Auto-Update: 2024-02-04T11:00:25.048620+00:00

This commit is contained in:
cad-safe-bot 2024-02-04 11:00:28 +00:00
parent 85a94593c6
commit 6924ed3710
25 changed files with 165 additions and 59 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-3156",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-26T21:15:12.987",
"lastModified": "2024-01-31T18:15:45.590",
"lastModified": "2024-02-04T09:15:08.010",
"vulnStatus": "Modified",
"cisaExploitAdd": "2022-04-06",
"cisaActionDue": "2022-04-27",
@ -528,6 +528,10 @@
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2024/Feb/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2021/01/26/3",
"source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-3358",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2022-10-11T15:15:10.233",
"lastModified": "2023-11-07T03:51:10.310",
"lastModified": "2024-02-04T09:15:08.427",
"vulnStatus": "Modified",
"descriptions": [
{
@ -81,6 +81,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202402-08",
"source": "openssl-security@openssl.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20221028-0014/",
"source": "openssl-security@openssl.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39046",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-08-31T06:15:07.467",
"lastModified": "2024-01-31T18:15:45.807",
"lastModified": "2024-02-04T09:15:08.257",
"vulnStatus": "Modified",
"descriptions": [
{
@ -242,6 +242,10 @@
"url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Feb/3",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/30/6",
"source": "cve@mitre.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4203",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-02-24T15:15:11.980",
"lastModified": "2023-11-07T03:57:10.267",
"lastModified": "2024-02-04T09:15:08.533",
"vulnStatus": "Modified",
"descriptions": [
{
@ -74,6 +74,10 @@
"Patch"
]
},
{
"url": "https://security.gentoo.org/glsa/202402-08",
"source": "openssl-security@openssl.org"
},
{
"url": "https://www.openssl.org/news/secadv/20230207.txt",
"source": "openssl-security@openssl.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4304",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-02-08T20:15:23.887",
"lastModified": "2023-11-07T03:57:29.653",
"lastModified": "2024-02-04T09:15:08.627",
"vulnStatus": "Modified",
"descriptions": [
{
@ -137,6 +137,10 @@
}
],
"references": [
{
"url": "https://security.gentoo.org/glsa/202402-08",
"source": "openssl-security@openssl.org"
},
{
"url": "https://www.openssl.org/news/secadv/20230207.txt",
"source": "openssl-security@openssl.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4450",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-02-08T20:15:23.973",
"lastModified": "2023-11-07T03:57:50.597",
"lastModified": "2024-02-04T09:15:08.733",
"vulnStatus": "Modified",
"descriptions": [
{
@ -113,6 +113,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202402-08",
"source": "openssl-security@openssl.org"
},
{
"url": "https://www.openssl.org/news/secadv/20230207.txt",
"source": "openssl-security@openssl.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0215",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-02-08T20:15:24.107",
"lastModified": "2023-07-19T00:55:16.513",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-04T09:15:08.847",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -120,6 +120,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202402-08",
"source": "openssl-security@openssl.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
"source": "openssl-security@openssl.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0216",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-02-08T20:15:24.160",
"lastModified": "2023-11-07T03:59:51.950",
"lastModified": "2024-02-04T09:15:08.947",
"vulnStatus": "Modified",
"descriptions": [
{
@ -90,6 +90,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202402-08",
"source": "openssl-security@openssl.org"
},
{
"url": "https://www.openssl.org/news/secadv/20230207.txt",
"source": "openssl-security@openssl.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0217",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-02-08T20:15:24.213",
"lastModified": "2023-11-07T03:59:52.100",
"lastModified": "2024-02-04T09:15:09.040",
"vulnStatus": "Modified",
"descriptions": [
{
@ -70,6 +70,10 @@
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=23985bac83fd50c8e29431009302b5442f985096",
