diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0125.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0125.json index 5df2e919b73..c0f4288032c 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0125.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0125.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0125", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-09T21:15:11.070", - "lastModified": "2023-11-07T03:59:42.130", + "lastModified": "2024-02-13T08:15:40.783", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0324.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0324.json index c8e143ac97a..5503694efa8 100644 --- a/CVE-2023/CVE-2023-03xx/CVE-2023-0324.json +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0324.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0324", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-16T15:15:10.473", - "lastModified": "2023-11-07T04:00:10.930", + "lastModified": "2024-02-13T08:15:41.180", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0515.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0515.json index 0a68c82d64c..2274f7b5d78 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0515.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0515.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0515", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-26T21:18:10.727", - "lastModified": "2023-11-07T04:00:37.503", + "lastModified": "2024-02-13T08:15:41.447", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0516.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0516.json index 8bfe1aa5765..7024eca3475 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0516.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0516.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0516", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-26T21:18:10.863", - "lastModified": "2023-11-07T04:00:37.960", + "lastModified": "2024-02-13T08:15:41.677", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0528.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0528.json index b96b34060c2..c21ade00b66 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0528.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0528.json @@ -2,12 +2,16 @@ "id": "CVE-2023-0528", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-27T11:15:12.820", - "lastModified": "2023-11-07T04:00:39.897", + "lastModified": "2024-02-13T08:15:41.900", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been classified as critical. This affects an unknown part of the file admin/abc.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219597 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Online Tours & Travels Management System 1.0. Ha sido clasificado como cr\u00edtico. Esto afecta a una parte desconocida del archivo admin/abc.php. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota. La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-219597." } ], "metrics": { @@ -33,7 +37,7 @@ "impactScore": 3.4 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0529.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0529.json index 2fe4621f944..93767a31e93 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0529.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0529.json @@ -2,12 +2,16 @@ "id": "CVE-2023-0529", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-27T11:15:13.170", - "lastModified": "2023-11-07T04:00:40.253", + "lastModified": "2024-02-13T08:15:42.147", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file admin/add_payment.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-219598 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Online Tours & Travels Management System 1.0. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a un c\u00f3digo desconocido del archivo admin/add_paid.php. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota.La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. VDB-219598 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { @@ -33,7 +37,7 @@ "impactScore": 3.4 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0530.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0530.json index 8d27ef8acf3..7db038514bc 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0530.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0530.json @@ -2,12 +2,16 @@ "id": "CVE-2023-0530", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-27T11:15:13.390", - "lastModified": "2023-11-07T04:00:40.653", + "lastModified": "2024-02-13T08:15:42.377", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin/approve_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219599." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Online Tours & Travels Management System 1.0. Ha sido declarada como cr\u00edtica. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota.La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-219599." } ], "metrics": { @@ -33,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0531.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0531.json index 9958b4724f2..8bae24769a0 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0531.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0531.json @@ -2,12 +2,16 @@ "id": "CVE-2023-0531", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-27T11:15:13.627", - "lastModified": "2023-11-07T04:00:41.010", + "lastModified": "2024-02-13T08:15:42.590", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in SourceCodester Online Tours & Travels Management System 1.0. Affected is an unknown function of the file admin/booking_report.php. The manipulation of the argument to_date leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219600." + }, + { + "lang": "es", + "value": "Una vulnerabilidad ha sido encontrada en SourceCodester Online Tours & Travels Management System 1.0. Una funci\u00f3n desconocida del archivo admin/booking_report.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento to_date conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota.La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-219600." } ], "metrics": { @@ -33,7 +37,7 @@ "impactScore": 3.4 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0532.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0532.json index 352d597201d..c762c0db4b5 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0532.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0532.json @@ -2,12 +2,16 @@ "id": "CVE-2023-0532", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-27T11:15:13.763", - "lastModified": "2023-11-07T04:00:41.360", + "lastModified": "2024-02-13T08:15:42.797", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in SourceCodester Online Tours & Travels Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/disapprove_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219601 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Online Tours & Travels Management System 1.0. Una funci\u00f3n desconocida del archivo admin/disapprove_user.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento id conduce a la inyecci\u00f3n de SQL. El ataque se puede lanzar de forma remota.La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-219601." } ], "metrics": { @@ -33,7 +37,7 @@ "impactScore": 3.4 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0533.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0533.json index 4b89c2d1deb..785efa16bf1 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0533.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0533.json @@ -2,12 +2,16 @@ "id": "CVE-2023-0533", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-27T11:15:13.890", - "lastModified": "2023-11-07T04:00:41.700", + "lastModified": "2024-02-13T08:15:43.010", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Online Tours & Travels Management System 1.0. Affected by this issue is some unknown functionality of the file admin/expense_report.php. The manipulation of the argument from_date leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-219602 is the identifier assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SourceCodester Online Tours & Travels Management System 1.0. Una funci\u00f3n desconocida del archivo admin/expense_report.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento from_date conduce a la inyecci\u00f3n de SQL. El ataque puede lanzarse de forma remota.La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. VDB-219602 es el identificador asignado a esta vulnerabilidad." } ], "metrics": { @@ -33,7 +37,7 @@ "impactScore": 3.4 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0534.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0534.json index 6877dd36f04..d9b90a7ce74 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0534.