Auto-Update: 2024-01-03T11:00:25.793446+00:00

This commit is contained in:
cad-safe-bot 2024-01-03 11:00:29 +00:00
parent 97575cd0d9
commit 85b43ead96
27 changed files with 1404 additions and 14 deletions

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-38674",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:08.107",
"lastModified": "2024-01-03T09:15:08.107",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "FPE in paddle.nanmedian in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.\n\n\n\n"
},
{
"lang": "es",
"value": "FPE en paddle.nanmedian en PaddlePaddle antes de 2.6.0. Este fallo puede provocar un bloqueo del tiempo de ejecuci\u00f3n y una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-369"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-006.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-38675",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:08.340",
"lastModified": "2024-01-03T09:15:08.340",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "FPE in paddle.linalg.matrix_rank in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.\n\n\n\n"
},
{
"lang": "es",
"value": "FPE en paddle.linalg.matrix_rank en PaddlePaddle antes de 2.6.0. Este fallo puede provocar un bloqueo del tiempo de ejecuci\u00f3n y una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-369"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-007.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-38676",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:08.517",
"lastModified": "2024-01-03T09:15:08.517",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Nullptr in paddle.dot\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.\n\n\n\n"
},
{
"lang": "es",
"value": "Puntero Null en paddle.dot en PaddlePaddle antes de 2.6.0. Este fallo puede provocar un bloqueo del tiempo de ejecuci\u00f3n y una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-008.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-38677",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:08.687",
"lastModified": "2024-01-03T09:15:08.687",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "FPE in paddle.linalg.eig in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.\n\n\n\n"
},
{
"lang": "es",
"value": "FPE en paddle.linalg.eig en PaddlePaddle antes de 2.6.0. Este fallo puede provocar un bloqueo del tiempo de ejecuci\u00f3n y una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-369"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-009.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-38678",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:08.877",
"lastModified": "2024-01-03T09:15:08.877",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "OOB access in paddle.mode\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.\n\n\n\n"
},
{
"lang": "es",
"value": "Acceso OOB en paddle.mode en PaddlePaddle antes de 2.6.0. Este fallo puede provocar un bloqueo del tiempo de ejecuci\u00f3n y una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-010.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-50921",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-01-03T09:15:09.067",
"lastModified": "2024-01-03T09:15:09.067",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on GL.iNet devices through 4.5.0. Attackers can invoke the add_user interface in the system module to gain root privileges. This affects A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7, and B1300 4.3.7."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en dispositivos GL.iNet hasta 4.5.0. Los atacantes pueden invocar la interfaz add_user en el m\u00f3dulo de system para obtener privilegios de root. Esto afecta a A1300 4.4.6, AX1800 4.4.6, AXT1800 4.4.6, MT3000 4.4.6, MT2500 4.4.6, MT6000 4.5.0, MT1300 4.3.7, MT300N-V2 4.3.7, AR750S 4.3.7, AR750 4.3.7, AR300M 4.3.7 y B1300 4.3.7."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/4.0.0/Add_user_vulnerability.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-51784",
"sourceIdentifier": "security@apache.org",
"published": "2024-01-03T10:15:09.027",
"lastModified": "2024-01-03T10:15:09.027",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Apache InLong.This issue affects Apache InLong: from 1.5.0 through 1.9.0, which could lead to Remote Code Execution.\u00a0Users are advised to upgrade to Apache InLong's 1.10.0 or cherry-pick [1] to solve it.\n\n[1] https://github.com/apache/inlong/pull/9329 \n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/4nxbyl6mh5jgh0plk0qposbxwn6w9h8j",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-51785",
"sourceIdentifier": "security@apache.org",
"published": "2024-01-03T10:15:09.130",
"lastModified": "2024-01-03T10:15:09.130",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in Apache InLong.This issue affects Apache InLong: from 1.7.0 through 1.9.0, the attackers\u00a0can make a arbitrary file read attack using mysql driver.\u00a0Users are advised to upgrade to Apache InLong's 1.10.0 or cherry-pick [1] to solve it.\n\n[1]\u00a0 https://github.com/apache/inlong/pull/9331 \n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/g0yjmtjqvp8bnf1j0tdsk0nhfozjdjno",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-52302",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:09.110",
"lastModified": "2024-01-03T09:15:09.110",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Nullptr in paddle.nextafter\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.\n\n\n\n"
},
{
"lang": "es",
"value": "Puntero Null en paddle.nextafter en PaddlePaddle antes de 2.6.0. Este fallo puede provocar un bloqueo del tiempo de ejecuci\u00f3n y una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-011.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-52303",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:09.277",
"lastModified": "2024-01-03T09:15:09.277",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Nullptr in paddle.put_along_axis\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.\n\n\n\n"
},
{
"lang": "es",
"value": "Puntero Null en paddle.put_along_axis en PaddlePaddle antes de 2.6.0. Este fallo puede provocar un bloqueo del tiempo de ejecuci\u00f3n y una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-012.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-52304",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:09.447",
"lastModified": "2024-01-03T09:15:09.447",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stack overflow in paddle.searchsorted\u00a0in PaddlePaddle before 2.6.0. This flaw can lead to a denial of service, or even more damage.\n\n\n\n"
},
{
"lang": "es",
"value": "Desbordamiento de pila en paddle.searchsorted en PaddlePaddle antes de 2.6.0. Este fallo puede provocar una denegaci\u00f3n de servicio o incluso m\u00e1s da\u00f1os."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-013.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-52305",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:09.617",
