Auto-Update: 2023-10-01T04:00:25.355123+00:00

This commit is contained in:
cad-safe-bot 2023-10-01 04:00:28 +00:00
parent 5e275c71dc
commit 5acad1d742
42 changed files with 134 additions and 89 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4956",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T17:15:39.323",
"lastModified": "2023-09-30T17:15:39.323",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43712",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T21:15:09.850",
"lastModified": "2023-09-30T21:15:09.850",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43713",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T21:15:09.947",
"lastModified": "2023-09-30T21:15:09.947",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43714",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T21:15:10.010",
"lastModified": "2023-09-30T21:15:10.010",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43715",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T21:15:10.077",
"lastModified": "2023-09-30T21:15:10.077",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43716",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T21:15:10.140",
"lastModified": "2023-09-30T21:15:10.140",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43717",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.347",
"lastModified": "2023-09-30T22:15:10.347",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43718",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.410",
"lastModified": "2023-09-30T22:15:10.410",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43719",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.467",
"lastModified": "2023-09-30T22:15:10.467",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43720",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.533",
"lastModified": "2023-09-30T22:15:10.533",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43721",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.597",
"lastModified": "2023-09-30T22:15:10.597",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43722",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.657",
"lastModified": "2023-09-30T22:15:10.657",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43723",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.717",
"lastModified": "2023-09-30T22:15:10.717",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43724",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.777",
"lastModified": "2023-09-30T22:15:10.777",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43725",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.843",
"lastModified": "2023-09-30T22:15:10.843",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43726",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.903",
"lastModified": "2023-09-30T22:15:10.903",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43727",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:10.967",
"lastModified": "2023-09-30T22:15:10.967",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43728",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:11.027",
"lastModified": "2023-09-30T22:15:11.027",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43729",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:11.097",
"lastModified": "2023-09-30T22:15:11.097",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43730",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:11.163",
"lastModified": "2023-09-30T22:15:11.163",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43731",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T22:15:11.227",
"lastModified": "2023-09-30T22:15:11.227",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43732",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T23:15:40.127",
"lastModified": "2023-09-30T23:15:40.127",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43733",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T23:15:40.203",
"lastModified": "2023-09-30T23:15:40.203",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43734",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T23:15:40.260",
"lastModified": "2023-09-30T23:15:40.260",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43735",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T23:15:40.320",
"lastModified": "2023-09-30T23:15:40.320",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43907",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-01T01:15:24.947",
"lastModified": "2023-10-01T01:15:24.947",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44488",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-30T20:15:10.200",
"lastModified": "2023-10-01T00:15:09.803",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5111",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T23:15:40.377",
"lastModified": "2023-09-30T23:15:40.377",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5112",
"sourceIdentifier": "help@fluidattacks.com",
"published": "2023-09-30T23:15:40.433",
"lastModified": "2023-09-30T23:15:40.433",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-5207",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-09-30T09:15:14.933",
"lastModified": "2023-09-30T09:15:14.933",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in GitLab CE and EE affecting all versions starting 16.0 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. An authenticated attacker could perform arbitrary pipeline execution under the context of another user."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad en GitLab CE y EE que afecta a todas las versiones desde 16.0 anteriores a 16.2.8, 16.3 anteriores a 16.3.5 y 16.4 anteriores a 16.4.1. Un atacante autenticado podr\u00eda realizar una ejecuci\u00f3n del pipeline arbitrario en el contexto de otro usuario."
}
],
"metrics": {

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5217",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-28T16:15:10.980",
"lastModified": "2023-10-01T00:15:09.863",
"lastModified": "2023-10-01T03:15:09.517",
"vulnStatus": "Modified",
"descriptions": [
{
@ -175,6 +175,10 @@
"url": "http://www.openwall.com/lists/oss-security/2023/09/30/4",
"source": "chrome-cve-admin@google.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/09/30/5",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software/",
"source": "chrome-cve-admin@google.com"

