Auto-Update: 2023-06-09T22:00:26.149980+00:00

This commit is contained in:
cad-safe-bot 2023-06-09 22:00:29 +00:00
parent b955110229
commit 74e590ec37
26 changed files with 651 additions and 60 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-39286",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-10-26T20:15:10.490",
"lastModified": "2023-03-21T13:17:38.247",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-09T20:15:09.533",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -183,6 +183,10 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5422",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2454",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-09T19:15:09.253",
"lastModified": "2023-06-09T19:15:09.253",
"vulnStatus": "Received",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2455",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-09T19:15:09.313",
"lastModified": "2023-06-09T19:15:09.313",
"vulnStatus": "Received",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-26465",
"sourceIdentifier": "security@pega.com",
"published": "2023-06-09T21:15:09.413",
"lastModified": "2023-06-09T21:15:09.413",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Pega Platform versions 7.2 to 8.8.1 are affected by an XSS issue."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@pega.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@pega.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://support.pega.com/support-doc/pega-security-advisory-a23-vulnerability-remediation-note",
"source": "security@pega.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27706",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-09T19:15:09.107",
"lastModified": "2023-06-09T19:15:09.107",
"vulnStatus": "Received",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,19 +2,83 @@
"id": "CVE-2023-28469",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-02T12:15:09.320",
"lastModified": "2023-06-02T12:48:49.093",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-09T21:56:17.860",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the Arm Mali GPU Kernel Driver. A non-privileged user can make improper GPU processing operations to gain access to already freed memory. This affects Valhall r29p0 through r42p0 before r43p0, and Arm's GPU Architecture Gen5 r41p0 through r42p0 before r43p0."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:avalon_gpu_kernel_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r41p0",
"versionEndExcluding": "r43p0",
"matchCriteriaId": "16AC01AB-58F9-4F1F-AC20-9439589365ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "r29p0",
"versionEndExcluding": "r43p0",
"matchCriteriaId": "1B0FAAE6-43A6-4C74-9223-A93D76A3D140"
}
]
}
]
}
],
"references": [
{
"url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29713",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-09T19:15:09.160",
"lastModified": "2023-06-09T19:15:09.160",
"vulnStatus": "Received",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29714",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-09T19:15:09.207",
"lastModified": "2023-06-09T19:15:09.207",
"vulnStatus": "Received",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-29749",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-09T20:15:09.663",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue found in Yandex Navigator v.6.60 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the SharedPreference files."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29749/CVE%20detailed.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-29751",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-09T21:15:09.497",
"lastModified": "2023-06-09T21:15:09.497",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue found in Yandex Navigator v.6.60 for Android allows unauthorized apps to cause a persistent denial of service by manipulating the SharedPreference files."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29751/CVE%20detailed.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-29752",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-09T20:15:09.717",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue found in Facemoji Emoji Keyboard v.2.9.1.2 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29752/CVE%20detailed.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-29753",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-09T21:15:09.537",
"lastModified": "2023-06-09T21:15:09.537",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue found in Facemoji Emoji Keyboard v.2.9.1.2 for Android allows a local attacker to cause a denial of service via the SharedPreference files."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29753/CVE%20detailed.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-29755",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-09T20:15:09.763",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue found in Twilight v.13.3 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the SharedPreference files."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29755/CVE%20detailed.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-29756",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-09T20:15:09.813",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue found in Twilight v.13.3 for Android allows unauthorized apps to cause a persistent denial of service by manipulating the SharedPreference files."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29756/CVE%20detailed.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-29757",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-09T20:15:09.857",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue found in Blue Light Filter v.1.5.5 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the SharedPreference files."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29757/CVE%20detailed.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-29758",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-09T20:15:09.903",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue found in Blue Light Filter v.1.5.5 for Android allows unauthorized apps to cause a persistent denial of service by manipulating the SharedPreference files."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29758/CVE%20detailed.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-29759",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-09T20:15:09.957",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue found in FlightAware v.5.8.0 for Android allows unauthorized apps to cause a persistent denial of service by manipulating the database files."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29759/CVE%20detailed.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-29761",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-09T20:15:10.003",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue found in Sleep v.20230303 for Android allows unauthorized apps to cause a persistent denial of service by manipulating the SharedPreference files."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29761/CVE%20detailed.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-29766",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-09T20:15:10.063",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue found in CrossX v.1.15.3 for Android allows a local attacker to cause an escalation of Privileges via the database files."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29766/CVE%20detailed.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-29767",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-09T20:15:10.140",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue found in CrossX v.1.15.3 for Android allows a local attacker to cause a persistent denial of service via the database files."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29767/CVE%20detailed.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30604",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2023-06-02T11:15:10.930",
"lastModified": "2023-06-02T12:48:49.093",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-09T21:56:34.763",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -46,10 +46,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hitrontech:coda-5310_firmware:7.2.4.7.1b3:*:*:*:*:*:*:*",
"matchCriteriaId": "B27E4E38-EFFE-4D6C-B59B-70CC41CF9139"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hitrontech:coda-5310:-:*:*:*:*:*:*:*",
"matchCriteriaId": "491195EE-6802-46EB-AFEE-CEF553255203"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/tw/cp-132-7086-35622-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-3141",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-09T20:15:10.327",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free flaw was found in r592_remove in drivers/memstick/host/r592.c in media access in the Linux Kernel. This flaw allows a local attacker to crash the system at device disconnect, possibly leading to a kernel information leak."
