diff --git a/CVE-2021/CVE-2021-420xx/CVE-2021-42073.json b/CVE-2021/CVE-2021-420xx/CVE-2021-42073.json index 54f236f3a64..102dce72d44 100644 --- a/CVE-2021/CVE-2021-420xx/CVE-2021-42073.json +++ b/CVE-2021/CVE-2021-420xx/CVE-2021-42073.json @@ -2,8 +2,8 @@ "id": "CVE-2021-42073", "sourceIdentifier": "cve@mitre.org", "published": "2021-11-08T04:15:08.500", - "lastModified": "2021-11-09T21:55:19.273", - "vulnStatus": "Analyzed", + "lastModified": "2023-11-13T22:15:07.353", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -103,6 +103,14 @@ "Third Party Advisory" ] }, + { + "url": "https://github.com/debauchee/barrier/commit/229abab99f39f11624e5651f819e7f1f8eddedcc", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/debauchee/barrier/commit/b5adc93e2bd74cb094f91ff595c07f321a489f3e", + "source": "cve@mitre.org" + }, { "url": "https://github.com/debauchee/barrier/releases/tag/v2.4.0", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42813.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42813.json new file mode 100644 index 00000000000..946608e0848 --- /dev/null +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42813.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-42813", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-11-13T21:15:07.473", + "lastModified": "2023-11-13T21:15:07.473", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Kyverno is a policy engine designed for Kubernetes. A security vulnerability was found in Kyverno where an attacker could cause denial of service of Kyverno. The vulnerable component in Kyvernos Notary verifier. An attacker would need control over the registry from which Kyverno would fetch attestations. With such a position, the attacker could return a malicious response to Kyverno, when Kyverno would send a request to the registry. The malicious response would cause denial of service of Kyverno, such that other users' admission requests would be blocked from being processed. This is a vulnerability in a new component released in v1.11.0. The only users affected by this are those that have been building Kyverno from source at the main branch which is not encouraged. Users consuming official Kyverno releases are not affected. There are no known cases of this vulnerability being exploited in the wild." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kyverno/kyverno/security/advisories/GHSA-wc3x-5rfv-hh5v", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42814.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42814.json new file mode 100644 index 00000000000..7c956e10e9a --- /dev/null +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42814.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-42814", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-11-13T21:15:07.730", + "lastModified": "2023-11-13T21:15:07.730", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Kyverno is a policy engine designed for Kubernetes. A security vulnerability was found in Kyverno where an attacker could cause denial of service of Kyverno. The vulnerable component in Kyvernos Notary verifier. An attacker would need control over the registry from which Kyverno would fetch attestations. With such a position, the attacker could return a malicious response to Kyverno, when Kyverno would send a request to the registry. The malicious response would cause denial of service of Kyverno, such that other users' admission requests would be blocked from being processed. This is a vulnerability in a new component released in v1.11.0. The only users affected by this are those that have been building Kyverno from source at the main branch which is not encouraged. Users consuming official Kyverno releases are not affected. There are no known cases of this vulnerability being exploited in the wild.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kyverno/kyverno/security/advisories/GHSA-9g37-h7p2-2c6r", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42815.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42815.json new file mode 100644 index 00000000000..d2d6255800d --- /dev/null +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42815.