diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125108.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125108.json index 8dc842505b2..9cecfd30bad 100644 --- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125108.json +++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125108.json @@ -2,8 +2,8 @@ "id": "CVE-2014-125108", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-23T17:15:07.773", - "lastModified": "2023-12-23T17:15:07.773", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15036.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15036.json index aca2f9c3933..42dfbe425ca 100644 --- a/CVE-2016/CVE-2016-150xx/CVE-2016-15036.json +++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15036.json @@ -2,8 +2,8 @@ "id": "CVE-2016-15036", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-23T20:15:37.930", - "lastModified": "2023-12-23T20:15:37.930", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2020/CVE-2020-367xx/CVE-2020-36769.json b/CVE-2020/CVE-2020-367xx/CVE-2020-36769.json index 4a192100dc5..20a5b75ceee 100644 --- a/CVE-2020/CVE-2020-367xx/CVE-2020-36769.json +++ b/CVE-2020/CVE-2020-367xx/CVE-2020-36769.json @@ -2,8 +2,8 @@ "id": "CVE-2020-36769", "sourceIdentifier": "security@wordfence.com", "published": "2023-12-23T10:15:08.113", - "lastModified": "2023-12-23T10:15:08.113", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-389xx/CVE-2021-38927.json b/CVE-2021/CVE-2021-389xx/CVE-2021-38927.json new file mode 100644 index 00000000000..7a22b827aad --- /dev/null +++ b/CVE-2021/CVE-2021-389xx/CVE-2021-38927.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2021-38927", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-12-25T03:15:07.943", + "lastModified": "2023-12-25T03:15:07.943", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "IBM Aspera Console 3.4.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 210322." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/210322", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7101252", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-430xx/CVE-2023-43064.json b/CVE-2023/CVE-2023-430xx/CVE-2023-43064.json new file mode 100644 index 00000000000..c9d04fe12d9 --- /dev/null +++ b/CVE-2023/CVE-2023-430xx/CVE-2023-43064.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-43064", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-12-25T03:15:08.210", + "lastModified": "2023-12-25T03:15:08.210", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Facsimile Support for IBM i 7.2, 7.3, 7.4, and 7.5 could allow a local user to gain elevated privileges due to an unqualified library call. A malicious actor could cause arbitrary code to run with the privilege of the user invoking the facsimile support. IBM X-Force ID: 267689." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267689", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7101330", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49594.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49594.json index af77aa12e2c..01835b23485 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49594.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49594.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49594", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-12-23T20:15:38.250", - "lastModified": "2023-12-24T18:15:44.833", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49880.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49880.json new file mode 100644 index 00000000000..796bec84f7a --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49880.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2023-49880", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2023-12-25T03:15:08.430", + "lastModified": "2023-12-25T03:15:08.430", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In the Message Entry and Repair (MER) facility of IBM Financial Transaction Manager for SWIFT Services 3.2.4 the sending address and the message type of FIN messages are assumed to be immutable. However, an attacker might modify these elements of a business transaction. IBM X-Force ID: 273183." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/273183", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7101167", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50727.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50727.json index 0ae107b1c23..f8133e20313 100644 --- a/CVE-2023/CVE-2023-507xx/CVE-2023-50727.json +++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50727.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50727", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T21:15:07.690", - "lastModified": "2023-12-22T21:15:07.690", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50730.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50730.json index b556be00583..7b2fe6d7e45 100644 --- a/CVE-2023/CVE-2023-507xx/CVE-2023-50730.json +++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50730.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50730", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T21:15:07.930", - "lastModified": "2023-12-22T21:15:07.930", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50731.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50731.json index 6658bdc7293..729c1dc2936 100644 --- a/CVE-2023/CVE-2023-507xx/CVE-2023-50731.json +++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50731.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50731", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T21:15:08.150", - "lastModified": "2023-12-22T21:15:08.150", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50924.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50924.json index 8e1989a9502..eace77772fd 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50924.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50924.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50924", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T21:15:08.370", - "lastModified": "2023-12-22T21:15:08.370", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50928.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50928.json index 699994ff65e..69eff8c2559 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50928.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50928.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50928", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T21:15:08.580", - "lastModified": "2023-12-22T21:15:08.580", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51386.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51386.json index 64e622fa99e..ec20a3a184f 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51386.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51386.