From 61438f5dc1c6fae8ab654b784e3029361a7cc512 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 21 Jul 2023 23:55:29 +0000 Subject: [PATCH] Auto-Update: 2023-07-21T23:55:25.728838+00:00 --- CVE-2022/CVE-2022-373xx/CVE-2022-37331.json | 6 +- CVE-2022/CVE-2022-417xx/CVE-2022-41793.json | 6 +- CVE-2022/CVE-2022-428xx/CVE-2022-42885.json | 6 +- CVE-2022/CVE-2022-434xx/CVE-2022-43467.json | 6 +- CVE-2022/CVE-2022-436xx/CVE-2022-43607.json | 6 +- CVE-2022/CVE-2022-444xx/CVE-2022-44451.json | 6 +- CVE-2022/CVE-2022-462xx/CVE-2022-46280.json | 6 +- CVE-2022/CVE-2022-462xx/CVE-2022-46289.json | 6 +- CVE-2022/CVE-2022-462xx/CVE-2022-46290.json | 6 +- CVE-2022/CVE-2022-462xx/CVE-2022-46291.json | 6 +- CVE-2022/CVE-2022-462xx/CVE-2022-46292.json | 6 +- CVE-2022/CVE-2022-462xx/CVE-2022-46293.json | 6 +- CVE-2022/CVE-2022-462xx/CVE-2022-46294.json | 6 +- CVE-2022/CVE-2022-462xx/CVE-2022-46295.json | 6 +- CVE-2023/CVE-2023-269xx/CVE-2023-26934.json | 77 +-------------- CVE-2023/CVE-2023-269xx/CVE-2023-26935.json | 77 +-------------- CVE-2023/CVE-2023-269xx/CVE-2023-26936.json | 77 +-------------- CVE-2023/CVE-2023-269xx/CVE-2023-26937.json | 77 +-------------- CVE-2023/CVE-2023-269xx/CVE-2023-26938.json | 77 +-------------- CVE-2023/CVE-2023-276xx/CVE-2023-27655.json | 101 +------------------- CVE-2023/CVE-2023-315xx/CVE-2023-31554.json | 70 +------------- CVE-2023/CVE-2023-315xx/CVE-2023-31557.json | 71 +------------- README.md | 80 +++++----------- 23 files changed, 136 insertions(+), 655 deletions(-) diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37331.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37331.json index 1ea07952949..edc4976aea0 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37331.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37331.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37331", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-21T21:15:10.143", - "lastModified": "2023-07-21T21:15:10.143", + "lastModified": "2023-07-21T22:15:10.087", "vulnStatus": "Received", "descriptions": [ { @@ -50,6 +50,10 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1672", "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1672", + "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-417xx/CVE-2022-41793.json b/CVE-2022/CVE-2022-417xx/CVE-2022-41793.json index fccb8c4cc8f..2b1d6ba955a 100644 --- a/CVE-2022/CVE-2022-417xx/CVE-2022-41793.json +++ b/CVE-2022/CVE-2022-417xx/CVE-2022-41793.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41793", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-21T21:15:10.237", - "lastModified": "2023-07-21T21:15:10.237", + "lastModified": "2023-07-21T22:15:10.190", "vulnStatus": "Received", "descriptions": [ { @@ -50,6 +50,10 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1667", "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1667", + "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-428xx/CVE-2022-42885.json b/CVE-2022/CVE-2022-428xx/CVE-2022-42885.json index 97ced424403..74e35642c1d 100644 --- a/CVE-2022/CVE-2022-428xx/CVE-2022-42885.json +++ b/CVE-2022/CVE-2022-428xx/CVE-2022-42885.json @@ -2,7 +2,7 @@ "id": "CVE-2022-42885", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-21T21:15:10.327", - "lastModified": "2023-07-21T21:15:10.327", + "lastModified": "2023-07-21T22:15:10.277", "vulnStatus": "Received", "descriptions": [ { @@ -50,6 +50,10 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1668", "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1668", + "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-434xx/CVE-2022-43467.json b/CVE-2022/CVE-2022-434xx/CVE-2022-43467.json index 2da444c3ad2..e45fb7eb6de 100644 --- a/CVE-2022/CVE-2022-434xx/CVE-2022-43467.json +++ b/CVE-2022/CVE-2022-434xx/CVE-2022-43467.