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0534.json @@ -2,12 +2,16 @@ "id": "CVE-2023-0534", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-27T11:15:14.070", - "lastModified": "2023-11-07T04:00:42.073", + "lastModified": "2024-02-13T08:15:43.217", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in SourceCodester Online Tours & Travels Management System 1.0. This affects an unknown part of the file admin/expense_report.php. The manipulation of the argument to_date leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219603." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en SSourceCodester Online Tours & Travels Management System 1.0. Esto afecta a una parte desconocida del archivo admin/expense_report.php. La manipulaci\u00f3n del argumento to_date conduce a la inyecci\u00f3n de SQL. Es posible iniciar el ataque de forma remota.La explotaci\u00f3n ha sido divulgada al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-219603." } ], "metrics": { @@ -33,7 +37,7 @@ "impactScore": 3.4 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0560.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0560.json index cbc40a14d5f..8ba4c92516b 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0560.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0560.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0560", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-28T17:15:09.003", - "lastModified": "2023-11-07T04:00:48.603", + "lastModified": "2024-02-13T08:15:43.430", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0561.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0561.json index 9cafd57c558..4f292bc48f4 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0561.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0561.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0561", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-28T17:15:09.147", - "lastModified": "2023-11-07T04:00:48.953", + "lastModified": "2024-02-13T08:15:43.657", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0570.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0570.json index 81295754a23..62936582f18 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0570.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0570.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0570", "sourceIdentifier": "cna@vuldb.com", "published": "2023-01-29T18:15:09.000", - "lastModified": "2023-11-07T04:00:50.810", + "lastModified": "2024-02-13T08:15:43.880", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0651.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0651.json index 0ca62276920..5b66dd13d87 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0651.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0651.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0651", "sourceIdentifier": "cna@vuldb.com", "published": "2023-02-02T16:19:35.040", - "lastModified": "2023-11-07T04:01:07.387", + "lastModified": "2024-02-13T08:15:44.080", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0674.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0674.json index a54b04b7015..b9d152269a6 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0674.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0674.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0674", "sourceIdentifier": "cna@vuldb.com", "published": "2023-02-04T08:15:08.237", - "lastModified": "2023-11-07T04:01:10.470", + "lastModified": "2024-02-13T08:15:44.320", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 3.6 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0679.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0679.json index 523971fc280..d898f9f3cd0 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0679.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0679.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0679", "sourceIdentifier": "cna@vuldb.com", "published": "2023-02-06T13:15:09.377", - "lastModified": "2024-01-12T22:22:40.437", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:15:44.543", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -82,7 +82,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0758.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0758.json index 935de7577e9..6badd6e5a91 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0758.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0758.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0758", "sourceIdentifier": "cna@vuldb.com", "published": "2023-02-09T11:15:10.217", - "lastModified": "2023-11-07T04:01:24.083", + "lastModified": "2024-02-13T08:15:44.770", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0781.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0781.json index a98641bf14d..3af6eb21a5c 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0781.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0781.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0781", "sourceIdentifier": "cna@vuldb.com", "published": "2023-02-11T13:15:19.230", - "lastModified": "2023-11-07T04:01:27.057", + "lastModified": "2024-02-13T08:15:44.987", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1040.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1040.json index 180cf767be5..ba3506749e3 100644 --- a/CVE-2023/CVE-2023-10xx/CVE-2023-1040.json +++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1040.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1040", "sourceIdentifier": "cna@vuldb.com", "published": "2023-02-26T12:15:11.217", - "lastModified": "2023-11-07T04:02:19.090", + "lastModified": "2024-02-13T08:15:45.210", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1130.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1130.json index b9ba8cb5dbf..f92e82bf71e 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1130.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1130.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1130", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-01T20:15:11.853", - "lastModified": "2023-11-07T04:02:34.377", + "lastModified": "2024-02-13T08:15:45.447", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1131.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1131.json index 26332965f31..97aa8ff83d5 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1131.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1131.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1131", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-01T20:15:12.423", - "lastModified": "2023-11-07T04:02:34.793", + "lastModified": "2024-02-13T08:15:45.677", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1164.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1164.json index 3836b44fa8e..8fdbaa62dd2 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1164.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1164.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1164", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-03T07:15:09.370", - "lastModified": "2023-11-07T04:02:41.860", + "lastModified": "2024-02-13T08:15:45.893", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1184.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1184.json index 35f0b9b5141..7725822c8b7 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1184.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1184.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1184", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-06T08:15:08.513", - "lastModified": "2023-11-07T04:02:46.723", + "lastModified": "2024-02-13T08:15:46.150", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1185.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1185.json index 5bb966b6c57..15c32a6a04b 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1185.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1185.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1185", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-06T08:15:08.610", - "lastModified": "2023-11-07T04:02:47.230", + "lastModified": "2024-02-13T08:15:46.373", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1200.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1200.json index 836c64f2e6d..dcd889dbeaa 100644 --- a/CVE-2023/CVE-2023-12xx/CVE-2023-1200.json +++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1200.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1200", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-06T16:15:10.090", - "lastModified": "2023-11-07T04:02:51.167", + "lastModified": "2024-02-13T08:15:46.597", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1276.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1276.json index 0aaa3d440af..da46831f87e 100644 --- a/CVE-2023/CVE-2023-12xx/CVE-2023-1276.json +++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1276.