index ec6734e5a2d..7f339b7c5c1 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3658.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3658.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3658",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-13T11:15:09.340",
- "lastModified": "2023-11-07T04:19:15.880",
+ "lastModified": "2024-02-29T01:40:38.160",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3659.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3659.json
index 95bc35e8a77..14ca9e5dd96 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3659.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3659.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3659",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-13T11:15:09.417",
- "lastModified": "2023-11-07T04:19:16.273",
+ "lastModified": "2024-02-29T01:40:38.253",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3660.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3660.json
index 98e91ce9fd8..ff3d42c4c0b 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3660.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3660.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3660",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-13T12:15:09.397",
- "lastModified": "2023-11-07T04:19:16.647",
+ "lastModified": "2024-02-29T01:40:38.350",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3661.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3661.json
index 9a97fb88793..5d4cc6b70ce 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3661.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3661.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3661",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-13T12:15:09.470",
- "lastModified": "2023-11-07T04:19:17.027",
+ "lastModified": "2024-02-29T01:40:38.447",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3678.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3678.json
index 5afb7328cc2..7d613a62905 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3678.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3678.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3678",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-15T08:15:42.537",
- "lastModified": "2023-11-07T04:19:18.660",
+ "lastModified": "2024-02-29T01:40:38.673",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3679.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3679.json
index 0448d6e6608..40a756a00ec 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3679.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3679.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3679",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-15T09:15:09.403",
- "lastModified": "2023-11-07T04:19:19.057",
+ "lastModified": "2024-02-29T01:40:38.787",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3680.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3680.json
index 15f099ce1c8..55e9259b5f6 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3680.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3680.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3680",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-15T09:15:09.803",
- "lastModified": "2023-11-07T04:19:19.527",
+ "lastModified": "2024-02-29T01:40:38.890",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3681.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3681.json
index e10c8d5c08f..00ee29c2941 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3681.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3681.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3681",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-15T10:15:09.323",
- "lastModified": "2023-11-07T04:19:19.880",
+ "lastModified": "2024-02-29T01:40:38.983",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3682.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3682.json
index 1fb01b74929..e888d8c4cf1 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3682.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3682.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3682",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-15T17:15:38.477",
- "lastModified": "2023-11-07T04:19:20.283",
+ "lastModified": "2024-02-29T01:40:39.077",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3683.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3683.json
index 3d7a9e1a5ea..1ffba62ba91 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3683.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3683.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3683",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-16T08:15:14.263",
- "lastModified": "2023-11-07T04:19:20.663",
+ "lastModified": "2024-02-29T01:40:39.160",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.5
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3684.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3684.json
index d77fbbb7ce9..f6e0979d59a 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3684.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3684.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3684",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-16T11:15:09.333",
- "lastModified": "2023-11-07T04:19:21.027",
+ "lastModified": "2024-02-29T01:40:39.253",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3685.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3685.json
index 4bb5d7d51b6..3e7f5727054 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3685.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3685.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3685",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-16T11:15:09.680",
- "lastModified": "2023-11-07T04:19:21.437",
+ "lastModified": "2024-02-29T01:40:39.343",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3686.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3686.json
index 19066c17fe3..14b2f0d1795 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3686.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3686.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3686",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-16T13:15:09.380",
- "lastModified": "2023-11-07T04:19:21.817",
+ "lastModified": "2024-02-29T01:40:39.437",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3687.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3687.json
index 80c32082033..4193e61e713 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3687.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3687.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3687",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-16T14:15:09.310",
- "lastModified": "2023-11-07T04:19:22.210",
+ "lastModified": "2024-02-29T01:40:39.540",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3688.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3688.json
index 0b2176b6372..cad23266889 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3688.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3688.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3688",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-16T15:15:09.143",
- "lastModified": "2023-11-07T04:19:22.573",
+ "lastModified": "2024-02-29T01:40:39.633",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3689.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3689.json
index 5a4649d8fc6..0f973feda17 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3689.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3689.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3689",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-16T16:15:09.360",
- "lastModified": "2023-11-07T04:19:22.957",
+ "lastModified": "2024-02-29T01:40:39.723",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3690.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3690.json
index 477806945ac..ffce59c318d 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3690.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3690.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3690",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-16T16:15:09.437",
- "lastModified": "2023-11-07T04:19:23.370",
+ "lastModified": "2024-02-29T01:40:39.813",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3691.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3691.json
index bec538e9ad9..00b7f5cfe38 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3691.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3691.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3691",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-16T17:15:09.387",
- "lastModified": "2023-11-07T04:19:23.720",
+ "lastModified": "2024-02-29T01:40:39.903",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3693.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3693.json
index 4a50999ac1a..f8839412364 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3693.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3693.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3693",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-16T22:15:09.397",
- "lastModified": "2023-11-07T04:19:24.123",
+ "lastModified": "2024-02-29T01:40:40.017",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3694.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3694.json
index b8ed1ad4767..fbfc7d22889 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3694.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3694.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3694",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-17T00:15:09.623",
- "lastModified": "2023-11-07T04:19:24.523",
+ "lastModified": "2024-02-29T01:40:40.110",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3695.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3695.json
index e63bf0da42e..efc6993be2e 100644
--- a/CVE-2023/CVE-2023-36xx/CVE-2023-3695.json
+++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3695.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3695",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-17T01:15:08.780",
- "lastModified": "2023-11-07T04:19:24.920",
+ "lastModified": "2024-02-29T01:40:40.207",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37495.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37495.json
new file mode 100644
index 00000000000..09524776756
--- /dev/null
+++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37495.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-37495",
+ "sourceIdentifier": "psirt@hcl.com",
+ "published": "2024-02-29T01:40:04.220",
+ "lastModified": "2024-02-29T01:40:04.220",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Internet passwords stored in Person documents in the Domino\u00ae Directory created using the \"Add Person\" action on the People & Groups tab in the Domino\u00ae Administrator are secured using a cryptographically weak hash algorithm. This could enable attackers with access to the hashed value to determine a user's password, e.g. using a brute force attack. This issue does not impact Person documents created through user registration https://help.hcltechsw.com/domino/10.0.1/admin/conf_userregistration_c.html . \n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@hcl.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0107585",
+ "source": "psirt@hcl.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37529.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37529.json
new file mode 100644
index 00000000000..d1248e1d0cd
--- /dev/null
+++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37529.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-37529",
+ "sourceIdentifier": "psirt@hcl.com",
+ "published": "2024-02-29T01:40:04.583",
+ "lastModified": "2024-02-29T01:40:04.583",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A cross-site scripting (XSS) vulnerability in the Web Reports component of HCL BigFix Platform can possibly allow an attacker to execute malicious javascript code into a webpage trying to retrieve cookie stored information. This is not the same vulnerability as identified in CVE-2023-37530.\n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@hcl.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.0,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 1.3,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0110209",
+ "source": "psirt@hcl.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37530.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37530.json
new file mode 100644
index 00000000000..7a6dad8fe14
--- /dev/null
+++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37530.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-37530",
+ "sourceIdentifier": "psirt@hcl.com",
+ "published": "2024-02-29T01:40:04.740",
+ "lastModified": "2024-02-29T01:40:04.740",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A cross-site scripting (XSS) vulnerability in the Web Reports component of HCL BigFix Platform can possibly allow an attacker to execute malicious javascript code into a webpage trying to retrieve cookie stored information. \n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@hcl.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.0,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 1.3,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0110209",
+ "source": "psirt@hcl.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-375xx/CVE-2023-37531.json b/CVE-2023/CVE-2023-375xx/CVE-2023-37531.json
new file mode 100644
index 00000000000..1e33df79aec
--- /dev/null
+++ b/CVE-2023/CVE-2023-375xx/CVE-2023-37531.json
@@ -0,0 +1,43 @@
+{
+ "id": "CVE-2023-37531",
+ "sourceIdentifier": "psirt@hcl.com",
+ "published": "2024-02-29T01:40:04.893",
+ "lastModified": "2024-02-29T01:40:04.893",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A cross-site scripting (XSS) vulnerability in the Web Reports component of HCL BigFix Platform can possibly allow an attacker to execute malicious javascript code into a form field of a webpage by a user with privileged access. \n"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@hcl.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.3,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 0.7,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0110209",
+ "source": "psirt@hcl.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3751.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3751.json
index e9390be0679..3d13daa49da 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3751.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3751.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3751",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-19T00:15:09.913",
- "lastModified": "2023-11-07T04:19:28.593",
+ "lastModified": "2024-02-29T01:40:40.750",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3752.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3752.json
index d03bc4b80d3..7398720779f 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3752.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3752.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3752",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-19T02:15:09.747",
- "lastModified": "2023-11-07T04:19:28.967",
+ "lastModified": "2024-02-29T01:40:40.840",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3753.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3753.json
index 376b6012d1c..be7259c5565 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3753.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3753.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3753",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-19T02:15:09.820",
- "lastModified": "2023-11-07T04:19:29.413",
+ "lastModified": "2024-02-29T01:40:40.927",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3754.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3754.json
index 7e5b31e53a1..e6010b19317 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3754.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3754.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3754",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-19T03:15:10.297",
- "lastModified": "2023-11-07T04:19:29.787",
+ "lastModified": "2024-02-29T01:40:41.020",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3755.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3755.json
index cfcdf7b5ac4..9e5e4e39af7 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3755.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3755.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3755",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-19T04:15:10.190",
- "lastModified": "2023-11-07T04:19:30.180",
+ "lastModified": "2024-02-29T01:40:41.113",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3756.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3756.json
index d40c0319776..edd6d9d9d96 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3756.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3756.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3756",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-19T04:15:10.270",
- "lastModified": "2023-11-07T04:19:30.577",
+ "lastModified": "2024-02-29T01:40:41.203",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3757.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3757.json
index b017ebcd97a..207d1df24a4 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3757.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3757.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3757",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-19T05:15:10.377",
- "lastModified": "2023-11-07T04:19:30.953",
+ "lastModified": "2024-02-29T01:40:41.293",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3759.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3759.json
index 36bc639c6fe..c62797cf2e6 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3759.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3759.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3759",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-19T05:15:10.503",
- "lastModified": "2023-11-07T04:19:31.340",
+ "lastModified": "2024-02-29T01:40:41.390",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3760.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3760.json
index e5c9f648912..f1d9c8bd0ac 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3760.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3760.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3760",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-19T06:15:13.470",
- "lastModified": "2023-11-07T04:19:31.700",
+ "lastModified": "2024-02-29T01:40:41.553",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3761.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3761.json
index 1ea2ae9caf6..6960e75aadd 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3761.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3761.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3761",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-19T06:15:13.897",
- "lastModified": "2023-11-07T04:19:32.093",
+ "lastModified": "2024-02-29T01:40:41.693",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3762.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3762.json
index 1e3a24d1fc1..b2022fa1493 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3762.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3762.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3762",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-19T07:15:08.813",
- "lastModified": "2023-11-07T04:19:32.453",
+ "lastModified": "2024-02-29T01:40:41.783",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3763.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3763.json
index 9a8442ff9bd..def3a13b225 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3763.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3763.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3763",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-19T07:15:09.007",
- "lastModified": "2023-11-07T04:19:32.843",
+ "lastModified": "2024-02-29T01:40:41.880",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3783.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3783.json
index f26158fd1e0..de9b10af78f 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3783.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3783.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3783",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T08:15:09.943",
- "lastModified": "2023-11-07T04:19:34.373",
+ "lastModified": "2024-02-29T01:40:42.160",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3784.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3784.json
index 8462f09c84c..a858bb2c78a 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3784.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3784.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3784",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T09:15:11.490",
- "lastModified": "2023-11-07T04:19:34.753",
+ "lastModified": "2024-02-29T01:40:42.253",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3785.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3785.json
index e7882ed13c6..5a974cca971 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3785.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3785.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3785",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T11:15:10.997",
- "lastModified": "2023-11-07T04:19:35.130",
+ "lastModified": "2024-02-29T01:40:42.347",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3786.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3786.json
index 8a0b3e35fed..91f4b56c9cf 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3786.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3786.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3786",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T13:15:11.200",
- "lastModified": "2023-11-07T04:19:35.520",
+ "lastModified": "2024-02-29T01:40:42.437",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3787.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3787.json
index 71bfa0e93f6..8592a31567e 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3787.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3787.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3787",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T15:15:12.090",
- "lastModified": "2023-11-07T04:19:37.327",
+ "lastModified": "2024-02-29T01:40:42.560",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3788.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3788.json
index 97a3787ff83..6f4f2b05155 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3788.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3788.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3788",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T16:15:12.527",
- "lastModified": "2023-11-07T04:19:37.600",
+ "lastModified": "2024-02-29T01:40:42.653",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3789.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3789.json
index 97d8a9f663c..e61cc994665 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3789.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3789.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3789",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T16:15:12.620",
- "lastModified": "2023-11-07T04:19:37.860",
+ "lastModified": "2024-02-29T01:40:42.740",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3790.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3790.json
index 5a55d32366d..bdf90568adf 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3790.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3790.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3790",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T17:15:11.027",
- "lastModified": "2023-11-07T04:19:38.130",
+ "lastModified": "2024-02-29T01:40:42.830",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3791.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3791.json
index f60005be3ac..36837599969 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3791.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3791.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3791",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T18:15:12.353",
- "lastModified": "2023-11-07T04:19:38.387",
+ "lastModified": "2024-02-29T01:40:42.917",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3792.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3792.json
index 5780b0b4540..8c10c3ae073 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3792.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3792.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3792",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T19:15:10.923",
- "lastModified": "2023-11-07T04:19:38.640",
+ "lastModified": "2024-02-29T01:40:43.010",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.5
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3793.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3793.json
index 47593b8e478..c2ca66670d4 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3793.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3793.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3793",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T20:15:10.603",
- "lastModified": "2023-11-07T04:19:38.890",
+ "lastModified": "2024-02-29T01:40:43.103",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3794.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3794.json
index d36618b4377..a707ce90d62 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3794.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3794.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3794",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T20:15:10.697",
- "lastModified": "2023-11-07T04:19:39.140",
+ "lastModified": "2024-02-29T01:40:43.197",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3795.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3795.json
index bf5c8135aca..ffd59ca071d 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3795.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3795.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3795",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T21:15:10.010",
- "lastModified": "2023-11-07T04:19:39.397",
+ "lastModified": "2024-02-29T01:40:43.290",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3796.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3796.json
index 2e98f0cf8e9..1a055f9e7bc 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3796.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3796.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3796",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T21:15:10.100",
- "lastModified": "2023-11-07T04:19:39.713",
+ "lastModified": "2024-02-29T01:40:43.380",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3797.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3797.json
index 37802ff2a4a..b3bc54fcb32 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3797.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3797.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3797",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T22:15:10.373",
- "lastModified": "2023-11-07T04:19:39.960",
+ "lastModified": "2024-02-29T01:40:43.473",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3798.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3798.json
index 09f9dc6e12b..50c26dab13c 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3798.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3798.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3798",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T22:15:10.460",
- "lastModified": "2023-11-07T04:19:40.230",
+ "lastModified": "2024-02-29T01:40:43.567",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3799.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3799.json
index a2639598e0c..9daadca3bba 100644
--- a/CVE-2023/CVE-2023-37xx/CVE-2023-3799.json
+++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3799.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3799",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T23:15:10.150",
- "lastModified": "2023-11-07T04:19:40.517",
+ "lastModified": "2024-02-29T01:40:43.660",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38367.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38367.json
new file mode 100644
index 00000000000..64d03089fd8
--- /dev/null
+++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38367.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-38367",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2024-02-29T02:15:09.120",
+ "lastModified": "2024-02-29T02:15:09.120",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "IBM Cloud Pak Foundational Services Identity Provider (idP) API (IBM Cloud Pak for Automation 18.0.0, 18.0.1, 18.0.2, 19.0.1, 19.0.2, 19.0.3, 20.0.1, 20.0.2, 20.0.3, 21.0.1, 21.0.2, 21.0.3, 22.0.1, and 22.0.2) allows CRUD Operations with an invalid token. This could allow an unauthenticated attacker to view, update, delete or create an IdP configuration. IBM X-Force ID: 261130."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 2.5
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/261130",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7015271",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38372.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38372.json
new file mode 100644
index 00000000000..4e444310011
--- /dev/null
+++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38372.json
@@ -0,0 +1,59 @@
+{
+ "id": "CVE-2023-38372",
+ "sourceIdentifier": "psirt@us.ibm.com",
+ "published": "2024-02-29T01:40:10.700",
+ "lastModified": "2024-02-29T01:40:10.700",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An unauthorized attacker who has obtained an IBM Watson IoT Platform 1.0 security authentication token can use it to impersonate an authorized platform user. IBM X-Force ID: 261201."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@us.ibm.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-287"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/261201",
+ "source": "psirt@us.ibm.com"
+ },
+ {
+ "url": "https://www.ibm.com/support/pages/node/7020635",
+ "source": "psirt@us.ibm.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3800.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3800.json
index 4399f793390..9856a301390 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3800.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3800.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3800",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-20T23:15:10.243",
- "lastModified": "2023-11-07T04:19:40.770",
+ "lastModified": "2024-02-29T01:40:43.753",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3801.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3801.json
index ff4b416fd1e..a61a0481d56 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3801.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3801.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3801",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-21T00:15:10.453",
- "lastModified": "2024-02-13T08:16:12.770",
+ "lastModified": "2024-02-29T01:40:43.843",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3802.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3802.json
index f7e2e7be10b..49a1d422e5a 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3802.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3802.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3802",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-21T00:15:10.537",
- "lastModified": "2023-11-07T04:19:41.433",
+ "lastModified": "2024-02-29T01:40:43.960",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3803.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3803.json
index c2ce0533f44..07dae557156 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3803.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3803.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3803",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-21T01:15:11.000",
- "lastModified": "2023-11-07T04:19:41.687",
+ "lastModified": "2024-02-29T01:40:44.077",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3804.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3804.json
index 8ea5ec466f4..965dc2f1a29 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3804.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3804.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3804",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-21T01:15:11.093",
- "lastModified": "2023-11-07T04:19:41.937",
+ "lastModified": "2024-02-29T01:40:44.177",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3805.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3805.json
index 51ffdc4d88f..28ec1aabe42 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3805.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3805.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3805",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-21T02:15:09.957",
- "lastModified": "2023-11-07T04:19:42.190",
+ "lastModified": "2024-02-29T01:40:44.267",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3806.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3806.json
index 11e54507c76..e829a2332cf 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3806.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3806.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3806",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-21T02:15:10.063",
- "lastModified": "2024-02-13T08:16:13.200",
+ "lastModified": "2024-02-29T01:40:44.363",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3807.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3807.json
index e96b2c41a85..898f375877d 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3807.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3807.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3807",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-21T03:15:10.230",
- "lastModified": "2023-11-07T04:19:42.703",
+ "lastModified": "2024-02-29T01:40:44.463",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3808.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3808.json
index 30bdc64e4a3..0a529d890ce 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3808.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3808.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3808",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-21T03:15:10.317",
- "lastModified": "2024-02-13T08:16:13.457",
+ "lastModified": "2024-02-29T01:40:44.560",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3809.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3809.json
index aa3c26752df..dc7058a2d34 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3809.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3809.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3809",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-21T04:15:15.560",
- "lastModified": "2024-02-13T08:16:13.707",
+ "lastModified": "2024-02-29T01:40:44.650",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3810.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3810.json
index 4af35074302..6355d1ffe97 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3810.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3810.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3810",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-21T04:15:16.070",
- "lastModified": "2024-02-13T08:16:13.943",
+ "lastModified": "2024-02-29T01:40:44.740",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3811.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3811.json
index d302a0edf06..b5532613fe3 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3811.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3811.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3811",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-21T05:15:15.507",
- "lastModified": "2024-02-13T08:16:14.227",
+ "lastModified": "2024-02-29T01:40:44.833",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3815.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3815.json
index df1ef55078f..b4f59174853 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3815.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3815.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3815",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-21T05:15:15.597",
- "lastModified": "2023-11-07T04:19:44.490",
+ "lastModified": "2024-02-29T01:40:44.983",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3826.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3826.json
index b444b20c15f..e4d17e7c1b7 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3826.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3826.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3826",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-22T07:15:09.180",
- "lastModified": "2024-02-13T08:16:14.487",
+ "lastModified": "2024-02-29T01:40:45.153",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3827.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3827.json
index cf0f4ec5ea3..c52f7e340be 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3827.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3827.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3827",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-22T09:15:09.520",
- "lastModified": "2023-11-07T04:19:45.140",
+ "lastModified": "2024-02-29T01:40:45.240",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3828.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3828.json
index dda7aa7538e..7cd53ca4c86 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3828.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3828.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3828",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-22T11:15:09.347",
- "lastModified": "2023-11-07T04:19:45.417",
+ "lastModified": "2024-02-29T01:40:45.327",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3829.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3829.json
index f5982387645..e717b3d34a4 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3829.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3829.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3829",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-22T12:15:09.477",
- "lastModified": "2023-11-07T04:19:45.703",
+ "lastModified": "2024-02-29T01:40:45.420",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3830.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3830.json
index 397569495b1..5481b500c75 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3830.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3830.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3830",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-22T15:15:09.517",
- "lastModified": "2023-11-07T04:19:45.973",
+ "lastModified": "2024-02-29T01:40:45.507",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3831.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3831.json
index ba1aac29f66..473556eb440 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3831.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3831.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3831",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-22T15:15:09.597",
- "lastModified": "2023-11-07T04:19:46.260",
+ "lastModified": "2024-02-29T01:40:45.600",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3832.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3832.json
index 46ce1c8546e..1e73a543534 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3832.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3832.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3832",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-22T16:15:09.420",
- "lastModified": "2023-11-07T04:19:46.533",
+ "lastModified": "2024-02-29T01:40:45.690",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3833.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3833.json
index addb50072cc..e1ced529f90 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3833.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3833.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3833",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-22T16:15:09.507",
- "lastModified": "2023-11-07T04:19:46.787",
+ "lastModified": "2024-02-29T01:40:45.787",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3834.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3834.json
index f0ea65f6245..12e471b14eb 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3834.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3834.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3834",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-22T17:15:09.887",
- "lastModified": "2023-11-07T04:19:47.050",
+ "lastModified": "2024-02-29T01:40:45.867",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3835.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3835.json
index 5169030ecf2..48d91364fc5 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3835.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3835.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3835",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-22T18:15:10.807",
- "lastModified": "2023-11-07T04:19:47.287",
+ "lastModified": "2024-02-29T01:40:45.957",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3836.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3836.json
index c3b65af2f87..e74ff6b351b 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3836.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3836.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3836",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-22T18:15:10.887",
- "lastModified": "2023-11-07T04:19:47.563",
+ "lastModified": "2024-02-29T01:40:46.047",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3837.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3837.json
index f76a882025c..6a7c1f91b7e 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3837.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3837.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3837",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-22T21:15:09.577",
- "lastModified": "2024-02-13T08:16:14.733",
+ "lastModified": "2024-02-29T01:40:46.140",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3838.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3838.json
index f34c4707cc6..f15a969d3af 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3838.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3838.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3838",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-23T02:15:11.360",
- "lastModified": "2024-02-13T08:16:15.020",
+ "lastModified": "2024-02-29T01:40:46.230",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3839.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3839.json
index fc0ca2791b4..e3c2fbdd44c 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3839.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3839.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3839",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-23T02:15:11.460",
- "lastModified": "2024-02-13T08:16:15.300",
+ "lastModified": "2024-02-29T01:40:46.323",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3840.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3840.json
index 85bac0e11bf..6bf54c9118f 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3840.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3840.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3840",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-23T03:15:09.923",
- "lastModified": "2023-11-07T04:19:48.583",
+ "lastModified": "2024-02-29T01:40:46.413",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3841.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3841.json
index 9d9ed528412..7ebc3eea56a 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3841.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3841.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3841",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-23T03:15:10.010",
- "lastModified": "2023-11-07T04:19:48.840",
+ "lastModified": "2024-02-29T01:40:46.507",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3842.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3842.json
index 43515acc621..55e7460ad7e 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3842.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3842.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3842",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-23T04:15:09.947",
- "lastModified": "2023-11-07T04:19:49.127",
+ "lastModified": "2024-02-29T01:40:46.603",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3843.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3843.json
index 84dd2c6a686..8d9f8258c53 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3843.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3843.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3843",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-23T05:15:08.837",
- "lastModified": "2023-11-07T04:19:49.380",
+ "lastModified": "2024-02-29T01:40:46.697",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3844.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3844.json
index 4b5d3200b25..d5c907f6bd0 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3844.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3844.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3844",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-23T06:15:09.637",
- "lastModified": "2023-11-07T04:19:49.630",
+ "lastModified": "2024-02-29T01:40:46.793",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3845.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3845.json
index 57cdcc27a52..56a4cf83f29 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3845.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3845.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3845",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-23T06:15:09.837",
- "lastModified": "2023-11-07T04:19:49.983",
+ "lastModified": "2024-02-29T01:40:46.887",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3846.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3846.json
index ad7d045e830..6d2485ac125 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3846.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3846.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3846",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-23T07:15:09.247",
- "lastModified": "2023-11-07T04:19:50.267",
+ "lastModified": "2024-02-29T01:40:46.980",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3847.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3847.json
index dadcf95c43b..47aefc447a8 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3847.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3847.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3847",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-23T08:15:09.243",
- "lastModified": "2023-11-07T04:19:50.543",
+ "lastModified": "2024-02-29T01:40:47.077",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3848.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3848.json
index 10153dc92e7..277553ec854 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3848.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3848.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3848",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-23T08:15:09.323",
- "lastModified": "2023-11-07T04:19:50.787",
+ "lastModified": "2024-02-29T01:40:47.200",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3849.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3849.json
index ca63834c127..cd2e92d02d2 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3849.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3849.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3849",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-23T09:15:09.713",
- "lastModified": "2023-11-07T04:19:51.050",
+ "lastModified": "2024-02-29T01:40:47.303",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3850.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3850.json
