Auto-Update: 2023-05-17T00:00:24.004568+00:00

This commit is contained in:
René Helmke 2023-05-17 02:00:27 +02:00
parent ecef3332c6
commit 76f957c5f6
94 changed files with 1934 additions and 1792 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-14575", "id": "CVE-2020-14575",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-07-15T18:15:23.597", "published": "2020-07-15T18:15:23.597",
"lastModified": "2022-07-01T15:18:32.567", "lastModified": "2023-05-16T22:55:30.580",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -96,22 +96,6 @@
} }
], ],
"configurations": [ "configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
}
]
}
]
},
{ {
"nodes": [ "nodes": [
{ {
@ -196,6 +180,23 @@
] ]
} }
] ]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
}
]
}
]
} }
], ],
"references": [ "references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-14678", "id": "CVE-2020-14678",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-07-15T18:15:32.457", "published": "2020-07-15T18:15:32.457",
"lastModified": "2022-06-30T21:00:30.310", "lastModified": "2023-05-16T22:59:36.700",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -96,22 +96,6 @@
} }
], ],
"configurations": [ "configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
}
]
}
]
},
{ {
"nodes": [ "nodes": [
{ {
@ -171,6 +155,23 @@
] ]
} }
] ]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
}
]
}
]
} }
], ],
"references": [ "references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-14680", "id": "CVE-2020-14680",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-07-15T18:15:32.647", "published": "2020-07-15T18:15:32.647",
"lastModified": "2022-06-30T21:01:56.163", "lastModified": "2023-05-16T22:58:48.653",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -96,22 +96,6 @@
} }
], ],
"configurations": [ "configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
}
]
}
]
},
{ {
"nodes": [ "nodes": [
{ {
@ -171,6 +155,23 @@
] ]
} }
] ]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
}
]
}
]
} }
], ],
"references": [ "references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-14697", "id": "CVE-2020-14697",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-07-15T18:15:33.973", "published": "2020-07-15T18:15:33.973",
"lastModified": "2022-06-30T21:03:05.463", "lastModified": "2023-05-16T22:55:00.257",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -105,8 +105,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.20", "versionEndIncluding": "8.0.20",
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407" "matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-14702", "id": "CVE-2020-14702",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2020-07-15T18:15:34.397", "published": "2020-07-15T18:15:34.397",
"lastModified": "2022-06-30T20:47:58.960", "lastModified": "2023-05-16T22:56:00.377",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -96,22 +96,6 @@
} }
], ],
"configurations": [ "configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "888DFC02-F0E7-42D9-9387-5CE444F16407"
}
]
}
]
},
{ {
"nodes": [ "nodes": [
{ {
@ -171,6 +155,23 @@
] ]
} }
] ]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.20",
"matchCriteriaId": "0E1A3769-E443-4511-B349-B5304F5E6EBD"
}
]
}
]
} }
], ],
"references": [ "references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-15888", "id": "CVE-2020-15888",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-07-21T22:15:12.090", "published": "2020-07-21T22:15:12.090",
"lastModified": "2021-07-21T11:39:23.747", "lastModified": "2023-05-16T22:31:05.550",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -92,9 +92,8 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:lua:lua:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:lua:lua:5.4.0:-:*:*:*:*:*:*",
"versionEndIncluding": "5.4.0", "matchCriteriaId": "E9F78BF8-B73C-42C6-AF54-2CD935670053"
"matchCriteriaId": "0081016A-225E-4C17-8B9E-F39047CA61CD"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-16168", "id": "CVE-2020-16168",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2020-08-07T13:15:10.777", "published": "2020-08-07T13:15:10.777",
"lastModified": "2020-09-02T19:15:17.500", "lastModified": "2023-05-16T22:42:15.457",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -85,8 +85,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:robotemi:temi_firmware:20190419.165201:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:robotemi:temi_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EFC89C88-25E2-43D8-BA74-EB10820F24D8" "versionEndExcluding": "1.3.7931",
"matchCriteriaId": "2B3C8C0D-7B39-48C1-BECE-70F96BD9FCF9"
} }
] ]
}, },

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0010",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.137",
"lastModified": "2023-05-16T22:15:10.137",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0011",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.210",
"lastModified": "2023-05-16T22:15:10.210",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0014",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.260",
"lastModified": "2023-05-16T22:15:10.260",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0015",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.310",
"lastModified": "2023-05-16T22:15:10.310",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0016",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.357",
"lastModified": "2023-05-16T22:15:10.357",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0017",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.403",
"lastModified": "2023-05-16T22:15:10.403",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0018",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.450",
"lastModified": "2023-05-16T22:15:10.450",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0019",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.497",
"lastModified": "2023-05-16T22:15:10.497",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0020",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.547",
"lastModified": "2023-05-16T22:15:10.547",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0021",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.593",
"lastModified": "2023-05-16T22:15:10.593",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0022",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.643",
"lastModified": "2023-05-16T22:15:10.643",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0023",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.693",
"lastModified": "2023-05-16T22:15:10.693",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0024",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.733",
"lastModified": "2023-05-16T22:15:10.733",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0025",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.773",