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1276", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-08T19:15:10.677", - "lastModified": "2023-11-07T04:03:00.193", + "lastModified": "2024-02-13T08:15:46.800", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1277.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1277.json index badab2df0cb..bddab6d000e 100644 --- a/CVE-2023/CVE-2023-12xx/CVE-2023-1277.json +++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1277.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1277", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-08T19:15:10.760", - "lastModified": "2023-11-07T04:03:00.717", + "lastModified": "2024-02-13T08:15:47.027", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1293.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1293.json index c2256a81412..227089341b7 100644 --- a/CVE-2023/CVE-2023-12xx/CVE-2023-1293.json +++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1293.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1293", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-09T15:15:09.403", - "lastModified": "2023-11-07T04:03:03.440", + "lastModified": "2024-02-13T08:15:47.240", "vulnStatus": "Undergoing Analysis", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1349.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1349.json index e531889926d..0a24e80c10b 100644 --- a/CVE-2023/CVE-2023-13xx/CVE-2023-1349.json +++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1349.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1349", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-11T09:15:09.910", - "lastModified": "2023-11-07T04:03:14.390", + "lastModified": "2024-02-13T08:15:47.470", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1368.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1368.json index d8ab1e48c6a..c27d06004d3 100644 --- a/CVE-2023/CVE-2023-13xx/CVE-2023-1368.json +++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1368.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1368", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-13T09:15:10.807", - "lastModified": "2023-11-07T04:03:20.750", + "lastModified": "2024-02-13T08:15:47.670", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1378.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1378.json index 8933679216f..ad095f98859 100644 --- a/CVE-2023/CVE-2023-13xx/CVE-2023-1378.json +++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1378.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1378", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-13T18:15:12.867", - "lastModified": "2023-11-07T04:03:22.967", + "lastModified": "2024-02-13T08:15:47.890", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1442.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1442.json index b9604aafdb8..9c68d6a5c6e 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1442.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1442.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1442", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-17T07:15:10.630", - "lastModified": "2023-11-07T04:03:37.443", + "lastModified": "2024-02-13T08:15:48.117", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1454.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1454.json index 607aac0cbf3..8d116f60e0f 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1454.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1454.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1454", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-17T07:15:13.573", - "lastModified": "2023-11-07T04:03:42.180", + "lastModified": "2024-02-13T08:15:48.323", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1459.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1459.json index 3a3dafc36a3..12b561faa36 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1459.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1459.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1459", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-17T08:15:09.900", - "lastModified": "2023-11-07T04:03:44.423", + "lastModified": "2024-02-13T08:15:48.520", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1461.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1461.json index a9f31150e2f..31ca7cb8ceb 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1461.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1461.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1461", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-17T09:15:12.663", - "lastModified": "2023-11-07T04:03:45.153", + "lastModified": "2024-02-13T08:15:48.717", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1475.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1475.json index 137c8a33c80..b299431b8da 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1475.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1475.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1475", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-17T15:15:12.057", - "lastModified": "2023-11-07T04:03:48.973", + "lastModified": "2024-02-13T08:15:48.943", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1561.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1561.json index 1a85507145d..31ad81889f3 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1561.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1561.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1561", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-22T12:15:10.763", - "lastModified": "2024-01-12T12:36:21.193", + "lastModified": "2024-02-13T08:15:49.163", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1571.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1571.json index a016281f2ca..2becb0208ac 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1571.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1571.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1571", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-22T15:15:10.273", - "lastModified": "2023-11-07T04:04:09.283", + "lastModified": "2024-02-13T08:15:49.403", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1572.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1572.json index 41adea3df94..e3fbef85689 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1572.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1572.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1572", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-22T13:15:10.053", - "lastModified": "2023-11-07T04:04:09.673", + "lastModified": "2024-02-13T08:15:49.617", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1573.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1573.json index da33a629336..659f4194edc 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1573.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1573.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1573", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-22T16:15:13.437", - "lastModified": "2023-11-07T04:04:10.040", + "lastModified": "2024-02-13T08:15:49.963", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1589.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1589.json index 0128e216449..a8c95991038 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1589.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1589.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1589", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-23T08:15:12.577", - "lastModified": "2023-11-07T04:04:13.113", + "lastModified": "2024-02-13T08:15:50.170", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1590.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1590.json index 6c68342641d..44f3250f3c6 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1590.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1590.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1590", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-23T08:15:12.683", - "lastModified": "2023-11-07T04:04:13.610", + "lastModified": "2024-02-13T08:15:50.423", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1594.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1594.json index 3c21c393ae2..ab2d21b2d9c 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1594.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1594.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1594", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-23T10:15:12.330", - "lastModified": "2023-11-07T04:04:15.030", + "lastModified": "2024-02-13T08:15:50.643", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1595.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1595.json index 81eff049a22..29a2306279e 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1595.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1595.