diff --git a/CVE-2022/CVE-2022-416xx/CVE-2022-41640.json b/CVE-2022/CVE-2022-416xx/CVE-2022-41640.json new file mode 100644 index 00000000000..8a95f685ae7 --- /dev/null +++ b/CVE-2022/CVE-2022-416xx/CVE-2022-41640.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-41640", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-09T10:15:10.423", + "lastModified": "2023-05-09T10:15:10.423", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (subscriber+) Stored Cross-Site Scripting (XSS) vulnerability in Rymera Web Co Wholesale Suite plugin <=\u00a02.1.5 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/woocommerce-wholesale-prices/wordpress-wholesale-suite-plugin-2-1-5-authenticated-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-236xx/CVE-2023-23664.json b/CVE-2023/CVE-2023-236xx/CVE-2023-23664.json new file mode 100644 index 00000000000..a9b05bfea3d --- /dev/null +++ b/CVE-2023/CVE-2023-236xx/CVE-2023-23664.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23664", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-09T10:15:10.567", + "lastModified": "2023-05-09T10:15:10.567", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in ConvertBox ConvertBox Auto Embed WordPress plugin <=\u00a01.0.19 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/convertbox-auto-embed/wordpress-convertbox-auto-embed-wordpress-plugin-plugin-1-0-19-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23732.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23732.json new file mode 100644 index 00000000000..c2a67b47c18 --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23732.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23732", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-09T11:15:09.193", + "lastModified": "2023-05-09T11:15:09.193", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Joel James Disqus Conditional Load plugin <=\u00a011.0.6 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/disqus-conditional-load/wordpress-disqus-conditional-load-plugin-11-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23733.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23733.json new file mode 100644 index 00000000000..5dd930f9e41 --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23733.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23733", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-09T11:15:09.260", + "lastModified": "2023-05-09T11:15:09.260", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Joel James Lazy Social Comments plugin <=\u00a02.0.4 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/lazy-facebook-comments/wordpress-lazy-social-comments-plugin-2-0-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23734.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23734.json new file mode 100644 index 00000000000..8dd873d8604 --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23734.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23734", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-09T11:15:09.313", + "lastModified": "2023-05-09T11:15:09.313", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in David Voswinkel Userlike \u2013 WordPress Live Chat plugin <=\u00a02.2 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/userlike/wordpress-userlike-wordpress-live-chat-plugin-plugin-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23793.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23793.json new file mode 100644 index 00000000000..bf329121b8f --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23793.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23793", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-09T10:15:10.620", + "lastModified": "2023-05-09T10:15:10.620", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Eightweb Interactive Read More Without Refresh plugin <=\u00a03.1 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/read-more-without-refresh/wordpress-read-more-without-refresh-plugin-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23862.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23862.json new file mode 100644 index 00000000000..f444f091f7d --- /dev/null +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23862.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23862", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-09T11:15:09.377", + "lastModified": "2023-05-09T11:15:09.377", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Gopi Ramasamy Vertical scroll recent post plugin <=\u00a014.0 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/vertical-scroll-recent-post/wordpress-vertical-scroll-recent-post-plugin-14-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23883.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23883.json new file mode 100644 index 00000000000..ab97904b987 --- /dev/null +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23883.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23883", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-09T11:15:09.433", + "lastModified": "2023-05-09T11:15:09.433", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability\u00a0in David Gwyer WP Content Filter plugin <=\u00a03.0.1 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-content-filter/wordpress-wp-content-filter-censor-all-offensive-content-from-your-site-plugin-3-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23884.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23884.json new file mode 100644 index 00000000000..7c920e5e963 --- /dev/null +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23884.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23884", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-09T11:15:09.517", + "lastModified": "2023-05-09T11:15:09.517", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Kanban for WordPress Kanban Boards for WordPress plugin <=\u00a02.5.20 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/kanban/wordpress-kanban-boards-for-wordpress-plugin-2-5-20-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-243xx/CVE-2023-24372.json b/CVE-2023/CVE-2023-243xx/CVE-2023-24372.json new file mode 100644 index 00000000000..597b69e28c4 --- /dev/null +++ b/CVE-2023/CVE-2023-243xx/CVE-2023-24372.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-24372", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-09T11:15:09.603", + "lastModified": "2023-05-09T11:15:09.603", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in USB Memory Direct Simple Custom Author Profiles plugin <=\u00a01.0.0 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/simple-custom-author-profiles/wordpress-simple-custom-author-profiles-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2591.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2591.json new file mode 100644 index 00000000000..d3686b78e37 --- /dev/null +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2591.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-2591", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-05-09T10:15:10.683", + "lastModified": "2023-05-09T10:15:10.683", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Code Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.7." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/nilsteampassnet/teampass/commit/57a977c6323656e5dc06ab5c227e75c3465a1a4a", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/705f79f4-f5e3-41d7-82a5-f00441cd984b", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 62bfd9d003e..20a1035f5f5 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-09T10:00:23.579245+00:00 +2023-05-09T12:00:24.021510+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-09T08:15:08.373000+00:00 +2023-05-09T11:15:09.603000+00:00 ``` ### Last Data Feed Release @@ -29,14 +29,24 @@ Download and Changelog: [Click](releases/latest) ### Total Number of included CVEs ```plain -214496 +214507 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `11` -* [CVE-2023-23863](CVE-2023/CVE-2023-238xx/CVE-2023-23863.json) (`2023-05-09T08:15:08.373`) +* [CVE-2022-41640](CVE-2022/CVE-2022-416xx/CVE-2022-41640.json) (`2023-05-09T10:15:10.423`) +* [CVE-2023-23664](CVE-2023/CVE-2023-236xx/CVE-2023-23664.json) (`2023-05-09T10:15:10.567`) +* [CVE-2023-23732](CVE-2023/CVE-2023-237xx/CVE-2023-23732.json) (`2023-05-09T11:15:09.193`) +* [CVE-2023-23733](CVE-2023/CVE-2023-237xx/CVE-2023-23733.json) (`2023-05-09T11:15:09.260`) +* [CVE-2023-23734](CVE-2023/CVE-2023-237xx/CVE-2023-23734.json) (`2023-05-09T11:15:09.313`) +* [CVE-2023-23793](CVE-2023/CVE-2023-237xx/CVE-2023-23793.json) (`2023-05-09T10:15:10.620`) +* [CVE-2023-23862](CVE-2023/CVE-2023-238xx/CVE-2023-23862.json) (`2023-05-09T11:15:09.377`) +* [CVE-2023-23883](CVE-2023/CVE-2023-238xx/CVE-2023-23883.json) (`2023-05-09T11:15:09.433`) +* [CVE-2023-23884](CVE-2023/CVE-2023-238xx/CVE-2023-23884.json) (`2023-05-09T11:15:09.517`) +* [CVE-2023-24372](CVE-2023/CVE-2023-243xx/CVE-2023-24372.json) (`2023-05-09T11:15:09.603`) +* [CVE-2023-2591](CVE-2023/CVE-2023-25xx/CVE-2023-2591.json) (`2023-05-09T10:15:10.683`) ### CVEs modified in the last Commit