"source": "openssl-security@openssl.org"
},
{
"url": "https://security.gentoo.org/glsa/202402-08",
"source": "openssl-security@openssl.org"
},
{
"url": "https://www.openssl.org/news/secadv/20230207.txt",
"source": "openssl-security@openssl.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0286",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-02-08T20:15:24.267",
"lastModified": "2023-11-07T04:00:05.973",
"lastModified": "2024-02-04T09:15:09.113",
"vulnStatus": "Modified",
"descriptions": [
{
@ -169,6 +169,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202402-08",
"source": "openssl-security@openssl.org"
},
{
"url": "https://www.openssl.org/news/secadv/20230207.txt",
"source": "openssl-security@openssl.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0401",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-02-08T20:15:24.323",
"lastModified": "2023-11-07T04:00:24.170",
"lastModified": "2024-02-04T09:15:09.223",
"vulnStatus": "Modified",
"descriptions": [
{
@ -90,6 +90,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202402-08",
"source": "openssl-security@openssl.org"
},
{
"url": "https://www.openssl.org/news/secadv/20230207.txt",
"source": "openssl-security@openssl.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0464",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-03-22T17:15:13.130",
"lastModified": "2023-11-09T13:15:07.340",
"lastModified": "2024-02-04T09:15:09.310",
"vulnStatus": "Modified",
"descriptions": [
{
@ -122,6 +122,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html",
"source": "openssl-security@openssl.org"
},
{
"url": "https://security.gentoo.org/glsa/202402-08",
"source": "openssl-security@openssl.org"
},
{
"url": "https://www.couchbase.com/alerts/",
"source": "openssl-security@openssl.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0465",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-03-28T15:15:06.820",
"lastModified": "2023-06-08T19:15:09.407",
"lastModified": "2024-02-04T09:15:09.430",
"vulnStatus": "Modified",
"descriptions": [
{
@ -87,6 +87,13 @@
}
],
"references": [
{
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a",
"source": "openssl-security@openssl.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb",
"source": "openssl-security@openssl.org",
@ -115,6 +122,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html",
"source": "openssl-security@openssl.org"
},
{
"url": "https://security.gentoo.org/glsa/202402-08",
"source": "openssl-security@openssl.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230414-0001/",
"source": "openssl-security@openssl.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0466",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-03-28T15:15:06.880",
"lastModified": "2023-09-28T18:15:11.707",
"lastModified": "2024-02-04T09:15:09.540",
"vulnStatus": "Modified",
"descriptions": [
{
@ -126,6 +126,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html",
"source": "openssl-security@openssl.org"
},
{
"url": "https://security.gentoo.org/glsa/202402-08",
"source": "openssl-security@openssl.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230414-0001/",
"source": "openssl-security@openssl.org"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2650",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-05-30T14:15:09.683",
"lastModified": "2023-10-27T15:15:13.057",
"lastModified": "2024-02-04T09:15:09.643",
"vulnStatus": "Modified",
"descriptions": [
{
@ -160,6 +160,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202402-08",
"source": "openssl-security@openssl.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230703-0001/",
"source": "openssl-security@openssl.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2975",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-07-14T12:15:09.023",
"lastModified": "2023-07-27T13:02:02.013",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-04T09:15:09.773",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -123,6 +123,10 @@
"Patch"
]
},
{
"url": "https://security.gentoo.org/glsa/202402-08",
"source": "openssl-security@openssl.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230725-0004/",
"source": "openssl-security@openssl.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3446",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-07-19T12:15:10.003",
"lastModified": "2023-10-03T15:48:00.240",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-04T09:15:09.900",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -159,6 +159,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202402-08",