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1595", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-23T11:15:13.007", - "lastModified": "2023-11-07T04:04:15.397", + "lastModified": "2024-02-13T08:15:50.850", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1606.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1606.json index 8f559f59872..a65ef2ac1ca 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1606.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1606.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1606", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-23T19:15:12.953", - "lastModified": "2023-11-07T04:04:17.363", + "lastModified": "2024-02-13T08:15:51.070", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -95,7 +95,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1607.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1607.json index 050f33666b5..91bed1587c2 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1607.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1607.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1607", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-23T20:15:14.570", - "lastModified": "2023-11-07T04:04:17.763", + "lastModified": "2024-02-13T08:15:51.300", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -95,7 +95,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1626.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1626.json index ae58136e718..dfa59f9b9c9 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1626.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1626.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1626", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-25T12:15:06.880", - "lastModified": "2023-11-07T04:04:22.647", + "lastModified": "2024-02-13T08:15:51.530", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1627.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1627.json index 6f9aa4aa4a5..1c1bc50cb3e 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1627.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1627.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1627", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-25T12:15:06.943", - "lastModified": "2023-11-07T04:04:23.010", + "lastModified": "2024-02-13T08:15:51.783", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 3.6 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1628.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1628.json index 2f2e54253ec..ff5edbcf627 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1628.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1628.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1628", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-25T12:15:07.000", - "lastModified": "2023-11-07T04:04:23.387", + "lastModified": "2024-02-13T08:15:52.013", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 3.6 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1741.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1741.json index 1187eeb7383..93a4a6249db 100644 --- a/CVE-2023/CVE-2023-17xx/CVE-2023-1741.json +++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1741.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1741", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-30T22:15:06.620", - "lastModified": "2023-11-07T04:04:46.313", + "lastModified": "2024-02-13T08:15:52.257", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1769.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1769.json index cd10d6f8b1f..453164f2d0e 100644 --- a/CVE-2023/CVE-2023-17xx/CVE-2023-1769.json +++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1769.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1769", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-31T11:15:06.847", - "lastModified": "2023-11-07T04:04:51.437", + "lastModified": "2024-02-13T08:15:52.500", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 3.6 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1770.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1770.json index dbf53b1c3e0..7ddf5474019 100644 --- a/CVE-2023/CVE-2023-17xx/CVE-2023-1770.json +++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1770.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1770", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-31T12:15:06.433", - "lastModified": "2023-11-07T04:04:51.807", + "lastModified": "2024-02-13T08:15:52.730", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1772.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1772.json index f70e9ccac4b..de4632bd65b 100644 --- a/CVE-2023/CVE-2023-17xx/CVE-2023-1772.json +++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1772.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1772", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-31T12:15:06.553", - "lastModified": "2023-11-07T04:04:52.513", + "lastModified": "2024-02-13T08:15:52.943", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1790.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1790.json index 869eff3ddf0..70fac331566 100644 --- a/CVE-2023/CVE-2023-17xx/CVE-2023-1790.json +++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1790.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1790", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-01T09:15:07.267", - "lastModified": "2023-11-07T04:04:55.480", + "lastModified": "2024-02-13T08:15:53.167", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 3.6 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1791.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1791.json index 9216d2cb4da..0c211ec2210 100644 --- a/CVE-2023/CVE-2023-17xx/CVE-2023-1791.json +++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1791.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1791", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-02T07:15:07.237", - "lastModified": "2023-11-07T04:04:55.710", + "lastModified": "2024-02-13T08:15:53.417", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1800.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1800.json index 73a63405266..d70aa7ed187 100644 --- a/CVE-2023/CVE-2023-18xx/CVE-2023-1800.json +++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1800.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1800", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-02T11:15:06.707", - "lastModified": "2023-11-07T04:04:59.260", + "lastModified": "2024-02-13T08:15:53.630", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1942.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1942.json index 9f8b8889a33..bb423b131fa 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1942.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1942.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1942", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-07T18:15:07.177", - "lastModified": "2023-11-07T04:05:27.897", + "lastModified": "2024-02-13T08:15:53.867", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1951.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1951.json index 2037e266ce4..6a9451e3bc5 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1951.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1951.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1951", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-08T08:15:07.357", - "lastModified": "2023-11-07T04:05:30.253", + "lastModified": "2024-02-13T08:15:54.117", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1952.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1952.json index c7387fb9bf6..05d435ab756 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1952.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1952.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1952", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-08T09:15:07.623", - "lastModified": "2023-11-07T04:05:30.637", + "lastModified": "2024-02-13T08:15:54.333", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1953.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1953.json index e33706131b5..087574cdb94 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1953.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1953.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1953", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-08T10:15:06.977", - "lastModified": "2023-11-07T04:05:31.053", + "lastModified": "2024-02-13T08:15:54.557", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1954.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1954.json index 2338355497a..77e5e6bcfe5 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1954.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1954.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1954", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-08T10:15:07.033", - "lastModified": "2023-11-07T04:05:31.420", + "lastModified": "2024-02-13T08:15:54.763", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1955.