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-42815", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-11-13T21:15:07.940", + "lastModified": "2023-11-13T21:15:07.940", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Kyverno is a policy engine designed for Kubernetes. A security vulnerability was found in Kyverno where an attacker could cause denial of service of Kyverno. The vulnerability was in Kyvernos Notary verifier. An attacker would need control over the registry from which Kyverno would fetch signatures. With such a position, the attacker could return a malicious response to Kyverno, when Kyverno would send a request to the registry. The malicious response would cause denial of service of Kyverno, such that other users' admission requests would be blocked from being processed. This is a vulnerability in a new component released in v1.11.0. The only users affected by this are those that have been building Kyverno from source at the main branch which is not encouraged. Users consuming official Kyverno releases are not affected. There are no known cases of this vulnerability being exploited in the wild." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kyverno/kyverno/security/advisories/GHSA-hjpv-68f4-2262", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-428xx/CVE-2023-42816.json b/CVE-2023/CVE-2023-428xx/CVE-2023-42816.json new file mode 100644 index 00000000000..7bf34ef0acb --- /dev/null +++ b/CVE-2023/CVE-2023-428xx/CVE-2023-42816.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-42816", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-11-13T21:15:08.127", + "lastModified": "2023-11-13T21:15:08.127", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Kyverno is a policy engine designed for Kubernetes. A security vulnerability was found in Kyverno where an attacker could cause denial of service of Kyverno. The vulnerability was in Kyvernos Notary verifier. An attacker would need control over the registry from which Kyverno would fetch signatures. With such a position, the attacker could return a malicious response to Kyverno, when Kyverno would send a request to the registry. The malicious response would cause denial of service of Kyverno, such that other users' admission requests would be blocked from being processed. This is a vulnerability in a new component released in v1.11.0. The only users affected by this are those that have been building Kyverno from source at the main branch which is not encouraged. Users consuming official Kyverno releases are not affected. There are no known cases of this vulnerability being exploited in the wild." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kyverno/kyverno/security/advisories/GHSA-4mp4-46gq-hv3r", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46014.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46014.json new file mode 100644 index 00000000000..217b37bda28 --- /dev/null +++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46014.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-46014", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-13T22:15:07.487", + "lastModified": "2023-11-13T22:15:07.487", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in hospitalLogin.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary SQL commands via 'hemail' and 'hpassword' parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ersinerenler/CVE-2023-46014-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46015.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46015.json new file mode 100644 index 00000000000..fab3558b162 --- /dev/null +++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46015.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-46015", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-13T22:15:07.537", + "lastModified": "2023-11-13T22:15:07.537", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting (XSS) vulnerability in index.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary code via 'msg' parameter in application URL." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ersinerenler/CVE-2023-46015-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46016.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46016.json new file mode 100644 index 00000000000..5ff12f38193 --- /dev/null +++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46016.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-46016", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-13T22:15:07.587", + "lastModified": "2023-11-13T22:15:07.587", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting (XSS) in abs.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary code via the 'search' parameter in the application URL." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ersinerenler/CVE-2023-46016-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46017.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46017.json new file mode 100644 index 00000000000..3489d6b118a --- /dev/null +++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46017.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-46017", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-13T22:15:07.640", + "lastModified": "2023-11-13T22:15:07.640", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in receiverLogin.