"lastModified": "2023-05-16T22:15:10.773",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0026",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.813",
"lastModified": "2023-05-16T22:15:10.813",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0027",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.860",
"lastModified": "2023-05-16T22:15:10.860",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0028",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.910",
"lastModified": "2023-05-16T22:15:10.910",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0029",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:10.963",
"lastModified": "2023-05-16T22:15:10.963",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0030",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.010",
"lastModified": "2023-05-16T22:15:11.010",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0031",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.060",
"lastModified": "2023-05-16T22:15:11.060",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0032",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.107",
"lastModified": "2023-05-16T22:15:11.107",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0033",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.157",
"lastModified": "2023-05-16T22:15:11.157",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0034",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.207",
"lastModified": "2023-05-16T22:15:11.207",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0035",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.247",
"lastModified": "2023-05-16T22:15:11.247",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0036",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.290",
"lastModified": "2023-05-16T22:15:11.290",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0037",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.337",
"lastModified": "2023-05-16T22:15:11.337",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0038",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.387",
"lastModified": "2023-05-16T22:15:11.387",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0039",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.423",
"lastModified": "2023-05-16T22:15:11.423",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0040",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.470",
"lastModified": "2023-05-16T22:15:11.470",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0041",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.513",
"lastModified": "2023-05-16T22:15:11.513",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0042",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.557",
"lastModified": "2023-05-16T22:15:11.557",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0043",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.600",
"lastModified": "2023-05-16T22:15:11.600",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0044",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.647",
"lastModified": "2023-05-16T22:15:11.647",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0045",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.693",
"lastModified": "2023-05-16T22:15:11.693",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0046",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.737",
"lastModified": "2023-05-16T22:15:11.737",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0047",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.780",
"lastModified": "2023-05-16T22:15:11.780",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0048",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.823",
"lastModified": "2023-05-16T22:15:11.823",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0049",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.867",
"lastModified": "2023-05-16T22:15:11.867",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0050",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.917",
"lastModified": "2023-05-16T22:15:11.917",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0059",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:11.963",
"lastModified": "2023-05-16T22:15:11.963",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0068",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.010",
"lastModified": "2023-05-16T22:15:12.010",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0080",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.060",
"lastModified": "2023-05-16T22:15:12.060",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0081",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.103",
"lastModified": "2023-05-16T22:15:12.103",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0085",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.147",
"lastModified": "2023-05-16T22:15:12.147",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0087",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.197",
"lastModified": "2023-05-16T22:15:12.197",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0088",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.243",
"lastModified": "2023-05-16T22:15:12.243",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0122",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.287",
"lastModified": "2023-05-16T22:15:12.287",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0123",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.327",
"lastModified": "2023-05-16T22:15:12.327",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0128",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.370",
"lastModified": "2023-05-16T22:15:12.370",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0130",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.410",
"lastModified": "2023-05-16T22:15:12.410",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0136",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.457",
"lastModified": "2023-05-16T22:15:12.457",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0137",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.507",
"lastModified": "2023-05-16T22:15:12.507",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0138",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.553",
"lastModified": "2023-05-16T22:15:12.553",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0139",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.597",
"lastModified": "2023-05-16T22:15:12.597",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0140",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.637",
"lastModified": "2023-05-16T22:15:12.637",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0141",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.677",
"lastModified": "2023-05-16T22:15:12.677",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0142",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.720",