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1955.json index 098d005b9c6..39da974ce2f 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1955.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1955.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1955", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-08T10:15:07.080", - "lastModified": "2023-11-07T04:05:31.770", + "lastModified": "2024-02-13T08:15:54.983", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1956.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1956.json index f293e27bdaf..212f53ae7f2 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1956.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1956.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1956", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-08T10:15:07.127", - "lastModified": "2023-11-07T04:05:32.143", + "lastModified": "2024-02-13T08:15:55.233", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1957.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1957.json index a10db8a9b72..9594c073098 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1957.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1957.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1957", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-08T11:15:06.830", - "lastModified": "2023-11-07T04:05:32.487", + "lastModified": "2024-02-13T08:15:55.467", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1958.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1958.json index ad704ad5092..7e76b8e9573 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1958.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1958.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1958", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-08T11:15:06.890", - "lastModified": "2023-11-07T04:05:32.870", + "lastModified": "2024-02-13T08:15:55.693", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1959.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1959.json index a5b963ce994..eb36f0663c8 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1959.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1959.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1959", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-08T11:15:06.943", - "lastModified": "2023-11-07T04:05:33.313", + "lastModified": "2024-02-13T08:15:55.917", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1960.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1960.json index 8c6e4b3e808..19a55e7b871 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1960.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1960.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1960", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-08T12:15:06.953", - "lastModified": "2023-11-07T04:05:33.707", + "lastModified": "2024-02-13T08:15:56.150", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1961.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1961.json index ca0f8c92073..7eebc0d4ab7 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1961.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1961.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1961", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-08T12:15:07.010", - "lastModified": "2023-11-07T04:05:34.070", + "lastModified": "2024-02-13T08:15:56.383", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1970.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1970.json index e586fc0471b..9e69beabe11 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1970.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1970.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1970", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-10T16:15:07.140", - "lastModified": "2023-11-07T04:05:36.167", + "lastModified": "2024-02-13T08:15:56.613", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1971.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1971.json index 4466e1a2c16..683a39ec754 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1971.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1971.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1971", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-10T17:15:06.937", - "lastModified": "2023-11-07T04:05:36.543", + "lastModified": "2024-02-13T08:15:56.850", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 3.6 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1985.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1985.json index 6e283ace1bc..d8b2dfa1515 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1985.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1985.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1985", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-11T18:15:58.633", - "lastModified": "2023-11-07T04:05:38.430", + "lastModified": "2024-02-13T08:15:57.077", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1986.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1986.json index fe209577c6f..8fb9a52b3d9 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1986.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1986.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1986", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-11T19:15:08.397", - "lastModified": "2023-11-07T04:05:38.807", + "lastModified": "2024-02-13T08:15:57.313", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1987.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1987.json index dad2a82e78e..c04ab6915f5 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1987.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1987.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1987", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-11T19:15:08.497", - "lastModified": "2023-11-07T04:05:39.167", + "lastModified": "2024-02-13T08:15:57.543", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1988.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1988.json index 5b9f594b143..03c8ca4b4c9 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1988.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1988.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1988", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-11T19:15:08.570", - "lastModified": "2023-11-07T04:05:39.537", + "lastModified": "2024-02-13T08:15:57.773", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2042.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2042.json index 787efa14960..5d69e5a51ba 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2042.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2042.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2042", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-14T10:15:09.837", - "lastModified": "2023-11-07T04:11:44.603", + "lastModified": "2024-02-13T08:15:58.020", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2091.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2091.json index 90d48d281bf..77265492950 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2091.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2091.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2091", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-15T09:15:07.683", - "lastModified": "2023-11-07T04:11:56.057", + "lastModified": "2024-02-13T08:15:58.250", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2244.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2244.json index e1e540fa575..54b416f7411 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2244.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2244.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2244", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-22T17:15:07.177", - "lastModified": "2023-11-07T04:12:15.563", + "lastModified": "2024-02-13T08:15:58.473", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2375.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2375.json index f41c8efeba1..193d7b9aa8a 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2375.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2375.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2375", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-28T15:15:10.903", - "lastModified": "2023-11-07T04:12:30.113", + "lastModified": "2024-02-13T08:15:58.697", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2376.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2376.json index 63d02bcc8f4..bed814508e3 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2376.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2376.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2376", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-28T16:15:09.933", - "lastModified": "2023-11-07T04:12:30.477", + "lastModified": "2024-02-13T08:15:58.947", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2377.