}
],
"metrics": {},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw@mail.gmail.com/t/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-3187",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-09T21:15:09.583",
"lastModified": "2023-06-09T21:15:09.583",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Teachers Record Management System 1.0. Affected by this issue is some unknown functionality of the file /changeimage.php of the component Profile Picture Handler. The manipulation of the argument newpic leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-231176."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/ctflearner/Vulnerability/blob/main/Teacher_Record_Management_System/trms.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.231176",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.231176",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2023-32312",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-06-09T20:15:10.190",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "UmbracoIdentityExtensions is an Umbraco add-on package that enables easy extensibility points for ASP.Net Identity integration. In affected versions client secrets are not required which may expose some endpoints to untrusted actors. Since Umbraco is not a single-page application, the implicit flow is not safe. For traditional MVC applications, it is recommended to use the authorization code flow, which requires the client to authenticate with the authorization server using a client secret. This flow provides better security, as it involves exchanging an authorization code for an access token and/or ID token, rather than directly returning tokens in the URL fragment. This issue has been patched in commit `e792429f9` and a release to Nuget is pending. Users are advised to upgrade when possible."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://docs.umbraco.com/umbraco-cms/reference/security/external-login-providers",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/umbraco/UmbracoIdentityExtensions/commit/e792429f9d1fa25c1ba4f7a61d23ee02fedd6dc9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/umbraco/UmbracoIdentityExtensions/pull/53",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/umbraco/UmbracoIdentityExtensions/security/advisories/GHSA-f2rf-8mwf-6jfh",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-34856",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-09T20:15:10.277",
"lastModified": "2023-06-09T20:40:34.737",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A Cross Site Scripting (XSS) vulnerability in D-Link DI-7500G-CI-19.05.29A allows attackers to execute arbitrary code via uploading a crafted HTML file to the interface /auth_pic.cgi."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/hashshfza/Vulnerability/issues/2",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-06-09T20:00:27.989102+00:00
2023-06-09T22:00:26.149980+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-06-09T19:44:47.700000+00:00