"lastModified": "2023-05-16T22:15:12.720",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0149",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.763",
"lastModified": "2023-05-16T22:15:12.763",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0150",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.810",
"lastModified": "2023-05-16T22:15:12.810",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0181",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.857",
"lastModified": "2023-05-16T22:15:12.857",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0184",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:12.903",
"lastModified": "2023-05-16T22:15:12.903",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0191",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:13.460",
"lastModified": "2023-05-16T22:15:13.460",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0192",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:13.507",
"lastModified": "2023-05-16T22:15:13.507",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-0195",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:13.557",
"lastModified": "2023-05-16T22:15:13.557",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-20600", "id": "CVE-2021-20600",
"sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp",
"published": "2021-10-08T17:15:07.437", "published": "2021-10-08T17:15:07.437",
"lastModified": "2022-07-07T16:15:08.927", "lastModified": "2023-05-16T22:50:39.020",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -43,18 +43,18 @@
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "2.0", "version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"accessVector": "NETWORK", "accessVector": "NETWORK",
"accessComplexity": "MEDIUM", "accessComplexity": "MEDIUM",
"authentication": "NONE", "authentication": "NONE",
"confidentialityImpact": "NONE", "confidentialityImpact": "NONE",
"integrityImpact": "NONE", "integrityImpact": "NONE",
"availabilityImpact": "PARTIAL", "availabilityImpact": "COMPLETE",
"baseScore": 4.3 "baseScore": 7.1
}, },
"baseSeverity": "MEDIUM", "baseSeverity": "HIGH",
"exploitabilityScore": 8.6, "exploitabilityScore": 8.6,
"impactScore": 2.9, "impactScore": 6.9,
"acInsufInfo": false, "acInsufInfo": false,
"obtainAllPrivilege": false, "obtainAllPrivilege": false,
"obtainUserPrivilege": false, "obtainUserPrivilege": false,
@ -86,7 +86,8 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:mitsubishielectric:r12ccpu-v_firmware:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:mitsubishielectric:r12ccpu-v_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56BCED50-FEC2-4F26-81AC-0C3C9BD12C4B" "versionEndIncluding": "16",
"matchCriteriaId": "B011D41D-5119-403C-A0A6-C872DA1ABB54"
} }
] ]
}, },

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-23145",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:13.603",
"lastModified": "2023-05-16T22:15:13.603",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-26946",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:13.647",
"lastModified": "2023-05-16T22:15:13.647",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-33065",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:13.700",
"lastModified": "2023-05-16T22:15:13.700",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-33066",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:13.750",
"lastModified": "2023-05-16T22:15:13.750",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-33067",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:13.787",
"lastModified": "2023-05-16T22:15:13.787",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2021-33070",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:13.830",
"lastModified": "2023-05-16T22:15:13.830",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2021. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-3609", "id": "CVE-2021-3609",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2022-03-03T19:15:08.173", "published": "2022-03-03T19:15:08.173",
"lastModified": "2023-02-12T23:41:20.010", "lastModified": "2023-05-16T22:39:09.540",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -95,40 +95,40 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.6.25", "versionStartIncluding": "2.6.25",
"versionEndExcluding": "5.13", "versionEndExcluding": "5.13",
"matchCriteriaId": "8EFC2DBA-66FA-4DAA-9541-E3A33920B255" "matchCriteriaId": "1DCA7CEB-754B-474C-BB29-B3C5A04996AF"
}, },
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*", "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "07CEAC13-3423-44F5-A2F8-6F5F846233C8" "matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
}, },
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*", "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F3CE353A-A5C0-4284-9D90-6B85475814B9" "matchCriteriaId": "96AC23B2-D46A-49D9-8203-8E1BEDCA8532"
}, },
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*", "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "4CDF8DC7-920B-45D8-BCED-B2FD21FE63FA" "matchCriteriaId": "DA610E30-717C-4700-9F77-A3C9244F3BFD"
}, },
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*", "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "3E8A9355-151F-476C-A0FD-747D46AAD110" "matchCriteriaId": "1ECD33F5-85BE-430B-8F86-8D7BD560311D"
}, },
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*", "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "BCC24971-26E3-4C4C-8490-DCEAC102D29B" "matchCriteriaId": "CF351855-2437-4CF5-AD7C-BDFA51F27683"
}, },
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*", "criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc6:*:*:*:*:*:*",
"matchCriteriaId": "B33BD284-D70B-4373-AE22-267AAE893A9B" "matchCriteriaId": "25A855BA-2118-44F2-90EF-EBBB12AF51EF"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-24738", "id": "CVE-2022-24738",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2022-03-07T22:15:08.227", "published": "2022-03-07T22:15:08.227",
"lastModified": "2022-03-17T15:55:20.160", "lastModified": "2023-05-16T22:53:49.397",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -114,9 +114,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:tharsis:evmos:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.1", "versionEndExcluding": "2.0.1",
"matchCriteriaId": "23DAB54E-9EC9-4A4B-84E2-6A7D52CDEBB5" "matchCriteriaId": "5134674C-EAA2-423C-AB60-7CE330AC7BBB"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-27856", "id": "CVE-2022-27856",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T11:15:09.587", "published": "2023-05-10T11:15:09.587",
"lastModified": "2023-05-10T13:06:16.563", "lastModified": "2023-05-16T21:56:30.183",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -12,6 +12,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -46,10 +66,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:atlasgondal:export_all_urls:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.1",
