From 91a32434209196f2072d3a36b4f62581ea0aaf7e Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 26 Dec 2023 09:00:27 +0000 Subject: [PATCH] Auto-Update: 2023-12-26T09:00:24.312836+00:00 --- CVE-2023/CVE-2023-424xx/CVE-2023-42436.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-457xx/CVE-2023-45737.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-457xx/CVE-2023-45740.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-457xx/CVE-2023-45741.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-466xx/CVE-2023-46681.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-466xx/CVE-2023-46699.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-467xx/CVE-2023-46711.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-472xx/CVE-2023-47215.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-491xx/CVE-2023-49119.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-495xx/CVE-2023-49598.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-497xx/CVE-2023-49779.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-498xx/CVE-2023-49807.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-501xx/CVE-2023-50175.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-502xx/CVE-2023-50294.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-503xx/CVE-2023-50332.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-503xx/CVE-2023-50339.json | 24 ++++++++++++++++++ CVE-2023/CVE-2023-513xx/CVE-2023-51363.json | 24 ++++++++++++++++++ README.md | 28 +++++++++++++++------ 18 files changed, 429 insertions(+), 7 deletions(-) create mode 100644 CVE-2023/CVE-2023-424xx/CVE-2023-42436.json create mode 100644 CVE-2023/CVE-2023-457xx/CVE-2023-45737.json create mode 100644 CVE-2023/CVE-2023-457xx/CVE-2023-45740.json create mode 100644 CVE-2023/CVE-2023-457xx/CVE-2023-45741.json create mode 100644 CVE-2023/CVE-2023-466xx/CVE-2023-46681.json create mode 100644 CVE-2023/CVE-2023-466xx/CVE-2023-46699.json create mode 100644 CVE-2023/CVE-2023-467xx/CVE-2023-46711.json create mode 100644 CVE-2023/CVE-2023-472xx/CVE-2023-47215.json create mode 100644 CVE-2023/CVE-2023-491xx/CVE-2023-49119.json create mode 100644 CVE-2023/CVE-2023-495xx/CVE-2023-49598.json create mode 100644 CVE-2023/CVE-2023-497xx/CVE-2023-49779.json create mode 100644 CVE-2023/CVE-2023-498xx/CVE-2023-49807.json create mode 100644 CVE-2023/CVE-2023-501xx/CVE-2023-50175.json create mode 100644 CVE-2023/CVE-2023-502xx/CVE-2023-50294.json create mode 100644 CVE-2023/CVE-2023-503xx/CVE-2023-50332.json create mode 100644 CVE-2023/CVE-2023-503xx/CVE-2023-50339.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51363.json diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42436.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42436.json new file mode 100644 index 00000000000..9916fa3f498 --- /dev/null +++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42436.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-42436", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:09.637", + "lastModified": "2023-12-26T08:15:09.637", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Stored cross-site scripting vulnerability exists in the presentation feature of GROWI versions prior to v3.4.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45737.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45737.json new file mode 100644 index 00000000000..204ebfb163b --- /dev/null +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45737.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-45737", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:09.907", + "lastModified": "2023-12-26T08:15:09.907", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Stored cross-site scripting vulnerability exists in the App Settings (/admin/app) page and the Markdown Settings (/admin/markdown) page of GROWI versions prior to v3.5.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45740.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45740.json new file mode 100644 index 00000000000..0a562145f43 --- /dev/null +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45740.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-45740", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:10.010", + "lastModified": "2023-12-26T08:15:10.010", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Stored cross-site scripting vulnerability when processing profile images exists in GROWI versions prior to v4.1.3. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-457xx/CVE-2023-45741.json b/CVE-2023/CVE-2023-457xx/CVE-2023-45741.json new file mode 100644 index 00000000000..5be862dd7aa --- /dev/null +++ b/CVE-2023/CVE-2023-457xx/CVE-2023-45741.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-45741", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:10.107", + "lastModified": "2023-12-26T08:15:10.107", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "VR-S1000 firmware Ver. 2.37 and earlier allows an attacker with access to the product's web management page to execute arbitrary OS commands." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN23771490/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.buffalo.jp/news/detail/20231225-01.html", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46681.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46681.json new file mode 100644 index 00000000000..facb0bd697e --- /dev/null +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46681.