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2377.json index 9a4f80a87d4..cce046ed109 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2377.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2377.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2377", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-28T16:15:10.003", - "lastModified": "2023-11-07T04:12:30.783", + "lastModified": "2024-02-13T08:15:59.213", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2379.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2379.json index 6e1121b4bd3..635a21649b8 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2379.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2379.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2379", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-28T17:15:43.067", - "lastModified": "2023-11-07T04:12:31.277", + "lastModified": "2024-02-13T08:15:59.713", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 3.6 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2380.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2380.json index 80204dfbb79..531f00ae654 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2380.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2380.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2380", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-28T17:15:43.130", - "lastModified": "2023-11-07T04:12:31.520", + "lastModified": "2024-02-13T08:16:00.203", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 3.6 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2382.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2382.json index f5c95c0c197..3db0bf21691 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2382.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2382.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2382", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-28T17:15:43.240", - "lastModified": "2023-11-07T04:12:32.017", + "lastModified": "2024-02-13T08:16:00.493", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2383.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2383.json index c101b402310..7810dc30cb3 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2383.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2383.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2383", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-28T18:15:26.457", - "lastModified": "2023-11-07T04:12:32.277", + "lastModified": "2024-02-13T08:16:00.757", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2384.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2384.json index 13b301c64f3..a8ed1d2f755 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2384.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2384.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2384", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-28T18:15:26.530", - "lastModified": "2023-11-07T04:12:32.537", + "lastModified": "2024-02-13T08:16:00.973", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2385.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2385.json index 0604ff59ec8..f4a3f15288c 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2385.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2385.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2385", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-28T18:15:26.607", - "lastModified": "2023-11-07T04:12:32.790", + "lastModified": "2024-02-13T08:16:01.207", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2388.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2388.json index 0a355a45cb1..221892ba70b 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2388.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2388.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2388", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-28T20:15:14.020", - "lastModified": "2023-11-07T04:12:33.547", + "lastModified": "2024-02-13T08:16:01.450", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2389.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2389.json index 77b34bdc430..341c9e31b44 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2389.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2389.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2389", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-28T20:15:14.090", - "lastModified": "2023-11-07T04:12:33.823", + "lastModified": "2024-02-13T08:16:01.760", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2392.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2392.json index 9ddbd1ffaa3..f57ed0d97fd 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2392.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2392.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2392", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-28T21:15:08.900", - "lastModified": "2023-11-07T04:12:34.570", + "lastModified": "2024-02-13T08:16:02.100", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2393.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2393.json index 25fbae9379e..35be4e82aa8 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2393.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2393.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2393", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-28T21:15:08.963", - "lastModified": "2023-11-07T04:12:34.810", + "lastModified": "2024-02-13T08:16:02.347", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2394.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2394.json index d40ffb930dc..b6364cfaab6 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2394.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2394.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2394", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-28T21:15:09.020", - "lastModified": "2023-11-07T04:12:35.050", + "lastModified": "2024-02-13T08:16:02.650", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2395.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2395.json index bfce2c02e70..40d88f0b2b3 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2395.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2395.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2395", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-28T22:15:09.130", - "lastModified": "2023-11-07T04:12:35.293", + "lastModified": "2024-02-13T08:16:03.010", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2396.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2396.json index ef61b32d17e..6eded037b27 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2396.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2396.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2396", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-28T22:15:09.190", - "lastModified": "2023-11-07T04:12:35.573", + "lastModified": "2024-02-13T08:16:03.277", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2418.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2418.json index f8d4e60bf3c..1518ab62d1a 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2418.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2418.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2418", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-29T01:15:08.980", - "lastModified": "2023-11-07T04:12:39.387", + "lastModified": "2024-02-13T08:16:03.520", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 3.6 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { @@ -111,7 +111,7 @@ "references": [ { "url": "https://github.com/advisories/GHSA-9g4c-xm3g-f8hq", - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "tags": [ "Third Party Advisory" ] diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2420.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2420.json index 76a096274cb..22f07ce4744 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2420.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2420.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2420", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-29T02:15:09.383", - "lastModified": "2023-11-07T04:12:39.870", + "lastModified": "2024-02-13T08:16:03.877", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2619.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2619.json index d2deb3130d0..4981afa9153 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2619.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2619.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2619", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-10T06:15:17.990", - "lastModified": "2023-11-07T04:12:58.463", + "lastModified": "2024-02-13T08:16:04.193", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2643.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2643.json index c407c7bedfe..ca50f8600e0 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2643.