diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35342.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35342.json index 39b84e5f5a4..d2e87a7bd52 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35342.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35342.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35342", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:18.797", - "lastModified": "2023-07-12T12:46:41.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-15T00:09:50.973", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,110 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.20048", + "matchCriteriaId": "CA7DB0E9-3DCD-4FAE-8F9A-20D15E061ED7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6085", + "matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4645", + "matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.3208", + "matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.3208", + "matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2176", + "matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.1992", + "matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35342", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35343.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35343.json index a8dbdb96334..d6ea8712d34 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35343.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35343.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35343", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:18.853", - "lastModified": "2023-07-12T12:46:41.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-15T00:09:13.217", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4645", + "matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19041.3208", + "matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.3208", + "matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.2176", + "matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.1992", + "matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35343", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35344.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35344.json index a23e532e437..e361d835d64 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35344.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35344.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35344", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:18.907", - "lastModified": "2023-07-12T12:46:41.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-15T00:09:23.267", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,73 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35344", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-353xx/CVE-2023-35345.json b/CVE-2023/CVE-2023-353xx/CVE-2023-35345.json index 83904899c29..8f5877a4d98 100644 --- a/CVE-2023/CVE-2023-353xx/CVE-2023-35345.json +++ b/CVE-2023/CVE-2023-353xx/CVE-2023-35345.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35345", "sourceIdentifier": "secure@microsoft.com", "published": "2023-07-11T18:15:18.963", - "lastModified": "2023-07-12T12:46:41.413", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-15T00:09:34.513", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,73 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35345", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3560.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3560.json index 668c5eb6d0f..02acf7bd47e 100644 --- a/CVE-2023/CVE-2023-35xx/CVE-2023-3560.json +++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3560.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3560", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-10T16:15:56.013", - "lastModified": "2023-07-10T16:27:17.833", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-15T00:20:02.850", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,14 +93,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gzscripts:ticket_booking_script:1.8:*:*:*:*:*:*:*", + "matchCriteriaId": "0C9D0BA6-9F20-4074-8629-5116E9288B01" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.233354", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.233354", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3562.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3562.json index 8a1295467dd..44749cee766 100644 --- a/CVE-2023/CVE-2023-35xx/CVE-2023-3562.json +++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3562.