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46681", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:10.247", + "lastModified": "2023-12-26T08:15:10.247", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper neutralization of argument delimiters in a command ('Argument Injection') vulnerability in VR-S1000 firmware Ver. 2.37 and earlier allows an authenticated attacker who can access to the product's command line interface to execute an arbitrary command." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN23771490/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.buffalo.jp/news/detail/20231225-01.html", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46699.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46699.json new file mode 100644 index 00000000000..7f73c309c97 --- /dev/null +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46699.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46699", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:10.407", + "lastModified": "2023-12-26T08:15:10.407", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-site request forgery (CSRF) vulnerability exists in the User settings (/me) page of GROWI versions prior to v6.0.0. If a user views a malicious page while logging in, settings may be changed without the user's intention." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-467xx/CVE-2023-46711.json b/CVE-2023/CVE-2023-467xx/CVE-2023-46711.json new file mode 100644 index 00000000000..09aa427352d --- /dev/null +++ b/CVE-2023/CVE-2023-467xx/CVE-2023-46711.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-46711", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:10.530", + "lastModified": "2023-12-26T08:15:10.530", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "VR-S1000 firmware Ver. 2.37 and earlier uses a hard-coded cryptographic key which may allow an attacker to analyze the password of a specific product user." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN23771490/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.buffalo.jp/news/detail/20231225-01.html", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47215.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47215.json new file mode 100644 index 00000000000..0694c42e32d --- /dev/null +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47215.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-47215", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:10.643", + "lastModified": "2023-12-26T08:15:10.643", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Stored cross-site scripting vulnerability which is exploiting a behavior of the XSS Filter exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49119.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49119.json new file mode 100644 index 00000000000..81aac37bd22 --- /dev/null +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49119.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-49119", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:10.793", + "lastModified": "2023-12-26T08:15:10.793", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Stored cross-site scripting vulnerability via the img tags exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49598.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49598.json new file mode 100644 index 00000000000..53a47939a0a --- /dev/null +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49598.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-49598", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:10.930", + "lastModified": "2023-12-26T08:15:10.930", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Stored cross-site scripting vulnerability exists in the event handlers of the pre tags in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-497xx/CVE-2023-49779.json b/CVE-2023/CVE-2023-497xx/CVE-2023-49779.json new file mode 100644 index 00000000000..dbfd89d4602 --- /dev/null +++ b/CVE-2023/CVE-2023-497xx/CVE-2023-49779.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-49779", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:11.017", + "lastModified": "2023-12-26T08:15:11.017", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Stored cross-site scripting vulnerability exists in the anchor tag of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-498xx/CVE-2023-49807.json b/CVE-2023/CVE-2023-498xx/CVE-2023-49807.json new file mode 100644 index 00000000000..0fc5857e763 --- /dev/null +++ b/CVE-2023/CVE-2023-498xx/CVE-2023-49807.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-49807", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:11.113", + "lastModified": "2023-12-26T08:15:11.113", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Stored cross-site scripting vulnerability when processing the MathJax exists in GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50175.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50175.json new file mode 100644 index 00000000000..2b60627501d --- /dev/null +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50175.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-50175", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:11.290", + "lastModified": "2023-12-26T08:15:11.290", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Stored cross-site scripting vulnerability exists in the App Settings (/admin/app) page, the Markdown Settings (/admin/markdown) page, and the Customize (/admin/customize) page of GROWI versions prior to v6.0.