"lastModified": "2024-01-03T09:15:09.617",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "FPE in paddle.topk\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-369"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-014.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-52306",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:09.793",
"lastModified": "2024-01-03T09:15:09.793",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "FPE in paddle.lerp\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.\n\n\n\n"
},
{
"lang": "es",
"value": "FPE en paddle.lerp en PaddlePaddle antes de 2.6.0. Este fallo puede provocar un bloqueo del tiempo de ejecuci\u00f3n y una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-369"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-015.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-52307",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:09.970",
"lastModified": "2024-01-03T09:15:09.970",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Stack overflow in paddle.linalg.lu_unpack\u00a0in PaddlePaddle before 2.6.0. This flaw can lead to a denial of service, or even more damage.\n\n\n\n"
},
{
"lang": "es",
"value": "Desbordamiento de pila en paddle.linalg.lu_unpack en PaddlePaddle antes de 2.6.0. Este fallo puede provocar una denegaci\u00f3n de servicio o incluso m\u00e1s da\u00f1os."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-016.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-52308",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:10.170",
"lastModified": "2024-01-03T09:15:10.170",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "FPE in paddle.amin\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.\n\n\n\n"
},
{
"lang": "es",
"value": "FPE en paddle.amin en PaddlePaddle antes de 2.6.0. Este fallo puede provocar un bloqueo del tiempo de ejecuci\u00f3n y una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-369"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-017.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-52309",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:10.340",
"lastModified": "2024-01-03T09:15:10.340",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Heap buffer overflow in paddle.repeat_interleave\u00a0in PaddlePaddle before 2.6.0. This flaw can lead to a denial of service, information disclosure, or more damage is possible.\n\n\n\n"
},
{
"lang": "es",
"value": "desbordamiento de b\u00fafer de almacenamiento din\u00e1mico en paddle.repeat_interleave en PaddlePaddle antes de 2.6.0. Esta falla puede provocar una denegaci\u00f3n de servicio, divulgaci\u00f3n de informaci\u00f3n o es posible que se produzcan m\u00e1s da\u00f1os."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-018.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-52310",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:10.520",
"lastModified": "2024-01-03T09:15:10.520",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "PaddlePaddle before 2.6.0 has a command injection in get_online_pass_interval. This resulted in the ability to execute arbitrary commands on the operating system.\n\n\n\n\n\n\n\n"
},
{
"lang": "es",
"value": "PaddlePaddle anterior a 2.6.0 tiene una inyecci\u00f3n de comando en get_online_pass_interval. Esto result\u00f3 en la capacidad de ejecutar comandos arbitrarios en el sistema operativo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-019.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-52311",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:10.720",
"lastModified": "2024-01-03T09:15:10.720",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "PaddlePaddle before 2.6.0 has a command injection in _wget_download. This resulted in the ability to execute arbitrary commands on the operating system.\n\n\n\n\n\n\n\n"
},
{
"lang": "es",
"value": "PaddlePaddle anterior a 2.6.0 tiene una inyecci\u00f3n de comando en _wget_download. Esto result\u00f3 en la capacidad de ejecutar comandos arbitrarios en el sistema operativo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-020.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-52312",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:10.903",
"lastModified": "2024-01-03T09:15:10.903",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Nullptr dereference in paddle.crop\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.\n\n\n\n"
},
{
"lang": "es",
"value": "Desreferencia de puntero NULL en paddle.crop en PaddlePaddle antes de 2.6.0. Esta falla puede provocar un bloqueo del tiempo de ejecuci\u00f3n y una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-021.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-52313",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:11.083",
"lastModified": "2024-01-03T09:15:11.083",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "FPE in paddle.argmin and paddle.argmax\u00a0in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service.\n\n\n\n"
},
{
"lang": "es",
"value": "FPE en paddle.argmin y paddle.argmax en PaddlePaddle antes de 2.6.0. Este fallo puede provocar un bloqueo del tiempo de ejecuci\u00f3n y una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-369"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-022.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-52314",
"sourceIdentifier": "paddle-security@baidu.com",
"published": "2024-01-03T09:15:11.267",
"lastModified": "2024-01-03T09:15:11.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "PaddlePaddle before 2.6.0 has a command injection in convert_shape_compare. This resulted in the ability to execute arbitrary commands on the operating system.\n\n\n\n\n\n\n\n"
},
{
"lang": "es",
"value": "PaddlePaddle anterior a 2.6.0 tiene una inyecci\u00f3n de comando en convert_shape_compare. Esto result\u00f3 en la capacidad de ejecutar comandos arbitrarios en el sistema operativo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "paddle-security@baidu.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-023.md",
"source": "paddle-security@baidu.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-6621",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-01-03T09:15:11.440",
"lastModified": "2024-01-03T09:15:11.440",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The POST SMTP WordPress plugin before 2.8.7 does not sanitise and escape the msg parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
},
{
"lang": "es",
"value": "POST SMTP WordPress plugin anterior a 2.8.7 no sanitiza ni escapa el par\u00e1metro msg antes de devolverlo a la p\u00e1gina, lo que genera cross site scripting reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador."