index f196e99688e..11ba04875f3 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3850.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3850.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3850",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-23T10:15:09.657",
- "lastModified": "2023-11-07T04:19:51.317",
+ "lastModified": "2024-02-29T01:40:47.393",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3852.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3852.json
index 2c72b751592..98f9d83f1bb 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3852.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3852.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3852",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-23T22:15:09.477",
- "lastModified": "2023-11-07T04:19:51.580",
+ "lastModified": "2024-02-29T01:40:47.487",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3853.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3853.json
index f0a5d000b24..8e7cb388e77 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3853.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3853.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3853",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-23T23:15:09.243",
- "lastModified": "2023-11-07T04:19:51.823",
+ "lastModified": "2024-02-29T01:40:47.580",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3854.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3854.json
index ed5916686a9..8b8ee1b24b7 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3854.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3854.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3854",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-23T23:15:09.330",
- "lastModified": "2023-11-07T04:19:52.090",
+ "lastModified": "2024-02-29T01:40:47.670",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3855.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3855.json
index 208fd5a9fab..7501eea5a89 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3855.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3855.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3855",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-24T00:15:09.430",
- "lastModified": "2023-11-07T04:19:52.330",
+ "lastModified": "2024-02-29T01:40:47.760",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3856.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3856.json
index 47cff68606a..32e81c11799 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3856.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3856.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3856",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-24T01:15:08.877",
- "lastModified": "2023-11-07T04:19:52.573",
+ "lastModified": "2024-02-29T01:40:47.847",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3857.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3857.json
index 930f22317c8..8fec5cc81d5 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3857.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3857.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3857",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-24T01:15:08.967",
- "lastModified": "2023-11-07T04:19:52.830",
+ "lastModified": "2024-02-29T01:40:47.940",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3858.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3858.json
index b9ea884469e..d325a8a5046 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3858.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3858.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3858",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-24T02:15:09.130",
- "lastModified": "2023-11-07T04:19:53.103",
+ "lastModified": "2024-02-29T01:40:48.047",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3859.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3859.json
index a3cdedefd87..a2603c46323 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3859.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3859.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3859",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-24T02:15:09.220",
- "lastModified": "2023-11-07T04:19:53.373",
+ "lastModified": "2024-02-29T01:40:48.140",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3860.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3860.json
index 39b3080cebd..753f3a4ebd6 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3860.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3860.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3860",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-24T03:15:09.033",
- "lastModified": "2023-11-07T04:19:53.650",
+ "lastModified": "2024-02-29T01:40:48.240",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3861.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3861.json
index e656d1ffc90..6aacbd3d908 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3861.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3861.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3861",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-24T03:15:09.120",
- "lastModified": "2023-11-07T04:19:53.907",
+ "lastModified": "2024-02-29T01:40:48.333",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3862.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3862.json
index 3051a4a7af2..588f8a0baa4 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3862.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3862.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3862",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-24T04:15:09.670",
- "lastModified": "2023-11-07T04:19:54.163",
+ "lastModified": "2024-02-29T01:40:48.433",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3871.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3871.json
index 7afb57f3a21..fedd49088ee 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3871.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3871.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3871",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-24T22:15:11.363",
- "lastModified": "2023-11-07T04:19:54.807",
+ "lastModified": "2024-02-29T01:40:48.577",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3872.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3872.json
index ea24b08765d..33298425c5d 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3872.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3872.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3872",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-24T22:15:11.867",
- "lastModified": "2023-11-07T04:19:55.107",
+ "lastModified": "2024-02-29T01:40:48.667",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3873.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3873.json
index 34658a93bd2..2257f4d53a9 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3873.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3873.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3873",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T00:15:09.720",
- "lastModified": "2023-11-07T04:19:55.390",
+ "lastModified": "2024-02-29T01:40:48.760",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3874.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3874.json
index 21f9e1df6c0..072a7153406 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3874.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3874.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3874",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T01:15:09.617",
- "lastModified": "2023-11-07T04:19:55.673",
+ "lastModified": "2024-02-29T01:40:48.853",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3875.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3875.json
index 3e19edf7f71..a87be6cf588 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3875.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3875.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3875",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T02:15:09.407",
- "lastModified": "2023-11-07T04:19:55.973",
+ "lastModified": "2024-02-29T01:40:48.957",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3876.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3876.json
index b57a9f9e4f6..b260c342dc6 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3876.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3876.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3876",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T02:15:09.490",
- "lastModified": "2023-11-07T04:19:56.247",
+ "lastModified": "2024-02-29T01:40:49.043",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3877.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3877.json
index 76868913df2..30baca298db 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3877.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3877.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3877",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T03:15:09.510",
- "lastModified": "2023-11-07T04:19:56.523",
+ "lastModified": "2024-02-29T01:40:49.160",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3878.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3878.json
index 004e1a60ec7..9bd8857fd9e 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3878.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3878.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3878",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T03:15:09.600",
- "lastModified": "2023-11-07T04:19:56.793",
+ "lastModified": "2024-02-29T01:40:49.280",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3879.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3879.json
index f7b178d22ee..dc5d136c0ca 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3879.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3879.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3879",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T04:15:10.733",
- "lastModified": "2023-11-07T04:19:57.053",
+ "lastModified": "2024-02-29T01:40:49.383",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3880.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3880.json
index 71a6333b7d9..f6db8ef9396 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3880.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3880.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3880",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T04:15:10.890",
- "lastModified": "2023-11-07T04:19:57.303",
+ "lastModified": "2024-02-29T01:40:49.510",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3881.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3881.json
index e0b332c5f04..93c09aadac8 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3881.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3881.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3881",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T05:15:09.297",
- "lastModified": "2023-11-07T04:19:57.553",
+ "lastModified": "2024-02-29T01:40:49.603",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3882.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3882.json
index 2cc37798265..fa489bebeaf 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3882.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3882.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3882",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T05:15:09.480",
- "lastModified": "2023-11-07T04:19:57.813",
+ "lastModified": "2024-02-29T01:40:49.700",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3883.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3883.json
index f03a310727b..767a3e0d170 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3883.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3883.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3883",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T06:15:16.410",
- "lastModified": "2023-11-07T04:19:58.077",
+ "lastModified": "2024-02-29T01:40:49.790",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3884.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3884.json
index 4ad71f158a5..37409f559f2 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3884.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3884.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3884",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T06:15:16.720",
- "lastModified": "2023-11-07T04:19:58.360",
+ "lastModified": "2024-02-29T01:40:49.877",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3885.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3885.json
index 6ef440eb822..f5f42b95dbb 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3885.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3885.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3885",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T07:15:11.550",
- "lastModified": "2023-11-07T04:19:58.603",
+ "lastModified": "2024-02-29T01:40:49.973",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3886.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3886.json
index 06465c3051a..2435a7e60a6 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3886.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3886.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3886",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T08:15:10.280",
- "lastModified": "2023-11-07T04:19:58.853",
+ "lastModified": "2024-02-29T01:40:50.063",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3887.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3887.json
index a1344448c02..e023a51e062 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3887.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3887.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3887",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T08:15:10.353",
- "lastModified": "2023-11-07T04:19:59.107",
+ "lastModified": "2024-02-29T01:40:50.153",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3888.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3888.json
index fe4ed6fd466..901f697d13a 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3888.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3888.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3888",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T08:15:10.420",
- "lastModified": "2023-11-07T04:19:59.373",
+ "lastModified": "2024-02-29T01:40:50.247",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3890.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3890.json
index a13d0fd1a38..a2c9de7b39f 100644
--- a/CVE-2023/CVE-2023-38xx/CVE-2023-3890.json
+++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3890.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3890",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T09:15:11.557",
- "lastModified": "2023-11-07T04:19:59.630",
+ "lastModified": "2024-02-29T01:40:50.340",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3944.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3944.json
index 3fe13ebe4b4..4ef2a443384 100644
--- a/CVE-2023/CVE-2023-39xx/CVE-2023-3944.json
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3944.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3944",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T20:15:14.027",
- "lastModified": "2023-11-07T04:20:00.653",
+ "lastModified": "2024-02-29T01:40:50.687",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3945.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3945.json
index 3e70081f457..b5bc2cec8e5 100644
--- a/CVE-2023/CVE-2023-39xx/CVE-2023-3945.json
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3945.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3945",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-25T22:15:10.780",
- "lastModified": "2023-11-07T04:20:00.970",
+ "lastModified": "2024-02-29T01:40:50.773",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3969.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3969.json
index 5c130687c39..ea7018376c7 100644
--- a/CVE-2023/CVE-2023-39xx/CVE-2023-3969.json
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3969.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3969",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-27T12:15:09.963",
- "lastModified": "2023-11-07T04:20:02.463",
+ "lastModified": "2024-02-29T01:40:51.043",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3970.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3970.json
index 110bdaa3cb0..12e294526dd 100644
--- a/CVE-2023/CVE-2023-39xx/CVE-2023-3970.json
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3970.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3970",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-27T12:15:10.537",
- "lastModified": "2023-11-07T04:20:02.750",
+ "lastModified": "2024-02-29T01:40:51.133",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3984.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3984.json
index e30403f0308..7c6cbfb6812 100644
--- a/CVE-2023/CVE-2023-39xx/CVE-2023-3984.json
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3984.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3984",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-28T03:15:09.623",
- "lastModified": "2023-11-07T04:20:03.870",
+ "lastModified": "2024-02-29T01:40:51.360",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3985.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3985.json
index 96a9519b579..a82f90ca1a4 100644
--- a/CVE-2023/CVE-2023-39xx/CVE-2023-3985.json
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3985.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3985",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-28T05:15:11.307",
- "lastModified": "2023-11-07T04:20:04.147",
+ "lastModified": "2024-02-29T01:40:51.460",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3986.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3986.json
index e19e48f53c5..9fc36f72f88 100644
--- a/CVE-2023/CVE-2023-39xx/CVE-2023-3986.json
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3986.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3986",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-28T05:15:11.407",
- "lastModified": "2023-11-07T04:20:04.423",
+ "lastModified": "2024-02-29T01:40:51.623",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3987.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3987.json
index 1268ea2fe86..38ea9895db8 100644
--- a/CVE-2023/CVE-2023-39xx/CVE-2023-3987.json
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3987.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3987",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-28T06:15:11.113",
- "lastModified": "2023-11-07T04:20:04.687",
+ "lastModified": "2024-02-29T01:40:51.717",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3988.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3988.json
index dc3a4f21886..082ca899948 100644
--- a/CVE-2023/CVE-2023-39xx/CVE-2023-3988.json
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3988.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3988",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-28T06:15:11.877",
- "lastModified": "2023-11-07T04:20:04.950",
+ "lastModified": "2024-02-29T01:40:51.807",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3989.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3989.json
index 44acc33dae0..5c1aa7ed186 100644
--- a/CVE-2023/CVE-2023-39xx/CVE-2023-3989.json
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3989.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3989",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-28T07:15:09.483",
- "lastModified": "2023-11-07T04:20:05.203",
+ "lastModified": "2024-02-29T01:40:51.903",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3990.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3990.json
index ef912406967..26803728258 100644
--- a/CVE-2023/CVE-2023-39xx/CVE-2023-3990.json
+++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3990.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-3990",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-28T07:15:09.700",
- "lastModified": "2023-11-07T04:20:05.457",
+ "lastModified": "2024-02-29T01:40:51.993",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-411xx/CVE-2023-41165.json b/CVE-2023/CVE-2023-411xx/CVE-2023-41165.json
new file mode 100644
index 00000000000..816611ade3a
--- /dev/null
+++ b/CVE-2023/CVE-2023-411xx/CVE-2023-41165.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-41165",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:40:58.383",
+ "lastModified": "2024-02-29T01:40:58.383",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in Stormshield Network Security (SNS) 3.7.0 through 3.7.38 before 3.7.39, 3.10.0 through 3.11.26 before 3.11.27, 4.0 through 4.3.21 before 4.3.22, and 4.4.0 through 4.6.8 before 4.6.9. An administrator with write access to the SNS firewall can configure a login disclaimer with malicious JavaScript elements that can result in data theft."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://advisories.stormshield.eu/2023-020/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4110.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4110.json
index ccbd9aed470..3a89b2ed118 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4110.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4110.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4110",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T03:15:10.830",
- "lastModified": "2023-11-07T04:22:05.943",
+ "lastModified": "2024-02-29T01:41:41.550",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4111.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4111.json
index e64e9031b2c..de21982aad9 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4111.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4111.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4111",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T04:15:10.977",
- "lastModified": "2023-11-07T04:22:06.220",
+ "lastModified": "2024-02-29T01:41:41.683",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4112.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4112.json
index a98c49ddf24..b0783f96e3c 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4112.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4112.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4112",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T05:15:10.817",
- "lastModified": "2023-11-07T04:22:06.510",
+ "lastModified": "2024-02-29T01:41:41.767",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4113.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4113.json
index 14c0ba8937e..8bbb8f8b4a1 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4113.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4113.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4113",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T05:15:10.930",
- "lastModified": "2023-11-07T04:22:06.807",
+ "lastModified": "2024-02-29T01:41:41.850",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4114.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4114.json
index 4b93d0d6d8f..b9105163d1c 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4114.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4114.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4114",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T06:15:10.547",
- "lastModified": "2023-11-07T04:22:07.100",
+ "lastModified": "2024-02-29T01:41:41.933",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4115.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4115.json
index 37ef6351089..d93c82384cd 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4115.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4115.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4115",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T06:15:10.710",
- "lastModified": "2023-11-07T04:22:07.343",
+ "lastModified": "2024-02-29T01:41:42.010",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4116.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4116.json
index 068e8c6e4f2..d1fdfb87343 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4116.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4116.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4116",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T07:15:13.290",
- "lastModified": "2023-11-07T04:22:07.617",
+ "lastModified": "2024-02-29T01:41:42.090",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4117.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4117.json
index c7fd6295903..434035d0fe9 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4117.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4117.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4117",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T08:15:10.633",
- "lastModified": "2023-11-07T04:22:07.880",
+ "lastModified": "2024-02-29T01:41:42.173",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4118.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4118.json
index b9e27fda763..ca16787a711 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4118.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4118.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4118",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T08:15:10.717",
- "lastModified": "2023-11-07T04:22:08.173",
+ "lastModified": "2024-02-29T01:41:42.253",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4119.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4119.json
index 5c104e6ad8e..596e533646e 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4119.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4119.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4119",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T09:15:09.697",
- "lastModified": "2023-11-07T04:22:08.410",
+ "lastModified": "2024-02-29T01:41:42.333",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4120.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4120.json
index fa01698a425..33b6d2c218a 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4120.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4120.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4120",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T09:15:10.210",
- "lastModified": "2023-11-07T04:22:08.650",
+ "lastModified": "2024-02-29T01:41:42.413",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4121.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4121.json
index 326647486a5..e07d06f6ee6 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4121.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4121.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4121",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-03T10:15:09.790",
- "lastModified": "2023-11-07T04:22:08.897",
+ "lastModified": "2024-02-29T01:41:42.527",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4165.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4165.json
index 9ee8876355f..d00eac6ba12 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4165.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4165.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4165",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-05T14:15:23.390",
- "lastModified": "2023-12-16T04:28:21.150",
+ "lastModified": "2024-02-29T01:41:43.040",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4166.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4166.json
index 3f58aa2dd5d..84a98290587 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4166.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4166.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4166",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-05T16:15:23.747",
- "lastModified": "2024-02-13T08:16:15.580",
+ "lastModified": "2024-02-29T01:41:43.133",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4167.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4167.json
index 082ee14ff83..62b2110c7f1 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4167.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4167.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4167",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-05T16:15:23.907",
- "lastModified": "2023-11-07T04:22:13.120",
+ "lastModified": "2024-02-29T01:41:43.210",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4168.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4168.json
index d576875bbd2..220709d0f39 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4168.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4168.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4168",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-05T18:15:09.563",
- "lastModified": "2023-11-07T04:22:13.450",
+ "lastModified": "2024-02-29T01:41:43.293",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4169.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4169.json
index 3c6128d4a42..af15cdd60a3 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4169.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4169.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4169",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-05T18:15:17.850",
- "lastModified": "2024-02-13T08:16:15.833",
+ "lastModified": "2024-02-29T01:41:43.380",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4170.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4170.json
index 4a019ced81f..9987a64eb04 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4170.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4170.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4170",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-05T19:15:18.463",
- "lastModified": "2023-11-07T04:22:14.010",
+ "lastModified": "2024-02-29T01:41:43.467",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4171.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4171.json
index 8960b82e873..e1622fbc116 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4171.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4171.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4171",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-05T21:15:09.490",
- "lastModified": "2023-11-07T04:22:14.257",
+ "lastModified": "2024-02-29T01:41:43.550",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0. This vulnerability affects unknown code of the file \\Service\\FileDownload.ashx. The manipulation of the argument Files leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-236206 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en Chengdu Flash Flood Disaster Monitoring and Warning System 2.0. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo \"\\Service\\FileDownload.ashx\". La manipulaci\u00f3n del argumento \"Files\" conduce a un path traversal: \"../filedir\". El ataque puede iniciarse de forma remota. El exploit ha sido revelado al p\u00fablico y puede ser utilizado. VDB-236206 es el identificador asignado a esta vulnerabilidad. "
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4172.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4172.json
index f43a15f9a89..6c00a517498 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4172.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4172.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4172",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-05T23:15:13.373",
- "lastModified": "2023-11-07T04:22:14.523",
+ "lastModified": "2024-02-29T01:41:43.637",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in Chengdu Flash Flood Disaster Monitoring and Warning System 2.0. This issue affects some unknown processing of the file \\Service\\FileHandler.ashx. The manipulation of the argument FileDirectory leads to absolute path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-236207."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad, clasificada como problem\u00e1tica, en Chengdu Flash Flood Disaster Monitoring and Warning System 2.0. Este problema afecta a alg\u00fan procesamiento desconocido del archivo \"\\Service\\FileHandler.ashx\". La manipulaci\u00f3n del argumento \"FileDirectory\" conduce a un path traversal absoluto. El ataque puede iniciarse de forma remota. El exploit ha sido revelado al p\u00fablico y puede ser utilizado. El identificador asociado de esta vulnerabilidad es VDB-236207."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4173.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4173.json
index 80a4fd68ddb..83d066d5824 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4173.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4173.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4173",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-06T00:15:10.103",
- "lastModified": "2023-11-07T04:22:14.770",
+ "lastModified": "2024-02-29T01:41:43.723",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in mooSocial mooStore 3.1.6. Affected is an unknown function of the file /search/index. The manipulation of the argument q leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-236208."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad, clasificada como problem\u00e1tica, en mooSocial mooStore v3.1.6. Se ve afectada una funci\u00f3n desconocida del archivo /search/index. La manipulaci\u00f3n del argumento \"q\" conduce a Cross-Site Scripting (XSS). Es posible lanzar el ataque de forma remota. El identificador de esta vulnerabilidad es VDB-236208."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4174.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4174.json
index 72c910d73f0..42123562f02 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4174.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4174.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4174",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-06T01:15:08.820",
- "lastModified": "2023-11-07T04:22:15.003",
+ "lastModified": "2024-02-29T01:41:43.803",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in mooSocial mooStore 3.1.6 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely. The identifier VDB-236209 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en mooSocial mooStore v3.1.6 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida. La manipulaci\u00f3n conduce a Cross-Site Scripting (XSS). El ataque puede lanzarse de forma remota. Se ha asignado a esta vulnerabilidad el identificador VDB-236209. "
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4175.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4175.json
index 8aba64bb420..b68e253d1da 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4175.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4175.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4175",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-06T02:15:09.093",
- "lastModified": "2023-11-07T04:22:15.270",
+ "lastModified": "2024-02-29T01:41:43.890",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4176.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4176.json
index e43b7fba91a..696c5aad30e 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4176.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4176.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4176",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-06T02:15:11.147",
- "lastModified": "2023-11-07T04:22:15.530",
+ "lastModified": "2024-02-29T01:41:43.967",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Hospital Management System 1.0. It has been classified as critical. This affects an unknown part of the file appointmentapproval.php. The manipulation of the argument time leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-236211."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en SourceCodester Hospital Management System 1.0. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo \"appointmentapproval.php\". La manipulaci\u00f3n del argumento \"time\" conduce a una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido revelado al p\u00fablico y puede ser utilizado. El identificador asociado de esta vulnerabilidad es VDB-236211."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4177.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4177.json
index 3e548ebc9a7..6edf89f1ce0 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4177.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4177.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4177",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-06T07:15:42.107",
- "lastModified": "2023-11-07T04:22:15.810",
+ "lastModified": "2024-02-29T01:41:44.050",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4179.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4179.json
index 0b7814fac1c..d43eefd2df4 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4179.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4179.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4179",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-06T08:15:09.113",
- "lastModified": "2023-11-07T04:22:16.067",
+ "lastModified": "2024-02-29T01:41:44.143",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4180.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4180.json
index cd5ba4a6934..e1ed5593fe9 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4180.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4180.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4180",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-06T08:15:09.213",
- "lastModified": "2023-11-07T04:22:16.350",
+ "lastModified": "2024-02-29T01:41:44.227",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4181.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4181.json
index 6dd33203bb3..e7fdc36b09d 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4181.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4181.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4181",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-06T09:15:09.513",
- "lastModified": "2023-11-07T04:22:16.603",
+ "lastModified": "2024-02-29T01:41:44.303",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4182.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4182.json
index 8a4262f6f6f..198d91b04e6 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4182.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4182.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4182",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-06T10:15:09.430",
- "lastModified": "2023-11-07T04:22:16.853",
+ "lastModified": "2024-02-29T01:41:44.383",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4183.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4183.json
index 1ac7d640923..3d67c001715 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4183.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4183.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4183",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-06T11:15:09.047",
- "lastModified": "2023-11-07T04:22:17.117",
+ "lastModified": "2024-02-29T01:41:44.457",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4184.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4184.json
index 51afdf119c9..921a712453e 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4184.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4184.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4184",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-06T12:15:09.263",
- "lastModified": "2023-11-07T04:22:17.420",
+ "lastModified": "2024-02-29T01:41:44.563",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4185.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4185.json
index 672ce1f414b..0f020f4da27 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4185.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4185.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4185",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-06T13:15:14.137",
- "lastModified": "2023-11-07T04:22:17.727",
+ "lastModified": "2024-02-29T01:41:44.660",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4186.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4186.json
index cb0b1fe8d6b..0b98698d273 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4186.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4186.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4186",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-06T14:15:10.167",
- "lastModified": "2024-02-13T08:16:16.087",
+ "lastModified": "2024-02-29T01:41:44.737",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4191.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4191.json
index 909be22d3e3..6792ba52c47 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4191.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4191.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4191",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-06T23:15:26.913",
- "lastModified": "2023-11-07T04:22:18.307",
+ "lastModified": "2024-02-29T01:41:44.853",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4192.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4192.json
index e9cd92a6b05..c7db4a6a82f 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4192.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4192.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4192",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-07T00:15:09.387",
- "lastModified": "2023-11-07T04:22:18.580",
+ "lastModified": "2024-02-29T01:41:44.933",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4193.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4193.json
index e4ca2ee4e3b..8a6b6d02af1 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4193.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4193.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4193",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-07T00:15:09.613",
- "lastModified": "2023-11-07T04:22:18.840",
+ "lastModified": "2024-02-29T01:41:45.020",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4199.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4199.json
index e8a4cc42ac0..1acafb099ba 100644
--- a/CVE-2023/CVE-2023-41xx/CVE-2023-4199.json
+++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4199.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4199",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-07T18:15:10.667",
- "lastModified": "2023-11-07T04:22:19.460",
+ "lastModified": "2024-02-29T01:41:45.157",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4200.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4200.json
index c40f60702a3..803597d4810 100644
--- a/CVE-2023/CVE-2023-42xx/CVE-2023-4200.json
+++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4200.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4200",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-07T19:15:12.057",
- "lastModified": "2023-11-07T04:22:19.770",
+ "lastModified": "2024-02-29T01:41:45.233",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4201.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4201.json
index f2f46793e52..52fd0d1ecef 100644
--- a/CVE-2023/CVE-2023-42xx/CVE-2023-4201.json
+++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4201.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4201",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-07T20:15:10.247",
- "lastModified": "2023-11-07T04:22:20.037",
+ "lastModified": "2024-02-29T01:41:45.317",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4219.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4219.json
index 9d3d7d69852..be471613e00 100644
--- a/CVE-2023/CVE-2023-42xx/CVE-2023-4219.json
+++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4219.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4219",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-08T13:15:12.633",
- "lastModified": "2023-11-07T04:22:20.910",
+ "lastModified": "2024-02-29T01:41:45.557",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Doctors Appointment System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument useremail leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-236365 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en SourceCodester Doctors Appointment System 1.0. Ha sido declarada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo \"login.php\". La manipulaci\u00f3n del argumento \"usermail\" conduce a una inyecci\u00f3n SQL. El ataque puede ser lanzado remotamente. El exploit ha sido revelado al p\u00fablico y puede ser utilizado. El identificador VDB-236365 fue asignado a esta vulnerabilidad. "
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43769.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43769.json
new file mode 100644
index 00000000000..a6325539cd0
--- /dev/null
+++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43769.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-43769",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:41:09.503",
+ "lastModified": "2024-02-29T01:41:09.503",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in Couchbase Server through 7.1.4 before 7.1.5 and before 7.2.1. There are Unauthenticated RMI Service Ports Exposed in Analytics."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://forums.couchbase.com/tags/security",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.couchbase.com/alerts/",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.couchbase.com/downloads",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4371.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4371.json
index b41618e994b..6c834e064f2 100644
--- a/CVE-2023/CVE-2023-43xx/CVE-2023-4371.json
+++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4371.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4371",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-15T15:15:09.710",
- "lastModified": "2023-11-07T04:22:28.343",
+ "lastModified": "2024-02-29T01:41:46.850",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in phpRecDB 1.3.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument r/view leads to cross site scripting. The attack may be launched remotely. VDB-237194 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en phpRecDB 1.3.1. Se ha clasificado como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del archivo /index.php. La manipulaci\u00f3n del argumento r/view conduce a cross site scripting. El ataque puede lanzarse de forma remota. VDB-237194 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 con el proveedor con antelaci\u00f3n acerca de esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4382.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4382.json
index 8026d030a6e..8e631b217c0 100644
--- a/CVE-2023/CVE-2023-43xx/CVE-2023-4382.json
+++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4382.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4382",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-16T20:15:09.650",
- "lastModified": "2023-11-07T04:22:29.103",
+ "lastModified": "2024-02-29T01:41:47.017",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4383.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4383.json
index a5b570906b1..43ba7f18ebe 100644
--- a/CVE-2023/CVE-2023-43xx/CVE-2023-4383.json
+++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4383.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4383",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-16T20:15:09.740",
- "lastModified": "2023-11-07T04:22:29.367",
+ "lastModified": "2024-02-29T01:41:47.103",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4384.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4384.json
index 711100015b6..e33a50b7e92 100644
--- a/CVE-2023/CVE-2023-43xx/CVE-2023-4384.json
+++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4384.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4384",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-16T20:15:09.827",
- "lastModified": "2023-11-07T04:22:29.607",
+ "lastModified": "2024-02-29T01:41:47.187",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in MaximaTech Portal Executivo 21.9.1.140 and classified as problematic. This vulnerability affects unknown code of the component Cookie Handler. The manipulation leads to missing encryption of sensitive data. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-237316. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en MaximaTech Portal Executivo 21.9.1.140 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del componente Cookie Handler. La manipulaci\u00f3n provoca la falta de cifrado de datos sensibles. El ataque puede ser iniciado remotamente. La complejidad del ataque es bastante elevada. La explotaci\u00f3n parece dif\u00edcil. El exploit ha sido revelado al p\u00fablico y puede ser utilizado. El identificador de esta vulnerabilidad es VDB-237316. NOTA: Se contact\u00f3 con el proveedor en un primer momento acerca de esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4392.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4392.json