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43467", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-21T21:15:10.413", - "lastModified": "2023-07-21T21:15:10.413", + "lastModified": "2023-07-21T22:15:10.360", "vulnStatus": "Received", "descriptions": [ { @@ -50,6 +50,10 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1671", "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1671", + "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-436xx/CVE-2022-43607.json b/CVE-2022/CVE-2022-436xx/CVE-2022-43607.json index 165dfdb8ab3..a7875f32a12 100644 --- a/CVE-2022/CVE-2022-436xx/CVE-2022-43607.json +++ b/CVE-2022/CVE-2022-436xx/CVE-2022-43607.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43607", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-21T21:15:10.497", - "lastModified": "2023-07-21T21:15:10.497", + "lastModified": "2023-07-21T22:15:10.440", "vulnStatus": "Received", "descriptions": [ { @@ -50,6 +50,10 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1664", "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1664", + "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-444xx/CVE-2022-44451.json b/CVE-2022/CVE-2022-444xx/CVE-2022-44451.json index 16313ef2919..a15a41b90f3 100644 --- a/CVE-2022/CVE-2022-444xx/CVE-2022-44451.json +++ b/CVE-2022/CVE-2022-444xx/CVE-2022-44451.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44451", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-21T21:15:10.577", - "lastModified": "2023-07-21T21:15:10.577", + "lastModified": "2023-07-21T22:15:10.527", "vulnStatus": "Received", "descriptions": [ { @@ -50,6 +50,10 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1669", "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1669", + "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-462xx/CVE-2022-46280.json b/CVE-2022/CVE-2022-462xx/CVE-2022-46280.json index 714f4b32ac2..d3aa95c549e 100644 --- a/CVE-2022/CVE-2022-462xx/CVE-2022-46280.json +++ b/CVE-2022/CVE-2022-462xx/CVE-2022-46280.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46280", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-21T21:15:10.660", - "lastModified": "2023-07-21T21:15:10.660", + "lastModified": "2023-07-21T22:15:10.610", "vulnStatus": "Received", "descriptions": [ { @@ -50,6 +50,10 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1670", "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1670", + "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-462xx/CVE-2022-46289.json b/CVE-2022/CVE-2022-462xx/CVE-2022-46289.json index 723a0b5061e..7e0b2e84adf 100644 --- a/CVE-2022/CVE-2022-462xx/CVE-2022-46289.json +++ b/CVE-2022/CVE-2022-462xx/CVE-2022-46289.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46289", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-21T21:15:10.740", - "lastModified": "2023-07-21T21:15:10.740", + "lastModified": "2023-07-21T22:15:10.697", "vulnStatus": "Received", "descriptions": [ { @@ -50,6 +50,10 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1665", "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1665", + "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-462xx/CVE-2022-46290.json b/CVE-2022/CVE-2022-462xx/CVE-2022-46290.json index ec7773277ca..f2922971912 100644 --- a/CVE-2022/CVE-2022-462xx/CVE-2022-46290.json +++ b/CVE-2022/CVE-2022-462xx/CVE-2022-46290.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46290", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-21T21:15:10.830", - "lastModified": "2023-07-21T21:15:10.830", + "lastModified": "2023-07-21T22:15:10.780", "vulnStatus": "Received", "descriptions": [ { @@ -50,6 +50,10 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1665", "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1665", + "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-462xx/CVE-2022-46291.json b/CVE-2022/CVE-2022-462xx/CVE-2022-46291.json index 75931b3fba9..ef4e6bf77ca 100644 --- a/CVE-2022/CVE-2022-462xx/CVE-2022-46291.json +++ b/CVE-2022/CVE-2022-462xx/CVE-2022-46291.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46291", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-21T21:15:10.917", - "lastModified": "2023-07-21T21:15:10.917", + "lastModified": "2023-07-21T22:15:10.863", "vulnStatus": "Received", "descriptions": [ { @@ -50,6 +50,10 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666", "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1666", + "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-462xx/CVE-2022-46292.json b/CVE-2022/CVE-2022-462xx/CVE-2022-46292.json index 9f5e60b49f3..856d26b526c 100644 --- a/CVE-2022/CVE-2022-462xx/CVE-2022-46292.json +++ b/CVE-2022/CVE-2022-462xx/CVE-2022-46292.