"matchCriteriaId": "F432B27C-5C08-47F6-B226-FB41A39ED10F"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://patchstack.com/database/vulnerability/export-all-urls/wordpress-export-all-urls-plugin-4-1-authenticated-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/export-all-urls/wordpress-export-all-urls-plugin-4-1-authenticated-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com" "source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-35266", "id": "CVE-2022-35266",
"sourceIdentifier": "talos-cna@cisco.com", "sourceIdentifier": "talos-cna@cisco.com",
"published": "2022-10-25T17:15:54.120", "published": "2022-10-25T17:15:54.120",
"lastModified": "2022-12-23T00:15:13.423", "lastModified": "2023-05-16T22:36:44.887",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-45061", "id": "CVE-2022-45061",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-11-09T07:15:09.887", "published": "2022-11-09T07:15:09.887",
"lastModified": "2023-05-03T11:15:11.877", "lastModified": "2023-05-16T23:04:21.670",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -48,6 +48,7 @@
], ],
"configurations": [ "configurations": [
{ {
"operator": "AND",
"nodes": [ "nodes": [
{ {
"operator": "OR", "operator": "OR",
@ -160,11 +161,17 @@
] ]
}, },
{ {
"operator": "AND",
"nodes": [ "nodes": [
{ {
"operator": "OR", "operator": "OR",
"negate": false, "negate": false,
"cpeMatch": [ "cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA"
},
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
@ -178,6 +185,79 @@
] ]
} }
] ]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"matchCriteriaId": "B55E8D50-99B4-47EC-86F9-699B67D473CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24B8DB06-590A-4008-B0AB-FCD1401C77C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85DF4B3F-4BBC-42B7-B729-096934523D63"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:hci:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A6E548F-62E9-40CB-85DA-FDAA0F0096C6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*",
"matchCriteriaId": "86B51137-28D9-41F2-AFA2-3CC22B4954D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95BA156C-C977-4F0C-8DFB-3FAE9CC8C02D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B"
}
]
}
]
} }
], ],
"references": [ "references": [
@ -192,11 +272,19 @@
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AOUKI72ACV6CHY2QUFO6VK2DNMVJ2MB/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/35YDIWCUMWTMDBWFRAVENFH6BLB65D6S/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4WBZJNSALFGMPYTINIF57HAAK46U72WQ/",
@ -208,39 +296,75 @@
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63FS6VHY4DCS74HBTEINUDOECQ2X6ZCH/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WQPHKGNXUJC3TC3BDW5RKGROWRJVSFR/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B3YI6JYARWU6GULWOHNUROSACT54XFFS/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTPVDZDATRQFE6KAT6B4BQIQ4GRHIIIJ/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IN26PWZTYG6IF3APLRXQJBVACQHZUPT2/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCDJXNBHWXNYUTOEV4H2HCFSRKV3SYL3/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JTYVESWVBPD57ZJC35G5722Q6TS37WSB/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KNE4GMD45RGC2HWUAAIGTDHT5VJ2E4O4/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKWAMPURWUV3DCCT4J7VHRF4NT2CFVBR/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O67LRHDTJWH544KXB6KY4HMHQLYDXFPK/",
@ -252,63 +376,121 @@
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ORVCQGJCCAVLN4DJDTWGREFCUWXKQRML/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PLQ2BNZVBBAQPV3SPRU24ZD37UYJJS7W/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QLUGZSEAO3MBWGKCUSMKQIRYJZKJCIOB/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RDK3ZZBRYFO47ET3N4BNTKVXN47U6ICY/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RH57BNT4VQERGEJ5SXNXSVMDYP66YD4H/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RTN2OOLKYTG34DODUEJGT5MLC2PFGPBA/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3D5TX4TDJPXHXD2QICKTY3OCQC3JARP/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UHVW73QZJMHA4MK7JBT7CXX7XSNYQEGF/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMDX6IFKLOA3NXUQEV524L5LHTPI2JI/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X3EJ6J7PXVQOULBQZQGBXCXY6LFF6LZD/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XXZJL3CNAFS5PAIR7K4RL62S3Y7THR7O/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPNWZKXPKTNHS5FVMN7UQZ2UPCSEFJUK/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZB5YCMIRVX35RUB6XPOWKENCVCJEVDRK/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://security.gentoo.org/glsa/202305-02", "url": "https://security.gentoo.org/glsa/202305-02",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://security.netapp.com/advisory/ntap-20221209-0007/", "url": "https://security.netapp.com/advisory/ntap-20221209-0007/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47137", "id": "CVE-2022-47137",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T11:15:09.967", "published": "2023-05-10T11:15:09.967",
"lastModified": "2023-05-10T13:06:16.563", "lastModified": "2023-05-16T21:58:18.313",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -12,6 +12,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -36,7 +56,7 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "audit@patchstack.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [ "description": [
{ {
@ -44,12 +64,43 @@
"value": "CWE-79" "value": "CWE-79"
} }
] ]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpmanageninja:ninja_tables:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.3.4",
"matchCriteriaId": "9A71DD56-FD3F-40AF-9808-8CC2315C5BDB"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://patchstack.com/database/vulnerability/ninja-tables/wordpress-ninja-tables-best-data-table-plugin-for-wordpress-plugin-4-3-4-cross-site-scripting-xss?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/ninja-tables/wordpress-ninja-tables-best-data-table-plugin-for-wordpress-plugin-4-3-4-cross-site-scripting-xss?_s_id=cve",
"source": "audit@patchstack.com" "source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47423", "id": "CVE-2022-47423",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T11:15:10.157", "published": "2023-05-10T11:15:10.157",
"lastModified": "2023-05-10T13:06:16.563", "lastModified": "2023-05-16T22:08:09.307",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -12,6 +12,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -46,10 +66,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-dtree_project:wp-dtree:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.4.5",