index 7c95aa36fac..6e908fdf7c7 100644
--- a/CVE-2023/CVE-2023-43xx/CVE-2023-4392.json
+++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4392.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4392",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-17T03:15:09.820",
- "lastModified": "2023-11-07T04:22:31.157",
+ "lastModified": "2024-02-29T01:41:47.327",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44341.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44341.json
new file mode 100644
index 00000000000..8f7d3e42756
--- /dev/null
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44341.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-44341",
+ "sourceIdentifier": "psirt@adobe.com",
+ "published": "2024-02-29T01:41:12.810",
+ "lastModified": "2024-02-29T01:41:12.810",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by a NULL Pointer Dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html",
+ "source": "psirt@adobe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44342.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44342.json
new file mode 100644
index 00000000000..630f0f13e0b
--- /dev/null
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44342.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-44342",
+ "sourceIdentifier": "psirt@adobe.com",
+ "published": "2024-02-29T01:41:13.020",
+ "lastModified": "2024-02-29T01:41:13.020",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html",
+ "source": "psirt@adobe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44343.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44343.json
new file mode 100644
index 00000000000..234fcabf894
--- /dev/null
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44343.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-44343",
+ "sourceIdentifier": "psirt@adobe.com",
+ "published": "2024-02-29T01:41:13.323",
+ "lastModified": "2024-02-29T01:41:13.323",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html",
+ "source": "psirt@adobe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44344.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44344.json
new file mode 100644
index 00000000000..772e72eb438
--- /dev/null
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44344.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-44344",
+ "sourceIdentifier": "psirt@adobe.com",
+ "published": "2024-02-29T01:41:13.497",
+ "lastModified": "2024-02-29T01:41:13.497",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html",
+ "source": "psirt@adobe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44345.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44345.json
new file mode 100644
index 00000000000..1c9b2fba397
--- /dev/null
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44345.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-44345",
+ "sourceIdentifier": "psirt@adobe.com",
+ "published": "2024-02-29T01:41:13.680",
+ "lastModified": "2024-02-29T01:41:13.680",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by a Improper Input Validation vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-20"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html",
+ "source": "psirt@adobe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44346.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44346.json
new file mode 100644
index 00000000000..58cc5953d80
--- /dev/null
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44346.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-44346",
+ "sourceIdentifier": "psirt@adobe.com",
+ "published": "2024-02-29T01:41:13.857",
+ "lastModified": "2024-02-29T01:41:13.857",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-125"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html",
+ "source": "psirt@adobe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44347.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44347.json
new file mode 100644
index 00000000000..70bb7874c5f
--- /dev/null
+++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44347.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-44347",
+ "sourceIdentifier": "psirt@adobe.com",
+ "published": "2024-02-29T01:41:14.037",
+ "lastModified": "2024-02-29T01:41:14.037",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Adobe InDesign versions ID18.5 (and earlier) and ID17.4.2 (and earlier) are affected by a NULL Pointer Dereference vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve an application denial-of-service in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "HIGH",
+ "baseScore": 5.5,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.8,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "psirt@adobe.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html",
+ "source": "psirt@adobe.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4407.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4407.json
index e2d71299224..053959acf19 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4407.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4407.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4407",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-18T13:15:09.830",
- "lastModified": "2023-11-07T04:22:32.097",
+ "lastModified": "2024-02-29T01:41:47.520",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4409.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4409.json
index 1be41ab98ec..f4ef1b6cae8 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4409.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4409.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4409",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-18T13:15:09.980",
- "lastModified": "2023-11-07T04:22:32.383",
+ "lastModified": "2024-02-29T01:41:47.610",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4410.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4410.json
index f8c845f58dd..3e40b172315 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4410.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4410.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4410",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-18T14:15:34.147",
- "lastModified": "2023-11-07T04:22:32.630",
+ "lastModified": "2024-02-29T01:41:47.690",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4411.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4411.json
index c6557409982..88d131afbe8 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4411.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4411.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4411",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-18T14:15:35.227",
- "lastModified": "2023-11-07T04:22:32.873",
+ "lastModified": "2024-02-29T01:41:47.767",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4412.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4412.json
index 6375a857148..1d48effdef4 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4412.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4412.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4412",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-18T15:15:10.240",
- "lastModified": "2023-11-07T04:22:33.103",
+ "lastModified": "2024-02-29T01:41:47.850",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4414.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4414.json
index e27d830fcd0..7c357ea5141 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4414.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4414.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4414",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-18T16:15:11.070",
- "lastModified": "2023-11-07T04:22:33.493",
+ "lastModified": "2024-02-29T01:41:47.937",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4415.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4415.json
index d1b559810dd..327bac4f14a 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4415.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4415.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4415",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-18T16:15:11.163",
- "lastModified": "2024-02-13T08:16:16.417",
+ "lastModified": "2024-02-29T01:41:48.023",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4436.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4436.json
index 1da4d9b9ccc..0179f06ea3d 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4436.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4436.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4436",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-20T22:15:10.273",
- "lastModified": "2023-11-07T04:22:34.470",
+ "lastModified": "2024-02-29T01:41:48.260",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4437.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4437.json
index 6a5cf89f5bb..04a4729100c 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4437.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4437.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4437",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-20T22:15:11.027",
- "lastModified": "2023-11-07T04:22:34.690",
+ "lastModified": "2024-02-29T01:41:48.370",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4438.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4438.json
index 98ca1957099..80865748a99 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4438.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4438.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4438",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-20T23:15:09.493",
- "lastModified": "2023-11-07T04:22:34.970",
+ "lastModified": "2024-02-29T01:41:48.480",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4439.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4439.json
index 04a4542e67f..e2552116238 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4439.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4439.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4439",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-20T23:15:10.440",
- "lastModified": "2023-11-07T04:22:35.240",
+ "lastModified": "2024-02-29T01:41:48.557",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4440.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4440.json
index 2bcbd459d11..c220e46390f 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4440.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4440.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4440",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-20T23:15:10.693",
- "lastModified": "2023-11-07T04:22:35.493",
+ "lastModified": "2024-02-29T01:41:48.643",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4441.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4441.json
index 1b63f8d6c93..35143ab51d4 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4441.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4441.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4441",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-21T00:15:09.457",
- "lastModified": "2023-11-07T04:22:35.747",
+ "lastModified": "2024-02-29T01:41:48.723",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4442.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4442.json
index 0f573b9f466..b0cf034d747 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4442.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4442.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4442",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-21T00:15:09.860",
- "lastModified": "2023-11-07T04:22:35.997",
+ "lastModified": "2024-02-29T01:41:48.807",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4443.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4443.json
index d2bc476fb24..4aeee56dfea 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4443.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4443.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4443",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-21T01:15:10.013",
- "lastModified": "2023-11-07T04:22:36.297",
+ "lastModified": "2024-02-29T01:41:48.887",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4444.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4444.json
index c31ac8c2b03..16594f0d246 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4444.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4444.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4444",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-21T01:15:10.117",
- "lastModified": "2023-11-07T04:22:36.547",
+ "lastModified": "2024-02-29T01:41:48.967",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4445.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4445.json
index 0e5465de1a7..d00546fa401 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4445.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4445.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4445",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-21T01:15:10.210",
- "lastModified": "2024-02-13T08:16:16.810",
+ "lastModified": "2024-02-29T01:41:49.040",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4446.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4446.json
index dc3d961e6f7..40bb47107a1 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4446.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4446.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4446",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-21T01:15:10.320",
- "lastModified": "2023-11-07T04:22:37.107",
+ "lastModified": "2024-02-29T01:41:49.120",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4447.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4447.json
index c3fe92c204c..524c04de562 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4447.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4447.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4447",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-21T02:15:10.120",
- "lastModified": "2023-11-07T04:22:37.350",
+ "lastModified": "2024-02-29T01:41:49.193",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4448.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4448.json
index 05ad09aa400..079dd462f51 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4448.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4448.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4448",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-21T02:15:10.227",
- "lastModified": "2023-11-07T04:22:37.587",
+ "lastModified": "2024-02-29T01:41:49.277",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4449.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4449.json
index 570d4415248..c3d1ea23849 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4449.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4449.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4449",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-21T02:15:10.370",
- "lastModified": "2023-11-07T04:22:37.830",
+ "lastModified": "2024-02-29T01:41:49.367",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4450.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4450.json
index 757dd3fc92a..59e3448ca30 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4450.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4450.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4450",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-21T03:15:13.760",
- "lastModified": "2024-02-13T08:16:17.063",
+ "lastModified": "2024-02-29T01:41:49.450",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4462.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4462.json
index bddabd57e77..640faa41064 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4462.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4462.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4462",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-29T10:15:11.100",
- "lastModified": "2024-01-09T17:15:11.153",
+ "lastModified": "2024-02-29T01:41:49.647",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4463.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4463.json
index fe3f9211a8f..43bbe38604c 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4463.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4463.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4463",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-29T10:15:11.413",
- "lastModified": "2024-01-09T17:15:11.347",
+ "lastModified": "2024-02-29T01:41:49.787",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4464.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4464.json
index 111fa5cabb3..e7acedf28b3 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4464.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4464.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4464",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-29T10:15:11.750",
- "lastModified": "2024-01-09T17:15:11.480",
+ "lastModified": "2024-02-29T01:41:49.877",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4465.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4465.json
index 98a5d92565d..03f213ce350 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4465.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4465.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4465",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-29T10:15:12.133",
- "lastModified": "2024-01-09T17:15:11.623",
+ "lastModified": "2024-02-29T01:41:49.960",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4466.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4466.json
index b2f62ac03eb..f04c37e46d5 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4466.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4466.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4466",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-29T10:15:12.470",
- "lastModified": "2024-01-09T17:15:11.773",
+ "lastModified": "2024-02-29T01:41:50.063",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4467.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4467.json
index 52d19e7b167..a7f590a790e 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4467.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4467.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4467",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-29T10:15:12.783",
- "lastModified": "2024-01-09T17:15:11.887",
+ "lastModified": "2024-02-29T01:41:50.153",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4468.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4468.json
index 0989fdb6067..bf097484dd0 100644
--- a/CVE-2023/CVE-2023-44xx/CVE-2023-4468.json
+++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4468.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4468",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-29T10:15:13.140",
- "lastModified": "2024-01-09T17:15:12.000",
+ "lastModified": "2024-02-29T01:41:50.240",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45874.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45874.json
new file mode 100644
index 00000000000..e5de03452f2
--- /dev/null
+++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45874.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-45874",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:41:20.007",
+ "lastModified": "2024-02-29T01:41:20.007",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in Couchbase Server through 7.2.2. A data reader may cause a denial of service (outage of reader threads)."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://forums.couchbase.com/tags/security",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.couchbase.com/alerts/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4534.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4534.json
index aa3ad4b034c..b49b6188c37 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4534.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4534.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4534",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-25T15:15:09.887",
- "lastModified": "2023-11-07T04:22:41.577",
+ "lastModified": "2024-02-29T01:41:50.840",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in NeoMind Fusion Platform up to 20230731. Affected is an unknown function of the file /fusion/portal/action/Link. The manipulation of the argument link leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-238026 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad, clasificada como problem\u00e1tica, en la plataforma NeoMind Fusion hasta 20230731. Se ve afectada una funci\u00f3n desconocida del archivo /fusion/portal/action/Link. La manipulaci\u00f3n del argumento link conduce a cross site scripting. Es posible lanzar el ataque de forma remota. El exploit ha sido revelado al p\u00fablico y puede ser utilizado. VDB-238026 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 con el proveedor con antelaci\u00f3n acerca de esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4542.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4542.json
index 419d2e9d4a5..33e4563f9d9 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4542.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4542.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4542",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-25T22:15:11.457",
- "lastModified": "2023-11-07T04:22:41.963",
+ "lastModified": "2024-02-29T01:41:51.003",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4543.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4543.json
index f889d85c730..9d908cd38fe 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4543.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4543.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4543",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-25T22:15:11.610",
- "lastModified": "2023-11-07T04:22:42.217",
+ "lastModified": "2024-02-29T01:41:51.090",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4544.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4544.json
index a7467d399a9..736c248e3df 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4544.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4544.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4544",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-26T05:15:49.630",
- "lastModified": "2023-11-07T04:22:42.500",
+ "lastModified": "2024-02-29T01:41:51.167",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4545.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4545.json
index e491b1d8251..717f23ac57f 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4545.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4545.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4545",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-26T07:15:10.067",
- "lastModified": "2023-11-07T04:22:42.790",
+ "lastModified": "2024-02-29T01:41:51.243",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4546.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4546.json
index 5caea203646..abaf258467b 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4546.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4546.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4546",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-26T08:15:08.047",
- "lastModified": "2023-11-07T04:22:43.110",
+ "lastModified": "2024-02-29T01:41:51.323",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4547.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4547.json
index 4dc01a5ae22..5ad28696f5c 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4547.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4547.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4547",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-26T09:15:09.057",
- "lastModified": "2023-11-07T04:22:43.380",
+ "lastModified": "2024-02-29T01:41:51.403",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4548.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4548.json
index aeb4bc4f66f..8d138540d20 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4548.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4548.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4548",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-26T10:15:11.277",
- "lastModified": "2023-11-07T04:22:43.800",
+ "lastModified": "2024-02-29T01:41:51.513",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4555.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4555.json
index aac47c3f92a..b7cc5cddef6 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4555.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4555.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4555",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-27T07:15:07.370",
- "lastModified": "2024-02-13T08:16:17.340",
+ "lastModified": "2024-02-29T01:41:51.693",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4556.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4556.json
index f59db97679a..79856700e52 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4556.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4556.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4556",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-27T07:15:13.950",
- "lastModified": "2023-11-07T04:22:44.560",
+ "lastModified": "2024-02-29T01:41:51.777",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +81,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4557.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4557.json
index c325238f166..883e5be6666 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4557.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4557.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4557",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-27T23:15:35.040",
- "lastModified": "2023-11-07T04:22:44.790",
+ "lastModified": "2024-02-29T01:41:51.857",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester Inventory Management System 1.0. Affected is an unknown function of the file app/ajax/search_purchase_paymen_report.php. The manipulation of the argument customer leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-238158 is the identifier assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Inventory Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo \"app/ajax/search_purchase_paymen_report.php\". La manipulaci\u00f3n del argumento customer conduce a una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido revelado al p\u00fablico y puede ser utilizado. VDB-238158 es el identificador asignado a esta vulnerabilidad. "
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4558.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4558.json
index aec4a4def40..51b0d308f01 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4558.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4558.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4558",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-27T23:15:36.730",
- "lastModified": "2024-02-13T08:16:17.623",
+ "lastModified": "2024-02-29T01:41:51.937",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4559.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4559.json
index 448af63b5e1..d65dfb7821d 100644
--- a/CVE-2023/CVE-2023-45xx/CVE-2023-4559.json
+++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4559.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4559",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-27T23:15:36.837",
- "lastModified": "2023-11-07T04:22:45.350",
+ "lastModified": "2024-02-29T01:41:52.017",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Bettershop LaikeTui. Affected by this issue is some unknown functionality of the file index.php?module=api&action=user&m=upload of the component POST Request Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The identifier of this vulnerability is VDB-238160."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad, clasificada como cr\u00edtica, en Bettershop LaikeTui. Este problema afecta a una funcionalidad desconocida del archivo \"index.php?module=api&action=user&m=upload\" del componente POST Request Handler. La manipulaci\u00f3n conduce a una carga sin restricciones. El ataque puede ser lanzado remotamente. Este producto utiliza entrega continua con lanzamientos continuos. Por lo tanto, no se dispone de detalles de la versi\u00f3n afectada ni de las versiones actualizadas. El identificador de esta vulnerabilidad es VDB-238160. "
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46251.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46251.json
index ec15a366e8b..8cdb822c0a8 100644
--- a/CVE-2023/CVE-2023-462xx/CVE-2023-46251.json
+++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46251.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-46251",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-06T18:15:08.547",
- "lastModified": "2023-11-14T17:07:08.867",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:41:21.943",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": " MyBB is a free and open source forum software. Custom MyCode (BBCode) for the visual editor (_SCEditor_) doesn't escape input properly when rendering HTML, resulting in a DOM-based XSS vulnerability. This weakness can be exploited by pointing a victim to a page where the visual editor is active (e.g. as a post or Private Message) and operates on a maliciously crafted MyCode message. This may occur on pages where message content is pre-filled using a GET/POST parameter, or on reply pages where a previously saved malicious message is quoted. The impact is be mitigated when: 1. the visual editor is disabled globally (_Admin CP ? Configuration ? Settings ? Clickable Smilies and BB Code: [Clickable MyCode Editor](https://github.com/mybb/mybb/blob/mybb_1836/install/resources/settings.xml#L2087-L2094)_ is set to _Off_), or 2. the visual editor is disabled for individual user accounts (_User CP ? Your Profile ? Edit Options_: _Show the MyCode formatting options on the posting pages_ checkbox is not checked). MyBB 1.8.37 resolves this issue with the commit `6dcaf0b4d`. Users are advised to upgrade. Users unable to upgrade may mitigate the impact without upgrading MyBB by changing the following setting (_Admin CP ? Configuration ? Settings_):\n- _Clickable Smilies and BB Code ? [Clickable MyCode Editor](https://github.com/mybb/mybb/blob/mybb_1836/install/resources/settings.xml#L2087-L2094)_: _Off_. Similarly, individual MyBB forum users are able to disable the visual editor by diabling the account option (_User CP ? Your Profile ? Edit Options_) _Show the MyCode formatting options on the posting pages_."
+ "value": " MyBB is a free and open source forum software. Custom MyCode (BBCode) for the visual editor (_SCEditor_) doesn't escape input properly when rendering HTML, resulting in a DOM-based XSS vulnerability. This weakness can be exploited by pointing a victim to a page where the visual editor is active (e.g. as a post or Private Message) and operates on a maliciously crafted MyCode message. This may occur on pages where message content is pre-filled using a GET/POST parameter, or on reply pages where a previously saved malicious message is quoted. The impact is be mitigated when: 1. the visual editor is disabled globally (_Admin CP \u2192 Configuration \u2192 Settings \u2192 Clickable Smilies and BB Code: [Clickable MyCode Editor](https://github.com/mybb/mybb/blob/mybb_1836/install/resources/settings.xml#L2087-L2094)_ is set to _Off_), or 2. the visual editor is disabled for individual user accounts (_User CP \u2192 Your Profile \u2192 Edit Options_: _Show the MyCode formatting options on the posting pages_ checkbox is not checked). MyBB 1.8.37 resolves this issue with the commit `6dcaf0b4d`. Users are advised to upgrade. Users unable to upgrade may mitigate the impact without upgrading MyBB by changing the following setting (_Admin CP \u2192 Configuration \u2192 Settings_):\n- _Clickable Smilies and BB Code \u2192 [Clickable MyCode Editor](https://github.com/mybb/mybb/blob/mybb_1836/install/resources/settings.xml#L2087-L2094)_: _Off_. Similarly, individual MyBB forum users are able to disable the visual editor by diabling the account option (_User CP \u2192 Your Profile \u2192 Edit Options_) _Show the MyCode formatting options on the posting pages_."
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47243.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47243.json
index 8467274f53f..90e85b23a9d 100644
--- a/CVE-2023/CVE-2023-472xx/CVE-2023-47243.json
+++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47243.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-47243",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-18T22:15:07.100",
- "lastModified": "2023-11-24T19:28:52.237",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:41:26.767",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Cross-Site Request Forgery (CSRF) vulnerability in CodeMShop ???? ????? \u2013 MSHOP MY SITE.This issue affects ???? ????? \u2013 MSHOP MY SITE: from n/a through 1.1.6.\n\n"
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in CodeMShop \ucf54\ub4dc\uc5e0\uc0f5 \ub9c8\uc774\uc0ac\uc774\ud2b8 \u2013 MSHOP MY SITE.This issue affects \ucf54\ub4dc\uc5e0\uc0f5 \ub9c8\uc774\uc0ac\uc774\ud2b8 \u2013 MSHOP MY SITE: from n/a through 1.1.6.\n\n"
},
{
"lang": "es",
@@ -61,7 +61,7 @@
"weaknesses": [
{
"source": "audit@patchstack.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47634.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47634.json
new file mode 100644
index 00000000000..0e2820eee9b
--- /dev/null
+++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47634.json
@@ -0,0 +1,67 @@
+{
+ "id": "CVE-2023-47634",
+ "sourceIdentifier": "security-advisories@github.com",
+ "published": "2024-02-29T01:41:28.370",
+ "lastModified": "2024-02-29T01:41:28.370",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Decidim is a participatory democracy framework. Starting in version 0.10.0 and prior to versions 0.26.9, 0.27.5, and 0.28.0, a race condition in the endorsement of resources (for instance, a proposal) allows a user to make more than once endorsement. To exploit this vulnerability, the request to set an endorsement must be sent several times in parallel. Versions 0.26.9, 0.27.5, and 0.28.0 contain a patch for this issue. As a workaround, disable the Endorsement feature in the components. "
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 3.1,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 1.6,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "security-advisories@github.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-362"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/decidim/decidim/releases/tag/v0.26.9",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/decidim/decidim/releases/tag/v0.27.5",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/decidim/decidim/releases/tag/v0.28.0",
+ "source": "security-advisories@github.com"
+ },
+ {
+ "url": "https://github.com/decidim/decidim/security/advisories/GHSA-r275-j57c-7mf2",
+ "source": "security-advisories@github.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4707.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4707.json
index 6b78d05b6f9..a4542b43e90 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4707.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4707.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4707",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-01T18:15:07.793",
- "lastModified": "2023-11-07T04:22:51.360",
+ "lastModified": "2024-02-29T01:41:53.317",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -33,7 +33,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +55,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -91,7 +91,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4708.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4708.json
index bda6faecc83..1a78349c0f3 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4708.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4708.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4708",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-01T18:15:07.893",
- "lastModified": "2023-11-07T04:22:51.690",
+ "lastModified": "2024-02-29T01:41:53.407",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4709.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4709.json
index 84782e4f7bc..023d2788203 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4709.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4709.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4709",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-01T19:15:43.063",
- "lastModified": "2023-11-07T04:22:52.003",
+ "lastModified": "2024-02-29T01:41:53.487",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4710.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4710.json
index 83a96e935b2..21a138edebb 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4710.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4710.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4710",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-01T20:15:08.103",
- "lastModified": "2023-11-07T04:22:52.277",
+ "lastModified": "2024-02-29T01:41:53.570",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4711.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4711.json
index d2119a51918..aefc3246726 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4711.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4711.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4711",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-01T20:15:08.310",
- "lastModified": "2023-11-07T04:22:52.530",
+ "lastModified": "2024-02-29T01:41:53.653",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4712.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4712.json
index 11feb5dd788..0ac91f1b44a 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4712.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4712.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4712",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-01T20:15:08.473",
- "lastModified": "2023-11-07T04:22:52.767",
+ "lastModified": "2024-02-29T01:41:53.740",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4713.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4713.json
index 1968865ae51..2732c346d3a 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4713.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4713.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4713",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-01T20:15:08.680",
- "lastModified": "2023-11-07T04:22:53.023",
+ "lastModified": "2024-02-29T01:41:53.813",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4714.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4714.json
index 5320c060c82..71b3de3c68a 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4714.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4714.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4714",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-01T20:15:08.890",
- "lastModified": "2023-11-07T04:22:53.283",
+ "lastModified": "2024-02-29T01:41:53.897",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4739.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4739.json
index 62bc28a8c85..5803acc95c6 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4739.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4739.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4739",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-03T20:15:13.890",
- "lastModified": "2023-11-07T04:22:54.467",
+ "lastModified": "2024-02-29T01:41:54.153",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4740.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4740.json
index 35d1571aa4d..63f3e12d17d 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4740.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4740.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4740",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-03T20:15:14.813",
- "lastModified": "2023-11-07T04:22:54.743",
+ "lastModified": "2024-02-29T01:41:54.243",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4741.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4741.json
index 97a9b922ecb..c36e2c31ff3 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4741.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4741.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4741",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-03T23:15:39.057",
- "lastModified": "2023-11-07T04:22:55.030",
+ "lastModified": "2024-02-29T01:41:54.333",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4742.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4742.json
index 6d4f27334e1..b542762f316 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4742.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4742.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4742",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-03T23:15:39.937",
- "lastModified": "2023-11-07T04:22:55.323",
+ "lastModified": "2024-02-29T01:41:54.420",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4743.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4743.json
index d001416953a..4ee48494ffd 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4743.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4743.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4743",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-03T23:15:40.147",
- "lastModified": "2024-02-13T08:16:17.867",
+ "lastModified": "2024-02-29T01:41:54.530",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4744.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4744.json
index 893479adea1..2132032cfcc 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4744.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4744.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4744",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-04T00:15:07.463",
- "lastModified": "2023-11-07T04:22:55.833",
+ "lastModified": "2024-02-29T01:41:54.623",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4745.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4745.json
index b1508376485..e0f1f72d855 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4745.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4745.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4745",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-04T00:15:07.820",
- "lastModified": "2023-11-07T04:22:56.097",
+ "lastModified": "2024-02-29T01:41:54.710",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4746.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4746.json
index 883d7479f85..c63ec3f7e65 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4746.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4746.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4746",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-04T01:15:07.437",
- "lastModified": "2024-01-09T02:39:00.667",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:41:54.790",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4747.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4747.json
index 1f9f37e7536..06e15c92523 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4747.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4747.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4747",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-04T01:15:07.790",
- "lastModified": "2024-02-13T08:16:18.140",
+ "lastModified": "2024-02-29T01:41:54.910",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4748.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4748.json
index 9431924e07c..7cea6885772 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4748.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4748.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4748",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-05T06:15:07.760",
- "lastModified": "2024-02-13T08:16:18.380",
+ "lastModified": "2024-02-29T01:41:55.007",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4749.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4749.json
index c9d708b2cbc..056affb9cf3 100644
--- a/CVE-2023/CVE-2023-47xx/CVE-2023-4749.json
+++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4749.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4749",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-04T01:15:07.890",
- "lastModified": "2023-11-07T04:22:57.317",
+ "lastModified": "2024-02-29T01:41:55.097",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48650.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48650.json
new file mode 100644
index 00000000000..f1fa0109c90
--- /dev/null
+++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48650.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-48650",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:41:34.060",
+ "lastModified": "2024-02-29T01:41:34.060",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Concrete CMS before 8.5.14 and 9 before 9.2.3 is vulnerable to an admin adding a stored XSS payload via the Layout Preset name."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://documentation.concretecms.org/developers/introduction/version-history/923-release-notes",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.concretecms.org/about/project-news/security/2023-12-05-concrete-cms-new-cves-and-cve-updates",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48651.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48651.json
new file mode 100644
index 00000000000..a3d98186208
--- /dev/null
+++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48651.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-48651",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:41:34.107",
+ "lastModified": "2024-02-29T01:41:34.107",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Concrete CMS 9 before 9.2.3 is vulnerable to Cross Site Request Forgery (CSRF) at /ccm/system/dialogs/file/delete/1/submit."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://documentation.concretecms.org/developers/introduction/version-history/923-release-notes",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.concretecms.org/about/project-news/security/2023-12-05-concrete-cms-new-cves-and-cve-updates",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48653.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48653.json
new file mode 100644
index 00000000000..4a0825271b6
--- /dev/null
+++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48653.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-48653",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:41:34.160",
+ "lastModified": "2024-02-29T01:41:34.160",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Concrete CMS before 8.5.14 and 9 before 9.2.3 allows Cross Site Request Forgery (CSRF) via ccm/calendar/dialogs/event/delete/submit. An attacker can force an admin to delete events on the site because the event ID is numeric and sequential."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://documentation.concretecms.org/developers/introduction/version-history/923-release-notes",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.concretecms.org/about/project-news/security/2023-12-05-concrete-cms-new-cves-and-cve-updates",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-489xx/CVE-2023-48974.json b/CVE-2023/CVE-2023-489xx/CVE-2023-48974.json
index d54cc9131c5..a5c8dbbe403 100644
--- a/CVE-2023/CVE-2023-489xx/CVE-2023-48974.json
+++ b/CVE-2023/CVE-2023-489xx/CVE-2023-48974.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-48974",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-08T01:15:26.963",
- "lastModified": "2024-02-14T21:54:56.907",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:41:35.677",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Cross Site Scripting vulnerability in Axigen WebMail v.10.5.7 and before allows a remote attacker to escalate privileges via a crafted script to the serverName_input parameter."