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2643.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2643", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-11T07:15:08.370", - "lastModified": "2023-11-07T04:13:00.770", + "lastModified": "2024-02-13T08:16:04.677", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2799.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2799.json index 5db8914ca26..1de5cede867 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2799.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2799.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2799", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-18T16:15:09.970", - "lastModified": "2023-11-07T04:13:20.967", + "lastModified": "2024-02-13T08:16:05.003", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2927.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2927.json index 4b98d8867f5..9db57afb373 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2927.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2927.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2927", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-27T09:15:10.240", - "lastModified": "2023-11-07T04:13:34.203", + "lastModified": "2024-02-13T08:16:05.267", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2973.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2973.json index cbb2f4d978c..eb2b8d265ea 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2973.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2973.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2973", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-30T11:15:09.457", - "lastModified": "2023-11-07T04:13:36.400", + "lastModified": "2024-02-13T08:16:05.503", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3007.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3007.json index c91babb1ec8..d8813de4c24 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3007.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3007.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3007", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-31T12:15:09.550", - "lastModified": "2023-11-07T04:17:44.950", + "lastModified": "2024-02-13T08:16:05.813", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3008.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3008.json index 384d627340e..407d251b305 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3008.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3008.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3008", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-31T12:15:09.640", - "lastModified": "2023-11-07T04:17:45.207", + "lastModified": "2024-02-13T08:16:06.103", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3014.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3014.json index 38eeda0a1f2..42888723e53 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3014.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3014.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3014", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-31T14:15:11.223", - "lastModified": "2023-11-07T04:17:45.670", + "lastModified": "2024-02-13T08:16:06.327", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3015.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3015.json index 6129528d9b0..f46493e1d42 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3015.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3015.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3015", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-31T14:15:11.290", - "lastModified": "2023-11-07T04:17:45.923", + "lastModified": "2024-02-13T08:16:06.567", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3016.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3016.json index 5c6ffbdf44a..efc4339a1fc 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3016.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3016.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3016", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-31T14:15:11.353", - "lastModified": "2023-11-07T04:17:46.187", + "lastModified": "2024-02-13T08:16:06.873", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3056.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3056.json index 1a8997006f8..c6501edd570 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3056.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3056.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3056", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-02T12:15:09.470", - "lastModified": "2023-11-07T04:17:49.043", + "lastModified": "2024-02-13T08:16:07.220", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3057.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3057.json index 945eab1dca5..84bc08fbe25 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3057.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3057.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3057", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-02T13:15:10.193", - "lastModified": "2023-11-07T04:17:49.317", + "lastModified": "2024-02-13T08:16:07.610", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3096.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3096.json index b015f36f5c6..183d1a7b7c1 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3096.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3096.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3096", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-05T06:15:09.227", - "lastModified": "2023-11-07T04:17:53.830", + "lastModified": "2024-02-13T08:16:07.833", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3097.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3097.json index b060a4c380a..84b07c15af7 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3097.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3097.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3097", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-05T06:15:09.463", - "lastModified": "2023-11-07T04:17:54.123", + "lastModified": "2024-02-13T08:16:08.220", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3098.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3098.json index 17b169e91c2..3a041a42302 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3098.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3098.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3098", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-05T07:15:09.420", - "lastModified": "2023-11-07T04:17:54.390", + "lastModified": "2024-02-13T08:16:08.497", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3099.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3099.json index 4d26c4e5e17..9f619d96cf0 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3099.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3099.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3099", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-05T07:15:11.143", - "lastModified": "2023-11-07T04:17:54.647", + "lastModified": "2024-02-13T08:16:08.810", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.2 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3232.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3232.json index 606c7885d31..3cc2133918d 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3232.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3232.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3232", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-14T06:15:09.080", - "lastModified": "2023-11-07T04:18:16.170", + "lastModified": "2024-02-13T08:16:09.170", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3233.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3233.json index cca70d0daa2..aaf951ea457 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3233.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3233.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3233", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-14T07:15:09.337", - "lastModified": "2023-11-07T04:18:16.550", + "lastModified": "2024-02-13T08:16:09.410", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3234.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3234.json index 378fd9e48c2..737a890f346 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3234.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3234.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3234", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-14T07:15:09.437", - "lastModified": "2023-11-07T04:18:16.913", + "lastModified": "2024-02-13T08:16:09.817", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3235.