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/b49ca336-5bc2-4d72-a9a5-b8c020057928",
"source": "contact@wpscan.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2023-6747",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-01-03T09:15:11.487",
"lastModified": "2024-01-03T09:15:11.487",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Best WordPress Gallery Plugin \u2013 FooGallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom attributes in all versions up to, and including, 2.3.3 due to insufficient input sanitization and output escaping. This makes it possible for contributors and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "Best WordPress Gallery Plugin \u2013 FooGallery plugin for WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de atributos personalizados en todas las versiones hasta la 2.3.3 inclusive debido a una sanitizaci\u00f3n de entrada y un escape de salida insuficientes. Esto hace posible que los contribuyentes y superiores inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://fooplugins.com/foogallery-wordpress-gallery-plugin/pricing/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dce8ac32-cab8-4e05-bf6f-cc348d0c9472?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2023-6984",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-01-03T09:15:11.647",
"lastModified": "2024-01-03T09:15:11.647",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.7.13. This is due to missing or incorrect nonce validation in the powerpack-lite-for-elementor/classes/class-pp-admin-settings.php file. This makes it possible for unauthenticated attackers to modify and reset plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "PowerPack Addons for Elementor (Free Widgets, Extensions and Templates) plugin for WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 2.7.13 inclusive. Esto se debe a una validaci\u00f3n nonce faltante o incorrecta en el archivo powerpack-lite-for-elementor/classes/class-pp-admin-settings.php. Esto hace posible que atacantes no autenticados modifiquen y restablezcan la configuraci\u00f3n del complemento mediante una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3015474%40powerpack-lite-for-elementor&new=3015474%40powerpack-lite-for-elementor&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fe2cfc96-63f4-4e4b-bf49-6031594a4805?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2023-7068",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-01-03T09:15:11.810",
"lastModified": "2024-01-03T09:15:11.810",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on theprint_packinglist action in all versions up to, and including, 4.3.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to export orders which can contain sensitive information."
},
{
"lang": "es",
"value": "WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels plugin for WordPress es vulnerable al acceso no autorizado a los datos debido a una falta de verificaci\u00f3n de capacidad en la acci\u00f3n theprint_packinglist en todas las versiones hasta la 4.3.0 inclusive. Esto hace posible que atacantes autenticados, con acceso a nivel de suscriptor y superior, exporten pedidos que pueden contener informaci\u00f3n confidencial."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3014977%40print-invoices-packing-slip-labels-for-woocommerce&new=3014977%40print-invoices-packing-slip-labels-for-woocommerce&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5abc282d-68c9-423c-a15c-d4d3f7035661?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2024-0201",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-01-03T10:15:09.240",