+ "value": "Cross Site Scripting vulnerability in Axigen WebMail prior to 10.3.3.61 allows a remote attacker to escalate privileges via a crafted script to the serverName_input parameter."
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4844.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4844.json
index 5e8a32341d2..8d7bf7b6ca5 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4844.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4844.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4844",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-08T22:15:12.177",
- "lastModified": "2023-11-07T04:23:01.887",
+ "lastModified": "2024-02-29T01:41:55.930",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4845.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4845.json
index d9accfd0e2f..43e3a06d0a2 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4845.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4845.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4845",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-09T07:15:50.457",
- "lastModified": "2023-11-07T04:23:02.253",
+ "lastModified": "2024-02-29T01:41:56.023",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4846.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4846.json
index e0f65681f65..f67ebc415c4 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4846.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4846.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4846",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-09T08:15:07.430",
- "lastModified": "2023-11-07T04:23:02.543",
+ "lastModified": "2024-02-29T01:41:56.110",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4847.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4847.json
index dbd8a61df50..b1e8f2e20aa 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4847.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4847.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4847",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-09T08:15:07.550",
- "lastModified": "2023-11-07T04:23:02.797",
+ "lastModified": "2024-02-29T01:41:56.187",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4848.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4848.json
index 13680f1e9fa..486845e88fe 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4848.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4848.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4848",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-09T10:15:07.287",
- "lastModified": "2023-11-07T04:23:03.070",
+ "lastModified": "2024-02-29T01:41:56.270",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4849.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4849.json
index 0cd63b8c27a..12b47042cb1 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4849.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4849.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4849",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-09T11:15:14.890",
- "lastModified": "2023-11-07T04:23:03.370",
+ "lastModified": "2024-02-29T01:41:56.350",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4850.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4850.json
index d1bb572dcc4..804575e8e5b 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4850.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4850.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4850",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-09T12:15:07.470",
- "lastModified": "2023-11-07T04:23:03.680",
+ "lastModified": "2024-02-29T01:41:56.427",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4851.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4851.json
index db9d99201e9..2013361ff32 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4851.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4851.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4851",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-09T12:15:08.300",
- "lastModified": "2024-02-13T08:16:18.607",
+ "lastModified": "2024-02-29T01:41:56.537",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4852.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4852.json
index 1b819f94cca..9cab8680370 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4852.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4852.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-4852",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-09T13:15:21.123",
- "lastModified": "2023-11-07T04:23:04.347",
+ "lastModified": "2024-02-29T01:41:56.663",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in IBOS OA 4.5.5 and classified as critical. This issue affects some unknown processing of the file ?r=dashboard/database/optimize. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239261 was assigned to this vulnerability."
+ },
+ {
+ "lang": "es",
+ "value": "Se ha encontrado una vulnerabilidad en IBOS OA 4.5.5 y clasificada como cr\u00edtica. Este problema afecta a alg\u00fan procesamiento desconocido del fichero ?r=dashboard/database/optimize. La manipulaci\u00f3n conduce a una inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-239261"
}
],
"metrics": {
@@ -33,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -55,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -81,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4864.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4864.json
index b94e1007758..5e5acdf59de 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4864.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4864.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4864",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-09T21:15:43.717",
- "lastModified": "2023-11-07T04:23:05.287",
+ "lastModified": "2024-02-29T01:41:56.813",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4865.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4865.json
index 55960a1d955..1c12c4912c4 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4865.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4865.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4865",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-09T23:15:40.483",
- "lastModified": "2023-11-07T04:23:05.553",
+ "lastModified": "2024-02-29T01:41:56.890",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4866.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4866.json
index 965accafc25..98900855457 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4866.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4866.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4866",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-10T00:15:07.330",
- "lastModified": "2023-11-07T04:23:05.850",
+ "lastModified": "2024-02-29T01:41:56.970",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4867.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4867.json
index 986c3e0bf95..f43d5548a64 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4867.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4867.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4867",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-10T01:15:07.207",
- "lastModified": "2024-02-13T08:16:18.873",
+ "lastModified": "2024-02-29T01:41:57.053",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4868.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4868.json
index a3308f141e0..d6f78b7d954 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4868.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4868.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4868",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-10T01:15:07.910",
- "lastModified": "2023-11-07T04:23:06.390",
+ "lastModified": "2024-02-29T01:41:57.130",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4869.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4869.json
index c4a67e5734e..58d28020e64 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4869.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4869.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4869",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-10T01:15:08.143",
- "lastModified": "2023-11-07T04:23:06.677",
+ "lastModified": "2024-02-29T01:41:57.213",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4870.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4870.json
index 9eef54fb4d8..f95916c4bc2 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4870.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4870.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4870",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-10T02:15:12.390",
- "lastModified": "2023-11-07T04:23:06.930",
+ "lastModified": "2024-02-29T01:41:57.293",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4871.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4871.json
index 201bcb338f7..c549f478163 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4871.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4871.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4871",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-10T03:15:16.733",
- "lastModified": "2023-11-07T04:23:07.213",
+ "lastModified": "2024-02-29T01:41:57.367",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4872.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4872.json
index df8bb076b23..0faf394dfbd 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4872.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4872.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4872",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-10T03:15:17.990",
- "lastModified": "2023-11-07T04:23:07.470",
+ "lastModified": "2024-02-29T01:41:57.450",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4873.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4873.json
index 772940ad678..8d39b132318 100644
--- a/CVE-2023/CVE-2023-48xx/CVE-2023-4873.json
+++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4873.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4873",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-10T03:15:18.080",
- "lastModified": "2023-11-07T04:23:07.730",
+ "lastModified": "2024-02-29T01:41:57.527",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-493xx/CVE-2023-49337.json b/CVE-2023/CVE-2023-493xx/CVE-2023-49337.json
new file mode 100644
index 00000000000..ac0a66a2387
--- /dev/null
+++ b/CVE-2023/CVE-2023-493xx/CVE-2023-49337.json
@@ -0,0 +1,51 @@
+{
+ "id": "CVE-2023-49337",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:41:37.560",
+ "lastModified": "2024-02-29T01:41:37.560",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Concrete CMS before 9.2.3 allows Stored XSS on the Admin Dashboard via /dashboard/system/basics/name. (8.5 and earlier are unaffected.)"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cve@mitre.org",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "REQUIRED",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "NONE",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 2.4,
+ "baseSeverity": "LOW"
+ },
+ "exploitabilityScore": 0.9,
+ "impactScore": 1.4
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://github.com/concretecms/concretecms/commit/07b433799b888c4eb854e052ca58b032ebc6d36f",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://hackerone.com/reports/2232594",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.concretecms.org/about/project-news/security/2023-12-05-concrete-cms-new-cves-and-cve-updates",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49853.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49853.json
index caa14a82137..8268548c6b9 100644
--- a/CVE-2023/CVE-2023-498xx/CVE-2023-49853.json
+++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49853.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-49853",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-18T15:15:09.707",
- "lastModified": "2023-12-20T04:27:45.017",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:41:39.820",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Cross-Site Request Forgery (CSRF) vulnerability in PayTR \u00d6deme ve Elektronik Para Kurulu?u A.?. PayTR Taksit Tablosu \u2013 WooCommerce.This issue affects PayTR Taksit Tablosu \u2013 WooCommerce: from n/a through 1.3.1.\n\n"
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in PayTR \u00d6deme ve Elektronik Para Kurulu\u015fu A.\u015e. PayTR Taksit Tablosu \u2013 WooCommerce.This issue affects PayTR Taksit Tablosu \u2013 WooCommerce: from n/a through 1.3.1.\n\n"
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49930.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49930.json
new file mode 100644
index 00000000000..8b621363549
--- /dev/null
+++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49930.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-49930",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:41:40.070",
+ "lastModified": "2024-02-29T01:41:40.070",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in Couchbase Server before 7.2.4. cURL calls to /diag/eval are not sufficiently restricted."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://forums.couchbase.com/tags/security",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.couchbase.com/alerts/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49931.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49931.json
new file mode 100644
index 00000000000..00b5561890d
--- /dev/null
+++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49931.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-49931",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:41:40.110",
+ "lastModified": "2024-02-29T01:41:40.110",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in Couchbase Server before 7.2.4. SQL++ cURL calls to /diag/eval are not sufficiently restricted."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://forums.couchbase.com/tags/security",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.couchbase.com/alerts/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49932.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49932.json
new file mode 100644
index 00000000000..a62a04d73d4
--- /dev/null
+++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49932.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-49932",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:41:40.157",
+ "lastModified": "2024-02-29T01:41:40.157",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in Couchbase Server before 7.2.4. An attacker can bypass SQL++ N1QL cURL host restrictions."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://forums.couchbase.com/tags/security",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.couchbase.com/alerts/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4965.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4965.json
index 857e7d34098..b153e6f26fc 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4965.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4965.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4965",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-14T20:15:12.880",
- "lastModified": "2023-11-07T04:23:13.890",
+ "lastModified": "2024-02-29T01:41:58.380",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4966.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4966.json
index a310c546da9..2755f2ade4a 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4966.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4966.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-4966",
"sourceIdentifier": "secure@citrix.com",
"published": "2023-10-10T14:15:10.977",
- "lastModified": "2024-01-09T02:27:10.417",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:41:58.480",
+ "vulnStatus": "Modified",
"cisaExploitAdd": "2023-10-18",
"cisaActionDue": "2023-11-08",
"cisaRequiredAction": "Apply mitigations and kill all active and persistent sessions per vendor instructions [https://www.netscaler.com/blog/news/cve-2023-4966-critical-security-update-now-available-for-netscaler-adc-and-netscaler-gateway/] OR discontinue use of the product if mitigations are unavailable.",
@@ -11,7 +11,7 @@
"descriptions": [
{
"lang": "en",
- "value": "Sensitive information disclosure\u00a0in NetScaler ADC and NetScaler Gateway when configured as a\u00a0Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy)\u00a0or\u00a0AAA ?virtual?server.\u00a0\n\n\n\n"
+ "value": "Sensitive information disclosure\u00a0in NetScaler ADC and NetScaler Gateway when configured as a\u00a0Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy)\u00a0or\u00a0AAA \u202fvirtual\u202fserver.\u00a0\n\n\n\n"
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4973.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4973.json
index 436b8acb956..6a83e7b0305 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4973.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4973.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4973",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-15T02:15:08.367",
- "lastModified": "2023-11-07T04:23:14.700",
+ "lastModified": "2024-02-29T01:41:58.653",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4974.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4974.json
index b6c9ea9536f..638c880a33f 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4974.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4974.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4974",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-15T03:15:09.393",
- "lastModified": "2023-11-07T04:23:14.970",
+ "lastModified": "2024-02-29T01:41:58.743",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4983.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4983.json
index db092883806..cebf3495855 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4983.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4983.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4983",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-15T14:15:11.320",
- "lastModified": "2023-11-07T04:23:15.497",
+ "lastModified": "2024-02-29T01:41:58.890",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4984.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4984.json
index 77b0d56f4ee..aff49b48782 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4984.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4984.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4984",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-15T14:15:11.457",
- "lastModified": "2023-11-07T04:23:15.737",
+ "lastModified": "2024-02-29T01:41:58.973",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4985.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4985.json
index 9fc125db88d..4065d0ef55f 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4985.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4985.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4985",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-15T15:15:07.773",
- "lastModified": "2023-11-07T04:23:15.973",
+ "lastModified": "2024-02-29T01:41:59.060",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4986.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4986.json
index 3cf5d74bb7c..7fd72966efa 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4986.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4986.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4986",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-15T15:15:08.037",
- "lastModified": "2023-11-07T04:23:16.230",
+ "lastModified": "2024-02-29T01:41:59.140",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4987.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4987.json
index 82ceb41de1f..3db6f44631d 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4987.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4987.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4987",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-15T15:15:08.273",
- "lastModified": "2023-11-07T04:23:16.500",
+ "lastModified": "2024-02-29T01:41:59.217",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4988.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4988.json
index d23c766df8f..f2f2277ea1f 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4988.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4988.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4988",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-15T16:15:08.080",
- "lastModified": "2023-11-07T04:23:16.727",
+ "lastModified": "2024-02-29T01:41:59.300",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4991.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4991.json
index 22e81141e5d..977eb73e4a9 100644
--- a/CVE-2023/CVE-2023-49xx/CVE-2023-4991.json
+++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4991.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-4991",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-15T16:15:08.180",
- "lastModified": "2023-11-07T04:23:17.003",
+ "lastModified": "2024-02-29T01:41:59.393",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50436.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50436.json
new file mode 100644
index 00000000000..d9b6451fb16
--- /dev/null
+++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50436.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-50436",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:42:00.697",
+ "lastModified": "2024-02-29T01:42:00.697",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in Couchbase Server before 7.2.4. ns_server admin credentials are leaked in encoded form in the diag.log file. The earliest affected version is 7.1.5."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://forums.couchbase.com/tags/security",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.couchbase.com/alerts/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50437.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50437.json
new file mode 100644
index 00000000000..de3c57695c6
--- /dev/null
+++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50437.json
@@ -0,0 +1,28 @@
+{
+ "id": "CVE-2023-50437",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:42:00.750",
+ "lastModified": "2024-02-29T01:42:00.750",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue was discovered in Couchbase Server before 7.2.x before 7.2.4. otpCookie is shown with full admin on pools/default/serverGroups and engageCluster2."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://docs.couchbase.com/server/current/release-notes/relnotes.html",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://forums.couchbase.com/tags/security",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.couchbase.com/alerts/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-506xx/CVE-2023-50658.json b/CVE-2023/CVE-2023-506xx/CVE-2023-50658.json
new file mode 100644
index 00000000000..9b3f5b2a066
--- /dev/null
+++ b/CVE-2023/CVE-2023-506xx/CVE-2023-50658.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-50658",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:42:01.123",
+ "lastModified": "2024-02-29T01:42:01.123",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The jose2go component before 1.6.0 for Go allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/dvsekhvalnov/jose2go/commit/a4584e9dd7128608fedbc67892eba9697f0d5317",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/dvsekhvalnov/jose2go/compare/v1.5.0...v1.6.0",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5012.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5012.json
index a7d0e19a0fe..e9a41009378 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5012.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5012.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5012",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-16T21:15:47.887",
- "lastModified": "2024-01-15T21:15:08.010",
+ "lastModified": "2024-02-29T01:42:08.750",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5013.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5013.json
index fc6c138e93b..fa4a2859f82 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5013.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5013.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5013",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-16T23:15:07.283",
- "lastModified": "2023-11-07T04:23:18.413",
+ "lastModified": "2024-02-29T01:42:08.853",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5014.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5014.json
index 485e09269f9..9d6d08a47e8 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5014.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5014.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5014",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T01:15:34.430",
- "lastModified": "2024-02-13T08:16:19.127",
+ "lastModified": "2024-02-29T01:42:08.943",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5015.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5015.json
index 1ed9f47c76f..6d90a929aa9 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5015.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5015.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5015",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T02:15:07.430",
- "lastModified": "2023-11-07T04:23:18.937",
+ "lastModified": "2024-02-29T01:42:09.020",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5016.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5016.json
index 72111911f95..232d39775a6 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5016.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5016.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5016",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T02:15:08.013",
- "lastModified": "2024-02-13T08:16:19.380",
+ "lastModified": "2024-02-29T01:42:09.103",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5017.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5017.json
index 541214c5fcd..a1daf9da650 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5017.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5017.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5017",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T03:15:08.810",
- "lastModified": "2023-11-07T04:23:19.477",
+ "lastModified": "2024-02-29T01:42:09.187",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5018.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5018.json
index c2c39bfe0e6..a35aa52adf6 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5018.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5018.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5018",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T04:15:10.497",
- "lastModified": "2023-11-07T04:23:19.747",
+ "lastModified": "2024-02-29T01:42:09.267",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5019.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5019.json
index d04fc1b564b..bafd0d29d02 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5019.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5019.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5019",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T04:15:11.460",
- "lastModified": "2023-12-16T04:28:21.150",
+ "lastModified": "2024-02-29T01:42:09.333",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5020.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5020.json
index 42d83d2984c..37691c032dc 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5020.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5020.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5020",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T05:15:10.283",
- "lastModified": "2024-02-13T08:16:19.600",
+ "lastModified": "2024-02-29T01:42:09.407",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5021.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5021.json
index fc4b9675af4..a62123f0906 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5021.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5021.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5021",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T05:15:10.370",
- "lastModified": "2023-11-07T04:23:20.500",
+ "lastModified": "2024-02-29T01:42:09.513",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5022.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5022.json
index 80ba820b56e..c2753947a86 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5022.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5022.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5022",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T06:15:07.530",
- "lastModified": "2024-02-13T08:16:19.857",
+ "lastModified": "2024-02-29T01:42:09.597",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5023.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5023.json
index 38f5743c422..acdc8142c23 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5023.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5023.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5023",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T07:15:09.927",
- "lastModified": "2023-12-16T04:28:21.150",
+ "lastModified": "2024-02-29T01:42:09.677",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5024.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5024.json
index 533c5e8d167..b3e29ee4556 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5024.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5024.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5024",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T07:15:10.063",
- "lastModified": "2023-11-07T04:23:21.263",
+ "lastModified": "2024-02-29T01:42:09.757",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5025.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5025.json
index 17dfc5e33e7..883218aacfa 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5025.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5025.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5025",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T07:15:10.153",
- "lastModified": "2023-11-07T04:23:21.530",
+ "lastModified": "2024-02-29T01:42:09.833",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5026.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5026.json
index e6fcd9bd87b..30ef6870e2f 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5026.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5026.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5026",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T10:15:07.560",
- "lastModified": "2024-02-13T08:16:20.133",
+ "lastModified": "2024-02-29T01:42:09.913",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5027.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5027.json
index 638cb3bccdd..2c0020bb85b 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5027.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5027.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5027",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T17:15:44.610",
- "lastModified": "2023-11-07T04:23:22.183",
+ "lastModified": "2024-02-29T01:42:10.007",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5028.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5028.json
index cf539e55e02..2f00947a7de 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5028.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5028.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5028",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T11:15:07.420",
- "lastModified": "2023-11-07T04:23:22.457",
+ "lastModified": "2024-02-29T01:42:10.103",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5029.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5029.json
index 62970724bf7..6b854054641 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5029.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5029.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5029",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T22:15:46.303",
- "lastModified": "2023-11-07T04:23:22.743",
+ "lastModified": "2024-02-29T01:42:10.200",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5030.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5030.json
index 7bc68236fa2..8caaea618b7 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5030.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5030.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5030",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-17T22:15:47.503",
- "lastModified": "2023-12-16T04:28:21.150",
+ "lastModified": "2024-02-29T01:42:10.283",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5031.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5031.json
index 9587aff1661..b12a78cb61d 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5031.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5031.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5031",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-18T02:15:51.220",
- "lastModified": "2023-11-07T04:23:23.220",
+ "lastModified": "2024-02-29T01:42:10.360",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5032.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5032.json
index 58bf8d00180..505170adcec 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5032.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5032.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5032",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-18T04:15:11.327",
- "lastModified": "2023-11-07T04:23:23.550",
+ "lastModified": "2024-02-29T01:42:10.440",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5033.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5033.json
index 6e30f60fec9..a5596b64f85 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5033.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5033.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5033",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-18T05:15:07.417",
- "lastModified": "2023-11-07T04:23:23.803",
+ "lastModified": "2024-02-29T01:42:10.527",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5034.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5034.json
index 8e578d412c6..7e19688cce4 100644
--- a/CVE-2023/CVE-2023-50xx/CVE-2023-5034.json
+++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5034.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5034",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-18T05:15:07.500",
- "lastModified": "2023-11-07T04:23:24.047",
+ "lastModified": "2024-02-29T01:42:10.603",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51535.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51535.json
index 0648d3f0349..eab0fb50496 100644
--- a/CVE-2023/CVE-2023-515xx/CVE-2023-51535.json
+++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51535.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-51535",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-01-05T10:15:10.740",
- "lastModified": "2024-01-09T15:21:54.790",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:04.433",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Cross-Site Request Forgery (CSRF) vulnerability in ?leanTalk - Anti-Spam Protection Spam protection, Anti-Spam, FireWall by CleanTalk.This issue affects Spam protection, Anti-Spam, FireWall by CleanTalk: from n/a through 6.20.\n\n"
+ "value": "Cross-Site Request Forgery (CSRF) vulnerability in \u0421leanTalk - Anti-Spam Protection Spam protection, Anti-Spam, FireWall by CleanTalk.This issue affects Spam protection, Anti-Spam, FireWall by CleanTalk: from n/a through 6.20.\n\n"
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-515xx/CVE-2023-51541.json b/CVE-2023/CVE-2023-515xx/CVE-2023-51541.json
index 6ec0ccfc933..64260391d12 100644
--- a/CVE-2023/CVE-2023-515xx/CVE-2023-51541.json
+++ b/CVE-2023/CVE-2023-515xx/CVE-2023-51541.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-51541",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-29T11:15:11.090",
- "lastModified": "2024-01-05T04:54:24.427",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:04.593",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aleksandar Uro\u0161evi? Stock Ticker allows Stored XSS.This issue affects Stock Ticker: from n/a through 3.23.4.\n\n"
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aleksandar Uro\u0161evi\u0107 Stock Ticker allows Stored XSS.This issue affects Stock Ticker: from n/a through 3.23.4.\n\n"
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51773.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51773.json
new file mode 100644
index 00000000000..a301867b49c
--- /dev/null
+++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51773.json
@@ -0,0 +1,36 @@
+{
+ "id": "CVE-2023-51773",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:42:05.557",
+ "lastModified": "2024-02-29T01:42:05.557",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "BACnet Stack before 1.3.2 has a decode function APDU buffer over-read in bacapp_decode_application_data in bacapp.c."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/bacnet-stack/bacnet-stack/blob/master/CHANGELOG.md",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/bacnet-stack/bacnet-stack/compare/bacnet-stack-1.3.1...bacnet-stack-1.3.2",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/bacnet-stack/bacnet-stack/pull/546",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://github.com/bacnet-stack/bacnet-stack/pull/546/commits/c465412a076ca6c9ddf649612f2b4e1874d8dcb8",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://sourceforge.net/p/bacnet/bugs/85/",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51774.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51774.json
new file mode 100644
index 00000000000..4a26e67e7ff
--- /dev/null
+++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51774.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-51774",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:42:05.597",
+ "lastModified": "2024-02-29T01:42:05.597",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The json-jwt (aka JSON::JWT) gem 1.16.3 for Ruby sometimes allows bypass of identity checks via a sign/encryption confusion attack. For example, JWE can sometimes be used to bypass JSON::JWT.decode."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/P3ngu1nW/CVE_Request/blob/main/novjson-jwt.md",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51775.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51775.json
new file mode 100644
index 00000000000..c99c0caec82
--- /dev/null
+++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51775.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-51775",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:42:05.637",
+ "lastModified": "2024-02-29T01:42:05.637",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The jose4j component before 0.9.4 for Java allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://bitbucket.org/b_c/jose4j/issues/212",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51779.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51779.json
new file mode 100644
index 00000000000..10099d17929
--- /dev/null
+++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51779.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-51779",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:42:05.677",
+ "lastModified": "2024-02-29T01:42:05.677",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-518xx/CVE-2023-51800.json b/CVE-2023/CVE-2023-518xx/CVE-2023-51800.json
new file mode 100644
index 00000000000..32dd1c935bf
--- /dev/null
+++ b/CVE-2023/CVE-2023-518xx/CVE-2023-51800.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-51800",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T02:15:09.280",
+ "lastModified": "2024-02-29T02:15:09.280",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting (XSS) vulnerability in School Fees Management System v.1.0 allows a remote attacker to execute arbitrary code via a crafted payload to the main_settings component in the phone, address, bank, acc_name, acc_number parameters, new_class and cname parameter, add_new_parent function in the name email parameters, new_term function in the tname parameter, and the edit_student function in the name parameter."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/geraldoalcantara/CVE-2023-51800",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-518xx/CVE-2023-51801.json b/CVE-2023/CVE-2023-518xx/CVE-2023-51801.json
new file mode 100644
index 00000000000..9049d6566a1
--- /dev/null
+++ b/CVE-2023/CVE-2023-518xx/CVE-2023-51801.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-51801",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T02:15:09.323",
+ "lastModified": "2024-02-29T02:15:09.323",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "SQL Injection vulnerability in the Simple Student Attendance System v.1.0 allows a remote attacker to execute arbitrary code via a crafted payload to the id parameter in the student_form.php and the class_form.php pages."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/geraldoalcantara/CVE-2023-51801",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-518xx/CVE-2023-51802.json b/CVE-2023/CVE-2023-518xx/CVE-2023-51802.json
new file mode 100644
index 00000000000..564ed6ec64d
--- /dev/null
+++ b/CVE-2023/CVE-2023-518xx/CVE-2023-51802.json
@@ -0,0 +1,20 @@
+{
+ "id": "CVE-2023-51802",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T02:15:09.367",
+ "lastModified": "2024-02-29T02:15:09.367",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Cross Site Scripting (XSS) vulnerability in the Simple Student Attendance System v.1.0 allows a remote attacker to execute arbitrary code via a crafted payload to the page or class_month parameter in the /php-attendance/attendance_report component."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://github.com/geraldoalcantara/CVE-2023-51802",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-518xx/CVE-2023-51835.json b/CVE-2023/CVE-2023-518xx/CVE-2023-51835.json
new file mode 100644
index 00000000000..6a68ab658eb
--- /dev/null
+++ b/CVE-2023/CVE-2023-518xx/CVE-2023-51835.json
@@ -0,0 +1,24 @@
+{
+ "id": "CVE-2023-51835",
+ "sourceIdentifier": "cve@mitre.org",
+ "published": "2024-02-29T01:42:05.830",
+ "lastModified": "2024-02-29T01:42:05.830",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "An issue in TRENDnet TEW-822DRE v.1.03B02 allows a local attacker to execute arbitrary code via the parameters ipv4_ping in the /boafrm/formSystemCheck."
