From 7719591d12fe90523b4ef4fdcffa8a4fbf1ea937 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 7 Aug 2023 10:00:36 +0000 Subject: [PATCH] Auto-Update: 2023-08-07T10:00:32.895580+00:00 --- CVE-2023/CVE-2023-239xx/CVE-2023-23934.json | 16 ++++++----- CVE-2023/CVE-2023-255xx/CVE-2023-25577.json | 12 ++++++--- CVE-2023/CVE-2023-381xx/CVE-2023-38133.json | 6 ++++- CVE-2023/CVE-2023-385xx/CVE-2023-38572.json | 6 ++++- CVE-2023/CVE-2023-385xx/CVE-2023-38592.json | 6 ++++- CVE-2023/CVE-2023-385xx/CVE-2023-38594.json | 6 ++++- CVE-2023/CVE-2023-385xx/CVE-2023-38595.json | 6 ++++- CVE-2023/CVE-2023-385xx/CVE-2023-38597.json | 6 ++++- CVE-2023/CVE-2023-385xx/CVE-2023-38599.json | 6 ++++- CVE-2023/CVE-2023-386xx/CVE-2023-38600.json | 6 ++++- CVE-2023/CVE-2023-386xx/CVE-2023-38611.json | 6 ++++- CVE-2023/CVE-2023-40xx/CVE-2023-4045.json | 6 ++++- CVE-2023/CVE-2023-40xx/CVE-2023-4046.json | 6 ++++- CVE-2023/CVE-2023-40xx/CVE-2023-4047.json | 6 ++++- CVE-2023/CVE-2023-40xx/CVE-2023-4048.json | 8 ++++-- CVE-2023/CVE-2023-40xx/CVE-2023-4049.json | 6 ++++- CVE-2023/CVE-2023-40xx/CVE-2023-4050.json | 6 ++++- CVE-2023/CVE-2023-40xx/CVE-2023-4055.json | 6 ++++- CVE-2023/CVE-2023-40xx/CVE-2023-4056.json | 8 ++++-- README.md | 30 ++++++++++++++++----- 20 files changed, 128 insertions(+), 36 deletions(-) diff --git a/CVE-2023/CVE-2023-239xx/CVE-2023-23934.json b/CVE-2023/CVE-2023-239xx/CVE-2023-23934.json index e5100de8b89..4314be0f6be 100644 --- a/CVE-2023/CVE-2023-239xx/CVE-2023-23934.json +++ b/CVE-2023/CVE-2023-239xx/CVE-2023-23934.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23934", "sourceIdentifier": "security-advisories@github.com", "published": "2023-02-14T20:15:17.370", - "lastModified": "2023-02-23T22:31:59.150", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-07T08:15:14.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -56,22 +56,22 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security-advisories@github.com", "type": "Primary", "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-20" } ] }, { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-20" + "value": "NVD-CWE-noinfo" } ] } @@ -115,6 +115,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5470", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-255xx/CVE-2023-25577.json b/CVE-2023/CVE-2023-255xx/CVE-2023-25577.json index 3d8a56733b1..9230d61a073 100644 --- a/CVE-2023/CVE-2023-255xx/CVE-2023-25577.json +++ b/CVE-2023/CVE-2023-255xx/CVE-2023-25577.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25577", "sourceIdentifier": "security-advisories@github.com", "published": "2023-02-14T20:15:17.543", - "lastModified": "2023-02-23T22:21:32.397", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-07T08:15:14.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -56,7 +56,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security-advisories@github.com", "type": "Primary", "description": [ { @@ -66,7 +66,7 @@ ] }, { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { @@ -115,6 +115,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5470", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-381xx/CVE-2023-38133.json b/CVE-2023/CVE-2023-381xx/CVE-2023-38133.json index c0b90c5261c..a70281651e9 100644 --- a/CVE-2023/CVE-2023-381xx/CVE-2023-38133.json +++ b/CVE-2023/CVE-2023-381xx/CVE-2023-38133.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38133", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T00:15:15.620", - "lastModified": "2023-08-04T03:15:12.377", + "lastModified": "2023-08-07T08:15:14.403", "vulnStatus": "Modified", "descriptions": [ { @@ -165,6 +165,10 @@ "Release Notes", "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5468", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38572.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38572.json index 4a1741a319a..5d8c4fd122a 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38572.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38572.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38572", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T01:15:36.913", - "lastModified": "2023-08-04T03:15:12.497", + "lastModified": "2023-08-07T08:15:14.517", "vulnStatus": "Modified", "descriptions": [ { @@ -162,6 +162,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5468", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38592.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38592.json index 89682322a77..718ff2c7378 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38592.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38592.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38592", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-28T05:15:10.873", - "lastModified": "2023-08-04T03:15:12.600", + "lastModified": "2023-08-07T08:15:14.623", "vulnStatus": "Modified", "descriptions": [ { @@ -130,6 +130,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5468", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38594.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38594.json index 8d427cc4ab0..b48c5a92600 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38594.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38594.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38594", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T00:15:15.887", - "lastModified": "2023-08-04T03:15:12.697", + "lastModified": "2023-08-07T08:15:14.733", "vulnStatus": "Modified", "descriptions": [ { @@ -165,6 +165,10 @@ "Release Notes", "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5468", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38595.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38595.json index 3468cd3af60..9bdf154f322 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38595.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38595.