"lastModified": "2024-01-03T10:15:09.240",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Product Expiry for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'save_settings' function in versions up to, and including, 2.5. This makes it possible for authenticated attackers, with subscriber-level permissions or above to update plugin settings."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/product-expiry-for-woocommerce/tags/2.5/product-expiry-for-woocommerce.php#L263",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/product-expiry-for-woocommerce/tags/2.6/product-expiry-for-woocommerce.php?rev=3014924#L263",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c4006612-770a-482f-a8c2-e62f607914a9?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-01-03T09:00:24.927629+00:00
2024-01-03T11:00:25.793446+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-01-03T08:15:11.443000+00:00
2024-01-03T10:15:09.240000+00:00
```
### Last Data Feed Release
@ -29,28 +29,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
234765
234791
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `26`
* [CVE-2023-47473](CVE-2023/CVE-2023-474xx/CVE-2023-47473.json) (`2024-01-03T07:15:07.350`)
* [CVE-2023-6986](CVE-2023/CVE-2023-69xx/CVE-2023-6986.json) (`2024-01-03T07:15:07.483`)
* [CVE-2023-50922](CVE-2023/CVE-2023-509xx/CVE-2023-50922.json) (`2024-01-03T08:15:09.607`)
* [CVE-2024-0207](CVE-2024/CVE-2024-02xx/CVE-2024-0207.json) (`2024-01-03T08:15:10.053`)
* [CVE-2024-0208](CVE-2024/CVE-2024-02xx/CVE-2024-0208.json) (`2024-01-03T08:15:10.340`)
* [CVE-2024-0209](CVE-2024/CVE-2024-02xx/CVE-2024-0209.json) (`2024-01-03T08:15:10.793`)
* [CVE-2024-0210](CVE-2024/CVE-2024-02xx/CVE-2024-0210.json) (`2024-01-03T08:15:11.150`)
* [CVE-2024-0211](CVE-2024/CVE-2024-02xx/CVE-2024-0211.json) (`2024-01-03T08:15:11.443`)
* [CVE-2023-38675](CVE-2023/CVE-2023-386xx/CVE-2023-38675.json) (`2024-01-03T09:15:08.340`)
* [CVE-2023-38676](CVE-2023/CVE-2023-386xx/CVE-2023-38676.json) (`2024-01-03T09:15:08.517`)
* [CVE-2023-38677](CVE-2023/CVE-2023-386xx/CVE-2023-38677.json) (`2024-01-03T09:15:08.687`)
* [CVE-2023-38678](CVE-2023/CVE-2023-386xx/CVE-2023-38678.json) (`2024-01-03T09:15:08.877`)
* [CVE-2023-50921](CVE-2023/CVE-2023-509xx/CVE-2023-50921.json) (`2024-01-03T09:15:09.067`)
* [CVE-2023-52302](CVE-2023/CVE-2023-523xx/CVE-2023-52302.json) (`2024-01-03T09:15:09.110`)
* [CVE-2023-52303](CVE-2023/CVE-2023-523xx/CVE-2023-52303.json) (`2024-01-03T09:15:09.277`)
* [CVE-2023-52304](CVE-2023/CVE-2023-523xx/CVE-2023-52304.json) (`2024-01-03T09:15:09.447`)
* [CVE-2023-52305](CVE-2023/CVE-2023-523xx/CVE-2023-52305.json) (`2024-01-03T09:15:09.617`)
* [CVE-2023-52306](CVE-2023/CVE-2023-523xx/CVE-2023-52306.json) (`2024-01-03T09:15:09.793`)
* [CVE-2023-52307](CVE-2023/CVE-2023-523xx/CVE-2023-52307.json) (`2024-01-03T09:15:09.970`)
* [CVE-2023-52308](CVE-2023/CVE-2023-523xx/CVE-2023-52308.json) (`2024-01-03T09:15:10.170`)
* [CVE-2023-52309](CVE-2023/CVE-2023-523xx/CVE-2023-52309.json) (`2024-01-03T09:15:10.340`)
* [CVE-2023-52310](CVE-2023/CVE-2023-523xx/CVE-2023-52310.json) (`2024-01-03T09:15:10.520`)
* [CVE-2023-52311](CVE-2023/CVE-2023-523xx/CVE-2023-52311.json) (`2024-01-03T09:15:10.720`)
* [CVE-2023-52312](CVE-2023/CVE-2023-523xx/CVE-2023-52312.json) (`2024-01-03T09:15:10.903`)
* [CVE-2023-52313](CVE-2023/CVE-2023-523xx/CVE-2023-52313.json) (`2024-01-03T09:15:11.083`)
* [CVE-2023-52314](CVE-2023/CVE-2023-523xx/CVE-2023-52314.json) (`2024-01-03T09:15:11.267`)
* [CVE-2023-6621](CVE-2023/CVE-2023-66xx/CVE-2023-6621.json) (`2024-01-03T09:15:11.440`)
* [CVE-2023-6747](CVE-2023/CVE-2023-67xx/CVE-2023-6747.json) (`2024-01-03T09:15:11.487`)
* [CVE-2023-6984](CVE-2023/CVE-2023-69xx/CVE-2023-6984.json) (`2024-01-03T09:15:11.647`)
* [CVE-2023-7068](CVE-2023/CVE-2023-70xx/CVE-2023-7068.json) (`2024-01-03T09:15:11.810`)
* [CVE-2023-51784](CVE-2023/CVE-2023-517xx/CVE-2023-51784.json) (`2024-01-03T10:15:09.027`)
* [CVE-2023-51785](CVE-2023/CVE-2023-517xx/CVE-2023-51785.json) (`2024-01-03T10:15:09.130`)
* [CVE-2024-0201](CVE-2024/CVE-2024-02xx/CVE-2024-0201.json) (`2024-01-03T10:15:09.240`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `0`
* [CVE-2023-6918](CVE-2023/CVE-2023-69xx/CVE-2023-6918.json) (`2024-01-03T08:15:09.780`)
## Download and Usage