+ }
+ ],
+ "metrics": {},
+ "references": [
+ {
+ "url": "https://warp-desk-89d.notion.site/TEW-822DRE-5289eb95796749c2878843519ab451d8",
+ "source": "cve@mitre.org"
+ },
+ {
+ "url": "https://www.trendnet.com/support/support-detail.asp?prod=105_TEW-822DRE",
+ "source": "cve@mitre.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5142.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5142.json
index 6e86e97ffa1..6a971fa7655 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5142.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5142.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5142",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-24T22:15:10.087",
- "lastModified": "2024-02-13T08:16:20.517",
+ "lastModified": "2024-02-29T01:42:11.600",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5143.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5143.json
index e92cd5e8687..5d07a9a9456 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5143.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5143.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5143",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-24T23:15:10.210",
- "lastModified": "2023-11-07T04:23:30.513",
+ "lastModified": "2024-02-29T01:42:11.720",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5144.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5144.json
index 6d821adc303..442fad54aed 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5144.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5144.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5144",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-24T23:15:10.587",
- "lastModified": "2023-11-07T04:23:30.760",
+ "lastModified": "2024-02-29T01:42:11.800",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5145.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5145.json
index 561865ad1df..c993d04de27 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5145.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5145.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5145",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-25T00:15:10.217",
- "lastModified": "2023-11-07T04:23:31.003",
+ "lastModified": "2024-02-29T01:42:11.890",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5146.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5146.json
index fb0d4ebbb73..c362659c706 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5146.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5146.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5146",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-25T00:15:11.300",
- "lastModified": "2023-11-07T04:23:31.290",
+ "lastModified": "2024-02-29T01:42:11.977",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5147.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5147.json
index 1a72472c9ab..19273b79313 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5147.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5147.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5147",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-25T01:15:19.327",
- "lastModified": "2023-11-07T04:23:31.563",
+ "lastModified": "2024-02-29T01:42:12.067",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5148.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5148.json
index 29301da7ee8..dbfb39300e5 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5148.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5148.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5148",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-25T01:15:19.420",
- "lastModified": "2023-11-07T04:23:31.810",
+ "lastModified": "2024-02-29T01:42:12.150",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5149.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5149.json
index 70f3fbcbe8e..4e0ec3194c2 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5149.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5149.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5149",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-25T01:15:19.503",
- "lastModified": "2023-11-07T04:23:32.087",
+ "lastModified": "2024-02-29T01:42:12.233",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5150.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5150.json
index 63467e38db0..28e7df25ba5 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5150.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5150.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5150",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-25T02:15:10.560",
- "lastModified": "2023-11-07T04:23:32.340",
+ "lastModified": "2024-02-29T01:42:12.320",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5151.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5151.json
index 58892e69b6c..7a63774591b 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5151.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5151.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5151",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-25T02:15:10.657",
- "lastModified": "2023-11-07T04:23:32.600",
+ "lastModified": "2024-02-29T01:42:12.400",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5152.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5152.json
index ab2e692148b..1a3c199efed 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5152.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5152.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5152",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-25T02:15:10.743",
- "lastModified": "2023-11-16T03:06:57.570",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:12.497",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5153.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5153.json
index a1e3d22468a..cda4b407fe7 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5153.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5153.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5153",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-25T03:15:09.390",
- "lastModified": "2023-11-07T04:23:33.130",
+ "lastModified": "2024-02-29T01:42:12.593",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5154.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5154.json
index 0f366dbe651..2dabc712789 100644
--- a/CVE-2023/CVE-2023-51xx/CVE-2023-5154.json
+++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5154.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5154",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-25T03:15:09.743",
- "lastModified": "2023-11-07T04:23:33.430",
+ "lastModified": "2024-02-29T01:42:12.680",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52081.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52081.json
index e2b6b0265b1..13e010ddc8f 100644
--- a/CVE-2023/CVE-2023-520xx/CVE-2023-52081.json
+++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52081.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-52081",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-12-28T16:16:02.090",
- "lastModified": "2024-01-05T15:59:47.810",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:06.407",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "ffcss is a CLI interface to apply and configure Firefox CSS themes. Prior to 0.2.0, the function `lookupPreprocess()` is meant to apply some transformations to a string by disabling characters in the regex `[-_ .]`. However, due to the use of late Unicode normalization of type NFKD, it is possible to bypass that validation and re-introduce all the characters in the regex `[-_ .]`. The `lookupPreprocess()` can be easily bypassed with equivalent Unicode characters like U+FE4D (?), which would result in the omitted U+005F (_), for instance. The `lookupPreprocess()` function is only ever used to search for themes loosely (case insensitively, while ignoring dashes, underscores and dots), so the actual security impact is classified as low. This vulnerability is fixed in 0.2.0. There are no known workarounds."
+ "value": "ffcss is a CLI interface to apply and configure Firefox CSS themes. Prior to 0.2.0, the function `lookupPreprocess()` is meant to apply some transformations to a string by disabling characters in the regex `[-_ .]`. However, due to the use of late Unicode normalization of type NFKD, it is possible to bypass that validation and re-introduce all the characters in the regex `[-_ .]`. The `lookupPreprocess()` can be easily bypassed with equivalent Unicode characters like U+FE4D (\ufe4d), which would result in the omitted U+005F (_), for instance. The `lookupPreprocess()` function is only ever used to search for themes loosely (case insensitively, while ignoring dashes, underscores and dots), so the actual security impact is classified as low. This vulnerability is fixed in 0.2.0. There are no known workarounds."
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52138.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52138.json
index f6a96d246a3..fd7d896ab6f 100644
--- a/CVE-2023/CVE-2023-521xx/CVE-2023-52138.json
+++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52138.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-52138",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-05T15:15:08.393",
- "lastModified": "2024-02-15T02:15:49.843",
+ "lastModified": "2024-02-29T01:42:06.987",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -118,6 +118,10 @@
"Vendor Advisory"
]
},
+ {
+ "url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00011.html",
+ "source": "security-advisories@github.com"
+ },
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4IOJ3QWXTZGCXFEHP72ELY22PZ4AX2CB/",
"source": "security-advisories@github.com"
diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52251.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52251.json
index b566f2e12a9..fea87c9de5a 100644
--- a/CVE-2023/CVE-2023-522xx/CVE-2023-52251.json
+++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52251.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-52251",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-25T21:15:08.787",
- "lastModified": "2024-01-31T23:25:48.163",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:07.630",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -70,6 +70,10 @@
}
],
"references": [
+ {
+ "url": "http://packetstormsecurity.com/files/177214/Kafka-UI-0.7.1-Command-Injection.html",
+ "source": "cve@mitre.org"
+ },
{
"url": "https://github.com/BobTheShoplifter/CVE-2023-52251-POC",
"source": "cve@mitre.org",
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5221.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5221.json
index 67bf7d3dcb6..a794db73a23 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5221.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5221.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5221",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-27T15:19:43.280",
- "lastModified": "2023-11-07T04:23:37.207",
+ "lastModified": "2024-02-29T01:42:13.323",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5222.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5222.json
index 0374368197b..3489e389ccf 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5222.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5222.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5222",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-27T15:19:43.387",
- "lastModified": "2023-11-07T04:23:37.530",
+ "lastModified": "2024-02-29T01:42:13.423",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5223.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5223.json
index 7d8a0393d5d..b3ac088bdcc 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5223.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5223.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5223",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-27T15:19:43.490",
- "lastModified": "2024-02-13T08:16:20.873",
+ "lastModified": "2024-02-29T01:42:13.640",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5257.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5257.json
index d99b858736e..214b3e836ab 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5257.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5257.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5257",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T11:15:41.977",
- "lastModified": "2023-11-07T04:23:40.820",
+ "lastModified": "2024-02-29T01:42:13.990",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5258.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5258.json
index 1983b36b310..b6f94dd240c 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5258.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5258.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5258",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T12:15:13.093",
- "lastModified": "2023-11-07T04:23:41.070",
+ "lastModified": "2024-02-29T01:42:14.080",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5259.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5259.json
index 9789c960362..ec2f4a565e0 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5259.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5259.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5259",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T12:15:13.203",
- "lastModified": "2023-11-07T04:23:41.340",
+ "lastModified": "2024-02-29T01:42:14.160",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5260.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5260.json
index 0c564769b2a..a431f458e60 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5260.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5260.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5260",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T12:15:13.287",
- "lastModified": "2024-02-13T08:16:21.153",
+ "lastModified": "2024-02-29T01:42:14.247",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5261.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5261.json
index e9122d29fb4..c3a4a222720 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5261.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5261.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5261",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T12:15:13.360",
- "lastModified": "2023-12-16T04:28:21.150",
+ "lastModified": "2024-02-29T01:42:14.327",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5262.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5262.json
index f4670de8795..e848e4fc967 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5262.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5262.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5262",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T14:15:11.163",
- "lastModified": "2023-11-07T04:23:42.160",
+ "lastModified": "2024-02-29T01:42:14.413",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5263.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5263.json
index 449e41ea63c..afa9917b52c 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5263.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5263.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5263",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T14:15:11.250",
- "lastModified": "2023-11-07T04:23:42.483",
+ "lastModified": "2024-02-29T01:42:14.507",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5264.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5264.json
index 2e35d2d245b..7913d5271e5 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5264.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5264.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5264",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T15:15:10.593",
- "lastModified": "2023-11-07T04:23:42.733",
+ "lastModified": "2024-02-29T01:42:14.613",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5265.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5265.json
index e763d39acca..a05250b5f4e 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5265.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5265.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5265",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T15:15:10.670",
- "lastModified": "2023-12-16T04:28:21.150",
+ "lastModified": "2024-02-29T01:42:14.697",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5266.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5266.json
index 1315f2cf342..5239718ebba 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5266.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5266.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5266",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T15:15:10.750",
- "lastModified": "2023-11-07T04:23:43.277",
+ "lastModified": "2024-02-29T01:42:14.780",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5267.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5267.json
index a145b0fd25f..6522109d45e 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5267.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5267.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5267",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T15:15:10.823",
- "lastModified": "2023-12-16T04:28:21.150",
+ "lastModified": "2024-02-29T01:42:14.860",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5268.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5268.json
index 9029b68c5a7..99b731ce1be 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5268.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5268.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5268",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T16:15:10.617",
- "lastModified": "2023-11-07T04:23:43.823",
+ "lastModified": "2024-02-29T01:42:14.937",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5269.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5269.json
index 69fb586beb0..d920ff6f4b5 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5269.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5269.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5269",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T16:15:10.697",
- "lastModified": "2023-11-07T04:23:44.103",
+ "lastModified": "2024-02-29T01:42:15.017",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5270.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5270.json
index 50feb8889fb..a351d822dc6 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5270.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5270.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5270",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T16:15:10.777",
- "lastModified": "2023-11-07T04:23:44.427",
+ "lastModified": "2024-02-29T01:42:15.100",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5271.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5271.json
index d44442beace..1999ef72884 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5271.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5271.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5271",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T16:15:10.853",
- "lastModified": "2023-11-07T04:23:44.690",
+ "lastModified": "2024-02-29T01:42:15.180",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5272.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5272.json
index b32ca5ea35c..58305ae6b63 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5272.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5272.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5272",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T17:15:48.323",
- "lastModified": "2023-11-07T04:23:44.967",
+ "lastModified": "2024-02-29T01:42:15.283",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5273.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5273.json
index a220040f00d..2dff5776f40 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5273.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5273.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5273",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T17:15:48.567",
- "lastModified": "2023-11-07T04:23:45.267",
+ "lastModified": "2024-02-29T01:42:15.387",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5276.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5276.json
index 2cc24f9a9c5..70b4465c5f9 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5276.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5276.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5276",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T18:15:09.863",
- "lastModified": "2023-11-07T04:23:45.520",
+ "lastModified": "2024-02-29T01:42:15.490",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5277.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5277.json
index bf91584ebf5..712fe764d9a 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5277.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5277.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5277",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T18:15:09.963",
- "lastModified": "2023-11-07T04:23:45.767",
+ "lastModified": "2024-02-29T01:42:15.577",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5278.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5278.json
index d744a66c7e0..7670938cf86 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5278.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5278.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5278",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T18:15:10.043",
- "lastModified": "2023-11-07T04:23:46.063",
+ "lastModified": "2024-02-29T01:42:15.653",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5279.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5279.json
index bceb19c2740..65d1d734a1c 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5279.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5279.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5279",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T18:15:10.117",
- "lastModified": "2023-11-07T04:23:46.320",
+ "lastModified": "2024-02-29T01:42:15.730",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5280.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5280.json
index cb2374c436f..fe694b2ec2e 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5280.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5280.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5280",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T18:15:10.187",
- "lastModified": "2023-11-07T04:23:46.583",
+ "lastModified": "2024-02-29T01:42:15.807",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5281.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5281.json
index 5714e0a9df8..8879ca7cbf8 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5281.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5281.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5281",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T19:15:09.493",
- "lastModified": "2023-11-07T04:23:46.830",
+ "lastModified": "2024-02-29T01:42:15.887",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5282.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5282.json
index 208015df26c..3abd67af951 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5282.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5282.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5282",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T19:15:09.570",
- "lastModified": "2023-11-07T04:23:47.097",
+ "lastModified": "2024-02-29T01:42:15.970",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5283.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5283.json
index ff01f575d85..d05738dcef9 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5283.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5283.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5283",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T20:15:10.073",
- "lastModified": "2023-11-07T04:23:47.373",
+ "lastModified": "2024-02-29T01:42:16.053",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5284.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5284.json
index 0a1da835b25..7138a4eab5e 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5284.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5284.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5284",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T20:15:10.147",
- "lastModified": "2023-11-07T04:23:47.647",
+ "lastModified": "2024-02-29T01:42:16.137",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5285.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5285.json
index 0a0d04a3564..a07244b803d 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5285.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5285.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5285",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T20:15:10.217",
- "lastModified": "2023-12-16T04:28:21.150",
+ "lastModified": "2024-02-29T01:42:16.217",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5286.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5286.json
index 22b028a571d..a8ee15dcb98 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5286.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5286.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5286",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T20:15:10.283",
- "lastModified": "2023-11-07T04:23:48.177",
+ "lastModified": "2024-02-29T01:42:16.297",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5287.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5287.json
index fc6a361b451..f1e4a2c7a58 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5287.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5287.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5287",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T21:15:10.097",
- "lastModified": "2023-11-07T04:23:48.430",
+ "lastModified": "2024-02-29T01:42:16.383",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5293.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5293.json
index 9374ad71393..79b3f3baadb 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5293.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5293.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5293",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T21:15:10.177",
- "lastModified": "2023-11-07T04:23:49.057",
+ "lastModified": "2024-02-29T01:42:16.530",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5294.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5294.json
index 0d33b721523..77b4c1742a9 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5294.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5294.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5294",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T22:15:12.033",
- "lastModified": "2023-11-07T04:23:49.413",
+ "lastModified": "2024-02-29T01:42:16.610",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5296.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5296.json
index 8db3a969569..d6f229c05aa 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5296.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5296.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5296",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T22:15:12.113",
- "lastModified": "2023-11-07T04:23:49.897",
+ "lastModified": "2024-02-29T01:42:16.707",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5297.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5297.json
index bec7bedcd9f..05fd6e3c35f 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5297.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5297.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5297",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-29T22:15:12.193",
- "lastModified": "2023-11-07T04:23:50.187",
+ "lastModified": "2024-02-29T01:42:16.787",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5298.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5298.json
index 5e50dfbf6b3..180fbf0280a 100644
--- a/CVE-2023/CVE-2023-52xx/CVE-2023-5298.json
+++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5298.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5298",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T06:15:11.483",
- "lastModified": "2024-02-13T08:16:21.430",
+ "lastModified": "2024-02-29T01:42:16.863",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5300.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5300.json
index d80abf2f8d0..90c8f1bd372 100644
--- a/CVE-2023/CVE-2023-53xx/CVE-2023-5300.json
+++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5300.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5300",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T10:15:10.517",
- "lastModified": "2023-11-07T04:23:50.727",
+ "lastModified": "2024-02-29T01:42:16.960",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5301.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5301.json
index f200a40c275..fb2ed49ac0b 100644
--- a/CVE-2023/CVE-2023-53xx/CVE-2023-5301.json
+++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5301.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5301",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T11:15:15.333",
- "lastModified": "2023-11-07T04:23:51.013",
+ "lastModified": "2024-02-29T01:42:17.040",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5302.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5302.json
index 06e49434b54..108c6d100e4 100644
--- a/CVE-2023/CVE-2023-53xx/CVE-2023-5302.json
+++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5302.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5302",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T12:15:09.963",
- "lastModified": "2023-11-07T04:23:51.283",
+ "lastModified": "2024-02-29T01:42:17.120",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5303.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5303.json
index ff88227d682..0f170b8444b 100644
--- a/CVE-2023/CVE-2023-53xx/CVE-2023-5303.json
+++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5303.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5303",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T14:15:15.737",
- "lastModified": "2023-11-07T04:23:51.563",
+ "lastModified": "2024-02-29T01:42:17.197",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5304.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5304.json
index 15cfafb0172..db7f49d64d0 100644
--- a/CVE-2023/CVE-2023-53xx/CVE-2023-5304.json
+++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5304.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5304",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T15:15:10.180",
- "lastModified": "2023-11-07T04:23:51.830",
+ "lastModified": "2024-02-29T01:42:17.280",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5305.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5305.json
index 5a3352be0c3..e85a927fabd 100644
--- a/CVE-2023/CVE-2023-53xx/CVE-2023-5305.json
+++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5305.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5305",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T15:15:10.260",
- "lastModified": "2023-11-07T04:23:52.107",
+ "lastModified": "2024-02-29T01:42:17.357",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5313.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5313.json
index 528ccdbac8e..50993f277dc 100644
--- a/CVE-2023/CVE-2023-53xx/CVE-2023-5313.json
+++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5313.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5313",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T15:15:10.337",
- "lastModified": "2023-11-07T04:23:52.957",
+ "lastModified": "2024-02-29T01:42:17.500",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5322.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5322.json
index e14e04bcdfc..4686e561f86 100644
--- a/CVE-2023/CVE-2023-53xx/CVE-2023-5322.json
+++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5322.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5322",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-01T05:15:09.933",
- "lastModified": "2023-11-07T04:23:53.560",
+ "lastModified": "2024-02-29T01:42:17.660",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5324.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5324.json
index e90917215f1..42edcab6dc6 100644
--- a/CVE-2023/CVE-2023-53xx/CVE-2023-5324.json
+++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5324.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5324",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-01T21:15:42.693",
- "lastModified": "2023-11-07T04:23:53.853",
+ "lastModified": "2024-02-29T01:42:17.760",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5326.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5326.json
index 535797b6313..241f2876535 100644
--- a/CVE-2023/CVE-2023-53xx/CVE-2023-5326.json
+++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5326.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5326",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-01T23:15:08.387",
- "lastModified": "2023-11-07T04:23:54.087",
+ "lastModified": "2024-02-29T01:42:17.853",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5327.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5327.json
index 7c2e5f6094e..f739dcd3da4 100644
--- a/CVE-2023/CVE-2023-53xx/CVE-2023-5327.json
+++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5327.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5327",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-01T23:15:08.487",
- "lastModified": "2023-11-07T04:23:54.397",
+ "lastModified": "2024-02-29T01:42:17.930",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5328.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5328.json
index 279ce357acc..bc829f276bd 100644
--- a/CVE-2023/CVE-2023-53xx/CVE-2023-5328.json
+++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5328.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5328",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-02T00:15:10.017",
- "lastModified": "2023-11-07T04:23:54.650",
+ "lastModified": "2024-02-29T01:42:18.027",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5329.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5329.json
index ae6b33fa15f..e4e2367e96b 100644
--- a/CVE-2023/CVE-2023-53xx/CVE-2023-5329.json
+++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5329.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5329",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-02T00:15:10.100",
- "lastModified": "2023-11-07T04:23:54.893",
+ "lastModified": "2024-02-29T01:42:18.110",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5373.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5373.json
index 1b01c206712..f2218b5de05 100644
--- a/CVE-2023/CVE-2023-53xx/CVE-2023-5373.json
+++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5373.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5373",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-04T13:15:26.433",
- "lastModified": "2023-11-07T04:23:57.423",
+ "lastModified": "2024-02-29T01:42:18.580",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5374.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5374.json
index e777322c496..7e62ac903e4 100644
--- a/CVE-2023/CVE-2023-53xx/CVE-2023-5374.json
+++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5374.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5374",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-04T14:15:11.123",
- "lastModified": "2023-11-07T04:23:57.693",
+ "lastModified": "2024-02-29T01:42:18.670",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5423.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5423.json
index ad2e6cd788e..b626d58e1fb 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5423.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5423.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5423",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-05T18:15:13.330",
- "lastModified": "2023-11-07T04:23:58.840",
+ "lastModified": "2024-02-29T01:42:19.097",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5459.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5459.json
index d688c2737dd..e7284984055 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5459.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5459.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5459",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-09T19:15:10.457",
- "lastModified": "2023-11-07T04:24:01.833",
+ "lastModified": "2024-02-29T01:42:19.447",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5460.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5460.json
index 0be4f84bf1a..ff9572fbc0a 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5460.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5460.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5460",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-09T19:15:10.543",
- "lastModified": "2023-11-07T04:24:02.077",
+ "lastModified": "2024-02-29T01:42:19.573",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5461.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5461.json
index e5b5ca98b23..9b6bba46417 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5461.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5461.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5461",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-09T20:15:10.633",
- "lastModified": "2023-11-07T04:24:02.337",
+ "lastModified": "2024-02-29T01:42:19.660",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5462.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5462.json
index 924163c021b..2b2e9fce6d4 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5462.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5462.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5462",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-09T22:15:12.863",
- "lastModified": "2023-11-07T04:24:02.610",
+ "lastModified": "2024-02-29T01:42:19.747",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5463.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5463.json
index 33846a3868b..f2a6398d690 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5463.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5463.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5463",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-09T22:15:12.937",
- "lastModified": "2023-11-07T04:24:02.853",
+ "lastModified": "2024-02-29T01:42:19.860",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5471.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5471.json
index d063543d67f..c68d1c8d385 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5471.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5471.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5471",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-10T01:15:10.400",
- "lastModified": "2023-11-07T04:24:03.833",
+ "lastModified": "2024-02-29T01:42:20.003",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5488.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5488.json
index 4139353d664..96fca1d3774 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5488.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5488.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5488",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-10T14:15:11.123",
- "lastModified": "2023-11-07T04:24:04.193",
+ "lastModified": "2024-02-29T01:42:20.200",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5489.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5489.json
index d353ccfd1ec..28b9152faa2 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5489.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5489.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5489",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-10T15:15:10.850",
- "lastModified": "2023-11-07T04:24:04.433",
+ "lastModified": "2024-02-29T01:42:20.277",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5490.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5490.json
index f064f049a63..e5f53e0aeb5 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5490.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5490.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5490",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-10T15:15:10.927",
- "lastModified": "2023-11-07T04:24:04.687",
+ "lastModified": "2024-02-29T01:42:20.350",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5491.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5491.json
index c11ca0f091e..e7eca1eaeff 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5491.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5491.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5491",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-10T15:15:11.003",
- "lastModified": "2023-11-07T04:24:04.953",
+ "lastModified": "2024-02-29T01:42:20.470",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5492.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5492.json
index 1d46809402e..6ea0259538c 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5492.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5492.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5492",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-10T16:15:10.340",
- "lastModified": "2023-11-07T04:24:05.220",
+ "lastModified": "2024-02-29T01:42:20.563",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5493.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5493.json
index 2ca9d628cd8..e11f51a6a77 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5493.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5493.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5493",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-10T16:15:10.420",
- "lastModified": "2023-11-07T04:24:05.540",
+ "lastModified": "2024-02-29T01:42:20.647",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5494.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5494.json
index 840f33f31af..2c488ab1c35 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5494.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5494.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5494",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-10T16:15:10.493",
- "lastModified": "2023-11-07T04:24:05.793",
+ "lastModified": "2024-02-29T01:42:20.737",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5495.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5495.json
index 9923354349a..6f785f7cecf 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5495.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5495.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5495",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-10T17:15:13.333",
- "lastModified": "2023-11-07T04:24:06.043",
+ "lastModified": "2024-02-29T01:42:20.823",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5496.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5496.json
index c3dd01e93a5..03471f08aee 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5496.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5496.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5496",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-10T17:15:13.413",
- "lastModified": "2023-11-07T04:24:06.350",
+ "lastModified": "2024-02-29T01:42:20.907",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.5
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-54xx/CVE-2023-5497.json b/CVE-2023/CVE-2023-54xx/CVE-2023-5497.json
index 2a2d4e76226..2d40a3f6024 100644
--- a/CVE-2023/CVE-2023-54xx/CVE-2023-5497.json
+++ b/CVE-2023/CVE-2023-54xx/CVE-2023-5497.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5497",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-10T18:15:19.247",
- "lastModified": "2023-11-07T04:24:06.610",
+ "lastModified": "2024-02-29T01:42:20.990",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5578.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5578.json