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38595", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T01:15:37.767", - "lastModified": "2023-08-04T03:15:12.790", + "lastModified": "2023-08-07T08:15:14.817", "vulnStatus": "Modified", "descriptions": [ { @@ -141,6 +141,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5468", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38597.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38597.json index 06dce8f7a2f..657f9e9f6dc 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38597.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38597.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38597", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T00:15:16.030", - "lastModified": "2023-08-04T03:15:12.897", + "lastModified": "2023-08-07T08:15:14.917", "vulnStatus": "Modified", "descriptions": [ { @@ -137,6 +137,10 @@ "Release Notes", "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5468", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38599.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38599.json index 118accdcef1..78f30259547 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38599.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38599.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38599", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-28T05:15:10.997", - "lastModified": "2023-08-04T03:15:12.997", + "lastModified": "2023-08-07T08:15:15.023", "vulnStatus": "Modified", "descriptions": [ { @@ -162,6 +162,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5468", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38600.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38600.json index ac92d01ab2d..aa7f02a71f2 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38600.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38600.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38600", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T01:15:38.187", - "lastModified": "2023-08-04T03:15:13.100", + "lastModified": "2023-08-07T08:15:15.113", "vulnStatus": "Modified", "descriptions": [ { @@ -141,6 +141,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5468", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38611.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38611.json index e5c215af3f6..5242b267248 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38611.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38611.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38611", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T01:15:39.303", - "lastModified": "2023-08-04T03:15:13.203", + "lastModified": "2023-08-07T08:15:15.203", "vulnStatus": "Modified", "descriptions": [ { @@ -141,6 +141,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5468", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4045.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4045.json index 6665a2cc5ea..28dc0f90b8e 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4045.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4045.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4045", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:09.783", - "lastModified": "2023-08-04T04:15:15.507", + "lastModified": "2023-08-07T08:15:15.293", "vulnStatus": "Undergoing Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://www.debian.org/security/2023/dsa-5464", "source": "security@mozilla.org" }, + { + "url": "https://www.debian.org/security/2023/dsa-5469", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "source": "security@mozilla.org" diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4046.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4046.json index eb35f99296a..3977d773aa4 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4046.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4046.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4046", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:09.847", - "lastModified": "2023-08-04T04:15:17.160", + "lastModified": "2023-08-07T08:15:15.417", "vulnStatus": "Undergoing Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://www.debian.org/security/2023/dsa-5464", "source": "security@mozilla.org" }, + { + "url": "https://www.debian.org/security/2023/dsa-5469", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "source": "security@mozilla.org" diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4047.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4047.json index 8bc17996ff0..ec5f7004e40 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4047.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4047.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4047", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:09.903", - "lastModified": "2023-08-04T04:15:19.387", + "lastModified": "2023-08-07T08:15:15.500", "vulnStatus": "Undergoing Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://www.debian.org/security/2023/dsa-5464", "source": "security@mozilla.org" }, + { + "url": "https://www.debian.org/security/2023/dsa-5469", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "source": "security@mozilla.org" diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4048.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4048.json index 0c4e8666e2b..32d0abb45f9 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4048.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4048.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4048", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:09.967", - "lastModified": "2023-08-04T18:51:34.427", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-07T08:15:15.