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3562", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-10T16:15:56.137", - "lastModified": "2023-07-10T16:27:17.833", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-14T23:59:07.700", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,14 +93,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gzscripts:php_crm_platform:1.8:*:*:*:*:*:*:*", + "matchCriteriaId": "1B729DB5-D509-46AE-AB7A-35DF2288583E" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.233356", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.233356", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3564.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3564.json index a6d3c28e754..32ec753f623 100644 --- a/CVE-2023/CVE-2023-35xx/CVE-2023-3564.json +++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3564.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3564", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-10T16:15:56.257", - "lastModified": "2023-07-10T16:27:17.833", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-07-15T00:19:01.347", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,14 +93,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gzscripts:gz_multi_hotel_booking_system:1.8:*:*:*:*:*:*:*", + "matchCriteriaId": "BC074411-9271-40C2-96AA-DEA388314DF8" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.233358", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.233358", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 6977600982e..9d313a5a95d 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-07-14T23:55:24.724313+00:00 +2023-07-15T02:00:33.795190+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-07-14T23:53:17.863000+00:00 +2023-07-15T00:20:02.850000+00:00 ``` ### Last Data Feed Release @@ -23,7 +23,7 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2023-07-14T00:00:13.552656+00:00 +2023-07-15T00:00:13.566584+00:00 ``` ### Total Number of included CVEs @@ -34,33 +34,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `0` -* [CVE-2023-34236](CVE-2023/CVE-2023-342xx/CVE-2023-34236.json) (`2023-07-14T22:15:09.083`) -* [CVE-2023-36466](CVE-2023/CVE-2023-364xx/CVE-2023-36466.json) (`2023-07-14T22:15:09.170`) -* [CVE-2023-36818](CVE-2023/CVE-2023-368xx/CVE-2023-36818.json) (`2023-07-14T22:15:09.243`) -* [CVE-2023-37268](CVE-2023/CVE-2023-372xx/CVE-2023-37268.json) (`2023-07-14T22:15:09.317`) -* [CVE-2023-38336](CVE-2023/CVE-2023-383xx/CVE-2023-38336.json) (`2023-07-14T22:15:09.387`) -* [CVE-2023-38337](CVE-2023/CVE-2023-383xx/CVE-2023-38337.json) (`2023-07-14T22:15:09.430`) -* [CVE-2023-37793](CVE-2023/CVE-2023-377xx/CVE-2023-37793.json) (`2023-07-14T23:15:08.970`) -* [CVE-2023-37794](CVE-2023/CVE-2023-377xx/CVE-2023-37794.json) (`2023-07-14T23:15:09.020`) ### CVEs modified in the last Commit -Recently modified CVEs: `11` +Recently modified CVEs: `7` -* [CVE-2023-30990](CVE-2023/CVE-2023-309xx/CVE-2023-30990.json) (`2023-07-14T23:15:08.793`) -* [CVE-2023-36810](CVE-2023/CVE-2023-368xx/CVE-2023-36810.json) (`2023-07-14T23:15:08.883`) -* [CVE-2023-3558](CVE-2023/CVE-2023-35xx/CVE-2023-3558.json) (`2023-07-14T23:17:31.257`) -* [CVE-2023-3554](CVE-2023/CVE-2023-35xx/CVE-2023-3554.json) (`2023-07-14T23:23:12.583`) -* [CVE-2023-3555](CVE-2023/CVE-2023-35xx/CVE-2023-3555.json) (`2023-07-14T23:26:31.897`) -* [CVE-2023-3556](CVE-2023/CVE-2023-35xx/CVE-2023-3556.json) (`2023-07-14T23:32:04.707`) -* [CVE-2023-3557](CVE-2023/CVE-2023-35xx/CVE-2023-3557.json) (`2023-07-14T23:35:37.410`) -* [CVE-2023-3559](CVE-2023/CVE-2023-35xx/CVE-2023-3559.json) (`2023-07-14T23:39:17.313`) -* [CVE-2023-2967](CVE-2023/CVE-2023-29xx/CVE-2023-2967.json) (`2023-07-14T23:40:58.000`) -* [CVE-2023-3561](CVE-2023/CVE-2023-35xx/CVE-2023-3561.json) (`2023-07-14T23:49:17.533`) -* [CVE-2023-3563](CVE-2023/CVE-2023-35xx/CVE-2023-3563.json) (`2023-07-14T23:53:17.863`) +* [CVE-2023-3562](CVE-2023/CVE-2023-35xx/CVE-2023-3562.json) (`2023-07-14T23:59:07.700`) +* [CVE-2023-35343](CVE-2023/CVE-2023-353xx/CVE-2023-35343.json) (`2023-07-15T00:09:13.217`) +* [CVE-2023-35344](CVE-2023/CVE-2023-353xx/CVE-2023-35344.json) (`2023-07-15T00:09:23.267`) +* [CVE-2023-35345](CVE-2023/CVE-2023-353xx/CVE-2023-35345.json) (`2023-07-15T00:09:34.513`) +* [CVE-2023-35342](CVE-2023/CVE-2023-353xx/CVE-2023-35342.json) (`2023-07-15T00:09:50.973`) +* [CVE-2023-3564](CVE-2023/CVE-2023-35xx/CVE-2023-3564.json) (`2023-07-15T00:19:01.347`) +* [CVE-2023-3560](CVE-2023/CVE-2023-35xx/CVE-2023-3560.json) (`2023-07-15T00:20:02.850`) ## Download and Usage