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-502xx/CVE-2023-50294.json b/CVE-2023/CVE-2023-502xx/CVE-2023-50294.json new file mode 100644 index 00000000000..bdb8157ba60 --- /dev/null +++ b/CVE-2023/CVE-2023-502xx/CVE-2023-50294.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-50294", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:11.427", + "lastModified": "2023-12-26T08:15:11.427", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The App Settings (/admin/app) page in GROWI versions prior to v6.0.6 stores sensitive information in cleartext form. As a result, the Secret access key for external service may be obtained by an attacker who can access the App Settings page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50332.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50332.json new file mode 100644 index 00000000000..7a9741c77e7 --- /dev/null +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50332.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-50332", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:11.570", + "lastModified": "2023-12-26T08:15:11.570", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper authorization vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.0.6. If this vulnerability is exploited, a user may delete or suspend its own account without the user's intention.\r\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50339.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50339.json new file mode 100644 index 00000000000..829d46e42e4 --- /dev/null +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50339.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-50339", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:11.657", + "lastModified": "2023-12-26T08:15:11.657", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Stored cross-site scripting vulnerability exists in the User Management (/admin/users) page of GROWI versions prior to v6.1.11. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the site using the product." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN18715935/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://weseek.co.jp/ja/news/2023/11/21/growi-prevent-xss6/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51363.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51363.json new file mode 100644 index 00000000000..ca122f42da2 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51363.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-51363", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2023-12-26T08:15:11.760", + "lastModified": "2023-12-26T08:15:11.760", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "VR-S1000 firmware Ver. 2.37 and earlier allows a network-adjacent unauthenticated attacker who can access the product's web management page to obtain sensitive information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/jp/JVN23771490/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.buffalo.jp/news/detail/20231225-01.html", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9433fcd6641..45b4e9bb1c9 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-26T07:00:24.303947+00:00 +2023-12-26T09:00:24.312836+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-26T06:15:07.530000+00:00 +2023-12-26T08:15:11.760000+00:00 ``` ### Last Data Feed Release @@ -29,16 +29,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -234212 +234229 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `17` -* [CVE-2023-49117](CVE-2023/CVE-2023-491xx/CVE-2023-49117.json) (`2023-12-26T06:15:07.260`) -* [CVE-2023-50297](CVE-2023/CVE-2023-502xx/CVE-2023-50297.json) (`2023-12-26T06:15:07.473`) -* [CVE-2023-51654](CVE-2023/CVE-2023-516xx/CVE-2023-51654.json) (`2023-12-26T06:15:07.530`) +* [CVE-2023-42436](CVE-2023/CVE-2023-424xx/CVE-2023-42436.json) (`2023-12-26T08:15:09.637`) +* [CVE-2023-45737](CVE-2023/CVE-2023-457xx/CVE-2023-45737.json) (`2023-12-26T08:15:09.907`) +* [CVE-2023-45740](CVE-2023/CVE-2023-457xx/CVE-2023-45740.json) (`2023-12-26T08:15:10.010`) +* [CVE-2023-45741](CVE-2023/CVE-2023-457xx/CVE-2023-45741.json) (`2023-12-26T08:15:10.107`) +* [CVE-2023-46681](CVE-2023/CVE-2023-466xx/CVE-2023-46681.json) (`2023-12-26T08:15:10.247`) +* [CVE-2023-46699](CVE-2023/CVE-2023-466xx/CVE-2023-46699.json) (`2023-12-26T08:15:10.407`) +* [CVE-2023-46711](CVE-2023/CVE-2023-467xx/CVE-2023-46711.json) (`2023-12-26T08:15:10.530`) +* [CVE-2023-47215](CVE-2023/CVE-2023-472xx/CVE-2023-47215.json) (`2023-12-26T08:15:10.643`) +* [CVE-2023-49119](CVE-2023/CVE-2023-491xx/CVE-2023-49119.json) (`2023-12-26T08:15:10.793`) +* [CVE-2023-49598](CVE-2023/CVE-2023-495xx/CVE-2023-49598.json) (`2023-12-26T08:15:10.930`) +* [CVE-2023-49779](CVE-2023/CVE-2023-497xx/CVE-2023-49779.json) (`2023-12-26T08:15:11.017`) +* [CVE-2023-49807](CVE-2023/CVE-2023-498xx/CVE-2023-49807.json) (`2023-12-26T08:15:11.113`) +* [CVE-2023-50175](CVE-2023/CVE-2023-501xx/CVE-2023-50175.json) (`2023-12-26T08:15:11.290`) +* [CVE-2023-50294](CVE-2023/CVE-2023-502xx/CVE-2023-50294.json) (`2023-12-26T08:15:11.427`) +* [CVE-2023-50332](CVE-2023/CVE-2023-503xx/CVE-2023-50332.json) (`2023-12-26T08:15:11.570`) +* [CVE-2023-50339](CVE-2023/CVE-2023-503xx/CVE-2023-50339.json) (`2023-12-26T08:15:11.657`) +* [CVE-2023-51363](CVE-2023/CVE-2023-513xx/CVE-2023-51363.json) (`2023-12-26T08:15:11.760`) ### CVEs modified in the last Commit