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46292", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-21T21:15:10.993", - "lastModified": "2023-07-21T21:15:10.993", + "lastModified": "2023-07-21T22:15:10.947", "vulnStatus": "Received", "descriptions": [ { @@ -50,6 +50,10 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666", "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1666", + "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-462xx/CVE-2022-46293.json b/CVE-2022/CVE-2022-462xx/CVE-2022-46293.json index 6b08e758cbb..809be22be5f 100644 --- a/CVE-2022/CVE-2022-462xx/CVE-2022-46293.json +++ b/CVE-2022/CVE-2022-462xx/CVE-2022-46293.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46293", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-21T21:15:11.077", - "lastModified": "2023-07-21T21:15:11.077", + "lastModified": "2023-07-21T22:15:11.030", "vulnStatus": "Received", "descriptions": [ { @@ -50,6 +50,10 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666", "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1666", + "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-462xx/CVE-2022-46294.json b/CVE-2022/CVE-2022-462xx/CVE-2022-46294.json index 87f53ff9b82..9ea270905b6 100644 --- a/CVE-2022/CVE-2022-462xx/CVE-2022-46294.json +++ b/CVE-2022/CVE-2022-462xx/CVE-2022-46294.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46294", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-21T21:15:11.160", - "lastModified": "2023-07-21T21:15:11.160", + "lastModified": "2023-07-21T22:15:11.113", "vulnStatus": "Received", "descriptions": [ { @@ -50,6 +50,10 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666", "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1666", + "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-462xx/CVE-2022-46295.json b/CVE-2022/CVE-2022-462xx/CVE-2022-46295.json index 1bb4b25f272..c04c0abdf64 100644 --- a/CVE-2022/CVE-2022-462xx/CVE-2022-46295.json +++ b/CVE-2022/CVE-2022-462xx/CVE-2022-46295.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46295", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-07-21T21:15:11.240", - "lastModified": "2023-07-21T21:15:11.240", + "lastModified": "2023-07-21T22:15:11.200", "vulnStatus": "Received", "descriptions": [ { @@ -50,6 +50,10 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666", "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1666", + "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26934.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26934.json index 10ca42ba879..35ae96a7286 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26934.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26934.json @@ -2,81 +2,14 @@ "id": "CVE-2023-26934", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-26T19:15:08.857", - "lastModified": "2023-05-03T16:47:27.773", - "vulnStatus": "Analyzed", + "lastModified": "2023-07-21T22:15:11.477", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "An issue found in XPDF v.4.04 allows an attacker to cause a denial of service via a crafted pdf file in the object.cc parameter." + "value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2019-9587. Reason: This record is a reservation duplicate of CVE-2019-9587. Notes: All CVE users should reference CVE-2019-9587 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.\n" } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "NVD-CWE-noinfo" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*", - "matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34", - "source": "cve@mitre.org", - "tags": [ - "Third Party Advisory" - ] - }, - { - "url": "https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/object_copy", - "source": "cve@mitre.org", - "tags": [ - "Exploit" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26935.