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-5298",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T06:15:11.483",
"lastModified": "2023-09-30T06:15:11.483",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tongda OA 2017. It has been rated as critical. Affected by this issue is some unknown functionality of the file general/hr/recruit/requirements/delete.php. The manipulation of the argument REQUIREMENTS_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-240938 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Tongda OA 2017 y ha sido calificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo general/hr/recruit/requirements/delete.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento REQUIREMENTS_ID conduce a la inyecci\u00f3n SQL. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 11.10 puede solucionar este problema. Se recomienda actualizar el componente afectado. VDB-240938 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-5300",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T10:15:10.517",
"lastModified": "2023-09-30T10:15:10.517",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in TTSPlanning up to 20230925. This affects an unknown part. The manipulation of the argument uid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240939."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en TTSPlanning hasta 20230925 y clasificada como cr\u00edtica. La manipulaci\u00f3n del argumento uid conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-240939."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-5301",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T11:15:15.333",
"lastModified": "2023-09-30T11:15:15.333",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in DedeCMS 5.7.111. This vulnerability affects the function AddMyAddon of the file album_add.php. The manipulation of the argument albumUploadFiles leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240940."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en DedeCMS 5.7.111 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n AddMyAddon del archivo album_add.php. La manipulaci\u00f3n del argumento albumUploadFiles conduce a la inyecci\u00f3n de comandos del sistema operativo. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-240940."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-5302",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T12:15:09.963",
"lastModified": "2023-09-30T12:15:09.963",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in SourceCodester Best Courier Management System 1.0. This issue affects some unknown processing of the component Manage Account Page. The manipulation of the argument First Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240941 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en SourceCodester Best Courier Management System 1.0. Este problema afecta a un procesamiento desconocido del componente Manage Account Page. La manipulaci\u00f3n del argumento First Name conduce a cross site scripting. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede usarse. El identificador VDB-240941 fue asignado a esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5303",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T14:15:15.737",
"lastModified": "2023-09-30T14:15:15.737",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5304",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T15:15:10.180",
"lastModified": "2023-09-30T15:15:10.180",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5305",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T15:15:10.260",
"lastModified": "2023-09-30T15:15:10.260",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5313",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-09-30T15:15:10.337",
"lastModified": "2023-09-30T15:15:10.337",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5321",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-09-30T14:15:15.843",
"lastModified": "2023-09-30T14:15:15.843",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5323",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-10-01T01:15:24.997",
"lastModified": "2023-10-01T01:15:24.997",
"vulnStatus": "Received",
"lastModified": "2023-10-01T03:02:09.307",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-10-01T02:00:25.366534+00:00
2023-10-01T04:00:25.355123+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-10-01T01:15:24.997000+00:00
2023-10-01T03:15:09.517000+00:00
```
### Last Data Feed Release
@ -34,18 +34,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `0`
* [CVE-2023-43907](CVE-2023/CVE-2023-439xx/CVE-2023-43907.json) (`2023-10-01T01:15:24.947`)
* [CVE-2023-5323](CVE-2023/CVE-2023-53xx/CVE-2023-5323.json) (`2023-10-01T01:15:24.997`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `41`
* [CVE-2023-44488](CVE-2023/CVE-2023-444xx/CVE-2023-44488.json) (`2023-10-01T00:15:09.803`)
* [CVE-2023-5217](CVE-2023/CVE-2023-52xx/CVE-2023-5217.json) (`2023-10-01T00:15:09.863`)
* [CVE-2023-43716](CVE-2023/CVE-2023-437xx/CVE-2023-43716.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43717](CVE-2023/CVE-2023-437xx/CVE-2023-43717.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43718](CVE-2023/CVE-2023-437xx/CVE-2023-43718.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43719](CVE-2023/CVE-2023-437xx/CVE-2023-43719.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43720](CVE-2023/CVE-2023-437xx/CVE-2023-43720.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43721](CVE-2023/CVE-2023-437xx/CVE-2023-43721.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43722](CVE-2023/CVE-2023-437xx/CVE-2023-43722.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43723](CVE-2023/CVE-2023-437xx/CVE-2023-43723.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43724](CVE-2023/CVE-2023-437xx/CVE-2023-43724.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43725](CVE-2023/CVE-2023-437xx/CVE-2023-43725.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43726](CVE-2023/CVE-2023-437xx/CVE-2023-43726.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43727](CVE-2023/CVE-2023-437xx/CVE-2023-43727.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43728](CVE-2023/CVE-2023-437xx/CVE-2023-43728.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43729](CVE-2023/CVE-2023-437xx/CVE-2023-43729.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43730](CVE-2023/CVE-2023-437xx/CVE-2023-43730.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43731](CVE-2023/CVE-2023-437xx/CVE-2023-43731.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43732](CVE-2023/CVE-2023-437xx/CVE-2023-43732.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43733](CVE-2023/CVE-2023-437xx/CVE-2023-43733.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43734](CVE-2023/CVE-2023-437xx/CVE-2023-43734.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43735](CVE-2023/CVE-2023-437xx/CVE-2023-43735.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-5111](CVE-2023/CVE-2023-51xx/CVE-2023-5111.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-5112](CVE-2023/CVE-2023-51xx/CVE-2023-5112.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-43907](CVE-2023/CVE-2023-439xx/CVE-2023-43907.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-5323](CVE-2023/CVE-2023-53xx/CVE-2023-5323.json) (`2023-10-01T03:02:09.307`)
* [CVE-2023-5217](CVE-2023/CVE-2023-52xx/CVE-2023-5217.json) (`2023-10-01T03:15:09.517`)
## Download and Usage