Auto-Update: 2023-11-13T23:00:17.983434+00:00

This commit is contained in:
cad-safe-bot 2023-11-13 23:00:21 +00:00
parent b95025763c
commit 80353f4539
15 changed files with 489 additions and 36 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42073",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-11-08T04:15:08.500",
"lastModified": "2021-11-09T21:55:19.273",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-13T22:15:07.353",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -103,6 +103,14 @@
"Third Party Advisory"
]
},
{
"url": "https://github.com/debauchee/barrier/commit/229abab99f39f11624e5651f819e7f1f8eddedcc",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/debauchee/barrier/commit/b5adc93e2bd74cb094f91ff595c07f321a489f3e",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/debauchee/barrier/releases/tag/v2.4.0",
"source": "cve@mitre.org",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-42813",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-13T21:15:07.473",
"lastModified": "2023-11-13T21:15:07.473",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Kyverno is a policy engine designed for Kubernetes. A security vulnerability was found in Kyverno where an attacker could cause denial of service of Kyverno. The vulnerable component in Kyvernos Notary verifier. An attacker would need control over the registry from which Kyverno would fetch attestations. With such a position, the attacker could return a malicious response to Kyverno, when Kyverno would send a request to the registry. The malicious response would cause denial of service of Kyverno, such that other users' admission requests would be blocked from being processed. This is a vulnerability in a new component released in v1.11.0. The only users affected by this are those that have been building Kyverno from source at the main branch which is not encouraged. Users consuming official Kyverno releases are not affected. There are no known cases of this vulnerability being exploited in the wild."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://github.com/kyverno/kyverno/security/advisories/GHSA-wc3x-5rfv-hh5v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-42814",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-13T21:15:07.730",
"lastModified": "2023-11-13T21:15:07.730",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Kyverno is a policy engine designed for Kubernetes. A security vulnerability was found in Kyverno where an attacker could cause denial of service of Kyverno. The vulnerable component in Kyvernos Notary verifier. An attacker would need control over the registry from which Kyverno would fetch attestations. With such a position, the attacker could return a malicious response to Kyverno, when Kyverno would send a request to the registry. The malicious response would cause denial of service of Kyverno, such that other users' admission requests would be blocked from being processed. This is a vulnerability in a new component released in v1.11.0. The only users affected by this are those that have been building Kyverno from source at the main branch which is not encouraged. Users consuming official Kyverno releases are not affected. There are no known cases of this vulnerability being exploited in the wild.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"references": [
{
"url": "https://github.com/kyverno/kyverno/security/advisories/GHSA-9g37-h7p2-2c6r",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-42815",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-13T21:15:07.940",
"lastModified": "2023-11-13T21:15:07.940",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Kyverno is a policy engine designed for Kubernetes. A security vulnerability was found in Kyverno where an attacker could cause denial of service of Kyverno. The vulnerability was in Kyvernos Notary verifier. An attacker would need control over the registry from which Kyverno would fetch signatures. With such a position, the attacker could return a malicious response to Kyverno, when Kyverno would send a request to the registry. The malicious response would cause denial of service of Kyverno, such that other users' admission requests would be blocked from being processed. This is a vulnerability in a new component released in v1.11.0. The only users affected by this are those that have been building Kyverno from source at the main branch which is not encouraged. Users consuming official Kyverno releases are not affected. There are no known cases of this vulnerability being exploited in the wild."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"references": [
{
"url": "https://github.com/kyverno/kyverno/security/advisories/GHSA-hjpv-68f4-2262",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-42816",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-13T21:15:08.127",