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26935.json index 8550df59cf9..413bc74abad 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26935.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26935.json @@ -2,81 +2,14 @@ "id": "CVE-2023-26935", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-26T19:15:08.893", - "lastModified": "2023-05-03T16:46:40.757", - "vulnStatus": "Analyzed", + "lastModified": "2023-07-21T22:15:11.677", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via SharedFile::readBlock at /xpdf/Stream.cc." + "value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2019-9587. Reason: This record is a reservation duplicate of CVE-2019-9587. Notes: All CVE users should reference CVE-2019-9587 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.\n" } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-120" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*", - "matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34", - "source": "cve@mitre.org", - "tags": [ - "Third Party Advisory" - ] - }, - { - "url": "https://github.com/huanglei3/xpdf_heapoverflow", - "source": "cve@mitre.org", - "tags": [ - "Exploit" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26936.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26936.json index 76d8eef82bd..7552fbd0a8b 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26936.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26936.json @@ -2,81 +2,14 @@ "id": "CVE-2023-26936", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-26T19:15:08.930", - "lastModified": "2023-05-03T16:46:25.367", - "vulnStatus": "Analyzed", + "lastModified": "2023-07-21T22:15:12.027", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via gmalloc in gmem.cc" + "value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2019-9587. Reason: This record is a reservation duplicate of CVE-2019-9587. Notes: All CVE users should reference CVE-2019-9587 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-120" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*", - "matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34", - "source": "cve@mitre.org", - "tags": [ - "Third Party Advisory" - ] - }, - { - "url": "https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/gmem_copyString", - "source": "cve@mitre.org", - "tags": [ - "Exploit" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26937.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26937.json index ac576c00306..ac07af9136c 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26937.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26937.json @@ -2,81 +2,14 @@ "id": "CVE-2023-26937", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-26T19:15:08.963", - "lastModified": "2023-05-03T16:45:53.083", - "vulnStatus": "Analyzed", + "lastModified": "2023-07-21T22:15:12.273", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via GString::resize located in goo/GString.cc" + "value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2019-9587. Reason: This record is a reservation duplicate of CVE-2019-9587. Notes: All CVE users should reference CVE-2019-9587 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-120" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*", - "matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34", - "source": "cve@mitre.org", - "tags": [ - "Third Party Advisory" - ] - }, - { - "url": "https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/Stack_backtracking_gstring", - "source": "cve@mitre.org", - "tags": [ - "Exploit" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26938.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26938.json index be599c7d797..8b15a8d469f 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26938.