index f20eb5f9521..3c89e290c12 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5578.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5578.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5578",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-14T11:15:45.800",
- "lastModified": "2023-11-07T04:24:09.117",
+ "lastModified": "2024-02-29T01:42:21.837",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5579.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5579.json
index b72f3203b99..15b2d3c1300 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5579.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5579.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5579",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-14T12:15:10.277",
- "lastModified": "2023-11-07T04:24:09.463",
+ "lastModified": "2024-02-29T01:42:21.933",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5580.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5580.json
index 971c4b71793..7919ea10518 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5580.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5580.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5580",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-14T12:15:10.353",
- "lastModified": "2023-11-07T04:24:09.737",
+ "lastModified": "2024-02-29T01:42:22.030",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5581.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5581.json
index 02bb4b5bffd..3b26fd48e24 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5581.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5581.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5581",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-14T13:15:09.743",
- "lastModified": "2023-11-07T04:24:09.983",
+ "lastModified": "2024-02-29T01:42:22.110",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5582.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5582.json
index c482f3c9a74..9c45ce8f9e6 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5582.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5582.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5582",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-14T14:15:10.963",
- "lastModified": "2023-11-07T04:24:10.253",
+ "lastModified": "2024-02-29T01:42:22.197",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5585.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5585.json
index f3e58ec9c3b..baeff454eb7 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5585.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5585.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5585",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-15T00:15:10.363",
- "lastModified": "2023-11-07T04:24:10.713",
+ "lastModified": "2024-02-29T01:42:22.300",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5587.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5587.json
index 95a06bc8df7..3f906663016 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5587.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5587.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5587",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-15T22:15:15.583",
- "lastModified": "2023-11-07T04:24:10.987",
+ "lastModified": "2024-02-29T01:42:22.443",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5588.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5588.json
index 4836e2473b1..4a6cf4ec540 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5588.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5588.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5588",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-15T22:15:15.703",
- "lastModified": "2023-11-07T04:24:11.233",
+ "lastModified": "2024-02-29T01:42:22.547",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 1.4
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-55xx/CVE-2023-5589.json b/CVE-2023/CVE-2023-55xx/CVE-2023-5589.json
index 3686981dbd3..f7b51b53c12 100644
--- a/CVE-2023/CVE-2023-55xx/CVE-2023-5589.json
+++ b/CVE-2023/CVE-2023-55xx/CVE-2023-5589.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5589",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-15T23:15:44.777",
- "lastModified": "2023-11-07T04:24:11.490",
+ "lastModified": "2024-02-29T01:42:22.790",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -85,7 +85,7 @@
},
"weaknesses": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5681.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5681.json
index 49b9b53e329..ea8d83468b1 100644
--- a/CVE-2023/CVE-2023-56xx/CVE-2023-5681.json
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5681.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5681",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-20T21:15:09.933",
- "lastModified": "2023-11-07T04:24:14.293",
+ "lastModified": "2024-02-29T01:42:23.930",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5682.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5682.json
index 68da971a1e3..9dba07954b8 100644
--- a/CVE-2023/CVE-2023-56xx/CVE-2023-5682.json
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5682.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5682",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-20T21:15:10.023",
- "lastModified": "2023-12-16T04:28:21.150",
+ "lastModified": "2024-02-29T01:42:24.020",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5683.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5683.json
index 1d15807ee5c..8f51211f207 100644
--- a/CVE-2023/CVE-2023-56xx/CVE-2023-5683.json
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5683.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5683",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-21T05:16:07.347",
- "lastModified": "2024-02-13T08:16:21.730",
+ "lastModified": "2024-02-29T01:42:24.097",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5684.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5684.json
index c6db54eba2e..c85ff5e98b2 100644
--- a/CVE-2023/CVE-2023-56xx/CVE-2023-5684.json
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5684.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5684",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-21T07:15:07.987",
- "lastModified": "2023-11-07T04:24:15.177",
+ "lastModified": "2024-02-29T01:42:24.187",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5693.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5693.json
index f4d934a1586..b4522845fd0 100644
--- a/CVE-2023/CVE-2023-56xx/CVE-2023-5693.json
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5693.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5693",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-22T23:15:08.067",
- "lastModified": "2024-01-09T02:49:34.650",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:24.327",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5694.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5694.json
index a1fe6101ced..c869881cad5 100644
--- a/CVE-2023/CVE-2023-56xx/CVE-2023-5694.json
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5694.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5694",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-22T23:15:08.130",
- "lastModified": "2023-11-07T04:24:16.180",
+ "lastModified": "2024-02-29T01:42:24.417",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5695.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5695.json
index fd72238e923..43793d665c9 100644
--- a/CVE-2023/CVE-2023-56xx/CVE-2023-5695.json
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5695.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5695",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-22T23:15:08.200",
- "lastModified": "2023-11-07T04:24:16.487",
+ "lastModified": "2024-02-29T01:42:24.513",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5696.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5696.json
index d820bbdea08..325125636b1 100644
--- a/CVE-2023/CVE-2023-56xx/CVE-2023-5696.json
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5696.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5696",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-22T23:15:08.260",
- "lastModified": "2023-11-07T04:24:16.757",
+ "lastModified": "2024-02-29T01:42:24.593",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5697.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5697.json
index 76f427ee338..62b0c58968a 100644
--- a/CVE-2023/CVE-2023-56xx/CVE-2023-5697.json
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5697.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5697",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-23T00:15:08.603",
- "lastModified": "2023-11-07T04:24:17.013",
+ "lastModified": "2024-02-29T01:42:24.680",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5698.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5698.json
index a3f571dc5c3..a82175b9b88 100644
--- a/CVE-2023/CVE-2023-56xx/CVE-2023-5698.json
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5698.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5698",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-23T00:15:08.673",
- "lastModified": "2023-11-07T04:24:17.283",
+ "lastModified": "2024-02-29T01:42:24.760",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5699.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5699.json
index bcc3277723c..3301cdee155 100644
--- a/CVE-2023/CVE-2023-56xx/CVE-2023-5699.json
+++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5699.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5699",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-23T00:15:08.733",
- "lastModified": "2023-11-07T04:24:17.560",
+ "lastModified": "2024-02-29T01:42:24.840",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5700.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5700.json
index f96c0f0c8c0..b240ead0b30 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5700.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5700.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5700",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-23T00:15:08.797",
- "lastModified": "2023-11-07T04:24:17.820",
+ "lastModified": "2024-02-29T01:42:24.923",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5701.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5701.json
index 6994fdd872e..e1152ea010c 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5701.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5701.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5701",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-23T01:15:07.690",
- "lastModified": "2023-11-07T04:24:18.063",
+ "lastModified": "2024-02-29T01:42:25.007",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5702.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5702.json
index 33331653936..82167cab2ad 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5702.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5702.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5702",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-23T01:15:07.757",
- "lastModified": "2023-11-07T04:24:18.357",
+ "lastModified": "2024-02-29T01:42:25.087",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5780.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5780.json
index e6e0ddf792b..60bbee34a48 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5780.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5780.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5780",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T13:15:10.013",
- "lastModified": "2023-12-16T04:28:21.150",
+ "lastModified": "2024-02-29T01:42:25.817",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5781.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5781.json
index 40a003d4b1d..bb991bd9495 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5781.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5781.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5781",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T13:15:10.087",
- "lastModified": "2023-12-16T04:28:21.150",
+ "lastModified": "2024-02-29T01:42:25.910",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5782.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5782.json
index 30f84f13c42..fd3c443be23 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5782.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5782.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5782",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T14:15:08.893",
- "lastModified": "2024-02-13T08:16:22.020",
+ "lastModified": "2024-02-29T01:42:25.997",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5783.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5783.json
index 28b726f9302..fed80949a20 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5783.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5783.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5783",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T14:15:08.967",
- "lastModified": "2023-12-16T04:28:21.150",
+ "lastModified": "2024-02-29T01:42:26.080",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5784.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5784.json
index 10ff1fea853..778e42f5c71 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5784.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5784.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5784",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T15:15:09.373",
- "lastModified": "2023-11-07T04:24:21.177",
+ "lastModified": "2024-02-29T01:42:26.157",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5785.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5785.json
index ab7e5962c85..3da4f20b29c 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5785.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5785.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5785",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T15:15:09.440",
- "lastModified": "2023-11-07T04:24:21.463",
+ "lastModified": "2024-02-29T01:42:26.230",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5786.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5786.json
index a1ba88d0bab..1813c7e7b47 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5786.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5786.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5786",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T16:15:08.570",
- "lastModified": "2023-11-07T04:24:21.713",
+ "lastModified": "2024-02-29T01:42:26.310",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5787.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5787.json
index 0db6dcb5b48..8234875d843 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5787.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5787.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5787",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T16:15:08.643",
- "lastModified": "2024-02-13T08:16:22.400",
+ "lastModified": "2024-02-29T01:42:26.393",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5789.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5789.json
index 4065beaad18..9613a5d35e9 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5789.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5789.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5789",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T17:15:10.000",
- "lastModified": "2023-11-07T04:24:22.260",
+ "lastModified": "2024-02-29T01:42:26.480",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5790.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5790.json
index aeeadc0a74f..7ccfcb828fc 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5790.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5790.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5790",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T17:15:10.080",
- "lastModified": "2023-11-07T04:24:22.530",
+ "lastModified": "2024-02-29T01:42:26.570",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5791.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5791.json
index 06133f46272..a249d2b645f 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5791.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5791.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5791",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T17:15:10.167",
- "lastModified": "2023-11-07T04:24:22.770",
+ "lastModified": "2024-02-29T01:42:26.660",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5792.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5792.json
index 895a43e111b..cfdfbe45f34 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5792.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5792.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5792",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T17:15:10.250",
- "lastModified": "2023-11-07T04:24:23.040",
+ "lastModified": "2024-02-29T01:42:26.740",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5793.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5793.json
index 48c59439b52..0d731314dc1 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5793.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5793.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5793",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T18:15:08.817",
- "lastModified": "2023-11-07T04:24:23.287",
+ "lastModified": "2024-02-29T01:42:26.817",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5794.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5794.json
index e20f78b0b29..ab9e032d32b 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5794.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5794.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5794",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T18:15:08.877",
- "lastModified": "2023-12-20T17:54:35.080",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:26.900",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5795.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5795.json
index 6f8335d14c1..0ffccad9d9a 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5795.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5795.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5795",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T18:15:08.940",
- "lastModified": "2023-11-07T04:24:23.857",
+ "lastModified": "2024-02-29T01:42:26.980",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5796.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5796.json
index 4e7990663a4..4b72cb92026 100644
--- a/CVE-2023/CVE-2023-57xx/CVE-2023-5796.json
+++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5796.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5796",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T18:15:09.007",
- "lastModified": "2023-11-07T04:24:24.130",
+ "lastModified": "2024-02-29T01:42:27.057",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5804.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5804.json
index 2b6c1b8455b..1ee42f17670 100644
--- a/CVE-2023/CVE-2023-58xx/CVE-2023-5804.json
+++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5804.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5804",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T20:15:08.900",
- "lastModified": "2023-11-07T04:24:24.593",
+ "lastModified": "2024-02-29T01:42:27.207",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 5.9
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5805.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5805.json
index 5aafdfee975..71880f6271b 100644
--- a/CVE-2023/CVE-2023-58xx/CVE-2023-5805.json
+++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5805.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5805",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-26T22:15:08.820",
- "lastModified": "2023-11-07T16:35:31.783",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:27.293",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5810.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5810.json
index e4d1c60cd4d..4c7d15bb718 100644
--- a/CVE-2023/CVE-2023-58xx/CVE-2023-5810.json
+++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5810.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5810",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-27T01:15:32.317",
- "lastModified": "2023-11-07T04:24:25.247",
+ "lastModified": "2024-02-29T01:42:27.413",
"vulnStatus": "Modified",
"descriptions": [
{
@@ -37,7 +37,7 @@
"impactScore": 2.7
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@@ -59,7 +59,7 @@
],
"cvssMetricV2": [
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
@@ -95,7 +95,7 @@
]
},
{
- "source": "1af790b2-7ee1-4545-860a-a788eba489b5",
+ "source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5811.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5811.json
index 14f60d5b2ce..3ea0a946162 100644
--- a/CVE-2023/CVE-2023-58xx/CVE-2023-5811.json
+++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5811.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5811",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-27T01:15:32.383",
- "lastModified": "2023-11-08T14:27:21.353",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:27.493",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5812.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5812.json
index 92b51678bd8..4bd3fa8ba59 100644
--- a/CVE-2023/CVE-2023-58xx/CVE-2023-5812.json
+++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5812.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5812",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-27T02:15:07.477",
- "lastModified": "2023-11-08T14:55:24.420",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:27.587",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5813.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5813.json
index 30819d0e613..d984a18497c 100644
--- a/CVE-2023/CVE-2023-58xx/CVE-2023-5813.json
+++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5813.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5813",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-27T02:15:07.540",
- "lastModified": "2023-11-13T14:15:08.297",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:27.673",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5814.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5814.json
index 40d28872e70..7b5ee4bcbc8 100644
--- a/CVE-2023/CVE-2023-58xx/CVE-2023-5814.json
+++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5814.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5814",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-27T02:15:07.603",
- "lastModified": "2023-11-13T14:15:05.840",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:27.753",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5826.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5826.json
index 4cc90265a3f..ab6d1ec4f13 100644
--- a/CVE-2023/CVE-2023-58xx/CVE-2023-5826.json
+++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5826.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5826",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-27T18:15:22.030",
- "lastModified": "2023-11-07T16:22:22.777",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:27.940",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5827.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5827.json
index 24faf75d489..cb22b830c99 100644
--- a/CVE-2023/CVE-2023-58xx/CVE-2023-5827.json
+++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5827.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5827",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-27T18:15:22.120",
- "lastModified": "2023-11-07T17:10:19.370",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:28.033",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5828.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5828.json
index 0b177403b03..bc0c02ce17a 100644
--- a/CVE-2023/CVE-2023-58xx/CVE-2023-5828.json
+++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5828.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5828",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-27T20:15:09.227",
- "lastModified": "2024-02-13T08:16:22.650",
+ "lastModified": "2024-02-29T01:42:28.120",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5829.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5829.json
index ea9c190970c..a0639cbe03d 100644
--- a/CVE-2023/CVE-2023-58xx/CVE-2023-5829.json
+++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5829.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5829",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-27T20:15:09.293",
- "lastModified": "2023-11-07T20:48:53.233",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:28.200",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5830.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5830.json
index 6522a10c0bc..3602ff397e0 100644
--- a/CVE-2023/CVE-2023-58xx/CVE-2023-5830.json
+++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5830.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5830",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-27T21:15:10.003",
- "lastModified": "2023-11-07T20:50:41.247",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:28.280",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5835.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5835.json
index 6c948f0d348..1c9cbe50f1a 100644
--- a/CVE-2023/CVE-2023-58xx/CVE-2023-5835.json
+++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5835.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5835",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-28T14:15:10.047",
- "lastModified": "2023-11-07T21:06:58.527",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:28.407",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5836.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5836.json
index ad571eb961f..2180f45a5b6 100644
--- a/CVE-2023/CVE-2023-58xx/CVE-2023-5836.json
+++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5836.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5836",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-28T22:15:08.553",
- "lastModified": "2023-11-07T19:41:12.047",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:28.487",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5837.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5837.json
index f7ddd8dcd13..fe1cde9e96e 100644
--- a/CVE-2023/CVE-2023-58xx/CVE-2023-5837.json
+++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5837.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5837",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-10-28T22:15:08.630",
- "lastModified": "2023-11-07T19:45:54.283",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:28.570",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5910.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5910.json
index 34521485522..7025565b1ea 100644
--- a/CVE-2023/CVE-2023-59xx/CVE-2023-5910.json
+++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5910.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-5910",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-02T00:15:23.373",
- "lastModified": "2024-02-13T08:16:22.950",
+ "lastModified": "2024-02-29T01:42:29.380",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5916.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5916.json
index 8ed35de24e3..9e8376e90a6 100644
--- a/CVE-2023/CVE-2023-59xx/CVE-2023-5916.json
+++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5916.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5916",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-02T11:15:14.540",
- "lastModified": "2023-11-09T19:31:48.253",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:29.533",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5917.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5917.json
index 5237f4c18d4..65fff19cb6e 100644
--- a/CVE-2023/CVE-2023-59xx/CVE-2023-5917.json
+++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5917.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5917",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-02T11:15:14.630",
- "lastModified": "2023-11-09T19:31:52.520",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:29.630",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5918.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5918.json
index c746d676095..f93ff8fae93 100644
--- a/CVE-2023/CVE-2023-59xx/CVE-2023-5918.json
+++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5918.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5918",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-02T12:15:09.800",
- "lastModified": "2023-11-09T19:26:36.717",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:29.717",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5919.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5919.json
index b5c242807e0..ccdba2b52cd 100644
--- a/CVE-2023/CVE-2023-59xx/CVE-2023-5919.json
+++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5919.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5919",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-02T14:15:13.190",
- "lastModified": "2023-11-09T19:59:47.870",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:29.803",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5923.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5923.json
index 133cb50aad4..9e9dfa6b3dd 100644
--- a/CVE-2023/CVE-2023-59xx/CVE-2023-5923.json
+++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5923.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5923",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-02T19:15:41.673",
- "lastModified": "2023-11-09T21:14:25.430",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:29.917",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5924.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5924.json
index 50dd05740e2..4c27c67b9d1 100644
--- a/CVE-2023/CVE-2023-59xx/CVE-2023-5924.json
+++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5924.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5924",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-02T19:15:41.747",
- "lastModified": "2023-11-09T21:07:52.570",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:30.000",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5925.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5925.json
index 8d1875f5463..be7327e8735 100644
--- a/CVE-2023/CVE-2023-59xx/CVE-2023-5925.json
+++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5925.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5925",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-02T20:15:10.103",
- "lastModified": "2023-11-09T20:56:15.113",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:30.080",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5926.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5926.json
index 809c372dd8b..7076d1f3a45 100644
--- a/CVE-2023/CVE-2023-59xx/CVE-2023-5926.json
+++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5926.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5926",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-02T20:15:10.183",
- "lastModified": "2023-11-09T20:51:32.893",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:30.160",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5927.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5927.json
index aa6fddea0f6..c334548284f 100644
--- a/CVE-2023/CVE-2023-59xx/CVE-2023-5927.json
+++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5927.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5927",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-02T20:15:10.257",
- "lastModified": "2023-11-09T20:46:42.307",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:30.243",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5928.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5928.json
index 5e66508a52a..a9bdca6ef6f 100644
--- a/CVE-2023/CVE-2023-59xx/CVE-2023-5928.json
+++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5928.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5928",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-02T20:15:10.337",
- "lastModified": "2023-11-09T20:32:30.993",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:30.330",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5929.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5929.json
index ffa9f8cf5a9..e384a66bc2d 100644
--- a/CVE-2023/CVE-2023-59xx/CVE-2023-5929.json
+++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5929.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5929",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-02T21:15:10.040",
- "lastModified": "2023-11-09T20:28:22.787",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:30.413",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5930.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5930.json
index 5c7f9dd4d5f..e8b9f37a282 100644
--- a/CVE-2023/CVE-2023-59xx/CVE-2023-5930.json
+++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5930.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5930",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-02T21:15:10.113",
- "lastModified": "2023-11-09T20:07:59.070",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:30.490",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5959.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5959.json
index 821c99f4a2b..ed7b9b7ec54 100644
--- a/CVE-2023/CVE-2023-59xx/CVE-2023-5959.json
+++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5959.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-5959",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-11T09:15:26.827",
- "lastModified": "2023-11-17T17:04:42.023",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:30.813",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6052.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6052.json
index 57570f52c15..96de45504a1 100644
--- a/CVE-2023/CVE-2023-60xx/CVE-2023-6052.json
+++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6052.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6052",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-09T13:15:07.870",
- "lastModified": "2023-12-16T04:28:21.150",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:31.743",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6053.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6053.json
index db048a9c768..9a5acc3e178 100644
--- a/CVE-2023/CVE-2023-60xx/CVE-2023-6053.json
+++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6053.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6053",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-09T19:15:08.577",
- "lastModified": "2023-12-16T04:28:21.150",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:31.840",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6054.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6054.json
index 653891828d4..7d1a2265a02 100644
--- a/CVE-2023/CVE-2023-60xx/CVE-2023-6054.json
+++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6054.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6054",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-09T19:15:08.803",
- "lastModified": "2023-12-16T04:28:21.150",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:31.917",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6074.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6074.json
index 17083c05736..b6a9588273f 100644
--- a/CVE-2023/CVE-2023-60xx/CVE-2023-6074.json
+++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6074.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6074",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-10T15:15:09.310",
- "lastModified": "2023-11-16T17:57:42.757",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:32.093",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6075.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6075.json
index 99048a93e52..1e2bde46e04 100644
--- a/CVE-2023/CVE-2023-60xx/CVE-2023-6075.json
+++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6075.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6075",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-10T15:15:09.567",
- "lastModified": "2023-11-16T17:57:21.953",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:32.173",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6076.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6076.json
index 6a3a64f3702..23ea3fe0473 100644
--- a/CVE-2023/CVE-2023-60xx/CVE-2023-6076.json
+++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6076.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6076",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-10T16:15:34.067",
- "lastModified": "2023-11-16T17:53:03.493",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:32.257",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6084.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6084.json
index 549bef26d77..a4fb4088591 100644
--- a/CVE-2023/CVE-2023-60xx/CVE-2023-6084.json
+++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6084.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6084",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-12T11:15:07.620",
- "lastModified": "2023-12-16T04:28:21.150",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:32.397",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6099.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6099.json
index a709e96a820..2bcfa40bbfa 100644
--- a/CVE-2023/CVE-2023-60xx/CVE-2023-6099.json
+++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6099.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6099",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-13T16:15:28.323",
- "lastModified": "2023-11-17T21:56:40.573",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:32.573",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6100.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6100.json
index 7e32de036b5..aaf250a4562 100644
--- a/CVE-2023/CVE-2023-61xx/CVE-2023-6100.json
+++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6100.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6100",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-13T16:15:28.617",
- "lastModified": "2023-11-20T16:12:22.750",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:32.670",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6101.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6101.json
index 426cda895c9..8e24da8d866 100644
--- a/CVE-2023/CVE-2023-61xx/CVE-2023-6101.json
+++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6101.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6101",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-13T16:15:28.857",
- "lastModified": "2023-11-20T16:11:40.347",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:32.750",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6102.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6102.json
index c15c3df5bf4..66f7ed6b89b 100644
--- a/CVE-2023/CVE-2023-61xx/CVE-2023-6102.json
+++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6102.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6102",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-13T18:15:08.123",
- "lastModified": "2023-11-20T16:10:42.370",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:32.830",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6103.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6103.json
index 3fcba5c1544..5b7a3db7fec 100644
--- a/CVE-2023/CVE-2023-61xx/CVE-2023-6103.json
+++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6103.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6103",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-13T18:15:08.470",
- "lastModified": "2023-11-20T13:28:52.767",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:32.917",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6122.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6122.json
index 94a86d61555..54d0cc2d97f 100644
--- a/CVE-2023/CVE-2023-61xx/CVE-2023-6122.json
+++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6122.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-6122",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2023-12-21T14:15:09.063",
- "lastModified": "2023-12-29T16:49:05.307",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:33.153",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ?stanbul Soft Informatics and Consultancy Limited Company Softomi Geli?mi? C2C Pazaryeri Yaz?l?m? allows Reflected XSS.This issue affects Softomi Geli?mi? C2C Pazaryeri Yaz?l?m?: before 12122023.\n\n"
+ "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in \u0130stanbul Soft Informatics and Consultancy Limited Company Softomi Geli\u015fmi\u015f C2C Pazaryeri Yaz\u0131l\u0131m\u0131 allows Reflected XSS.This issue affects Softomi Geli\u015fmi\u015f C2C Pazaryeri Yaz\u0131l\u0131m\u0131: before 12122023.\n\n"
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6145.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6145.json
index 23949d3ec43..2de7372c71e 100644
--- a/CVE-2023/CVE-2023-61xx/CVE-2023-6145.json
+++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6145.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-6145",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2023-12-21T14:15:09.430",
- "lastModified": "2023-12-29T16:38:48.537",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:33.440",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ?stanbul Soft Informatics and Consultancy Limited Company Softomi Advanced C2C Marketplace Software allows SQL Injection.This issue affects Softomi Advanced C2C Marketplace Software: before 12122023.\n\n"
+ "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in \u0130stanbul Soft Informatics and Consultancy Limited Company Softomi Advanced C2C Marketplace Software allows SQL Injection.This issue affects Softomi Advanced C2C Marketplace Software: before 12122023.\n\n"
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6188.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6188.json
index 7ecfd88adb3..da5b89bd8ae 100644
--- a/CVE-2023/CVE-2023-61xx/CVE-2023-6188.json
+++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6188.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6188",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-17T18:15:07.150",
- "lastModified": "2023-11-25T01:21:44.570",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:33.773",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-61xx/CVE-2023-6190.json b/CVE-2023/CVE-2023-61xx/CVE-2023-6190.json
index d0aefa01db3..e53bc29bd06 100644
--- a/CVE-2023/CVE-2023-61xx/CVE-2023-6190.json
+++ b/CVE-2023/CVE-2023-61xx/CVE-2023-6190.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-6190",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2023-12-27T15:15:45.900",
- "lastModified": "2024-01-04T03:43:21.943",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:33.877",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
- "value": "Improper Input Validation vulnerability in ?zmir Katip \u00c7elebi University University Information Management System allows Absolute Path Traversal.This issue affects University Information Management System: before 30.11.2023.\n\n"
+ "value": "Improper Input Validation vulnerability in \u0130zmir Katip \u00c7elebi University University Information Management System allows Absolute Path Traversal.This issue affects University Information Management System: before 30.11.2023.\n\n"
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6247.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6247.json
new file mode 100644
index 00000000000..bc3b4139376
--- /dev/null
+++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6247.json
@@ -0,0 +1,32 @@
+{
+ "id": "CVE-2023-6247",
+ "sourceIdentifier": "security@openvpn.net",
+ "published": "2024-02-29T01:42:34.380",
+ "lastModified": "2024-02-29T01:42:34.380",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The PKCS#7 parser in OpenVPN 3 Core Library versions through 3.8.3 did not properly validate the parsed data, which would result in the application crashing."