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary SQL commands via 'remail' and 'rpassword' parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ersinerenler/CVE-2023-46017-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46018.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46018.json new file mode 100644 index 00000000000..f552f6d7ce4 --- /dev/null +++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46018.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-46018", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-13T22:15:07.690", + "lastModified": "2023-11-13T22:15:07.690", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL injection vulnerability in receiverReg.php in Code-Projects Blood Bank 1.0 \\allows attackers to run arbitrary SQL commands via 'remail' parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ersinerenler/CVE-2023-46018-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47117.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47117.json new file mode 100644 index 00000000000..d88044b09a2 --- /dev/null +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47117.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-47117", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-11-13T21:15:08.317", + "lastModified": "2023-11-13T21:15:08.317", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Label Studio is an open source data labeling tool. In all current versions of Label Studio prior to 1.9.2post0, the application allows users to insecurely set filters for filtering tasks. An attacker can construct a filter chain to filter tasks based on sensitive fields for all user accounts on the platform by exploiting Django's Object Relational Mapper (ORM). Since the results of query can be manipulated by the ORM filter, an attacker can leak these sensitive fields character by character. In addition, Label Studio had a hard coded secret key that an attacker can use to forge a session token of any user by exploiting this ORM Leak vulnerability to leak account password hashes. This vulnerability has been addressed in commit `f931d9d129` which is included in the 1.9.2post0 release. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/HumanSignal/label-studio/commit/f931d9d129002f54a495995774ce7384174cef5c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6hjj-gq77-j4qw", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-473xx/CVE-2023-47346.json b/CVE-2023/CVE-2023-473xx/CVE-2023-47346.json new file mode 100644 index 00000000000..caa2f319af8 --- /dev/null +++ b/CVE-2023/CVE-2023-473xx/CVE-2023-47346.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-47346", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-11-13T22:15:07.740", + "lastModified": "2023-11-13T22:15:07.740", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability in free5gc 3.3.0, UPF 1.2.0, and SMF 1.2.0 allows attackers to cause a denial of service via crafted PFCP messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/free5gc/free5gc/issues/482", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47625.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47625.json new file mode 100644 index 00000000000..53b55583d8a --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47625.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-47625", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-11-13T21:15:08.513", + "lastModified": "2023-11-13T21:15:08.513", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "PX4 autopilot is a flight control solution for drones. In affected versions a global buffer overflow vulnerability exists in the CrsfParser_TryParseCrsfPacket function in /src/drivers/rc/crsf_rc/CrsfParser.cpp:298 due to the invalid size check. A malicious user may create an RC packet remotely and that packet goes into the device where the _rcs_buf reads. The global buffer overflow vulnerability will be triggered and the drone can behave unexpectedly. This issue has been addressed in version 1.14.0. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.9, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.4, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/PX4/PX4-Autopilot/commit/d1fcd39a44e6312582c6ab02b0d5ee2599fb55aa", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-qpw7-65ww-wj82", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5999.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5999.json index 22799e3d0ec..7010375ab91 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5999.