"matchCriteriaId": "8895F418-5443-41AB-A5CA-EBD1C0932B0A"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://patchstack.com/database/vulnerability/wp-dtree-30/wordpress-wp-dtree-plugin-4-4-5-cross-site-scripting-xss?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/wp-dtree-30/wordpress-wp-dtree-plugin-4-4-5-cross-site-scripting-xss?_s_id=cve",
"source": "audit@patchstack.com" "source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47436", "id": "CVE-2022-47436",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T11:15:10.307", "published": "2023-05-10T11:15:10.307",
"lastModified": "2023-05-10T13:06:16.563", "lastModified": "2023-05-16T22:09:53.720",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -12,6 +12,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -46,10 +66,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mantrabrain:yatra:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1.14",
"matchCriteriaId": "60CBD372-29D9-43DD-BA5D-1CD821531052"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://patchstack.com/database/vulnerability/yatra/wordpress-best-travel-booking-wordpress-plugin-tour-booking-system-trip-booking-wordpress-plugin-yatra-plugin-2-1-13-cross-site-scripting-xss?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/yatra/wordpress-best-travel-booking-wordpress-plugin-tour-booking-system-trip-booking-wordpress-plugin-yatra-plugin-2-1-13-cross-site-scripting-xss?_s_id=cve",
"source": "audit@patchstack.com" "source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,23 +2,106 @@
"id": "CVE-2023-27510", "id": "CVE-2023-27510",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:13.807", "published": "2023-05-10T06:15:13.807",
"lastModified": "2023-05-10T13:06:16.563", "lastModified": "2023-05-16T22:29:07.847",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "JB Inquiry form contains an exposure of private personal information to an unauthorized actor vulnerability, which may allow a remote unauthenticated attacker to obtain information entered from forms created using the affected product. The affected products and versions are as follows: JB Inquiry form versions 0.6.1 and 0.6.0, JB Inquiry form versions 0.5.2, 0.5.1 and 0.5.0, and JB Inquiry form version 0.40." "value": "JB Inquiry form contains an exposure of private personal information to an unauthorized actor vulnerability, which may allow a remote unauthenticated attacker to obtain information entered from forms created using the affected product. The affected products and versions are as follows: JB Inquiry form versions 0.6.1 and 0.6.0, JB Inquiry form versions 0.5.2, 0.5.1 and 0.5.0, and JB Inquiry form version 0.40."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "551D6264-5C5B-4CB5-A79E-77614A4619FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3845790E-96A1-41D8-8C63-34C38862075F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6262C814-C397-4DAE-920F-CAFA9162F2B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A7B3B7F-341D-42F2-846B-FA5A36924974"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4D04C8BD-88F3-4070-AC82-61CB32CAC814"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jubei:jb_inquiry_form:0.40:*:*:*:*:*:*:*",
"matchCriteriaId": "8F3C55CD-138D-4B56-A59A-A90F30674ADC"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://jubei.co.jp/formmail/info20230414.html", "url": "https://jubei.co.jp/formmail/info20230414.html",
"source": "vultures@jpcert.or.jp" "source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://jvn.jp/en/jp/JVN36340790/", "url": "https://jvn.jp/en/jp/JVN36340790/",
"source": "vultures@jpcert.or.jp" "source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31677",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:13.913",
"lastModified": "2023-05-16T22:15:13.913",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Insecure permissions in luowice 3.5.18 allow attackers to view information for other alarm devices via modification of the eseeid parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/zzh-newlearner/record/blob/main/luowice.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31678",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:13.957",
"lastModified": "2023-05-16T22:15:13.957",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in Videogo v6.8.1 allows attackers to bind shared devices after the connection has been ended."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/zzh-newlearner/record/blob/main/yingshi_devicekey.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31679",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T22:15:14.003",
"lastModified": "2023-05-16T22:15:14.003",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in Videogo v6.8.1 allows attackers to access images from other devices via modification of the Device Id parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/zzh-newlearner/record/blob/main/yingshi_privacy.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-31906", "id": "CVE-2023-31906",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T15:15:10.187", "published": "2023-05-10T15:15:10.187",
"lastModified": "2023-05-10T15:26:03.940", "lastModified": "2023-05-16T23:11:15.007",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Jerryscript 3.0.0(commit 1a2c047) was discovered to contain a heap-buffer-overflow via the component lexer_compare_identifier_to_chars at /jerry-core/parser/js/js-lexer.c." "value": "Jerryscript 3.0.0(commit 1a2c047) was discovered to contain a heap-buffer-overflow via the component lexer_compare_identifier_to_chars at /jerry-core/parser/js/js-lexer.c."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/jerryscript-project/jerryscript/issues/5066", "url": "https://github.com/jerryscript-project/jerryscript/issues/5066",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
} }
] ]
} }

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-31907", "id": "CVE-2023-31907",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T15:15:10.353", "published": "2023-05-10T15:15:10.353",
"lastModified": "2023-05-10T15:26:03.940", "lastModified": "2023-05-16T23:12:04.163",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via the component scanner_literal_is_created at /jerry-core/parser/js/js-scanner-util.c." "value": "Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via the component scanner_literal_is_created at /jerry-core/parser/js/js-scanner-util.c."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/jerryscript-project/jerryscript/issues/5073", "url": "https://github.com/jerryscript-project/jerryscript/issues/5073",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
} }
] ]
} }

227
README.md
View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2023-05-16T21:55:25.390018+00:00 2023-05-17T00:00:24.004568+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2023-05-16T21:51:49.343000+00:00 2023-05-16T23:12:04.163000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -29,143 +29,112 @@ Download and Changelog: [Click](releases/latest)