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26938.json @@ -2,81 +2,14 @@ "id": "CVE-2023-26938", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-26T19:15:09.000", - "lastModified": "2023-05-03T16:45:10.690", - "vulnStatus": "Analyzed", + "lastModified": "2023-07-21T22:15:12.477", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service viaSharedFile::readBlock located in goo/gfile.cc." + "value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2019-9587. Reason: This record is a reservation duplicate of CVE-2019-9587. Notes: All CVE users should reference CVE-2019-9587 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-120" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*", - "matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34", - "source": "cve@mitre.org", - "tags": [ - "Third Party Advisory" - ] - }, - { - "url": "https://github.com/huanglei3/xpdf_heapoverflow/edit/main/Stack_backtracking_readblock", - "source": "cve@mitre.org", - "tags": [ - "Permissions Required" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27655.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27655.json index e703f1e8a6f..51dffb826ab 100644 --- a/CVE-2023/CVE-2023-276xx/CVE-2023-27655.json +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27655.json @@ -2,105 +2,14 @@ "id": "CVE-2023-27655", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-23T14:15:15.490", - "lastModified": "2023-03-27T15:37:08.893", - "vulnStatus": "Analyzed", + "lastModified": "2023-07-21T22:15:12.697", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "xpdf v4.04 was discovered to contain a stack overflow in the component pdftotext." + "value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2019-9587. Reason: This record is a reservation duplicate of CVE-2019-9587. Notes: All CVE users should reference CVE-2019-9587 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-787" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*", - "matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC" - } - ] - } - ] - } - ], - "references": [ - { - "url": "http://www.xpdfreader.com/download.html", - "source": "cve@mitre.org", - "tags": [ - "Product" - ] - }, - { - "url": "http://xpdf.com", - "source": "cve@mitre.org", - "tags": [ - "Product" - ] - }, - { - "url": "https://forum.xpdfreader.com/viewtopic.php?t=42398", - "source": "cve@mitre.org", - "tags": [ - "Exploit", - "Vendor Advisory" - ] - }, - { - "url": "https://github.com/keepinggg/poc/blob/main/poc_of_xpdf/id2", - "source": "cve@mitre.org", - "tags": [ - "Exploit", - "Third Party Advisory" - ] - }, - { - "url": "https://github.com/keepinggg/poc/tree/main/poc_of_xpdf", - "source": "cve@mitre.org", - "tags": [ - "Exploit", - "Third Party Advisory" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31554.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31554.json index 97dbce77278..4940def2283 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31554.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31554.json @@ -2,74 +2,14 @@ "id": "CVE-2023-31554", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T16:15:12.263", - "lastModified": "2023-05-17T17:56:30.120", - "vulnStatus": "Analyzed", + "lastModified": "2023-07-21T22:15:12.933", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "xpdf pdfimages v4.04 was discovered to contain a stack overflow in the component Catalog::readPageLabelTree2(Object*). This vulnerability allows attackers to cause a Denial of Service (DoS)." + "value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-2663. Reason: This record is a reservation duplicate of CVE-2023-2663. Notes: All CVE users should reference CVE-2023-2663 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.\n" } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-787" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:glyphandcog:pdfimages:4.04:*:*:*:*:*:*:*", - "matchCriteriaId": "30F81024-7899-4E48-9D12-AFF61E1A75B0" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://forum.xpdfreader.com/viewtopic.php?t=42421", - "source": "cve@mitre.org", - "tags": [ - "Exploit" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31557.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31557.json index a7b84e45ad4..eb92183ac73 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31557.