"lastModified": "2023-11-13T21:15:08.127",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Kyverno is a policy engine designed for Kubernetes. A security vulnerability was found in Kyverno where an attacker could cause denial of service of Kyverno. The vulnerability was in Kyvernos Notary verifier. An attacker would need control over the registry from which Kyverno would fetch signatures. With such a position, the attacker could return a malicious response to Kyverno, when Kyverno would send a request to the registry. The malicious response would cause denial of service of Kyverno, such that other users' admission requests would be blocked from being processed. This is a vulnerability in a new component released in v1.11.0. The only users affected by this are those that have been building Kyverno from source at the main branch which is not encouraged. Users consuming official Kyverno releases are not affected. There are no known cases of this vulnerability being exploited in the wild."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
}
],
"references": [
{
"url": "https://github.com/kyverno/kyverno/security/advisories/GHSA-4mp4-46gq-hv3r",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-46014",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-13T22:15:07.487",
"lastModified": "2023-11-13T22:15:07.487",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in hospitalLogin.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary SQL commands via 'hemail' and 'hpassword' parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ersinerenler/CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-46015",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-13T22:15:07.537",
"lastModified": "2023-11-13T22:15:07.537",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting (XSS) vulnerability in index.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary code via 'msg' parameter in application URL."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ersinerenler/CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-46016",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-13T22:15:07.587",
"lastModified": "2023-11-13T22:15:07.587",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting (XSS) in abs.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary code via the 'search' parameter in the application URL."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ersinerenler/CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-46017",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-13T22:15:07.640",
"lastModified": "2023-11-13T22:15:07.640",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in receiverLogin.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary SQL commands via 'remail' and 'rpassword' parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ersinerenler/CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-46018",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-13T22:15:07.690",
"lastModified": "2023-11-13T22:15:07.690",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in receiverReg.php in Code-Projects Blood Bank 1.0 \\allows attackers to run arbitrary SQL commands via 'remail' parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ersinerenler/CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-47117",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-13T21:15:08.317",
"lastModified": "2023-11-13T21:15:08.317",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Label Studio is an open source data labeling tool. In all current versions of Label Studio prior to 1.9.2post0, the application allows users to insecurely set filters for filtering tasks. An attacker can construct a filter chain to filter tasks based on sensitive fields for all user accounts on the platform by exploiting Django's Object Relational Mapper (ORM). Since the results of query can be manipulated by the ORM filter, an attacker can leak these sensitive fields character by character. In addition, Label Studio had a hard coded secret key that an attacker can use to forge a session token of any user by exploiting this ORM Leak vulnerability to leak account password hashes. This vulnerability has been addressed in commit `f931d9d129` which is included in the 1.9.2post0 release. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/HumanSignal/label-studio/commit/f931d9d129002f54a495995774ce7384174cef5c",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6hjj-gq77-j4qw",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-47346",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-13T22:15:07.740",
"lastModified": "2023-11-13T22:15:07.740",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in free5gc 3.3.0, UPF 1.2.0, and SMF 1.2.0 allows attackers to cause a denial of service via crafted PFCP messages."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/free5gc/free5gc/issues/482",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-47625",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-13T21:15:08.513",