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
215422 215495
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `6` Recently added CVEs: `73`
* [CVE-2021-27131](CVE-2021/CVE-2021-271xx/CVE-2021-27131.json) (`2023-05-16T20:15:08.987`) * [CVE-2021-0010](CVE-2021/CVE-2021-00xx/CVE-2021-0010.json) (`2023-05-16T22:15:10.137`)
* [CVE-2023-27742](CVE-2023/CVE-2023-277xx/CVE-2023-27742.json) (`2023-05-16T20:15:09.093`) * [CVE-2021-0011](CVE-2021/CVE-2021-00xx/CVE-2021-0011.json) (`2023-05-16T22:15:10.210`)
* [CVE-2023-29927](CVE-2023/CVE-2023-299xx/CVE-2023-29927.json) (`2023-05-16T20:15:09.213`) * [CVE-2021-0014](CVE-2021/CVE-2021-00xx/CVE-2021-0014.json) (`2023-05-16T22:15:10.260`)
* [CVE-2023-30189](CVE-2023/CVE-2023-301xx/CVE-2023-30189.json) (`2023-05-16T20:15:09.273`) * [CVE-2021-0015](CVE-2021/CVE-2021-00xx/CVE-2021-0015.json) (`2023-05-16T22:15:10.310`)
* [CVE-2023-30281](CVE-2023/CVE-2023-302xx/CVE-2023-30281.json) (`2023-05-16T20:15:09.323`) * [CVE-2021-0016](CVE-2021/CVE-2021-00xx/CVE-2021-0016.json) (`2023-05-16T22:15:10.357`)
* [CVE-2023-31544](CVE-2023/CVE-2023-315xx/CVE-2023-31544.json) (`2023-05-16T21:15:09.027`) * [CVE-2021-0017](CVE-2021/CVE-2021-00xx/CVE-2021-0017.json) (`2023-05-16T22:15:10.403`)
* [CVE-2021-0018](CVE-2021/CVE-2021-00xx/CVE-2021-0018.json) (`2023-05-16T22:15:10.450`)
* [CVE-2021-0019](CVE-2021/CVE-2021-00xx/CVE-2021-0019.json) (`2023-05-16T22:15:10.497`)
* [CVE-2021-0020](CVE-2021/CVE-2021-00xx/CVE-2021-0020.json) (`2023-05-16T22:15:10.547`)
* [CVE-2021-0021](CVE-2021/CVE-2021-00xx/CVE-2021-0021.json) (`2023-05-16T22:15:10.593`)
* [CVE-2021-0022](CVE-2021/CVE-2021-00xx/CVE-2021-0022.json) (`2023-05-16T22:15:10.643`)
* [CVE-2021-0023](CVE-2021/CVE-2021-00xx/CVE-2021-0023.json) (`2023-05-16T22:15:10.693`)
* [CVE-2021-0024](CVE-2021/CVE-2021-00xx/CVE-2021-0024.json) (`2023-05-16T22:15:10.733`)
* [CVE-2021-0025](CVE-2021/CVE-2021-00xx/CVE-2021-0025.json) (`2023-05-16T22:15:10.773`)
* [CVE-2021-0026](CVE-2021/CVE-2021-00xx/CVE-2021-0026.json) (`2023-05-16T22:15:10.813`)
* [CVE-2021-0027](CVE-2021/CVE-2021-00xx/CVE-2021-0027.json) (`2023-05-16T22:15:10.860`)
* [CVE-2021-0028](CVE-2021/CVE-2021-00xx/CVE-2021-0028.json) (`2023-05-16T22:15:10.910`)
* [CVE-2021-0029](CVE-2021/CVE-2021-00xx/CVE-2021-0029.json) (`2023-05-16T22:15:10.963`)
* [CVE-2021-0030](CVE-2021/CVE-2021-00xx/CVE-2021-0030.json) (`2023-05-16T22:15:11.010`)
* [CVE-2021-0031](CVE-2021/CVE-2021-00xx/CVE-2021-0031.json) (`2023-05-16T22:15:11.060`)
* [CVE-2021-0032](CVE-2021/CVE-2021-00xx/CVE-2021-0032.json) (`2023-05-16T22:15:11.107`)
* [CVE-2021-0033](CVE-2021/CVE-2021-00xx/CVE-2021-0033.json) (`2023-05-16T22:15:11.157`)
* [CVE-2021-0034](CVE-2021/CVE-2021-00xx/CVE-2021-0034.json) (`2023-05-16T22:15:11.207`)
* [CVE-2021-0035](CVE-2021/CVE-2021-00xx/CVE-2021-0035.json) (`2023-05-16T22:15:11.247`)
* [CVE-2021-0036](CVE-2021/CVE-2021-00xx/CVE-2021-0036.json) (`2023-05-16T22:15:11.290`)
* [CVE-2021-0037](CVE-2021/CVE-2021-00xx/CVE-2021-0037.json) (`2023-05-16T22:15:11.337`)
* [CVE-2021-0038](CVE-2021/CVE-2021-00xx/CVE-2021-0038.json) (`2023-05-16T22:15:11.387`)
* [CVE-2021-0039](CVE-2021/CVE-2021-00xx/CVE-2021-0039.json) (`2023-05-16T22:15:11.423`)
* [CVE-2021-0040](CVE-2021/CVE-2021-00xx/CVE-2021-0040.json) (`2023-05-16T22:15:11.470`)
* [CVE-2021-0041](CVE-2021/CVE-2021-00xx/CVE-2021-0041.json) (`2023-05-16T22:15:11.513`)
* [CVE-2021-0042](CVE-2021/CVE-2021-00xx/CVE-2021-0042.json) (`2023-05-16T22:15:11.557`)
* [CVE-2021-0043](CVE-2021/CVE-2021-00xx/CVE-2021-0043.json) (`2023-05-16T22:15:11.600`)
* [CVE-2021-0044](CVE-2021/CVE-2021-00xx/CVE-2021-0044.json) (`2023-05-16T22:15:11.647`)
* [CVE-2021-0045](CVE-2021/CVE-2021-00xx/CVE-2021-0045.json) (`2023-05-16T22:15:11.693`)
* [CVE-2021-0046](CVE-2021/CVE-2021-00xx/CVE-2021-0046.json) (`2023-05-16T22:15:11.737`)
* [CVE-2021-0047](CVE-2021/CVE-2021-00xx/CVE-2021-0047.json) (`2023-05-16T22:15:11.780`)
* [CVE-2021-0048](CVE-2021/CVE-2021-00xx/CVE-2021-0048.json) (`2023-05-16T22:15:11.823`)
* [CVE-2021-0049](CVE-2021/CVE-2021-00xx/CVE-2021-0049.json) (`2023-05-16T22:15:11.867`)
* [CVE-2021-0050](CVE-2021/CVE-2021-00xx/CVE-2021-0050.json) (`2023-05-16T22:15:11.917`)
* [CVE-2021-0059](CVE-2021/CVE-2021-00xx/CVE-2021-0059.json) (`2023-05-16T22:15:11.963`)
* [CVE-2021-0068](CVE-2021/CVE-2021-00xx/CVE-2021-0068.json) (`2023-05-16T22:15:12.010`)
* [CVE-2021-0080](CVE-2021/CVE-2021-00xx/CVE-2021-0080.json) (`2023-05-16T22:15:12.060`)
* [CVE-2021-0081](CVE-2021/CVE-2021-00xx/CVE-2021-0081.json) (`2023-05-16T22:15:12.103`)
* [CVE-2021-0085](CVE-2021/CVE-2021-00xx/CVE-2021-0085.json) (`2023-05-16T22:15:12.147`)
* [CVE-2021-0087](CVE-2021/CVE-2021-00xx/CVE-2021-0087.json) (`2023-05-16T22:15:12.197`)
* [CVE-2021-0088](CVE-2021/CVE-2021-00xx/CVE-2021-0088.json) (`2023-05-16T22:15:12.243`)
* [CVE-2021-0122](CVE-2021/CVE-2021-01xx/CVE-2021-0122.json) (`2023-05-16T22:15:12.287`)
* [CVE-2021-0123](CVE-2021/CVE-2021-01xx/CVE-2021-0123.json) (`2023-05-16T22:15:12.327`)
* [CVE-2021-0128](CVE-2021/CVE-2021-01xx/CVE-2021-0128.json) (`2023-05-16T22:15:12.370`)
* [CVE-2021-0130](CVE-2021/CVE-2021-01xx/CVE-2021-0130.json) (`2023-05-16T22:15:12.410`)
* [CVE-2021-0136](CVE-2021/CVE-2021-01xx/CVE-2021-0136.json) (`2023-05-16T22:15:12.457`)
* [CVE-2021-0137](CVE-2021/CVE-2021-01xx/CVE-2021-0137.json) (`2023-05-16T22:15:12.507`)
* [CVE-2021-0138](CVE-2021/CVE-2021-01xx/CVE-2021-0138.json) (`2023-05-16T22:15:12.553`)
* [CVE-2021-0139](CVE-2021/CVE-2021-01xx/CVE-2021-0139.json) (`2023-05-16T22:15:12.597`)
* [CVE-2021-0140](CVE-2021/CVE-2021-01xx/CVE-2021-0140.json) (`2023-05-16T22:15:12.637`)
* [CVE-2021-0141](CVE-2021/CVE-2021-01xx/CVE-2021-0141.json) (`2023-05-16T22:15:12.677`)
* [CVE-2021-0142](CVE-2021/CVE-2021-01xx/CVE-2021-0142.json) (`2023-05-16T22:15:12.720`)
* [CVE-2021-0149](CVE-2021/CVE-2021-01xx/CVE-2021-0149.json) (`2023-05-16T22:15:12.763`)
* [CVE-2021-0150](CVE-2021/CVE-2021-01xx/CVE-2021-0150.json) (`2023-05-16T22:15:12.810`)
* [CVE-2021-0181](CVE-2021/CVE-2021-01xx/CVE-2021-0181.json) (`2023-05-16T22:15:12.857`)
* [CVE-2021-0184](CVE-2021/CVE-2021-01xx/CVE-2021-0184.json) (`2023-05-16T22:15:12.903`)
* [CVE-2021-0191](CVE-2021/CVE-2021-01xx/CVE-2021-0191.json) (`2023-05-16T22:15:13.460`)
* [CVE-2021-0192](CVE-2021/CVE-2021-01xx/CVE-2021-0192.json) (`2023-05-16T22:15:13.507`)
* [CVE-2021-0195](CVE-2021/CVE-2021-01xx/CVE-2021-0195.json) (`2023-05-16T22:15:13.557`)
* [CVE-2021-23145](CVE-2021/CVE-2021-231xx/CVE-2021-23145.json) (`2023-05-16T22:15:13.603`)
* [CVE-2021-26946](CVE-2021/CVE-2021-269xx/CVE-2021-26946.json) (`2023-05-16T22:15:13.647`)
* [CVE-2021-33065](CVE-2021/CVE-2021-330xx/CVE-2021-33065.json) (`2023-05-16T22:15:13.700`)
* [CVE-2021-33066](CVE-2021/CVE-2021-330xx/CVE-2021-33066.json) (`2023-05-16T22:15:13.750`)