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5999.json @@ -2,12 +2,12 @@ "id": "CVE-2023-5999", "sourceIdentifier": "security@wordfence.com", "published": "2023-11-13T20:15:29.060", - "lastModified": "2023-11-13T20:15:29.060", + "lastModified": "2023-11-13T21:15:08.710", "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "Rejected reason: DUPLICATE" + "value": "Rejected reason: This is a duplicate." } ], "metrics": {}, diff --git a/README.md b/README.md index b4aa5f95e99..71b22b2fac8 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-13T21:00:17.912754+00:00 +2023-11-13T23:00:17.983434+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-13T20:57:57.407000+00:00 +2023-11-13T22:15:07.740000+00:00 ``` ### Last Data Feed Release @@ -29,46 +29,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -230442 +230454 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `12` -* [CVE-2023-47621](CVE-2023/CVE-2023-476xx/CVE-2023-47621.json) (`2023-11-13T20:15:28.840`) -* [CVE-2023-5999](CVE-2023/CVE-2023-59xx/CVE-2023-5999.json) (`2023-11-13T20:15:29.060`) +* [CVE-2023-42813](CVE-2023/CVE-2023-428xx/CVE-2023-42813.json) (`2023-11-13T21:15:07.473`) +* [CVE-2023-42814](CVE-2023/CVE-2023-428xx/CVE-2023-42814.json) (`2023-11-13T21:15:07.730`) +* [CVE-2023-42815](CVE-2023/CVE-2023-428xx/CVE-2023-42815.json) (`2023-11-13T21:15:07.940`) +* [CVE-2023-42816](CVE-2023/CVE-2023-428xx/CVE-2023-42816.json) (`2023-11-13T21:15:08.127`) +* [CVE-2023-47117](CVE-2023/CVE-2023-471xx/CVE-2023-47117.json) (`2023-11-13T21:15:08.317`) +* [CVE-2023-47625](CVE-2023/CVE-2023-476xx/CVE-2023-47625.json) (`2023-11-13T21:15:08.513`) +* [CVE-2023-46014](CVE-2023/CVE-2023-460xx/CVE-2023-46014.json) (`2023-11-13T22:15:07.487`) +* [CVE-2023-46015](CVE-2023/CVE-2023-460xx/CVE-2023-46015.json) (`2023-11-13T22:15:07.537`) +* [CVE-2023-46016](CVE-2023/CVE-2023-460xx/CVE-2023-46016.json) (`2023-11-13T22:15:07.587`) +* [CVE-2023-46017](CVE-2023/CVE-2023-460xx/CVE-2023-46017.json) (`2023-11-13T22:15:07.640`) +* [CVE-2023-46018](CVE-2023/CVE-2023-460xx/CVE-2023-46018.json) (`2023-11-13T22:15:07.690`) +* [CVE-2023-47346](CVE-2023/CVE-2023-473xx/CVE-2023-47346.json) (`2023-11-13T22:15:07.740`) ### CVEs modified in the last Commit -Recently modified CVEs: `50` +Recently modified CVEs: `2` -* [CVE-2023-47359](CVE-2023/CVE-2023-473xx/CVE-2023-47359.json) (`2023-11-13T19:31:30.630`) -* [CVE-2023-41353](CVE-2023/CVE-2023-413xx/CVE-2023-41353.json) (`2023-11-13T19:31:44.943`) -* [CVE-2023-47360](CVE-2023/CVE-2023-473xx/CVE-2023-47360.json) (`2023-11-13T19:32:33.670`) -* [CVE-2023-41354](CVE-2023/CVE-2023-413xx/CVE-2023-41354.json) (`2023-11-13T19:34:12.973`) -* [CVE-2023-40922](CVE-2023/CVE-2023-409xx/CVE-2023-40922.json) (`2023-11-13T19:34:31.343`) -* [CVE-2023-46981](CVE-2023/CVE-2023-469xx/CVE-2023-46981.json) (`2023-11-13T19:37:07.107`) -* [CVE-2023-46501](CVE-2023/CVE-2023-465xx/CVE-2023-46501.json) (`2023-11-13T19:38:38.617`) -* [CVE-2023-47102](CVE-2023/CVE-2023-471xx/CVE-2023-47102.json) (`2023-11-13T19:38:52.273`) -* [CVE-2023-2675](CVE-2023/CVE-2023-26xx/CVE-2023-2675.json) (`2023-11-13T19:40:23.627`) -* [CVE-2023-30739](CVE-2023/CVE-2023-307xx/CVE-2023-30739.json) (`2023-11-13T19:42:03.357`) -* [CVE-2023-25990](CVE-2023/CVE-2023-259xx/CVE-2023-25990.json) (`2023-11-13T19:43:16.177`) -* [CVE-2023-32121](CVE-2023/CVE-2023-321xx/CVE-2023-32121.json) (`2023-11-13T19:44:25.423`) -* [CVE-2023-32508](CVE-2023/CVE-2023-325xx/CVE-2023-32508.json) (`2023-11-13T19:46:18.337`) -* [CVE-2023-34179](CVE-2023/CVE-2023-341xx/CVE-2023-34179.json) (`2023-11-13T19:51:47.503`) -* [CVE-2023-25700](CVE-2023/CVE-2023-257xx/CVE-2023-25700.json) (`2023-11-13T19:52:51.423`) -* [CVE-2023-41355](CVE-2023/CVE-2023-413xx/CVE-2023-41355.json) (`2023-11-13T19:54:23.593`) -* [CVE-2023-41344](CVE-2023/CVE-2023-413xx/CVE-2023-41344.json) (`2023-11-13T19:54:38.750`) -* [CVE-2023-41357](CVE-2023/CVE-2023-413xx/CVE-2023-41357.json) (`2023-11-13T19:54:51.547`) -* [CVE-2023-5763](CVE-2023/CVE-2023-57xx/CVE-2023-5763.json) (`2023-11-13T19:55:13.637`) -* [CVE-2023-5948](CVE-2023/CVE-2023-59xx/CVE-2023-5948.json) (`2023-11-13T19:55:35.617`) -* [CVE-2023-1194](CVE-2023/CVE-2023-11xx/CVE-2023-1194.json) (`2023-11-13T20:01:15.780`) -* [CVE-2023-42670](CVE-2023/CVE-2023-426xx/CVE-2023-42670.json) (`2023-11-13T20:02:04.523`) -* [CVE-2023-46846](CVE-2023/CVE-2023-468xx/CVE-2023-46846.json) (`2023-11-13T20:02:30.513`) -* [CVE-2023-46847](CVE-2023/CVE-2023-468xx/CVE-2023-46847.json) (`2023-11-13T20:03:02.077`) -* [CVE-2023-46848](CVE-2023/CVE-2023-468xx/CVE-2023-46848.json) (`2023-11-13T20:03:23.447`) +* [CVE-2021-42073](CVE-2021/CVE-2021-420xx/CVE-2021-42073.json) (`2023-11-13T22:15:07.353`) +* [CVE-2023-5999](CVE-2023/CVE-2023-59xx/CVE-2023-5999.json) (`2023-11-13T21:15:08.710`) ## Download and Usage