+ }
+ ],
+ "metrics": {},
+ "weaknesses": [
+ {
+ "source": "security@openvpn.net",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-476"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://community.openvpn.net/openvpn/wiki/CVE-2023-6247",
+ "source": "security@openvpn.net"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6274.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6274.json
index 144153933e4..41a7d7c5616 100644
--- a/CVE-2023/CVE-2023-62xx/CVE-2023-6274.json
+++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6274.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6274",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-24T14:15:08.413",
- "lastModified": "2023-12-04T15:08:18.743",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:34.663",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json
index f45857bac3e..8109ab1dec1 100644
--- a/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json
+++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6275.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-6275",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-24T15:15:07.783",
- "lastModified": "2023-12-15T06:15:43.300",
+ "lastModified": "2024-02-29T01:42:34.760",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6276.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6276.json
index a1b6b039ba4..e1ff6232229 100644
--- a/CVE-2023/CVE-2023-62xx/CVE-2023-6276.json
+++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6276.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6276",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-24T16:15:06.910",
- "lastModified": "2023-12-16T04:28:21.150",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:34.843",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6296.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6296.json
index 0bd00cb9ff5..7245b6c8835 100644
--- a/CVE-2023/CVE-2023-62xx/CVE-2023-6296.json
+++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6296.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6296",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-26T22:15:06.983",
- "lastModified": "2023-12-01T19:00:57.113",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:35.057",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -86,7 +86,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
- "type": "Secondary",
+ "type": "Primary",
"description": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6297.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6297.json
index c79dc76d108..3faf1f57126 100644
--- a/CVE-2023/CVE-2023-62xx/CVE-2023-6297.json
+++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6297.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6297",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-26T23:15:07.423",
- "lastModified": "2023-11-30T21:02:23.727",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:35.160",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6298.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6298.json
index d48fc52bdbc..67683fd1d4a 100644
--- a/CVE-2023/CVE-2023-62xx/CVE-2023-6298.json
+++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6298.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6298",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-26T23:15:07.657",
- "lastModified": "2024-02-01T19:58:50.157",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:35.247",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6299.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6299.json
index 5120e394aea..34b1ddc1277 100644
--- a/CVE-2023/CVE-2023-62xx/CVE-2023-6299.json
+++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6299.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6299",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-26T23:15:07.883",
- "lastModified": "2023-11-30T20:09:27.653",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:35.340",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6300.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6300.json
index dd47eca6b06..abb81308682 100644
--- a/CVE-2023/CVE-2023-63xx/CVE-2023-6300.json
+++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6300.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6300",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T00:15:07.377",
- "lastModified": "2023-11-30T05:23:34.157",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:35.423",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6301.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6301.json
index 9fd4a24e3e2..3d4edc7aed8 100644
--- a/CVE-2023/CVE-2023-63xx/CVE-2023-6301.json
+++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6301.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6301",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T00:15:07.597",
- "lastModified": "2023-11-30T05:22:55.350",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:35.510",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6302.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6302.json
index e345e3bea67..883466e7c3b 100644
--- a/CVE-2023/CVE-2023-63xx/CVE-2023-6302.json
+++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6302.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6302",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T00:15:07.820",
- "lastModified": "2023-11-30T19:59:45.953",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:35.590",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6303.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6303.json
index 8c264466ee8..aeb2b758061 100644
--- a/CVE-2023/CVE-2023-63xx/CVE-2023-6303.json
+++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6303.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6303",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T00:15:08.040",
- "lastModified": "2023-11-30T19:58:47.923",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:35.673",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6304.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6304.json
index 0e3770f4dcb..ff597672484 100644
--- a/CVE-2023/CVE-2023-63xx/CVE-2023-6304.json
+++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6304.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6304",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T01:15:07.223",
- "lastModified": "2023-12-01T19:25:17.770",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:35.777",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6305.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6305.json
index 2a09a1f7f25..445d8af0f52 100644
--- a/CVE-2023/CVE-2023-63xx/CVE-2023-6305.json
+++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6305.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6305",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T01:15:07.463",
- "lastModified": "2023-12-28T18:55:36.773",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:35.880",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6306.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6306.json
index ad4eccca4d6..04bcc029f65 100644
--- a/CVE-2023/CVE-2023-63xx/CVE-2023-6306.json
+++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6306.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6306",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T02:15:42.133",
- "lastModified": "2023-12-28T18:55:28.227",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:35.967",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6307.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6307.json
index 08200779483..eb0166425ba 100644
--- a/CVE-2023/CVE-2023-63xx/CVE-2023-6307.json
+++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6307.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-6307",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T02:15:42.353",
- "lastModified": "2024-02-13T08:16:23.223",
+ "lastModified": "2024-02-29T01:42:36.053",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6308.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6308.json
index f36e1e501fc..6a828a6e9d9 100644
--- a/CVE-2023/CVE-2023-63xx/CVE-2023-6308.json
+++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6308.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6308",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T02:15:42.570",
- "lastModified": "2023-12-01T19:23:41.710",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:36.133",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6309.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6309.json
index ac92a8c3d1d..31c421997fa 100644
--- a/CVE-2023/CVE-2023-63xx/CVE-2023-6309.json
+++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6309.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6309",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T02:15:42.797",
- "lastModified": "2023-11-30T21:35:30.657",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:36.223",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6310.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6310.json
index 4f551bd76f2..e78413c670f 100644
--- a/CVE-2023/CVE-2023-63xx/CVE-2023-6310.json
+++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6310.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6310",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T02:15:43.007",
- "lastModified": "2023-11-30T05:37:19.430",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:36.303",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6311.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6311.json
index 770d0cf294a..8710f47e396 100644
--- a/CVE-2023/CVE-2023-63xx/CVE-2023-6311.json
+++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6311.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6311",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T02:15:43.237",
- "lastModified": "2023-11-30T05:37:42.547",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:36.387",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6312.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6312.json
index d082ef55c65..ae1f141e638 100644
--- a/CVE-2023/CVE-2023-63xx/CVE-2023-6312.json
+++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6312.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6312",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T03:15:07.420",
- "lastModified": "2023-11-30T05:38:10.237",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:36.470",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6313.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6313.json
index c6081a3251f..9fec04cf8ee 100644
--- a/CVE-2023/CVE-2023-63xx/CVE-2023-6313.json
+++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6313.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6313",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T03:15:07.650",
- "lastModified": "2023-11-30T19:57:47.960",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:36.560",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6401.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6401.json
index f6d42f6cc4d..95f475f6d31 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6401.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6401.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6401",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-30T15:15:09.507",
- "lastModified": "2023-12-06T14:59:33.213",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:37.250",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6402.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6402.json
index 0355676651c..543d5aa41f9 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6402.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6402.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6402",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-30T15:15:09.813",
- "lastModified": "2023-12-06T14:52:46.017",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:37.340",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6438.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6438.json
index 0bfc31bd372..aae4c7470ea 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6438.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6438.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6438",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-30T17:15:13.223",
- "lastModified": "2023-12-06T13:53:13.397",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:37.710",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6439.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6439.json
index 65635ed82d2..eff613332ce 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6439.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6439.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6439",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-30T20:15:07.027",
- "lastModified": "2023-12-06T17:10:16.797",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:37.797",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6440.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6440.json
index baff09df557..069ddaa63d8 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6440.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6440.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6440",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-30T21:15:09.530",
- "lastModified": "2024-02-22T03:36:29.637",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:37.890",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6442.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6442.json
index ffd387244e5..1e882b2245b 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6442.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6442.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6442",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-30T21:15:09.763",
- "lastModified": "2023-12-06T16:53:05.960",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:37.993",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6462.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6462.json
index 281a4dea29b..a26be07a56c 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6462.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6462.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6462",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-01T22:15:10.960",
- "lastModified": "2023-12-06T20:20:30.583",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:38.190",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6463.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6463.json
index d0ca0135dc7..9cd87872a8b 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6463.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6463.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6463",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-01T23:15:08.023",
- "lastModified": "2023-12-06T20:10:36.877",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:38.277",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6464.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6464.json
index 141aa7aedbc..773c21aed69 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6464.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6464.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6464",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-02T09:15:42.160",
- "lastModified": "2023-12-06T20:48:36.220",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:38.350",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6465.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6465.json
index 0c7803bafc3..1ee8d6d54e7 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6465.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6465.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6465",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-02T12:15:06.933",
- "lastModified": "2023-12-06T20:51:35.523",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:38.433",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6466.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6466.json
index 85130e1390f..b89a0879e8f 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6466.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6466.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6466",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-02T14:15:07.413",
- "lastModified": "2023-12-07T15:11:44.983",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:38.517",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6467.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6467.json
index 4a20ae3dd9c..9880d2f37f1 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6467.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6467.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6467",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-02T14:15:07.647",
- "lastModified": "2023-12-06T20:33:19.333",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:38.603",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6472.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6472.json
index 12c77bf3d11..6d07c528ffe 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6472.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6472.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6472",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-02T19:15:07.493",
- "lastModified": "2023-12-06T22:06:00.133",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:38.700",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6473.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6473.json
index 7ad436f2325..1b2ed506a61 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6473.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6473.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6473",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-02T21:15:07.227",
- "lastModified": "2023-12-06T22:03:54.937",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:38.787",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6474.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6474.json
index 56d2de8f8f1..0fc053d32ce 100644
--- a/CVE-2023/CVE-2023-64xx/CVE-2023-6474.json
+++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6474.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6474",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-03T00:15:07.253",
- "lastModified": "2023-12-08T15:06:36.437",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:38.863",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6515.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6515.json
index d8cf97c6b27..7edecca9354 100644
--- a/CVE-2023/CVE-2023-65xx/CVE-2023-6515.json
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6515.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-6515",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-02-08T10:15:11.047",
- "lastModified": "2024-02-08T13:44:21.670",
+ "lastModified": "2024-02-29T01:42:39.177",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
- "value": "Authorization Bypass Through User-Controlled Key vulnerability in Mia Technology Inc. M?A-MED allows Authentication Abuse.This issue affects M?A-MED: before 1.0.7.\n\n"
+ "value": "Authorization Bypass Through User-Controlled Key vulnerability in Mia Technology Inc. M\u0130A-MED allows Authentication Abuse.This issue affects M\u0130A-MED: before 1.0.7.\n\n"
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6517.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6517.json
index f39d796579d..7874d50d51a 100644
--- a/CVE-2023/CVE-2023-65xx/CVE-2023-6517.json
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6517.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-6517",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-02-08T12:15:55.087",
- "lastModified": "2024-02-08T13:44:11.750",
+ "lastModified": "2024-02-29T01:42:39.260",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
- "value": "Exposure of Sensitive Information Due to Incompatible Policies vulnerability in Mia Technology Inc. M?A-MED allows Collect Data as Provided by Users.This issue affects M?A-MED: before 1.0.7.\n\n"
+ "value": "Exposure of Sensitive Information Due to Incompatible Policies vulnerability in Mia Technology Inc. M\u0130A-MED allows Collect Data as Provided by Users.This issue affects M\u0130A-MED: before 1.0.7.\n\n"
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6518.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6518.json
index e005fe0ae78..bd092f3e13d 100644
--- a/CVE-2023/CVE-2023-65xx/CVE-2023-6518.json
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6518.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-6518",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-02-08T12:15:55.350",
- "lastModified": "2024-02-08T13:44:11.750",
+ "lastModified": "2024-02-29T01:42:39.340",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
- "value": "Plaintext Storage of a Password vulnerability in Mia Technology Inc. M?A-MED allows Read Sensitive Strings Within an Executable.This issue affects M?A-MED: before 1.0.7.\n\n"
+ "value": "Plaintext Storage of a Password vulnerability in Mia Technology Inc. M\u0130A-MED allows Read Sensitive Strings Within an Executable.This issue affects M\u0130A-MED: before 1.0.7.\n\n"
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6519.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6519.json
index 5ca747f4490..645308c5ac2 100644
--- a/CVE-2023/CVE-2023-65xx/CVE-2023-6519.json
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6519.json
@@ -2,12 +2,12 @@
"id": "CVE-2023-6519",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-02-08T12:15:55.563",
- "lastModified": "2024-02-08T13:44:11.750",
+ "lastModified": "2024-02-29T01:42:39.437",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
- "value": "Exposure of Data Element to Wrong Session vulnerability in Mia Technology Inc. M?A-MED allows Read Sensitive Strings Within an Executable.This issue affects M?A-MED: before 1.0.7.\n\n"
+ "value": "Exposure of Data Element to Wrong Session vulnerability in Mia Technology Inc. M\u0130A-MED allows Read Sensitive Strings Within an Executable.This issue affects M\u0130A-MED: before 1.0.7.\n\n"
},
{
"lang": "es",
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6565.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6565.json
new file mode 100644
index 00000000000..a656fd91d9d
--- /dev/null
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6565.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-6565",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2024-02-29T01:42:39.890",
+ "lastModified": "2024-02-29T01:42:39.890",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The InfiniteWP Client plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.12.3 via the multi-call backup option. This makes it possible for unauthenticated attackers to extract sensitive data from a temporary SQL file via repeated GET requests during the limited time window of the backup process."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "HIGH",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "HIGH",
+ "integrityImpact": "NONE",
+ "availabilityImpact": "NONE",
+ "baseScore": 5.9,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.2,
+ "impactScore": 3.6
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/3007309/iwp-client",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2fdc32a4-adf8-4174-924b-5d0b763d010c?source=cve",
+ "source": "security@wordfence.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6574.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6574.json
index 9a5fd10cc18..ae88ec52f03 100644
--- a/CVE-2023/CVE-2023-65xx/CVE-2023-6574.json
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6574.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6574",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-07T20:15:38.743",
- "lastModified": "2023-12-13T18:45:36.640",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:40.123",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6575.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6575.json
index ad8551fc232..4b343c2dd22 100644
--- a/CVE-2023/CVE-2023-65xx/CVE-2023-6575.json
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6575.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6575",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-07T20:15:39.020",
- "lastModified": "2023-12-13T18:45:52.623",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:40.220",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6576.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6576.json
index ecf4bac90ef..76261919fe3 100644
--- a/CVE-2023/CVE-2023-65xx/CVE-2023-6576.json
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6576.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6576",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-07T21:15:08.387",
- "lastModified": "2023-12-12T20:41:54.757",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:40.303",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6577.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6577.json
index 50b859e5165..78f4c034591 100644
--- a/CVE-2023/CVE-2023-65xx/CVE-2023-6577.json
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6577.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6577",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-07T21:15:08.620",
- "lastModified": "2023-12-12T20:37:53.397",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:40.383",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6578.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6578.json
index 33b37e8ff6a..d46a921eda8 100644
--- a/CVE-2023/CVE-2023-65xx/CVE-2023-6578.json
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6578.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6578",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-07T21:15:08.863",
- "lastModified": "2023-12-13T15:48:30.210",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:40.467",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6579.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6579.json
index 394a0f8281f..bd9f4b5d75f 100644
--- a/CVE-2023/CVE-2023-65xx/CVE-2023-6579.json
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6579.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6579",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-07T22:15:08.300",
- "lastModified": "2023-12-12T20:19:12.933",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:40.563",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6580.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6580.json
index 1936b04493c..8d3fb192bfb 100644
--- a/CVE-2023/CVE-2023-65xx/CVE-2023-6580.json
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6580.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6580",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-07T22:15:08.533",
- "lastModified": "2023-12-13T14:11:27.950",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:40.643",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6581.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6581.json
index dd956f45cdc..59e5fd64d4c 100644
--- a/CVE-2023/CVE-2023-65xx/CVE-2023-6581.json
+++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6581.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6581",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-07T22:15:08.770",
- "lastModified": "2023-12-12T19:24:10.287",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:40.730",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6607.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6607.json
index 373367da0e1..8bdd1c9bbcc 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6607.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6607.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6607",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-08T14:15:07.203",
- "lastModified": "2023-12-16T04:28:21.150",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:40.973",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6608.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6608.json
index a370341420b..8d96d6623d2 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6608.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6608.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6608",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-08T15:15:08.457",
- "lastModified": "2023-12-16T04:28:21.150",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:41.067",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6609.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6609.json
index 700283130c4..77cf8bfe47b 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6609.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6609.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6609",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-08T15:15:08.683",
- "lastModified": "2023-12-13T15:08:59.200",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:41.150",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6611.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6611.json
index 1857443bd73..e7786d0a49d 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6611.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6611.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6611",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-08T15:15:08.917",
- "lastModified": "2023-12-16T04:28:21.150",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:41.250",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6612.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6612.json
index 486c2376b94..dc49b2eb08c 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6612.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6612.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6612",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-08T16:15:18.713",
- "lastModified": "2023-12-12T22:26:54.027",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:41.333",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6613.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6613.json
index c3ffabc8ecd..08a928bd938 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6613.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6613.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6613",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-08T16:15:19.610",
- "lastModified": "2023-12-12T20:03:31.290",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:41.423",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6614.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6614.json
index c51283c6037..5ff24339df1 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6614.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6614.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6614",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-08T16:15:20.223",
- "lastModified": "2023-12-12T20:02:52.180",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:41.537",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6615.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6615.json
index 327e379251c..94eab549b34 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6615.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6615.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6615",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-08T17:15:08.143",
- "lastModified": "2023-12-12T20:07:33.927",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:41.690",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6616.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6616.json
index 895321c86ca..85e990d46f8 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6616.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6616.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6616",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-08T17:15:08.367",
- "lastModified": "2023-12-12T20:06:58.937",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:41.783",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6617.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6617.json
index e2d4b346b37..3b10a7eedce 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6617.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6617.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6617",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-08T17:15:08.600",
- "lastModified": "2023-12-12T20:06:30.670",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:41.877",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6618.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6618.json
index 504099c6d3f..5e08d1c26ff 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6618.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6618.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6618",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-08T17:15:08.827",
- "lastModified": "2023-12-12T20:06:17.253",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:41.963",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6619.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6619.json
index fceb657da52..55300a1252d 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6619.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6619.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6619",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-08T18:15:06.930",
- "lastModified": "2023-12-12T20:04:28.453",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:42.050",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6646.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6646.json
index b27dd00796c..791b86ced22 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6646.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6646.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6646",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-09T22:15:07.560",
- "lastModified": "2023-12-13T16:53:04.853",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:42.310",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6647.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6647.json
index 70ac7e94abb..4519a1a2e3a 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6647.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6647.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6647",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-10T07:15:44.100",
- "lastModified": "2023-12-14T17:22:19.353",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:42.403",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6648.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6648.json
index 54e737ac49b..cd7a585b50b 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6648.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6648.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6648",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-10T09:15:06.913",
- "lastModified": "2023-12-13T02:16:14.417",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:42.497",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6649.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6649.json
index 68bc9573cd7..a47c0c8614c 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6649.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6649.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6649",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-10T10:15:07.263",
- "lastModified": "2023-12-13T02:15:56.150",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:42.583",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6650.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6650.json
index 77e5944f5db..de3288c2fa2 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6650.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6650.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6650",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-10T11:15:07.373",
- "lastModified": "2023-12-13T02:15:42.593",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:42.670",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6651.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6651.json
index 3b9669f24a1..63627927976 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6651.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6651.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6651",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-10T11:15:08.147",
- "lastModified": "2023-12-13T02:15:23.383",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:42.760",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6652.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6652.json
index ffb9f7f31fc..91e58d5fa9d 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6652.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6652.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6652",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-10T12:15:07.310",
- "lastModified": "2023-12-13T02:15:11.147",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:42.847",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6653.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6653.json
index 8bae0206e4d..8777788d09e 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6653.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6653.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6653",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-10T13:15:07.073",
- "lastModified": "2023-12-13T02:14:50.063",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:42.933",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6654.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6654.json
index a17b0c8a4a7..c200b4ce7cf 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6654.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6654.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-6654",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-10T15:15:07.160",
- "lastModified": "2024-02-13T08:16:23.480",
+ "lastModified": "2024-02-29T01:42:43.013",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6655.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6655.json
index 71474dcb003..5e6538f5361 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6655.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6655.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-6655",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-10T16:15:07.067",
- "lastModified": "2023-12-19T09:15:37.367",
+ "lastModified": "2024-02-29T01:42:43.097",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6656.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6656.json
index 4a6252e6d1a..5f27b79c517 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6656.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6656.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-6656",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-10T21:15:07.093",
- "lastModified": "2024-02-13T08:16:23.730",
+ "lastModified": "2024-02-29T01:42:43.187",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6657.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6657.json
index 0982dd00699..d77b093aa07 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6657.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6657.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6657",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-10T21:15:07.343",
- "lastModified": "2023-12-13T20:30:26.467",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:43.273",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6658.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6658.json
index a83838e0b3e..8d435247161 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6658.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6658.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6658",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-10T23:15:07.313",
- "lastModified": "2023-12-13T20:34:08.910",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:43.357",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6659.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6659.json
index fafa6daa6e7..39443dc856a 100644
--- a/CVE-2023/CVE-2023-66xx/CVE-2023-6659.json
+++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6659.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6659",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-11T01:15:07.073",
- "lastModified": "2023-12-13T21:15:46.997",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:43.437",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6755.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6755.json
index 709d19c5afd..4d7d2aaae26 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6755.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6755.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6755",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-13T13:15:09.203",
- "lastModified": "2023-12-15T20:48:01.920",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:44.057",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6756.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6756.json
index 084c7d1a0c5..63e43471acf 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6756.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6756.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6756",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-13T14:15:47.267",
- "lastModified": "2023-12-15T14:07:50.217",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:44.147",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6757.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6757.json
index 09d0d3c58b2..1ce5503f0ae 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6757.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6757.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6757",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-13T14:15:47.500",
- "lastModified": "2023-12-15T14:08:46.667",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:44.230",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6758.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6758.json
index 7e2245bd05d..8e7e8279f3e 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6758.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6758.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6758",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-13T15:15:08.080",
- "lastModified": "2023-12-16T01:46:12.850",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:44.310",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6759.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6759.json
index 753223ac98f..6eb7aaddeaa 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6759.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6759.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6759",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-13T15:15:08.337",
- "lastModified": "2023-12-15T18:02:45.423",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:44.390",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6760.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6760.json
index b2bc051090d..41a3fe4b46b 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6760.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6760.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6760",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-13T16:15:12.210",
- "lastModified": "2023-12-15T18:01:45.383",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:44.473",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6761.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6761.json
index da08f5fa65b..dc6ad7bf5a6 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6761.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6761.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6761",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-13T16:15:12.473",
- "lastModified": "2023-12-16T01:47:21.580",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:44.577",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6762.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6762.json
index 7f12c17eec0..14e628b6e6d 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6762.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6762.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6762",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-13T16:15:12.710",
- "lastModified": "2023-12-16T01:47:57.310",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:44.653",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6765.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6765.json
index fdade21ecbb..ffb210e57ee 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6765.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6765.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6765",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-13T18:15:44.627",
- "lastModified": "2023-12-18T19:05:53.770",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:44.743",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6766.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6766.json
index 50c4394b360..bee6bfadcae 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6766.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6766.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6766",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-13T18:15:44.870",
- "lastModified": "2023-12-18T19:04:02.987",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:44.830",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6767.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6767.json