* [CVE-2021-33067](CVE-2021/CVE-2021-330xx/CVE-2021-33067.json) (`2023-05-16T22:15:13.787`)
* [CVE-2021-33070](CVE-2021/CVE-2021-330xx/CVE-2021-33070.json) (`2023-05-16T22:15:13.830`)
* [CVE-2023-31677](CVE-2023/CVE-2023-316xx/CVE-2023-31677.json) (`2023-05-16T22:15:13.913`)
* [CVE-2023-31678](CVE-2023/CVE-2023-316xx/CVE-2023-31678.json) (`2023-05-16T22:15:13.957`)
* [CVE-2023-31679](CVE-2023/CVE-2023-316xx/CVE-2023-31679.json) (`2023-05-16T22:15:14.003`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `118` Recently modified CVEs: `20`
* [CVE-2017-14025](CVE-2017/CVE-2017-140xx/CVE-2017-14025.json) (`2023-05-16T20:58:31.210`) * [CVE-2020-14575](CVE-2020/CVE-2020-145xx/CVE-2020-14575.json) (`2023-05-16T22:55:30.580`)
* [CVE-2017-15583](CVE-2017/CVE-2017-155xx/CVE-2017-15583.json) (`2023-05-16T20:58:31.210`) * [CVE-2020-14678](CVE-2020/CVE-2020-146xx/CVE-2020-14678.json) (`2023-05-16T22:59:36.700`)
* [CVE-2017-16731](CVE-2017/CVE-2017-167xx/CVE-2017-16731.json) (`2023-05-16T20:10:13.340`) * [CVE-2020-14680](CVE-2020/CVE-2020-146xx/CVE-2020-14680.json) (`2023-05-16T22:58:48.653`)
* [CVE-2018-1168](CVE-2018/CVE-2018-11xx/CVE-2018-1168.json) (`2023-05-16T21:04:23.433`) * [CVE-2020-14697](CVE-2020/CVE-2020-146xx/CVE-2020-14697.json) (`2023-05-16T22:55:00.257`)
* [CVE-2018-14805](CVE-2018/CVE-2018-148xx/CVE-2018-14805.json) (`2023-05-16T20:21:29.777`) * [CVE-2020-14702](CVE-2020/CVE-2020-147xx/CVE-2020-14702.json) (`2023-05-16T22:56:00.377`)
* [CVE-2018-20720](CVE-2018/CVE-2018-207xx/CVE-2018-20720.json) (`2023-05-16T21:02:25.137`) * [CVE-2020-15888](CVE-2020/CVE-2020-158xx/CVE-2020-15888.json) (`2023-05-16T22:31:05.550`)
* [CVE-2019-0097](CVE-2019/CVE-2019-00xx/CVE-2019-0097.json) (`2023-05-16T21:43:11.747`) * [CVE-2020-16168](CVE-2020/CVE-2020-161xx/CVE-2020-16168.json) (`2023-05-16T22:42:15.457`)
* [CVE-2019-18247](CVE-2019/CVE-2019-182xx/CVE-2019-18247.json) (`2023-05-16T21:02:25.137`) * [CVE-2021-0187](CVE-2021/CVE-2021-01xx/CVE-2021-0187.json) (`2023-05-16T22:15:13.397`)
* [CVE-2019-18253](CVE-2019/CVE-2019-182xx/CVE-2019-18253.json) (`2023-05-16T21:02:25.137`) * [CVE-2021-20600](CVE-2021/CVE-2021-206xx/CVE-2021-20600.json) (`2023-05-16T22:50:39.020`)
* [CVE-2019-18998](CVE-2019/CVE-2019-189xx/CVE-2019-18998.json) (`2023-05-16T20:06:09.550`) * [CVE-2021-3609](CVE-2021/CVE-2021-36xx/CVE-2021-3609.json) (`2023-05-16T22:39:09.540`)
* [CVE-2019-19000](CVE-2019/CVE-2019-190xx/CVE-2019-19000.json) (`2023-05-16T20:21:29.777`) * [CVE-2022-24738](CVE-2022/CVE-2022-247xx/CVE-2022-24738.json) (`2023-05-16T22:53:49.397`)
* [CVE-2019-19001](CVE-2019/CVE-2019-190xx/CVE-2019-19001.json) (`2023-05-16T20:21:29.777`) * [CVE-2022-27856](CVE-2022/CVE-2022-278xx/CVE-2022-27856.json) (`2023-05-16T21:56:30.183`)
* [CVE-2019-19002](CVE-2019/CVE-2019-190xx/CVE-2019-19002.json) (`2023-05-16T20:21:29.777`) * [CVE-2022-35266](CVE-2022/CVE-2022-352xx/CVE-2022-35266.json) (`2023-05-16T22:36:44.887`)
* [CVE-2019-19003](CVE-2019/CVE-2019-190xx/CVE-2019-19003.json) (`2023-05-16T20:21:29.777`) * [CVE-2022-45061](CVE-2022/CVE-2022-450xx/CVE-2022-45061.json) (`2023-05-16T23:04:21.670`)
* [CVE-2019-19089](CVE-2019/CVE-2019-190xx/CVE-2019-19089.json) (`2023-05-16T20:21:29.777`) * [CVE-2022-47137](CVE-2022/CVE-2022-471xx/CVE-2022-47137.json) (`2023-05-16T21:58:18.313`)
* [CVE-2019-19090](CVE-2019/CVE-2019-190xx/CVE-2019-19090.json) (`2023-05-16T20:21:29.777`) * [CVE-2022-47423](CVE-2022/CVE-2022-474xx/CVE-2022-47423.json) (`2023-05-16T22:08:09.307`)
* [CVE-2019-19091](CVE-2019/CVE-2019-190xx/CVE-2019-19091.json) (`2023-05-16T20:21:29.777`) * [CVE-2022-47436](CVE-2022/CVE-2022-474xx/CVE-2022-47436.json) (`2023-05-16T22:09:53.720`)
* [CVE-2019-19092](CVE-2019/CVE-2019-190xx/CVE-2019-19092.json) (`2023-05-16T20:21:29.777`) * [CVE-2023-27510](CVE-2023/CVE-2023-275xx/CVE-2023-27510.json) (`2023-05-16T22:29:07.847`)
* [CVE-2019-19093](CVE-2019/CVE-2019-190xx/CVE-2019-19093.json) (`2023-05-16T20:21:29.777`) * [CVE-2023-31906](CVE-2023/CVE-2023-319xx/CVE-2023-31906.json) (`2023-05-16T23:11:15.007`)
* [CVE-2019-19094](CVE-2019/CVE-2019-190xx/CVE-2019-19094.json) (`2023-05-16T20:21:29.777`) * [CVE-2023-31907](CVE-2023/CVE-2023-319xx/CVE-2023-31907.json) (`2023-05-16T23:12:04.163`)
* [CVE-2019-19095](CVE-2019/CVE-2019-190xx/CVE-2019-19095.json) (`2023-05-16T20:21:29.777`)
* [CVE-2019-19096](CVE-2019/CVE-2019-190xx/CVE-2019-19096.json) (`2023-05-16T20:21:29.777`)
* [CVE-2019-19097](CVE-2019/CVE-2019-190xx/CVE-2019-19097.json) (`2023-05-16T20:21:29.777`)
* [CVE-2019-5620](CVE-2019/CVE-2019-56xx/CVE-2019-5620.json) (`2023-05-16T20:44:12.157`)
* [CVE-2021-22278](CVE-2021/CVE-2021-222xx/CVE-2021-22278.json) (`2023-05-16T20:56:48.347`)
* [CVE-2021-26845](CVE-2021/CVE-2021-268xx/CVE-2021-26845.json) (`2023-05-16T20:21:29.777`)
* [CVE-2021-27196](CVE-2021/CVE-2021-271xx/CVE-2021-27196.json) (`2023-05-16T21:04:23.433`)
* [CVE-2021-27414](CVE-2021/CVE-2021-274xx/CVE-2021-27414.json) (`2023-05-16T20:16:56.977`)
* [CVE-2021-27416](CVE-2021/CVE-2021-274xx/CVE-2021-27416.json) (`2023-05-16T20:16:56.977`)
* [CVE-2021-31239](CVE-2021/CVE-2021-312xx/CVE-2021-31239.json) (`2023-05-16T21:03:51.827`)
* [CVE-2021-35526](CVE-2021/CVE-2021-355xx/CVE-2021-35526.json) (`2023-05-16T20:56:48.347`)
* [CVE-2021-35527](CVE-2021/CVE-2021-355xx/CVE-2021-35527.json) (`2023-05-16T20:21:29.777`)
* [CVE-2021-35529](CVE-2021/CVE-2021-355xx/CVE-2021-35529.json) (`2023-05-16T20:09:00.503`)
* [CVE-2021-35533](CVE-2021/CVE-2021-355xx/CVE-2021-35533.json) (`2023-05-16T21:04:23.433`)
* [CVE-2022-28613](CVE-2022/CVE-2022-286xx/CVE-2022-28613.json) (`2023-05-16T21:04:23.433`)
* [CVE-2023-0536](CVE-2023/CVE-2023-05xx/CVE-2023-0536.json) (`2023-05-16T20:05:41.627`)
* [CVE-2023-1031](CVE-2023/CVE-2023-10xx/CVE-2023-1031.json) (`2023-05-16T20:00:29.527`)
* [CVE-2023-2195](CVE-2023/CVE-2023-21xx/CVE-2023-2195.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-2196](CVE-2023/CVE-2023-21xx/CVE-2023-2196.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-22361](CVE-2023/CVE-2023-223xx/CVE-2023-22361.json) (`2023-05-16T21:13:19.133`)
* [CVE-2023-22696](CVE-2023/CVE-2023-226xx/CVE-2023-22696.json) (`2023-05-16T21:25:22.240`)
* [CVE-2023-23794](CVE-2023/CVE-2023-237xx/CVE-2023-23794.json) (`2023-05-16T21:32:54.857`)
* [CVE-2023-23873](CVE-2023/CVE-2023-238xx/CVE-2023-23873.json) (`2023-05-16T21:35:51.213`)
* [CVE-2023-24406](CVE-2023/CVE-2023-244xx/CVE-2023-24406.json) (`2023-05-16T21:37:27.610`)
* [CVE-2023-25824](CVE-2023/CVE-2023-258xx/CVE-2023-25824.json) (`2023-05-16T20:54:11.347`)