2023-06-09T21:56:34.763000+00:00
```
### Last Data Feed Release
@ -29,55 +29,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
217373
217390
```
### CVEs added in the last Commit
Recently added CVEs: `11`
Recently added CVEs: `17`
* [CVE-2019-16283](CVE-2019/CVE-2019-162xx/CVE-2019-16283.json) (`2023-06-09T18:15:09.483`)
* [CVE-2023-29712](CVE-2023/CVE-2023-297xx/CVE-2023-29712.json) (`2023-06-09T18:15:09.600`)
* [CVE-2023-30262](CVE-2023/CVE-2023-302xx/CVE-2023-30262.json) (`2023-06-09T18:15:09.647`)
* [CVE-2023-33557](CVE-2023/CVE-2023-335xx/CVE-2023-33557.json) (`2023-06-09T18:15:09.693`)
* [CVE-2023-34100](CVE-2023/CVE-2023-341xx/CVE-2023-34100.json) (`2023-06-09T18:15:09.737`)
* [CVE-2023-34245](CVE-2023/CVE-2023-342xx/CVE-2023-34245.json) (`2023-06-09T18:15:09.813`)
* [CVE-2023-27706](CVE-2023/CVE-2023-277xx/CVE-2023-27706.json) (`2023-06-09T19:15:09.107`)
* [CVE-2023-29713](CVE-2023/CVE-2023-297xx/CVE-2023-29713.json) (`2023-06-09T19:15:09.160`)
* [CVE-2023-29714](CVE-2023/CVE-2023-297xx/CVE-2023-29714.json) (`2023-06-09T19:15:09.207`)
* [CVE-2023-2454](CVE-2023/CVE-2023-24xx/CVE-2023-2454.json) (`2023-06-09T19:15:09.253`)
* [CVE-2023-2455](CVE-2023/CVE-2023-24xx/CVE-2023-2455.json) (`2023-06-09T19:15:09.313`)
* [CVE-2023-29749](CVE-2023/CVE-2023-297xx/CVE-2023-29749.json) (`2023-06-09T20:15:09.663`)
* [CVE-2023-29752](CVE-2023/CVE-2023-297xx/CVE-2023-29752.json) (`2023-06-09T20:15:09.717`)
* [CVE-2023-29755](CVE-2023/CVE-2023-297xx/CVE-2023-29755.json) (`2023-06-09T20:15:09.763`)
* [CVE-2023-29756](CVE-2023/CVE-2023-297xx/CVE-2023-29756.json) (`2023-06-09T20:15:09.813`)
* [CVE-2023-29757](CVE-2023/CVE-2023-297xx/CVE-2023-29757.json) (`2023-06-09T20:15:09.857`)
* [CVE-2023-29758](CVE-2023/CVE-2023-297xx/CVE-2023-29758.json) (`2023-06-09T20:15:09.903`)
* [CVE-2023-29759](CVE-2023/CVE-2023-297xx/CVE-2023-29759.json) (`2023-06-09T20:15:09.957`)
* [CVE-2023-29761](CVE-2023/CVE-2023-297xx/CVE-2023-29761.json) (`2023-06-09T20:15:10.003`)
* [CVE-2023-29766](CVE-2023/CVE-2023-297xx/CVE-2023-29766.json) (`2023-06-09T20:15:10.063`)
* [CVE-2023-29767](CVE-2023/CVE-2023-297xx/CVE-2023-29767.json) (`2023-06-09T20:15:10.140`)
* [CVE-2023-32312](CVE-2023/CVE-2023-323xx/CVE-2023-32312.json) (`2023-06-09T20:15:10.190`)
* [CVE-2023-34856](CVE-2023/CVE-2023-348xx/CVE-2023-34856.json) (`2023-06-09T20:15:10.277`)
* [CVE-2023-3141](CVE-2023/CVE-2023-31xx/CVE-2023-3141.json) (`2023-06-09T20:15:10.327`)
* [CVE-2023-26465](CVE-2023/CVE-2023-264xx/CVE-2023-26465.json) (`2023-06-09T21:15:09.413`)
* [CVE-2023-29751](CVE-2023/CVE-2023-297xx/CVE-2023-29751.json) (`2023-06-09T21:15:09.497`)
* [CVE-2023-29753](CVE-2023/CVE-2023-297xx/CVE-2023-29753.json) (`2023-06-09T21:15:09.537`)
* [CVE-2023-3187](CVE-2023/CVE-2023-31xx/CVE-2023-3187.json) (`2023-06-09T21:15:09.583`)
### CVEs modified in the last Commit
Recently modified CVEs: `47`
Recently modified CVEs: `8`