"source": "openssl-security@openssl.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230803-0011/",
"source": "openssl-security@openssl.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3817",
"sourceIdentifier": "openssl-security@openssl.org",
"published": "2023-07-31T16:15:10.497",
"lastModified": "2023-11-06T19:15:09.120",
"lastModified": "2024-02-04T09:15:10.030",
"vulnStatus": "Modified",
"descriptions": [
{
@ -475,6 +475,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html",
"source": "openssl-security@openssl.org"
},
{
"url": "https://security.gentoo.org/glsa/202402-08",
"source": "openssl-security@openssl.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230818-0014/",
"source": "openssl-security@openssl.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5371",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-10-04T17:15:10.437",
"lastModified": "2023-10-10T13:13:05.367",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-04T10:15:08.080",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -116,6 +116,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202402-09",
"source": "cve@gitlab.com"
},
{
"url": "https://www.wireshark.org/security/wnpa-sec-2023-27.html",
"source": "cve@gitlab.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6174",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-11-16T12:15:07.240",
"lastModified": "2023-11-28T17:27:06.313",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-04T10:15:08.337",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -122,6 +122,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202402-09",
"source": "cve@gitlab.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5559",
"source": "cve@gitlab.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6246",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-31T14:15:48.420",
"lastModified": "2024-02-02T04:15:08.713",
"vulnStatus": "Modified",
"lastModified": "2024-02-04T10:15:08.490",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -123,6 +123,14 @@
"url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html",
"source": "secalert@redhat.com"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Feb/3",
"source": "secalert@redhat.com"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Feb/5",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-6246",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6779",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-31T14:15:48.700",
"lastModified": "2024-02-02T04:15:08.813",
"lastModified": "2024-02-04T09:15:10.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -55,6 +55,10 @@
"url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html",
"source": "secalert@redhat.com"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Feb/3",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-6779",
"source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6780",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-31T14:15:48.917",
"lastModified": "2024-02-02T04:15:08.907",
"lastModified": "2024-02-04T09:15:10.487",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -55,6 +55,10 @@
"url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html",
"source": "secalert@redhat.com"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Feb/3",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-6780",
"source": "secalert@redhat.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23222",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-01-23T01:15:11.500",
"lastModified": "2024-01-30T14:32:15.580",
"vulnStatus": "Analyzed",
"lastModified": "2024-02-04T10:15:08.623",
"vulnStatus": "Modified",
"cisaExploitAdd": "2024-01-23",
"cisaActionDue": "2024-02-13",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
@ -128,6 +128,10 @@
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Feb/6",
"source": "product-security@apple.com"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Jan/27",
"source": "product-security@apple.com",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-04T09:00:25.052527+00:00
2024-02-04T11:00:25.048620+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-04T08:15:13.520000+00:00
2024-02-04T10:15:08.623000+00:00
```
### Last Data Feed Release
@ -40,33 +40,32 @@ Recently added CVEs: `0`
### CVEs modified in the last Commit
Recently modified CVEs: `39`
Recently modified CVEs: `24`