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51386", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T22:15:07.827", - "lastModified": "2023-12-22T22:15:07.827", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51387.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51387.json index ef9ee11b133..c8d68a0d840 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51387.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51387.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51387", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T21:15:08.790", - "lastModified": "2023-12-22T21:15:08.790", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51449.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51449.json index 4526daad140..09fff08a985 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51449.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51449.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51449", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T21:15:09.000", - "lastModified": "2023-12-22T21:15:09.000", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51451.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51451.json index c4c4d49b871..c5ca2293ee0 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51451.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51451.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51451", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T21:15:09.297", - "lastModified": "2023-12-22T21:15:09.297", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51650.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51650.json index 6e46ccd047e..64e42285e6d 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51650.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51650.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51650", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T21:15:09.503", - "lastModified": "2023-12-22T21:15:09.503", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51651.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51651.json index ab21f1115b7..4f229072f38 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51651.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51651.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51651", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-22T21:15:09.700", - "lastModified": "2023-12-22T21:15:09.700", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51714.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51714.json index bbbd1e09b21..54c5de7d1ee 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51714.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51714.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51714", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-24T21:15:25.470", - "lastModified": "2023-12-24T21:15:25.470", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51763.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51763.json index 5ab27654589..71105954197 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51763.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51763.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51763", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-24T04:15:07.633", - "lastModified": "2023-12-24T04:15:07.633", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51764.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51764.json index 95c168878a6..2b0caef4c7b 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51764.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51764.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51764", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-24T05:15:08.273", - "lastModified": "2023-12-24T12:15:37.670", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51765.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51765.json index fea3ac6dc27..794b06c48b1 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51765.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51765.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51765", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-24T06:15:07.527", - "lastModified": "2023-12-24T12:15:38.020", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51766.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51766.json index 92473bbb834..e820264cc99 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51766.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51766.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51766", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-24T06:15:07.673", - "lastModified": "2023-12-24T12:15:38.070", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-517xx/CVE-2023-51767.json b/CVE-2023/CVE-2023-517xx/CVE-2023-51767.json index 6d51d53bc61..92df8fba701 100644 --- a/CVE-2023/CVE-2023-517xx/CVE-2023-51767.json +++ b/CVE-2023/CVE-2023-517xx/CVE-2023-51767.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51767", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-24T07:15:07.410", - "lastModified": "2023-12-24T07:15:07.410", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5961.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5961.json index 5eada9fbec3..d32b14198f8 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5961.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5961.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5961", "sourceIdentifier": "psirt@moxa.com", "published": "2023-12-23T09:15:07.730", - "lastModified": "2023-12-23T09:15:07.730", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5962.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5962.json index 3f6e7af61af..0df76d1bcef 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5962.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5962.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5962", "sourceIdentifier": "psirt@moxa.com", "published": "2023-12-23T09:15:08.050", - "lastModified": "2023-12-23T09:15:08.050", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6377.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6377.json index 11bd65f6c17..14161d882bb 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6377.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6377.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6377", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-13T07:15:30.030", - "lastModified": "2023-12-21T17:18:05.783", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-25T04:15:07.613", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -290,6 +290,10 @@ "Mailing List" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R63Z6GIWM3YUNZRCGFODUXLW3GY2HD6/", + "source": "secalert@redhat.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6478.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6478.json index 5dac97df7c4..af7b8fec776 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6478.