index e1c7733248a..2816ec0fdac 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6767.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6767.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6767",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-13T18:15:45.107",
- "lastModified": "2023-12-18T19:00:46.430",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:44.910",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6771.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6771.json
index 7b744b2c7f3..095aa52bc42 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6771.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6771.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6771",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-13T19:15:08.257",
- "lastModified": "2023-12-18T18:57:14.040",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:45.017",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6772.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6772.json
index 5c8994f4e02..048c971309c 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6772.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6772.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6772",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-13T19:15:08.513",
- "lastModified": "2023-12-18T18:56:31.197",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:45.097",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6773.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6773.json
index 3a20ca31c3c..4aef37cbadc 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6773.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6773.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6773",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-13T20:15:49.890",
- "lastModified": "2023-12-20T18:31:30.370",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:45.173",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6774.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6774.json
index 475919b6e7f..98f5b0948c9 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6774.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6774.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6774",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-13T20:15:50.140",
- "lastModified": "2023-12-20T18:29:53.997",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:45.263",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6775.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6775.json
index c247780ed11..36768421236 100644
--- a/CVE-2023/CVE-2023-67xx/CVE-2023-6775.json
+++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6775.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6775",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-13T21:15:09.793",
- "lastModified": "2023-12-19T14:46:42.323",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:45.343",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6806.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6806.json
new file mode 100644
index 00000000000..657b43e59cf
--- /dev/null
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6806.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-6806",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2024-02-29T01:42:45.657",
+ "lastModified": "2024-02-29T01:42:45.657",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Starbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Job Settings user profile fields in all versions up to, and including, 3.4.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.4,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 3.1,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset/3029599/starbox",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1f413fc2-8543-4478-987d-d983581027bf?source=cve",
+ "source": "security@wordfence.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6848.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6848.json
index 66fa6602ebf..6b7345fde51 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6848.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6848.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-6848",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-16T07:15:44.407",
- "lastModified": "2024-02-13T08:16:24.067",
+ "lastModified": "2024-02-29T01:42:46.090",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6849.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6849.json
index b17b74bdcb8..2af7c802bd3 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6849.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6849.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-6849",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-16T08:15:06.663",
- "lastModified": "2024-02-13T08:16:24.430",
+ "lastModified": "2024-02-29T01:42:46.187",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6850.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6850.json
index c8b8e397fea..a1058bdb89b 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6850.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6850.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-6850",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-16T09:15:07.030",
- "lastModified": "2024-02-13T08:16:24.670",
+ "lastModified": "2024-02-29T01:42:46.273",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6851.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6851.json
index 74b92e18983..bc159b4ebfb 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6851.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6851.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-6851",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-16T11:15:07.163",
- "lastModified": "2024-02-13T08:16:24.913",
+ "lastModified": "2024-02-29T01:42:46.370",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6852.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6852.json
index aabcef9e106..ef61e9d1d73 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6852.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6852.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-6852",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-16T12:15:07.220",
- "lastModified": "2024-02-13T08:16:25.180",
+ "lastModified": "2024-02-29T01:42:46.450",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6853.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6853.json
index 9985a3174d4..d1680afc62f 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6853.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6853.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-6853",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-16T12:15:07.467",
- "lastModified": "2024-02-13T08:16:25.467",
+ "lastModified": "2024-02-29T01:42:46.580",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6881.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6881.json
new file mode 100644
index 00000000000..caa035b8f1f
--- /dev/null
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6881.json
@@ -0,0 +1,55 @@
+{
+ "id": "CVE-2023-6881",
+ "sourceIdentifier": "vulnerabilities@zephyrproject.org",
+ "published": "2024-02-29T01:42:46.890",
+ "lastModified": "2024-02-29T01:42:46.890",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "Possible buffer overflow in is_mount_point"
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "vulnerabilities@zephyrproject.org",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
+ "attackVector": "LOCAL",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "HIGH",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 2.5,
+ "impactScore": 4.7
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "vulnerabilities@zephyrproject.org",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-120"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-mh67-4h3q-p437",
+ "source": "vulnerabilities@zephyrproject.org"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6885.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6885.json
index 489ab7feb32..2881b2d46de 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6885.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6885.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6885",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-16T23:15:40.830",
- "lastModified": "2023-12-20T04:11:21.097",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:47.127",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6886.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6886.json
index a91fbde90bb..91d6ed4141e 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6886.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6886.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6886",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-17T01:15:27.307",
- "lastModified": "2023-12-20T20:41:07.530",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:47.213",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6887.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6887.json
index e6c9241c909..f06c3a2481d 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6887.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6887.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6887",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-17T01:15:27.553",
- "lastModified": "2023-12-20T19:51:23.947",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:47.300",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6888.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6888.json
index 8cd399cbe6a..3f1d4163228 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6888.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6888.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6888",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-17T01:15:27.783",
- "lastModified": "2023-12-20T19:54:21.513",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:47.387",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6891.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6891.json
index 8531bb7b8ac..8feaacd11e1 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6891.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6891.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6891",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-17T04:15:07.137",
- "lastModified": "2023-12-20T20:05:21.797",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:47.493",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6893.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6893.json
index 51064f0deba..2f96b387593 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6893.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6893.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6893",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-17T07:15:07.137",
- "lastModified": "2023-12-20T19:37:52.770",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:47.573",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6894.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6894.json
index 65f7de5bdf7..da09a17bebf 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6894.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6894.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6894",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-17T08:15:06.833",
- "lastModified": "2023-12-21T19:29:58.587",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:47.670",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6895.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6895.json
index 02e3385fad9..b4adff8c6f0 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6895.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6895.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6895",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-17T08:15:07.173",
- "lastModified": "2024-01-02T13:12:21.823",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:47.760",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6896.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6896.json
index d173450b194..d2f66b66771 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6896.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6896.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6896",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-17T10:15:08.260",
- "lastModified": "2023-12-20T04:09:26.843",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:47.850",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6898.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6898.json
index 67d505d337c..38c4a99271b 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6898.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6898.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6898",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-17T11:15:08.327",
- "lastModified": "2023-12-20T04:08:09.913",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:47.933",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6899.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6899.json
index afaea334afa..fcb453e59ec 100644
--- a/CVE-2023/CVE-2023-68xx/CVE-2023-6899.json
+++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6899.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6899",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-17T13:15:42.910",
- "lastModified": "2023-12-20T20:29:39.937",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:48.027",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6900.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6900.json
index cc1f81af556..c9a01783e02 100644
--- a/CVE-2023/CVE-2023-69xx/CVE-2023-6900.json
+++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6900.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6900",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-17T14:15:36.947",
- "lastModified": "2023-12-20T20:35:24.577",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:48.120",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6901.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6901.json
index cc82d877a24..6f4c5ed1418 100644
--- a/CVE-2023/CVE-2023-69xx/CVE-2023-6901.json
+++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6901.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6901",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-17T14:15:37.170",
- "lastModified": "2023-12-20T20:11:33.917",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:48.200",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6902.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6902.json
index c82963ba482..01c0093ff26 100644
--- a/CVE-2023/CVE-2023-69xx/CVE-2023-6902.json
+++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6902.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6902",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-17T16:15:13.037",
- "lastModified": "2023-12-21T18:39:09.373",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:48.280",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6903.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6903.json
index 8efa92c6dbf..7c5ce97fa36 100644
--- a/CVE-2023/CVE-2023-69xx/CVE-2023-6903.json
+++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6903.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6903",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-17T23:15:44.167",
- "lastModified": "2023-12-21T20:18:03.200",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:48.377",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6904.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6904.json
index 864992ef9dd..c5a73b95224 100644
--- a/CVE-2023/CVE-2023-69xx/CVE-2023-6904.json
+++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6904.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6904",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-17T23:15:44.397",
- "lastModified": "2023-12-21T20:10:56.897",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:48.463",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6905.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6905.json
index de380d4c93a..3fe69dc917f 100644
--- a/CVE-2023/CVE-2023-69xx/CVE-2023-6905.json
+++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6905.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6905",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-18T00:15:11.327",
- "lastModified": "2023-12-21T20:07:00.727",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:48.550",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6906.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6906.json
index 320ffd256ac..8e736dcc7c7 100644
--- a/CVE-2023/CVE-2023-69xx/CVE-2023-6906.json
+++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6906.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6906",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-18T04:15:51.227",
- "lastModified": "2023-12-20T20:47:26.333",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:48.630",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6907.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6907.json
index 7d4df28e16c..100b1498efa 100644
--- a/CVE-2023/CVE-2023-69xx/CVE-2023-6907.json
+++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6907.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6907",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-18T04:15:51.693",
- "lastModified": "2023-12-20T20:50:06.230",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:48.720",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6908.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6908.json
index 2743e3dd25b..256cc54e598 100644
--- a/CVE-2023/CVE-2023-69xx/CVE-2023-6908.json
+++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6908.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6908",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-18T04:15:52.013",
- "lastModified": "2023-12-22T20:25:41.517",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:48.797",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6923.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6923.json
new file mode 100644
index 00000000000..317e6ad470c
--- /dev/null
+++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6923.json
@@ -0,0 +1,47 @@
+{
+ "id": "CVE-2023-6923",
+ "sourceIdentifier": "security@wordfence.com",
+ "published": "2024-02-29T01:42:49.007",
+ "lastModified": "2024-02-29T01:42:49.007",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "The Matomo Analytics \u2013 Ethical Stats. Powerful Insights. plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the idsite parameter in all versions up to, and including, 4.15.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "security@wordfence.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "REQUIRED",
+ "scope": "CHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "NONE",
+ "baseScore": 6.1,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 2.7
+ }
+ ]
+ },
+ "references": [
+ {
+ "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3031495%40matomo&new=3031495%40matomo&sfp_email=&sfph_mail=",
+ "source": "security@wordfence.com"
+ },
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e2d54eb-c176-49c4-a4fc-833e17189cad?source=cve",
+ "source": "security@wordfence.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6945.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6945.json
index 1f1a43cdaa7..fb1437eebd1 100644
--- a/CVE-2023/CVE-2023-69xx/CVE-2023-6945.json
+++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6945.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-6945",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-19T11:15:08.380",
- "lastModified": "2023-12-28T17:15:46.797",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:49.380",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7020.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7020.json
index 7be06d6b4fd..fb5fa89ee86 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7020.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7020.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7020",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-21T01:15:34.073",
- "lastModified": "2023-12-27T21:11:34.267",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:49.870",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7021.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7021.json
index 481c2ce006f..fd0edc7b521 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7021.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7021.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7021",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-21T01:15:34.393",
- "lastModified": "2023-12-27T21:11:16.050",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:49.960",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7022.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7022.json
index ec27692a2d7..918a7e53e21 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7022.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7022.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7022",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-21T02:15:43.680",
- "lastModified": "2023-12-27T21:06:48.520",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:50.043",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7023.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7023.json
index a6e136bf3ea..393782002ca 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7023.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7023.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7023",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-21T02:15:43.960",
- "lastModified": "2023-12-27T20:38:15.883",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:50.123",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7025.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7025.json
index a3a56a48218..f352d3b4488 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7025.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7025.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-7025",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-21T03:15:07.857",
- "lastModified": "2024-02-13T08:16:25.867",
+ "lastModified": "2024-02-29T01:42:50.213",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7026.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7026.json
index a29cea4d932..851c2872e18 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7026.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7026.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7026",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-21T05:15:08.733",
- "lastModified": "2024-01-02T17:48:23.077",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:50.300",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7035.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7035.json
index 5b1006b38bd..b049abce6b8 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7035.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7035.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7035",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-21T15:15:13.967",
- "lastModified": "2023-12-29T06:01:20.280",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:50.457",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@@ -11,7 +11,7 @@
},
{
"lang": "es",
- "value": "Una vulnerabilidad fue encontrada en automad hasta 1.10.9 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo packages\\standard\\templates\\post.php del componente Configuration Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento sitename conduce a cross site scripting. El ataque puede lanzarse de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-248684. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna forma."
+ "value": "Una vulnerabilidad fue encontrada en automad hasta 1.10.9 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo packages\\standard\\templates\\post.php del componente Setting Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento sitename conduce a cross site scripting. El ataque puede lanzarse de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-248684. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna forma."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7036.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7036.json
index 4b5cd3b3109..dae87319a66 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7036.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7036.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7036",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-21T16:15:11.320",
- "lastModified": "2023-12-29T06:01:11.023",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:50.547",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7037.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7037.json
index 44774fc42c3..74f63c5c3b9 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7037.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7037.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7037",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-21T17:15:09.383",
- "lastModified": "2023-12-29T06:00:05.517",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:50.637",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7038.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7038.json
index b7d7fe966e5..b5b9a94ad4c 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7038.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7038.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7038",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-21T18:15:08.827",
- "lastModified": "2023-12-29T05:56:00.117",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:50.720",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7039.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7039.json
index 9606d17b99b..ef30f4b5c55 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7039.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7039.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7039",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-21T19:15:13.170",
- "lastModified": "2024-01-03T15:03:23.020",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:50.800",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7040.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7040.json
index 2f36282ea27..f2a72a9dfb9 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7040.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7040.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7040",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-21T20:15:08.553",
- "lastModified": "2023-12-30T03:25:06.460",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:50.887",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7041.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7041.json
index e6fa13d932e..dc3f746b613 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7041.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7041.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7041",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-21T20:15:08.903",
- "lastModified": "2023-12-29T19:24:27.717",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:50.977",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7050.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7050.json
index 92bc3d8620c..60b68e807ea 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7050.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7050.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7050",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-21T22:15:15.397",
- "lastModified": "2023-12-29T19:12:07.860",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:51.107",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7051.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7051.json
index 72f03934fd0..e94ea8397c4 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7051.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7051.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7051",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-21T22:15:15.773",
- "lastModified": "2023-12-28T14:01:04.813",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:51.220",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7052.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7052.json
index 21db037ccb6..a43055af73d 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7052.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7052.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7052",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-22T01:15:12.323",
- "lastModified": "2023-12-28T14:01:27.227",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:51.320",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7053.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7053.json
index fa2283a539e..6a5517a57e1 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7053.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7053.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7053",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-22T02:15:43.213",
- "lastModified": "2023-12-28T14:02:30.227",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:51.410",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7054.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7054.json
index a797adaf820..b1b154589e5 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7054.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7054.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7054",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-22T02:15:43.453",
- "lastModified": "2023-12-28T14:09:37.753",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:51.493",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7055.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7055.json
index eb94e308ab7..c6efa2e74a1 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7055.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7055.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7055",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-22T03:15:09.790",
- "lastModified": "2023-12-28T14:11:05.570",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:51.583",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7056.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7056.json
index bbeacc4b28c..6a35519ddc7 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7056.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7056.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7056",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-22T03:15:10.020",
- "lastModified": "2023-12-28T14:14:49.117",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:51.680",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7057.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7057.json
index c9107a1e718..bb4d38afcd6 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7057.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7057.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7057",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-22T04:15:09.443",
- "lastModified": "2023-12-28T14:14:38.083",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:51.757",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7058.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7058.json
index d552bfec240..320b7a648cd 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7058.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7058.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7058",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-22T05:15:13.860",
- "lastModified": "2023-12-28T14:15:04.563",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:51.837",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7059.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7059.json
index 594a7280873..68ce7d7fbd4 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7059.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7059.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7059",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-22T05:15:14.323",
- "lastModified": "2023-12-28T14:15:58.007",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:51.923",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7075.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7075.json
index c0ef22b07b5..fb77f419988 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7075.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7075.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7075",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-22T12:15:27.410",
- "lastModified": "2023-12-29T06:22:57.930",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:52.060",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7076.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7076.json
index 39aad853423..601fc4bc895 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7076.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7076.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7076",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-22T14:15:07.093",
- "lastModified": "2024-01-02T20:37:14.207",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:52.140",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7081.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7081.json
index 350c5e5e682..23a6f579880 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7081.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7081.json
@@ -2,12 +2,16 @@
"id": "CVE-2023-7081",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-02-15T16:15:46.373",
- "lastModified": "2024-02-15T19:55:09.230",
+ "lastModified": "2024-02-29T01:42:52.267",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
- "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in POSTAHS?L Online Payment System allows SQL Injection.This issue affects Online Payment System: before 14.02.2024.\n\n"
+ "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in POSTAHS\u0130L Online Payment System allows SQL Injection.This issue affects Online Payment System: before 14.02.2024.\n\n"
+ },
+ {
+ "lang": "es",
+ "value": "La neutralizaci\u00f3n inadecuada de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en POSTAHS?L Online Payment System permite la inyecci\u00f3n de SQL. Este problema afecta a Online Payment System: antes del 14.02.2024."
}
],
"metrics": {
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7091.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7091.json
index 90a622324bc..decd3e07627 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7091.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7091.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7091",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-24T21:15:25.530",
- "lastModified": "2023-12-30T03:15:29.733",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:52.390",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7092.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7092.json
index c83a1971c10..bcbb5837add 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7092.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7092.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7092",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-24T23:15:08.290",
- "lastModified": "2024-01-05T18:37:04.550",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:52.480",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7093.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7093.json
index efd14778177..0f4c0e0828e 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7093.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7093.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-7093",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-25T00:15:08.400",
- "lastModified": "2024-02-13T08:16:26.130",
+ "lastModified": "2024-02-29T01:42:52.573",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7094.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7094.json
index a23176d69da..37edb64f1e3 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7094.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7094.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7094",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-25T00:15:08.677",
- "lastModified": "2024-01-03T20:33:22.497",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:52.663",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7095.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7095.json
index 35eff0e5ac1..f14a7abaec9 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7095.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7095.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7095",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-25T01:15:08.203",
- "lastModified": "2024-01-03T20:24:59.943",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:52.773",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7096.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7096.json
index 98c3cf68eae..2ab994e8dc4 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7096.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7096.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7096",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-25T01:15:08.457",
- "lastModified": "2023-12-30T03:16:06.620",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:52.850",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7097.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7097.json
index e4b2778eb1b..adcbb383b6c 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7097.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7097.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7097",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-25T02:15:44.337",
- "lastModified": "2023-12-30T03:18:18.157",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:52.927",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7098.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7098.json
index a82a802711d..f9bdb9ce936 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7098.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7098.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-7098",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-25T02:15:44.603",
- "lastModified": "2024-02-13T08:16:26.440",
+ "lastModified": "2024-02-29T01:42:53.000",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7099.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7099.json
index 7202e4b496c..cf0f0d29be0 100644
--- a/CVE-2023/CVE-2023-70xx/CVE-2023-7099.json
+++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7099.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-7099",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-25T03:15:08.620",
- "lastModified": "2024-02-13T08:16:26.870",
+ "lastModified": "2024-02-29T01:42:53.073",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7100.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7100.json
index 36fc60a32e8..e523c70fc2d 100644
--- a/CVE-2023/CVE-2023-71xx/CVE-2023-7100.json
+++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7100.json
@@ -2,8 +2,8 @@
"id": "CVE-2023-7100",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-25T03:15:08.840",
- "lastModified": "2023-12-29T06:21:04.260",
- "vulnStatus": "Analyzed",
+ "lastModified": "2024-02-29T01:42:53.150",
+ "vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7104.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7104.json
index 7b8c1aec080..c089b7fc446 100644
--- a/CVE-2023/CVE-2023-71xx/CVE-2023-7104.json
+++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7104.json
@@ -2,7 +2,7 @@
"id": "CVE-2023-7104",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-29T10:15:13.890",
- "lastModified": "2024-01-12T14:15:49.607",
+ "lastModified": "2024-02-29T01:42:53.253",
"vulnStatus": "Modified",
"descriptions": [
{
diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7105.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7105.json
new file mode 100644
index 00000000000..8dd54e3f488
--- /dev/null
+++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7105.json
@@ -0,0 +1,88 @@
+{
+ "id": "CVE-2023-7105",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2024-02-29T01:42:53.353",
+ "lastModified": "2024-02-29T01:42:53.353",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability was found in code-projects E-Commerce Website 1.0. It has been classified as critical. Affected is an unknown function of the file index_search.php. The manipulation of the argument search leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249000."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "HIGH",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 4.7,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 1.2,
+ "impactScore": 3.4
+ }
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "MULTIPLE",
+ "confidentialityImpact": "PARTIAL",
+ "integrityImpact": "PARTIAL",
+ "availabilityImpact": "PARTIAL",
+ "baseScore": 5.8
+ },
+ "baseSeverity": "MEDIUM",
+ "exploitabilityScore": 6.4,
+ "impactScore": 6.4,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%201.md",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.249000",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?id.249000",
+ "source": "cna@vuldb.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7106.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7106.json
new file mode 100644
index 00000000000..508c40c06cf
--- /dev/null
+++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7106.json
@@ -0,0 +1,88 @@
+{
+ "id": "CVE-2023-7106",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2024-02-29T01:42:53.563",
+ "lastModified": "2024-02-29T01:42:53.563",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability was found in code-projects E-Commerce Website 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file product_details.php?prod_id=11. The manipulation of the argument prod_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-249001 was assigned to this vulnerability."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "LOW",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 6.3,
+ "baseSeverity": "MEDIUM"
+ },
+ "exploitabilityScore": 2.8,
+ "impactScore": 3.4
+ }
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "SINGLE",
+ "confidentialityImpact": "PARTIAL",
+ "integrityImpact": "PARTIAL",
+ "availabilityImpact": "PARTIAL",
+ "baseScore": 6.5
+ },
+ "baseSeverity": "MEDIUM",
+ "exploitabilityScore": 8.0,
+ "impactScore": 6.4,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Primary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%202.md",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.249001",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?id.249001",
+ "source": "cna@vuldb.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7107.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7107.json
new file mode 100644
index 00000000000..0d616dee346
--- /dev/null
+++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7107.json
@@ -0,0 +1,88 @@
+{
+ "id": "CVE-2023-7107",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2024-02-29T01:42:53.770",
+ "lastModified": "2024-02-29T01:42:53.770",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability was found in code-projects E-Commerce Website 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file user_signup.php. The manipulation of the argument firstname/middlename/email/address/contact/username leads to sql injection. The attack may be launched remotely. VDB-249002 is the identifier assigned to this vulnerability."
+ }
+ ],
+ "metrics": {
+ "cvssMetricV31": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
+ "attackVector": "NETWORK",
+ "attackComplexity": "LOW",
+ "privilegesRequired": "NONE",
+ "userInteraction": "NONE",
+ "scope": "UNCHANGED",
+ "confidentialityImpact": "LOW",
+ "integrityImpact": "LOW",
+ "availabilityImpact": "LOW",
+ "baseScore": 7.3,
+ "baseSeverity": "HIGH"
+ },
+ "exploitabilityScore": 3.9,
+ "impactScore": 3.4
+ }
+ ],
+ "cvssMetricV2": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "cvssData": {
+ "version": "2.0",
+ "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
+ "accessVector": "NETWORK",
+ "accessComplexity": "LOW",
+ "authentication": "NONE",
+ "confidentialityImpact": "PARTIAL",
+ "integrityImpact": "PARTIAL",
+ "availabilityImpact": "PARTIAL",
+ "baseScore": 7.5
+ },
+ "baseSeverity": "HIGH",
+ "exploitabilityScore": 10.0,
+ "impactScore": 6.4,
+ "acInsufInfo": false,
+ "obtainAllPrivilege": false,
+ "obtainUserPrivilege": false,
+ "obtainOtherPrivilege": false,
+ "userInteractionRequired": false
+ }
+ ]
+ },
+ "weaknesses": [
+ {
+ "source": "cna@vuldb.com",
+ "type": "Secondary",
+ "description": [
+ {
+ "lang": "en",
+ "value": "CWE-89"
+ }
+ ]
+ }
+ ],
+ "references": [
+ {
+ "url": "https://github.com/h4md153v63n/CVEs/blob/main/E-Commerce_Website/E-Commerce%20Website%20-%20SQL%20Injection%203.md",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?ctiid.249002",
+ "source": "cna@vuldb.com"
+ },
+ {
+ "url": "https://vuldb.com/?id.249002",
+ "source": "cna@vuldb.com"
+ }
+ ]
+}
\ No newline at end of file
diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7108.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7108.json
new file mode 100644
index 00000000000..3479e219ffc
--- /dev/null
+++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7108.json
@@ -0,0 +1,88 @@
+{
+ "id": "CVE-2023-7108",
+ "sourceIdentifier": "cna@vuldb.com",
+ "published": "2024-02-29T01:42:53.997",
+ "lastModified": "2024-02-29T01:42:53.997",
+ "vulnStatus": "Received",
+ "descriptions": [
+ {
+ "lang": "en",
+ "value": "A vulnerability classified as problematic has been found in code-projects E-Commerce Website 1.0. This affects an unknown part of the file user_signup.php. The manipulation of the argument firstname with the input