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -106,6 +106,10 @@ "Third Party Advisory" ] }, + { + "url": "https://www.debian.org/security/2023/dsa-5469", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "source": "security@mozilla.org", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4049.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4049.json index dae344d94f9..2a412ff1efb 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4049.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4049.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4049", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:10.030", - "lastModified": "2023-08-04T04:15:20.330", + "lastModified": "2023-08-07T08:15:15.683", "vulnStatus": "Undergoing Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://www.debian.org/security/2023/dsa-5464", "source": "security@mozilla.org" }, + { + "url": "https://www.debian.org/security/2023/dsa-5469", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "source": "security@mozilla.org" diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4050.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4050.json index 7619269cfaa..ba9fd37fbb1 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4050.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4050.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4050", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T15:15:10.090", - "lastModified": "2023-08-04T04:15:20.757", + "lastModified": "2023-08-07T08:15:15.770", "vulnStatus": "Undergoing Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://www.debian.org/security/2023/dsa-5464", "source": "security@mozilla.org" }, + { + "url": "https://www.debian.org/security/2023/dsa-5469", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "source": "security@mozilla.org" diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4055.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4055.json index 672bc97c77f..23ae14446ea 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4055.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4055.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4055", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T16:15:09.967", - "lastModified": "2023-08-04T04:15:21.227", + "lastModified": "2023-08-07T08:15:15.857", "vulnStatus": "Undergoing Analysis", "descriptions": [ { @@ -20,6 +20,10 @@ "url": "https://www.debian.org/security/2023/dsa-5464", "source": "security@mozilla.org" }, + { + "url": "https://www.debian.org/security/2023/dsa-5469", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "source": "security@mozilla.org" diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4056.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4056.json index 85edc08447a..a4b724f864c 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4056.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4056.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4056", "sourceIdentifier": "security@mozilla.org", "published": "2023-08-01T16:15:10.020", - "lastModified": "2023-08-04T18:47:11.427", - "vulnStatus": "Analyzed", + "lastModified": "2023-08-07T08:15:15.943", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -105,6 +105,10 @@ "Third Party Advisory" ] }, + { + "url": "https://www.debian.org/security/2023/dsa-5469", + "source": "security@mozilla.org" + }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-29/", "source": "security@mozilla.org", diff --git a/README.md b/README.md index f141933c4be..58baff4798c 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-08-07T08:00:29.043959+00:00 +2023-08-07T10:00:32.895580+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-08-07T06:15:11.577000+00:00 +2023-08-07T08:15:15.943000+00:00 ``` ### Last Data Feed Release @@ -34,17 +34,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `0` -* [CVE-2023-0425](CVE-2023/CVE-2023-04xx/CVE-2023-0425.json) (`2023-08-07T06:15:10.090`) -* [CVE-2023-0426](CVE-2023/CVE-2023-04xx/CVE-2023-0426.json) (`2023-08-07T06:15:11.167`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `19` -* [CVE-2023-29984](CVE-2023/CVE-2023-299xx/CVE-2023-29984.json) (`2023-08-07T06:15:11.577`) +* [CVE-2023-23934](CVE-2023/CVE-2023-239xx/CVE-2023-23934.json) (`2023-08-07T08:15:14.060`) +* [CVE-2023-25577](CVE-2023/CVE-2023-255xx/CVE-2023-25577.json) (`2023-08-07T08:15:14.293`) +* [CVE-2023-38133](CVE-2023/CVE-2023-381xx/CVE-2023-38133.json) (`2023-08-07T08:15:14.403`) +* [CVE-2023-38572](CVE-2023/CVE-2023-385xx/CVE-2023-38572.json) (`2023-08-07T08:15:14.517`) +* [CVE-2023-38592](CVE-2023/CVE-2023-385xx/CVE-2023-38592.json) (`2023-08-07T08:15:14.623`) +* [CVE-2023-38594](CVE-2023/CVE-2023-385xx/CVE-2023-38594.json) (`2023-08-07T08:15:14.733`) +* [CVE-2023-38595](CVE-2023/CVE-2023-385xx/CVE-2023-38595.json) (`2023-08-07T08:15:14.817`) +* [CVE-2023-38597](CVE-2023/CVE-2023-385xx/CVE-2023-38597.json) (`2023-08-07T08:15:14.917`) +* [CVE-2023-38599](CVE-2023/CVE-2023-385xx/CVE-2023-38599.json) (`2023-08-07T08:15:15.023`) +* [CVE-2023-38600](CVE-2023/CVE-2023-386xx/CVE-2023-38600.json) (`2023-08-07T08:15:15.113`) +* [CVE-2023-38611](CVE-2023/CVE-2023-386xx/CVE-2023-38611.json) (`2023-08-07T08:15:15.203`) +* [CVE-2023-4045](CVE-2023/CVE-2023-40xx/CVE-2023-4045.json) (`2023-08-07T08:15:15.293`) +* [CVE-2023-4046](CVE-2023/CVE-2023-40xx/CVE-2023-4046.json) (`2023-08-07T08:15:15.417`) +* [CVE-2023-4047](CVE-2023/CVE-2023-40xx/CVE-2023-4047.json) (`2023-08-07T08:15:15.500`) +* [CVE-2023-4048](CVE-2023/CVE-2023-40xx/CVE-2023-4048.json) (`2023-08-07T08:15:15.590`) +* [CVE-2023-4049](CVE-2023/CVE-2023-40xx/CVE-2023-4049.json) (`2023-08-07T08:15:15.683`) +* [CVE-2023-4050](CVE-2023/CVE-2023-40xx/CVE-2023-4050.json) (`2023-08-07T08:15:15.770`) +* [CVE-2023-4055](CVE-2023/CVE-2023-40xx/CVE-2023-4055.json) (`2023-08-07T08:15:15.857`) +* [CVE-2023-4056](CVE-2023/CVE-2023-40xx/CVE-2023-4056.json) (`2023-08-07T08:15:15.943`) ## Download and Usage