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6478.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6478", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-13T07:15:31.213", - "lastModified": "2023-12-21T17:21:03.223", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-25T04:15:07.777", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -283,6 +283,10 @@ "Mailing List" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R63Z6GIWM3YUNZRCGFODUXLW3GY2HD6/", + "source": "secalert@redhat.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-67xx/CVE-2023-6744.json b/CVE-2023/CVE-2023-67xx/CVE-2023-6744.json index f93b01e1f8d..72bd23ded53 100644 --- a/CVE-2023/CVE-2023-67xx/CVE-2023-6744.json +++ b/CVE-2023/CVE-2023-67xx/CVE-2023-6744.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6744", "sourceIdentifier": "security@wordfence.com", "published": "2023-12-23T10:15:10.570", - "lastModified": "2023-12-23T10:15:10.570", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6971.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6971.json index b0490305d1b..f9763344ce1 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6971.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6971.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6971", "sourceIdentifier": "security@wordfence.com", "published": "2023-12-23T02:15:45.150", - "lastModified": "2023-12-23T02:15:45.150", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6972.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6972.json index a9a6ef0912d..3a8a3e0ed74 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6972.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6972.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6972", "sourceIdentifier": "security@wordfence.com", "published": "2023-12-23T02:15:45.333", - "lastModified": "2023-12-23T02:15:45.333", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7002.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7002.json index 7aec83d1b9e..8ae34e32e7d 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7002.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7002.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7002", "sourceIdentifier": "security@wordfence.com", "published": "2023-12-23T02:15:45.490", - "lastModified": "2023-12-23T02:15:45.490", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7008.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7008.json index 159840e6a2d..dd690c12473 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7008.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7008.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7008", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-23T13:15:07.573", - "lastModified": "2023-12-23T13:15:07.573", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:20.540", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7090.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7090.json index c750afe2117..0c016f5e439 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7090.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7090.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7090", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-23T23:15:07.560", - "lastModified": "2023-12-23T23:15:07.560", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7091.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7091.json index 71cafdae1cf..dd6f57f46b4 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7091.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7091.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7091", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-24T21:15:25.530", - "lastModified": "2023-12-24T21:15:25.530", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7092.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7092.json index 33c5ad58217..14dd985866b 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7092.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7092.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7092", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-24T23:15:08.290", - "lastModified": "2023-12-24T23:15:08.290", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7093.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7093.json index 609f2f9ed0a..40cebebd41a 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7093.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7093.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7093", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-25T00:15:08.400", - "lastModified": "2023-12-25T00:15:08.400", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7094.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7094.json index a1c967e6d92..e2672dc469b 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7094.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7094.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7094", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-25T00:15:08.677", - "lastModified": "2023-12-25T00:15:08.677", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7095.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7095.json index 55ad54837bd..abbeb690461 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7095.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7095.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7095", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-25T01:15:08.203", - "lastModified": "2023-12-25T01:15:08.203", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7096.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7096.json index 09d86ebe423..829d85cb7c4 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7096.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7096.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7096", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-25T01:15:08.457", - "lastModified": "2023-12-25T01:15:08.457", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7097.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7097.json index cb4c5dd6f48..6b7a7e1c720 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7097.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7097.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7097", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-25T02:15:44.337", - "lastModified": "2023-12-25T02:15:44.337", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7098.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7098.json index 2680ca6f555..f8720999c01 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7098.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7098.