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31557.json @@ -2,75 +2,14 @@ "id": "CVE-2023-31557", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T16:15:12.427", - "lastModified": "2023-05-17T18:00:51.400", - "vulnStatus": "Analyzed", + "lastModified": "2023-07-21T22:15:13.167", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "xpdf pdfimages v4.04 was discovered to contain a stack overflow in the component Catalog::readEmbeddedFileTree(Object*). This vulnerability allows attackers to cause a Denial of Service (DoS)." + "value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-2664. Reason: This record is a reservation duplicate of CVE-2023-2664. Notes: All CVE users should reference CVE-2023-2664 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-787" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*", - "matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://forum.xpdfreader.com/viewtopic.php?t=42422&sid=acb8ed31bbd74223e3c4d0fb2552c748", - "source": "cve@mitre.org", - "tags": [ - "Exploit", - "Issue Tracking" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/README.md b/README.md index 51062fa1602..3ec8cda8f1b 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-07-21T22:00:27.983362+00:00 +2023-07-21T23:55:25.728838+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-07-21T21:15:11.973000+00:00 +2023-07-21T22:15:13.167000+00:00 ``` ### Last Data Feed Release @@ -34,64 +34,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `28` +Recently added CVEs: `0` -* [CVE-2022-42885](CVE-2022/CVE-2022-428xx/CVE-2022-42885.json) (`2023-07-21T21:15:10.327`) -* [CVE-2022-43467](CVE-2022/CVE-2022-434xx/CVE-2022-43467.json) (`2023-07-21T21:15:10.413`) -* [CVE-2022-43607](CVE-2022/CVE-2022-436xx/CVE-2022-43607.json) (`2023-07-21T21:15:10.497`) -* [CVE-2022-44451](CVE-2022/CVE-2022-444xx/CVE-2022-44451.json) (`2023-07-21T21:15:10.577`) -* [CVE-2022-46280](CVE-2022/CVE-2022-462xx/CVE-2022-46280.json) (`2023-07-21T21:15:10.660`) -* [CVE-2022-46289](CVE-2022/CVE-2022-462xx/CVE-2022-46289.json) (`2023-07-21T21:15:10.740`) -* [CVE-2022-46290](CVE-2022/CVE-2022-462xx/CVE-2022-46290.json) (`2023-07-21T21:15:10.830`) -* [CVE-2022-46291](CVE-2022/CVE-2022-462xx/CVE-2022-46291.json) (`2023-07-21T21:15:10.917`) -* [CVE-2022-46292](CVE-2022/CVE-2022-462xx/CVE-2022-46292.json) (`2023-07-21T21:15:10.993`) -* [CVE-2022-46293](CVE-2022/CVE-2022-462xx/CVE-2022-46293.json) (`2023-07-21T21:15:11.077`) -* [CVE-2022-46294](CVE-2022/CVE-2022-462xx/CVE-2022-46294.json) (`2023-07-21T21:15:11.160`) -* [CVE-2022-46295](CVE-2022/CVE-2022-462xx/CVE-2022-46295.json) (`2023-07-21T21:15:11.240`) -* [CVE-2023-36339](CVE-2023/CVE-2023-363xx/CVE-2023-36339.json) (`2023-07-21T20:15:15.887`) -* [CVE-2023-37903](CVE-2023/CVE-2023-379xx/CVE-2023-37903.json) (`2023-07-21T20:15:16.057`) -* [CVE-2023-37905](CVE-2023/CVE-2023-379xx/CVE-2023-37905.json) (`2023-07-21T20:15:16.297`) -* [CVE-2023-3603](CVE-2023/CVE-2023-36xx/CVE-2023-3603.json) (`2023-07-21T20:15:16.587`) -* [CVE-2023-35077](CVE-2023/CVE-2023-350xx/CVE-2023-35077.json) (`2023-07-21T21:15:11.337`) -* [CVE-2023-37915](CVE-2023/CVE-2023-379xx/CVE-2023-37915.json) (`2023-07-21T21:15:11.400`) -* [CVE-2023-37916](CVE-2023/CVE-2023-379xx/CVE-2023-37916.json) (`2023-07-21T21:15:11.487`) -* [CVE-2023-37917](CVE-2023/CVE-2023-379xx/CVE-2023-37917.json) (`2023-07-21T21:15:11.570`) -* [CVE-2023-37918](CVE-2023/CVE-2023-379xx/CVE-2023-37918.json) (`2023-07-21T21:15:11.657`) -* [CVE-2023-3609](CVE-2023/CVE-2023-36xx/CVE-2023-3609.json) (`2023-07-21T21:15:11.743`) -* [CVE-2023-3610](CVE-2023/CVE-2023-36xx/CVE-2023-3610.json) (`2023-07-21T21:15:11.820`) -* [CVE-2023-3611](CVE-2023/CVE-2023-36xx/CVE-2023-3611.json) (`2023-07-21T21:15:11.897`) -* [CVE-2023-3776](CVE-2023/CVE-2023-37xx/CVE-2023-3776.json) (`2023-07-21T21:15:11.973`) ### CVEs modified in the last Commit -Recently modified CVEs: `48` +Recently modified CVEs: `22` -* [CVE-2022-35915](CVE-2022/CVE-2022-359xx/CVE-2022-35915.json) (`2023-07-21T20:48:55.340`) -* [CVE-2022-35921](CVE-2022/CVE-2022-359xx/CVE-2022-35921.json) (`2023-07-21T20:49:00.297`) -* [CVE-2022-35922](CVE-2022/CVE-2022-359xx/CVE-2022-35922.json) (`2023-07-21T20:49:03.533`) -* [CVE-2022-35923](CVE-2022/CVE-2022-359xx/CVE-2022-35923.json) (`2023-07-21T20:49:08.377`) -* [CVE-2022-35925](CVE-2022/CVE-2022-359xx/CVE-2022-35925.json) (`2023-07-21T20:49:11.747`) -* [CVE-2022-34858](CVE-2022/CVE-2022-348xx/CVE-2022-34858.json) (`2023-07-21T20:52:35.387`) -* [CVE-2022-36034](CVE-2022/CVE-2022-360xx/CVE-2022-36034.json) (`2023-07-21T20:52:39.343`) -* [CVE-2022-36055](CVE-2022/CVE-2022-360xx/CVE-2022-36055.json) (`2023-07-21T20:52:45.190`) -* [CVE-2022-36064](CVE-2022/CVE-2022-360xx/CVE-2022-36064.json) (`2023-07-21T20:52:48.920`) -* [CVE-2022-36065](CVE-2022/CVE-2022-360xx/CVE-2022-36065.json) (`2023-07-21T20:52:53.347`) -* [CVE-2022-36072](CVE-2022/CVE-2022-360xx/CVE-2022-36072.json) (`2023-07-21T21:00:36.520`) -* [CVE-2022-36074](CVE-2022/CVE-2022-360xx/CVE-2022-36074.json) (`2023-07-21T21:01:21.577`) -* [CVE-2022-35238](CVE-2022/CVE-2022-352xx/CVE-2022-35238.json) (`2023-07-21T21:01:27.210`) -* [CVE-2022-35249](CVE-2022/CVE-2022-352xx/CVE-2022-35249.json) (`2023-07-21T21:02:12.633`) -* [CVE-2022-3496](CVE-2022/CVE-2022-34xx/CVE-2022-3496.json) (`2023-07-21T21:02:42.540`) -* [CVE-2022-3564](CVE-2022/CVE-2022-35xx/CVE-2022-3564.json) (`2023-07-21T21:03:17.817`) -* [CVE-2022-3565](CVE-2022/CVE-2022-35xx/CVE-2022-3565.json) (`2023-07-21T21:04:25.487`) -* [CVE-2022-3517](CVE-2022/CVE-2022-35xx/CVE-2022-3517.json) (`2023-07-21T21:04:31.790`) -* [CVE-2022-3569](CVE-2022/CVE-2022-35xx/CVE-2022-3569.json) (`2023-07-21T21:04:44.847`) -* [CVE-2022-3582](CVE-2022/CVE-2022-35xx/CVE-2022-3582.json) (`2023-07-21T21:04:56.290`) -* [CVE-2022-3585](CVE-2022/CVE-2022-35xx/CVE-2022-3585.json) (`2023-07-21T21:05:17.697`) -* [CVE-2022-3489](CVE-2022/CVE-2022-34xx/CVE-2022-3489.json) (`2023-07-21T21:05:21.977`) -* [CVE-2022-3538](CVE-2022/CVE-2022-35xx/CVE-2022-3538.json) (`2023-07-21T21:05:28.230`) -* [CVE-2022-34885](CVE-2022/CVE-2022-348xx/CVE-2022-34885.json) (`2023-07-21T21:05:31.803`) -* [CVE-2023-21719](CVE-2023/CVE-2023-217xx/CVE-2023-21719.json) (`2023-07-21T20:15:14.243`) +* [CVE-2022-37331](CVE-2022/CVE-2022-373xx/CVE-2022-37331.json) (`2023-07-21T22:15:10.087`) +* [CVE-2022-41793](CVE-2022/CVE-2022-417xx/CVE-2022-41793.json) (`2023-07-21T22:15:10.190`) +* [CVE-2022-42885](CVE-2022/CVE-2022-428xx/CVE-2022-42885.json) (`2023-07-21T22:15:10.277`) +* [CVE-2022-43467](CVE-2022/CVE-2022-434xx/CVE-2022-43467.json) (`2023-07-21T22:15:10.360`) +* [CVE-2022-43607](CVE-2022/CVE-2022-436xx/CVE-2022-43607.json) (`2023-07-21T22:15:10.440`) +* [CVE-2022-44451](CVE-2022/CVE-2022-444xx/CVE-2022-44451.json) (`2023-07-21T22:15:10.527`) +* [CVE-2022-46280](CVE-2022/CVE-2022-462xx/CVE-2022-46280.json) (`2023-07-21T22:15:10.610`) +* [CVE-2022-46289](CVE-2022/CVE-2022-462xx/CVE-2022-46289.json) (`2023-07-21T22:15:10.697`) +* [CVE-2022-46290](CVE-2022/CVE-2022-462xx/CVE-2022-46290.json) (`2023-07-21T22:15:10.780`) +* [CVE-2022-46291](CVE-2022/CVE-2022-462xx/CVE-2022-46291.json) (`2023-07-21T22:15:10.863`) +* [CVE-2022-46292](CVE-2022/CVE-2022-462xx/CVE-2022-46292.json) (`2023-07-21T22:15:10.947`) +* [CVE-2022-46293](CVE-2022/CVE-2022-462xx/CVE-2022-46293.json) (`2023-07-21T22:15:11.030`) +* [CVE-2022-46294](CVE-2022/CVE-2022-462xx/CVE-2022-46294.json) (`2023-07-21T22:15:11.113`) +* [CVE-2022-46295](CVE-2022/CVE-2022-462xx/CVE-2022-46295.json) (`2023-07-21T22:15:11.200`) +* [CVE-2023-26934](CVE-2023/CVE-2023-269xx/CVE-2023-26934.json) (`2023-07-21T22:15:11.477`) +* [CVE-2023-26935](CVE-2023/CVE-2023-269xx/CVE-2023-26935.json) (`2023-07-21T22:15:11.677`) +* [CVE-2023-26936](CVE-2023/CVE-2023-269xx/CVE-2023-26936.json) (`2023-07-21T22:15:12.027`) +* [CVE-2023-26937](CVE-2023/CVE-2023-269xx/CVE-2023-26937.json) (`2023-07-21T22:15:12.273`) +* [CVE-2023-26938](CVE-2023/CVE-2023-269xx/CVE-2023-26938.json) (`2023-07-21T22:15:12.477`) +* [CVE-2023-27655](CVE-2023/CVE-2023-276xx/CVE-2023-27655.json) (`2023-07-21T22:15:12.697`) +* [CVE-2023-31554](CVE-2023/CVE-2023-315xx/CVE-2023-31554.json) (`2023-07-21T22:15:12.933`) +* [CVE-2023-31557](CVE-2023/CVE-2023-315xx/CVE-2023-31557.json) (`2023-07-21T22:15:13.167`) ## Download and Usage