"lastModified": "2023-11-13T21:15:08.513",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "PX4 autopilot is a flight control solution for drones. In affected versions a global buffer overflow vulnerability exists in the CrsfParser_TryParseCrsfPacket function in /src/drivers/rc/crsf_rc/CrsfParser.cpp:298 due to the invalid size check. A malicious user may create an RC packet remotely and that packet goes into the device where the _rcs_buf reads. The global buffer overflow vulnerability will be triggered and the drone can behave unexpectedly. This issue has been addressed in version 1.14.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 2.9,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.4,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/PX4/PX4-Autopilot/commit/d1fcd39a44e6312582c6ab02b0d5ee2599fb55aa",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-qpw7-65ww-wj82",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-5999",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-11-13T20:15:29.060",
"lastModified": "2023-11-13T20:15:29.060",
"lastModified": "2023-11-13T21:15:08.710",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: DUPLICATE"
"value": "Rejected reason: This is a duplicate."
}
],
"metrics": {},

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-13T21:00:17.912754+00:00
2023-11-13T23:00:17.983434+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-13T20:57:57.407000+00:00
2023-11-13T22:15:07.740000+00:00
```
### Last Data Feed Release
@ -29,46 +29,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
230442
230454
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `12`
* [CVE-2023-47621](CVE-2023/CVE-2023-476xx/CVE-2023-47621.json) (`2023-11-13T20:15:28.840`)
* [CVE-2023-5999](CVE-2023/CVE-2023-59xx/CVE-2023-5999.json) (`2023-11-13T20:15:29.060`)
* [CVE-2023-42813](CVE-2023/CVE-2023-428xx/CVE-2023-42813.json) (`2023-11-13T21:15:07.473`)
* [CVE-2023-42814](CVE-2023/CVE-2023-428xx/CVE-2023-42814.json) (`2023-11-13T21:15:07.730`)
* [CVE-2023-42815](CVE-2023/CVE-2023-428xx/CVE-2023-42815.json) (`2023-11-13T21:15:07.940`)
* [CVE-2023-42816](CVE-2023/CVE-2023-428xx/CVE-2023-42816.json) (`2023-11-13T21:15:08.127`)
* [CVE-2023-47117](CVE-2023/CVE-2023-471xx/CVE-2023-47117.json) (`2023-11-13T21:15:08.317`)
* [CVE-2023-47625](CVE-2023/CVE-2023-476xx/CVE-2023-47625.json) (`2023-11-13T21:15:08.513`)
* [CVE-2023-46014](CVE-2023/CVE-2023-460xx/CVE-2023-46014.json) (`2023-11-13T22:15:07.487`)
* [CVE-2023-46015](CVE-2023/CVE-2023-460xx/CVE-2023-46015.json) (`2023-11-13T22:15:07.537`)
* [CVE-2023-46016](CVE-2023/CVE-2023-460xx/CVE-2023-46016.json) (`2023-11-13T22:15:07.587`)
* [CVE-2023-46017](CVE-2023/CVE-2023-460xx/CVE-2023-46017.json) (`2023-11-13T22:15:07.640`)
* [CVE-2023-46018](CVE-2023/CVE-2023-460xx/CVE-2023-46018.json) (`2023-11-13T22:15:07.690`)
* [CVE-2023-47346](CVE-2023/CVE-2023-473xx/CVE-2023-47346.json) (`2023-11-13T22:15:07.740`)
### CVEs modified in the last Commit
Recently modified CVEs: `50`
Recently modified CVEs: `2`
* [CVE-2023-47359](CVE-2023/CVE-2023-473xx/CVE-2023-47359.json) (`2023-11-13T19:31:30.630`)
* [CVE-2023-41353](CVE-2023/CVE-2023-413xx/CVE-2023-41353.json) (`2023-11-13T19:31:44.943`)
* [CVE-2023-47360](CVE-2023/CVE-2023-473xx/CVE-2023-47360.json) (`2023-11-13T19:32:33.670`)
* [CVE-2023-41354](CVE-2023/CVE-2023-413xx/CVE-2023-41354.json) (`2023-11-13T19:34:12.973`)
* [CVE-2023-40922](CVE-2023/CVE-2023-409xx/CVE-2023-40922.json) (`2023-11-13T19:34:31.343`)
* [CVE-2023-46981](CVE-2023/CVE-2023-469xx/CVE-2023-46981.json) (`2023-11-13T19:37:07.107`)
* [CVE-2023-46501](CVE-2023/CVE-2023-465xx/CVE-2023-46501.json) (`2023-11-13T19:38:38.617`)
* [CVE-2023-47102](CVE-2023/CVE-2023-471xx/CVE-2023-47102.json) (`2023-11-13T19:38:52.273`)
* [CVE-2023-2675](CVE-2023/CVE-2023-26xx/CVE-2023-2675.json) (`2023-11-13T19:40:23.627`)
* [CVE-2023-30739](CVE-2023/CVE-2023-307xx/CVE-2023-30739.json) (`2023-11-13T19:42:03.357`)
* [CVE-2023-25990](CVE-2023/CVE-2023-259xx/CVE-2023-25990.json) (`2023-11-13T19:43:16.177`)
* [CVE-2023-32121](CVE-2023/CVE-2023-321xx/CVE-2023-32121.json) (`2023-11-13T19:44:25.423`)
* [CVE-2023-32508](CVE-2023/CVE-2023-325xx/CVE-2023-32508.json) (`2023-11-13T19:46:18.337`)
* [CVE-2023-34179](CVE-2023/CVE-2023-341xx/CVE-2023-34179.json) (`2023-11-13T19:51:47.503`)
* [CVE-2023-25700](CVE-2023/CVE-2023-257xx/CVE-2023-25700.json) (`2023-11-13T19:52:51.423`)
* [CVE-2023-41355](CVE-2023/CVE-2023-413xx/CVE-2023-41355.json) (`2023-11-13T19:54:23.593`)
* [CVE-2023-41344](CVE-2023/CVE-2023-413xx/CVE-2023-41344.json) (`2023-11-13T19:54:38.750`)
* [CVE-2023-41357](CVE-2023/CVE-2023-413xx/CVE-2023-41357.json) (`2023-11-13T19:54:51.547`)
* [CVE-2023-5763](CVE-2023/CVE-2023-57xx/CVE-2023-5763.json) (`2023-11-13T19:55:13.637`)
* [CVE-2023-5948](CVE-2023/CVE-2023-59xx/CVE-2023-5948.json) (`2023-11-13T19:55:35.617`)
* [CVE-2023-1194](CVE-2023/CVE-2023-11xx/CVE-2023-1194.json) (`2023-11-13T20:01:15.780`)
* [CVE-2023-42670](CVE-2023/CVE-2023-426xx/CVE-2023-42670.json) (`2023-11-13T20:02:04.523`)
* [CVE-2023-46846](CVE-2023/CVE-2023-468xx/CVE-2023-46846.json) (`2023-11-13T20:02:30.513`)
* [CVE-2023-46847](CVE-2023/CVE-2023-468xx/CVE-2023-46847.json) (`2023-11-13T20:03:02.077`)
* [CVE-2023-46848](CVE-2023/CVE-2023-468xx/CVE-2023-46848.json) (`2023-11-13T20:03:23.447`)
* [CVE-2021-42073](CVE-2021/CVE-2021-420xx/CVE-2021-42073.json) (`2023-11-13T22:15:07.353`)
* [CVE-2023-5999](CVE-2023/CVE-2023-59xx/CVE-2023-5999.json) (`2023-11-13T21:15:08.710`)
## Download and Usage