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7098", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-25T02:15:44.603", - "lastModified": "2023-12-25T02:15:44.603", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7099.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7099.json new file mode 100644 index 00000000000..484b1e1d8b2 --- /dev/null +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7099.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2023-7099", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-12-25T03:15:08.620", + "lastModified": "2023-12-25T03:15:08.620", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This issue affects some unknown processing of the file bwdates-report-result.php. The manipulation of the argument fromdate leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248951." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/laoquanshi/heishou/blob/main/niv%20-SQL", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/laoquanshi/heishou/blob/main/sqlmap.png", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.248951", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.248951", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7100.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7100.json new file mode 100644 index 00000000000..7bb944775c8 --- /dev/null +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7100.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-7100", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-12-25T03:15:08.840", + "lastModified": "2023-12-25T03:15:08.840", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Restaurant Table Booking System 1.0. Affected is an unknown function of the file /admin/bwdates-report-details.php. The manipulation of the argument fdate leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248952." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://medium.com/@2839549219ljk/restaurant-table-booking-system-sql-injection-vulnerability-30708cfabe03", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.248952", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.248952", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7101.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7101.json index fec524ebe96..1c2d55d2f51 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7101.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7101.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7101", "sourceIdentifier": "mandiant-cve@google.com", "published": "2023-12-24T22:15:07.983", - "lastModified": "2023-12-24T22:15:07.983", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7102.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7102.json index 6afc602fc0c..40991756fc1 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7102.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7102.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7102", "sourceIdentifier": "mandiant-cve@google.com", "published": "2023-12-24T22:15:08.107", - "lastModified": "2023-12-24T22:15:08.107", - "vulnStatus": "Received", + "lastModified": "2023-12-25T03:08:09.833", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 7b8247901fa..1257b3c5d1c 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-25T03:00:32.236336+00:00 +2023-12-25T05:00:25.323061+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-25T02:15:44.603000+00:00 +2023-12-25T04:15:07.777000+00:00 ``` ### Last Data Feed Release @@ -29,23 +29,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -234166 +234171 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `5` -* [CVE-2023-7095](CVE-2023/CVE-2023-70xx/CVE-2023-7095.json) (`2023-12-25T01:15:08.203`) -* [CVE-2023-7096](CVE-2023/CVE-2023-70xx/CVE-2023-7096.json) (`2023-12-25T01:15:08.457`) -* [CVE-2023-7097](CVE-2023/CVE-2023-70xx/CVE-2023-7097.json) (`2023-12-25T02:15:44.337`) -* [CVE-2023-7098](CVE-2023/CVE-2023-70xx/CVE-2023-7098.json) (`2023-12-25T02:15:44.603`) +* [CVE-2021-38927](CVE-2021/CVE-2021-389xx/CVE-2021-38927.json) (`2023-12-25T03:15:07.943`) +* [CVE-2023-43064](CVE-2023/CVE-2023-430xx/CVE-2023-43064.json) (`2023-12-25T03:15:08.210`) +* [CVE-2023-49880](CVE-2023/CVE-2023-498xx/CVE-2023-49880.json) (`2023-12-25T03:15:08.430`) +* [CVE-2023-7099](CVE-2023/CVE-2023-70xx/CVE-2023-7099.json) (`2023-12-25T03:15:08.620`) +* [CVE-2023-7100](CVE-2023/CVE-2023-71xx/CVE-2023-7100.json) (`2023-12-25T03:15:08.840`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `41` +* [CVE-2023-7094](CVE-2023/CVE-2023-70xx/CVE-2023-7094.json) (`2023-12-25T03:08:09.833`) +* [CVE-2023-7095](CVE-2023/CVE-2023-70xx/CVE-2023-7095.json) (`2023-12-25T03:08:09.833`) +* [CVE-2023-7096](CVE-2023/CVE-2023-70xx/CVE-2023-7096.json) (`2023-12-25T03:08:09.833`) +* [CVE-2023-7097](CVE-2023/CVE-2023-70xx/CVE-2023-7097.json) (`2023-12-25T03:08:09.833`) +* [CVE-2023-7098](CVE-2023/CVE-2023-70xx/CVE-2023-7098.json) (`2023-12-25T03:08:09.833`) +* [CVE-2023-50727](CVE-2023/CVE-2023-507xx/CVE-2023-50727.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-50730](CVE-2023/CVE-2023-507xx/CVE-2023-50730.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-50731](CVE-2023/CVE-2023-507xx/CVE-2023-50731.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-50924](CVE-2023/CVE-2023-509xx/CVE-2023-50924.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-50928](CVE-2023/CVE-2023-509xx/CVE-2023-50928.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-51387](CVE-2023/CVE-2023-513xx/CVE-2023-51387.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-51449](CVE-2023/CVE-2023-514xx/CVE-2023-51449.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-51451](CVE-2023/CVE-2023-514xx/CVE-2023-51451.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-51650](CVE-2023/CVE-2023-516xx/CVE-2023-51650.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-51651](CVE-2023/CVE-2023-516xx/CVE-2023-51651.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-51386](CVE-2023/CVE-2023-513xx/CVE-2023-51386.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-6971](CVE-2023/CVE-2023-69xx/CVE-2023-6971.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-6972](CVE-2023/CVE-2023-69xx/CVE-2023-6972.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-7002](CVE-2023/CVE-2023-70xx/CVE-2023-7002.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-5961](CVE-2023/CVE-2023-59xx/CVE-2023-5961.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-5962](CVE-2023/CVE-2023-59xx/CVE-2023-5962.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-6744](CVE-2023/CVE-2023-67xx/CVE-2023-6744.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-7008](CVE-2023/CVE-2023-70xx/CVE-2023-7008.json) (`2023-12-25T03:08:20.540`) +* [CVE-2023-6377](CVE-2023/CVE-2023-63xx/CVE-2023-6377.json) (`2023-12-25T04:15:07.613`) +* [CVE-2023-6478](CVE-2023/CVE-2023-64xx/CVE-2023-6478.json) (`2023-12-25T04:15:07.777`) ## Download and Usage