* [CVE-2022-26361](CVE-2022/CVE-2022-263xx/CVE-2022-26361.json) (`2024-02-04T08:15:10.587`)
* [CVE-2022-27672](CVE-2022/CVE-2022-276xx/CVE-2022-27672.json) (`2024-02-04T08:15:10.667`)
* [CVE-2022-29900](CVE-2022/CVE-2022-299xx/CVE-2022-29900.json) (`2024-02-04T08:15:10.917`)
* [CVE-2022-29901](CVE-2022/CVE-2022-299xx/CVE-2022-29901.json) (`2024-02-04T08:15:11.163`)
* [CVE-2022-33746](CVE-2022/CVE-2022-337xx/CVE-2022-33746.json) (`2024-02-04T08:15:11.510`)
* [CVE-2022-33747](CVE-2022/CVE-2022-337xx/CVE-2022-33747.json) (`2024-02-04T08:15:11.717`)
* [CVE-2022-33748](CVE-2022/CVE-2022-337xx/CVE-2022-33748.json) (`2024-02-04T08:15:11.800`)
* [CVE-2022-33749](CVE-2022/CVE-2022-337xx/CVE-2022-33749.json) (`2024-02-04T08:15:11.900`)
* [CVE-2022-42309](CVE-2022/CVE-2022-423xx/CVE-2022-42309.json) (`2024-02-04T08:15:11.987`)
* [CVE-2022-42310](CVE-2022/CVE-2022-423xx/CVE-2022-42310.json) (`2024-02-04T08:15:12.090`)
* [CVE-2022-42319](CVE-2022/CVE-2022-423xx/CVE-2022-42319.json) (`2024-02-04T08:15:12.187`)
* [CVE-2022-42320](CVE-2022/CVE-2022-423xx/CVE-2022-42320.json) (`2024-02-04T08:15:12.300`)
* [CVE-2022-42321](CVE-2022/CVE-2022-423xx/CVE-2022-42321.json) (`2024-02-04T08:15:12.390`)
* [CVE-2022-42322](CVE-2022/CVE-2022-423xx/CVE-2022-42322.json) (`2024-02-04T08:15:12.477`)
* [CVE-2022-42323](CVE-2022/CVE-2022-423xx/CVE-2022-42323.json) (`2024-02-04T08:15:12.560`)
* [CVE-2022-42324](CVE-2022/CVE-2022-423xx/CVE-2022-42324.json) (`2024-02-04T08:15:12.647`)
* [CVE-2022-42325](CVE-2022/CVE-2022-423xx/CVE-2022-42325.json) (`2024-02-04T08:15:12.767`)
* [CVE-2022-42326](CVE-2022/CVE-2022-423xx/CVE-2022-42326.json) (`2024-02-04T08:15:12.877`)
* [CVE-2022-42327](CVE-2022/CVE-2022-423xx/CVE-2022-42327.json) (`2024-02-04T08:15:12.970`)
* [CVE-2022-42330](CVE-2022/CVE-2022-423xx/CVE-2022-42330.json) (`2024-02-04T08:15:13.050`)
* [CVE-2022-42331](CVE-2022/CVE-2022-423xx/CVE-2022-42331.json) (`2024-02-04T08:15:13.147`)
* [CVE-2022-42332](CVE-2022/CVE-2022-423xx/CVE-2022-42332.json) (`2024-02-04T08:15:13.257`)
* [CVE-2022-42333](CVE-2022/CVE-2022-423xx/CVE-2022-42333.json) (`2024-02-04T08:15:13.357`)
* [CVE-2022-42334](CVE-2022/CVE-2022-423xx/CVE-2022-42334.json) (`2024-02-04T08:15:13.440`)
* [CVE-2022-42335](CVE-2022/CVE-2022-423xx/CVE-2022-42335.json) (`2024-02-04T08:15:13.520`)
* [CVE-2021-3156](CVE-2021/CVE-2021-31xx/CVE-2021-3156.json) (`2024-02-04T09:15:08.010`)
* [CVE-2022-39046](CVE-2022/CVE-2022-390xx/CVE-2022-39046.json) (`2024-02-04T09:15:08.257`)
* [CVE-2022-3358](CVE-2022/CVE-2022-33xx/CVE-2022-3358.json) (`2024-02-04T09:15:08.427`)
* [CVE-2022-4203](CVE-2022/CVE-2022-42xx/CVE-2022-4203.json) (`2024-02-04T09:15:08.533`)
* [CVE-2022-4304](CVE-2022/CVE-2022-43xx/CVE-2022-4304.json) (`2024-02-04T09:15:08.627`)
* [CVE-2022-4450](CVE-2022/CVE-2022-44xx/CVE-2022-4450.json) (`2024-02-04T09:15:08.733`)
* [CVE-2023-0215](CVE-2023/CVE-2023-02xx/CVE-2023-0215.json) (`2024-02-04T09:15:08.847`)
* [CVE-2023-0216](CVE-2023/CVE-2023-02xx/CVE-2023-0216.json) (`2024-02-04T09:15:08.947`)
* [CVE-2023-0217](CVE-2023/CVE-2023-02xx/CVE-2023-0217.json) (`2024-02-04T09:15:09.040`)
* [CVE-2023-0286](CVE-2023/CVE-2023-02xx/CVE-2023-0286.json) (`2024-02-04T09:15:09.113`)
* [CVE-2023-0401](CVE-2023/CVE-2023-04xx/CVE-2023-0401.json) (`2024-02-04T09:15:09.223`)
* [CVE-2023-0464](CVE-2023/CVE-2023-04xx/CVE-2023-0464.json) (`2024-02-04T09:15:09.310`)
* [CVE-2023-0465](CVE-2023/CVE-2023-04xx/CVE-2023-0465.json) (`2024-02-04T09:15:09.430`)
* [CVE-2023-0466](CVE-2023/CVE-2023-04xx/CVE-2023-0466.json) (`2024-02-04T09:15:09.540`)
* [CVE-2023-2650](CVE-2023/CVE-2023-26xx/CVE-2023-2650.json) (`2024-02-04T09:15:09.643`)
* [CVE-2023-2975](CVE-2023/CVE-2023-29xx/CVE-2023-2975.json) (`2024-02-04T09:15:09.773`)
* [CVE-2023-3446](CVE-2023/CVE-2023-34xx/CVE-2023-3446.json) (`2024-02-04T09:15:09.900`)
* [CVE-2023-3817](CVE-2023/CVE-2023-38xx/CVE-2023-3817.json) (`2024-02-04T09:15:10.030`)
* [CVE-2023-6779](CVE-2023/CVE-2023-67xx/CVE-2023-6779.json) (`2024-02-04T09:15:10.377`)
* [CVE-2023-6780](CVE-2023/CVE-2023-67xx/CVE-2023-6780.json) (`2024-02-04T09:15:10.487`)
* [CVE-2023-5371](CVE-2023/CVE-2023-53xx/CVE-2023-5371.json) (`2024-02-04T10:15:08.080`)
* [CVE-2023-6174](CVE-2023/CVE-2023-61xx/CVE-2023-6174.json) (`2024-02-04T10:15:08.337`)
* [CVE-2023-6246](CVE-2023/CVE-2023-62xx/CVE-2023-6246.json) (`2024-02-04T10:15:08.490`)
* [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2024-02-04T10:15:08.623`)
## Download and Usage