* [CVE-2023-26125](CVE-2023/CVE-2023-261xx/CVE-2023-26125.json) (`2023-06-09T18:32:18.030`)
* [CVE-2023-32981](CVE-2023/CVE-2023-329xx/CVE-2023-32981.json) (`2023-06-09T18:32:50.573`)
* [CVE-2023-2261](CVE-2023/CVE-2023-22xx/CVE-2023-2261.json) (`2023-06-09T18:33:46.487`)
* [CVE-2023-2284](CVE-2023/CVE-2023-22xx/CVE-2023-2284.json) (`2023-06-09T18:33:46.487`)
* [CVE-2023-2285](CVE-2023/CVE-2023-22xx/CVE-2023-2285.json) (`2023-06-09T18:33:46.487`)
* [CVE-2023-2286](CVE-2023/CVE-2023-22xx/CVE-2023-2286.json) (`2023-06-09T18:33:46.487`)
* [CVE-2023-3183](CVE-2023/CVE-2023-31xx/CVE-2023-3183.json) (`2023-06-09T18:33:46.487`)
* [CVE-2023-3184](CVE-2023/CVE-2023-31xx/CVE-2023-3184.json) (`2023-06-09T18:33:46.487`)
* [CVE-2023-2121](CVE-2023/CVE-2023-21xx/CVE-2023-2121.json) (`2023-06-09T18:33:46.487`)
* [CVE-2023-25752](CVE-2023/CVE-2023-257xx/CVE-2023-25752.json) (`2023-06-09T18:40:27.807`)
* [CVE-2023-28161](CVE-2023/CVE-2023-281xx/CVE-2023-28161.json) (`2023-06-09T18:43:27.150`)
* [CVE-2023-34408](CVE-2023/CVE-2023-344xx/CVE-2023-34408.json) (`2023-06-09T18:44:52.567`)
* [CVE-2023-28147](CVE-2023/CVE-2023-281xx/CVE-2023-28147.json) (`2023-06-09T18:49:06.737`)
* [CVE-2023-27744](CVE-2023/CVE-2023-277xx/CVE-2023-27744.json) (`2023-06-09T18:57:44.797`)
* [CVE-2023-27745](CVE-2023/CVE-2023-277xx/CVE-2023-27745.json) (`2023-06-09T19:08:15.767`)
* [CVE-2023-29724](CVE-2023/CVE-2023-297xx/CVE-2023-29724.json) (`2023-06-09T19:13:11.110`)
* [CVE-2023-32758](CVE-2023/CVE-2023-327xx/CVE-2023-32758.json) (`2023-06-09T19:15:09.373`)
* [CVE-2023-33255](CVE-2023/CVE-2023-332xx/CVE-2023-33255.json) (`2023-06-09T19:15:09.450`)
* [CVE-2023-3094](CVE-2023/CVE-2023-30xx/CVE-2023-3094.json) (`2023-06-09T19:16:27.433`)
* [CVE-2023-2201](CVE-2023/CVE-2023-22xx/CVE-2023-2201.json) (`2023-06-09T19:22:09.597`)
* [CVE-2023-3095](CVE-2023/CVE-2023-30xx/CVE-2023-3095.json) (`2023-06-09T19:29:53.880`)
* [CVE-2023-2224](CVE-2023/CVE-2023-22xx/CVE-2023-2224.json) (`2023-06-09T19:31:37.800`)
* [CVE-2023-2337](CVE-2023/CVE-2023-23xx/CVE-2023-2337.json) (`2023-06-09T19:32:03.357`)
* [CVE-2023-2472](CVE-2023/CVE-2023-24xx/CVE-2023-2472.json) (`2023-06-09T19:34:48.477`)
* [CVE-2023-34407](CVE-2023/CVE-2023-344xx/CVE-2023-34407.json) (`2023-06-09T19:39:30.837`)
* [CVE-2022-39286](CVE-2022/CVE-2022-392xx/CVE-2022-39286.json) (`2023-06-09T20:15:09.533`)
* [CVE-2023-27706](CVE-2023/CVE-2023-277xx/CVE-2023-27706.json) (`2023-06-09T20:40:34.737`)
* [CVE-2023-29713](CVE-2023/CVE-2023-297xx/CVE-2023-29713.json) (`2023-06-09T20:40:34.737`)
* [CVE-2023-29714](CVE-2023/CVE-2023-297xx/CVE-2023-29714.json) (`2023-06-09T20:40:34.737`)
* [CVE-2023-2454](CVE-2023/CVE-2023-24xx/CVE-2023-2454.json) (`2023-06-09T20:40:34.737`)
* [CVE-2023-2455](CVE-2023/CVE-2023-24xx/CVE-2023-2455.json) (`2023-06-09T20:40:34.737`)
* [CVE-2023-28469](CVE-2023/CVE-2023-284xx/CVE-2023-28469.json) (`2023-06-09T21:56:17.860`)
* [CVE-2023-30604](CVE-2023/CVE-2023-306xx/CVE-2023-30604.json) (`2023-06-09T21:56:34.763`)
## Download and Usage