* [CVE-2023-2631](CVE-2023/CVE-2023-26xx/CVE-2023-2631.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-2632](CVE-2023/CVE-2023-26xx/CVE-2023-2632.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-2633](CVE-2023/CVE-2023-26xx/CVE-2023-2633.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-2721](CVE-2023/CVE-2023-27xx/CVE-2023-2721.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-2722](CVE-2023/CVE-2023-27xx/CVE-2023-2722.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-2723](CVE-2023/CVE-2023-27xx/CVE-2023-2723.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-2724](CVE-2023/CVE-2023-27xx/CVE-2023-2724.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-2725](CVE-2023/CVE-2023-27xx/CVE-2023-2725.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-2726](CVE-2023/CVE-2023-27xx/CVE-2023-2726.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-2738](CVE-2023/CVE-2023-27xx/CVE-2023-2738.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-2739](CVE-2023/CVE-2023-27xx/CVE-2023-2739.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-2740](CVE-2023/CVE-2023-27xx/CVE-2023-2740.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-27419](CVE-2023/CVE-2023-274xx/CVE-2023-27419.json) (`2023-05-16T21:39:13.027`)
* [CVE-2023-27455](CVE-2023/CVE-2023-274xx/CVE-2023-27455.json) (`2023-05-16T21:43:52.443`)
* [CVE-2023-27527](CVE-2023/CVE-2023-275xx/CVE-2023-27527.json) (`2023-05-16T20:33:27.193`)
* [CVE-2023-27888](CVE-2023/CVE-2023-278xx/CVE-2023-27888.json) (`2023-05-16T20:20:33.970`)
* [CVE-2023-28076](CVE-2023/CVE-2023-280xx/CVE-2023-28076.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-28128](CVE-2023/CVE-2023-281xx/CVE-2023-28128.json) (`2023-05-16T20:15:09.140`)
* [CVE-2023-28318](CVE-2023/CVE-2023-283xx/CVE-2023-28318.json) (`2023-05-16T20:03:20.540`)
* [CVE-2023-28932](CVE-2023/CVE-2023-289xx/CVE-2023-28932.json) (`2023-05-16T21:23:45.097`)
* [CVE-2023-29101](CVE-2023/CVE-2023-291xx/CVE-2023-29101.json) (`2023-05-16T21:51:49.343`)
* [CVE-2023-29439](CVE-2023/CVE-2023-294xx/CVE-2023-29439.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-30501](CVE-2023/CVE-2023-305xx/CVE-2023-30501.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-30502](CVE-2023/CVE-2023-305xx/CVE-2023-30502.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-30503](CVE-2023/CVE-2023-305xx/CVE-2023-30503.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-30504](CVE-2023/CVE-2023-305xx/CVE-2023-30504.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-30505](CVE-2023/CVE-2023-305xx/CVE-2023-30505.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-30506](CVE-2023/CVE-2023-305xx/CVE-2023-30506.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-30507](CVE-2023/CVE-2023-305xx/CVE-2023-30507.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-30508](CVE-2023/CVE-2023-305xx/CVE-2023-30508.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-30509](CVE-2023/CVE-2023-305xx/CVE-2023-30509.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-30510](CVE-2023/CVE-2023-305xx/CVE-2023-30510.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-31519](CVE-2023/CVE-2023-315xx/CVE-2023-31519.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-31572](CVE-2023/CVE-2023-315xx/CVE-2023-31572.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-31576](CVE-2023/CVE-2023-315xx/CVE-2023-31576.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-31587](CVE-2023/CVE-2023-315xx/CVE-2023-31587.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-31856](CVE-2023/CVE-2023-318xx/CVE-2023-31856.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-31857](CVE-2023/CVE-2023-318xx/CVE-2023-31857.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-31890](CVE-2023/CVE-2023-318xx/CVE-2023-31890.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32568](CVE-2023/CVE-2023-325xx/CVE-2023-32568.json) (`2023-05-16T20:09:16.343`)
* [CVE-2023-32569](CVE-2023/CVE-2023-325xx/CVE-2023-32569.json) (`2023-05-16T20:13:37.477`)
* [CVE-2023-32570](CVE-2023/CVE-2023-325xx/CVE-2023-32570.json) (`2023-05-16T20:48:09.520`)
* [CVE-2023-32977](CVE-2023/CVE-2023-329xx/CVE-2023-32977.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32978](CVE-2023/CVE-2023-329xx/CVE-2023-32978.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32979](CVE-2023/CVE-2023-329xx/CVE-2023-32979.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32980](CVE-2023/CVE-2023-329xx/CVE-2023-32980.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32981](CVE-2023/CVE-2023-329xx/CVE-2023-32981.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32982](CVE-2023/CVE-2023-329xx/CVE-2023-32982.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32983](CVE-2023/CVE-2023-329xx/CVE-2023-32983.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32984](CVE-2023/CVE-2023-329xx/CVE-2023-32984.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32985](CVE-2023/CVE-2023-329xx/CVE-2023-32985.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32986](CVE-2023/CVE-2023-329xx/CVE-2023-32986.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32987](CVE-2023/CVE-2023-329xx/CVE-2023-32987.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32988](CVE-2023/CVE-2023-329xx/CVE-2023-32988.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32989](CVE-2023/CVE-2023-329xx/CVE-2023-32989.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32990](CVE-2023/CVE-2023-329xx/CVE-2023-32990.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32991](CVE-2023/CVE-2023-329xx/CVE-2023-32991.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32992](CVE-2023/CVE-2023-329xx/CVE-2023-32992.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32993](CVE-2023/CVE-2023-329xx/CVE-2023-32993.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32994](CVE-2023/CVE-2023-329xx/CVE-2023-32994.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32995](CVE-2023/CVE-2023-329xx/CVE-2023-32995.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32996](CVE-2023/CVE-2023-329xx/CVE-2023-32996.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32997](CVE-2023/CVE-2023-329xx/CVE-2023-32997.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32998](CVE-2023/CVE-2023-329xx/CVE-2023-32998.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-32999](CVE-2023/CVE-2023-329xx/CVE-2023-32999.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-33000](CVE-2023/CVE-2023-330xx/CVE-2023-33000.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-33001](CVE-2023/CVE-2023-330xx/CVE-2023-33001.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-33002](CVE-2023/CVE-2023-330xx/CVE-2023-33002.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-33003](CVE-2023/CVE-2023-330xx/CVE-2023-33003.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-33004](CVE-2023/CVE-2023-330xx/CVE-2023-33004.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-33005](CVE-2023/CVE-2023-330xx/CVE-2023-33005.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-33006](CVE-2023/CVE-2023-330xx/CVE-2023-33006.json) (`2023-05-16T20:04:03.627`)
* [CVE-2023-33007](CVE-2023/CVE-2023-330xx/CVE-2023-33007.json) (`2023-05-16T20:04:03.627`)
## Download and Usage ## Download and Usage