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3235.json index 86c2f7694f2..30e328856f9 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3235.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3235.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3235", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-14T07:15:09.510", - "lastModified": "2023-11-07T04:18:17.303", + "lastModified": "2024-02-13T08:16:10.153", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3236.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3236.json index 18ebc5ad892..fa5f5d8d156 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3236.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3236.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3236", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-14T07:15:09.580", - "lastModified": "2023-11-07T04:18:17.663", + "lastModified": "2024-02-13T08:16:10.510", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3237.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3237.json index 8fdf9836594..11ae22fec67 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3237.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3237.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3237", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-14T08:15:09.640", - "lastModified": "2023-11-07T04:18:18.097", + "lastModified": "2024-02-13T08:16:10.870", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -95,7 +95,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3238.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3238.json index c37c6746de3..2d613c95fa2 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3238.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3238.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3238", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-14T08:15:09.713", - "lastModified": "2023-11-07T04:18:18.477", + "lastModified": "2024-02-13T08:16:11.180", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3239.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3239.json index 384428162b4..cce16845016 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3239.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3239.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3239", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-14T09:15:09.333", - "lastModified": "2023-11-07T04:18:18.880", + "lastModified": "2024-02-13T08:16:11.400", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 3.6 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3240.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3240.json index 119cb2909bb..9d2264f7fd9 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3240.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3240.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3240", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-14T09:15:09.717", - "lastModified": "2023-11-07T04:18:19.327", + "lastModified": "2024-02-13T08:16:11.833", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 3.6 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3241.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3241.json index a2b61f8a601..d5d80afdae2 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3241.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3241.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3241", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-14T09:15:09.783", - "lastModified": "2023-11-07T04:18:19.707", + "lastModified": "2024-02-13T08:16:12.073", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 3.6 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -95,7 +95,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3308.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3308.json index c8742ac17ef..fa12de744a4 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3308.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3308.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3308", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-18T09:15:09.677", - "lastModified": "2023-11-07T04:18:26.740", + "lastModified": "2024-02-13T08:16:12.440", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3801.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3801.json index 5c2c100972a..ff4b416fd1e 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3801.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3801.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3801", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-21T00:15:10.453", - "lastModified": "2023-11-16T01:36:59.253", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:12.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3806.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3806.json index 3da9878d3ed..11e54507c76 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3806.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3806.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3806", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-21T02:15:10.063", - "lastModified": "2023-11-07T04:19:42.453", + "lastModified": "2024-02-13T08:16:13.200", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3808.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3808.json index fab2a1621a2..30bdc64e4a3 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3808.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3808.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3808", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-21T03:15:10.317", - "lastModified": "2023-11-07T04:19:42.967", + "lastModified": "2024-02-13T08:16:13.457", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3809.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3809.json index be66ef7227e..aa3c26752df 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3809.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3809.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3809", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-21T04:15:15.560", - "lastModified": "2023-11-07T04:19:43.240", + "lastModified": "2024-02-13T08:16:13.707", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3810.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3810.json index 5417b71208b..4af35074302 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3810.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3810.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3810", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-21T04:15:16.070", - "lastModified": "2023-11-07T04:19:43.510", + "lastModified": "2024-02-13T08:16:13.943", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3811.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3811.json index cee3a9d5438..d302a0edf06 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3811.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3811.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3811", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-21T05:15:15.507", - "lastModified": "2023-11-07T04:19:43.770", + "lastModified": "2024-02-13T08:16:14.227", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3826.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3826.json index e0fa025a2f5..b444b20c15f 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3826.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3826.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3826", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-22T07:15:09.180", - "lastModified": "2023-11-07T04:19:44.870", + "lastModified": "2024-02-13T08:16:14.487", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3837.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3837.json index 3299463c2e5..f76a882025c 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3837.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3837.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3837", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-22T21:15:09.577", - "lastModified": "2023-11-07T04:19:47.803", + "lastModified": "2024-02-13T08:16:14.733", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3838.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3838.json index 6ad6afa5dc5..f34c4707cc6 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3838.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3838.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3838", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-23T02:15:11.360", - "lastModified": "2023-11-07T04:19:48.053", + "lastModified": "2024-02-13T08:16:15.020", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-38xx/CVE-2023-3839.json b/CVE-2023/CVE-2023-38xx/CVE-2023-3839.json index e21425077db..fc0ca2791b4 100644 --- a/CVE-2023/CVE-2023-38xx/CVE-2023-3839.json +++ b/CVE-2023/CVE-2023-38xx/CVE-2023-3839.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3839", "sourceIdentifier": "cna@vuldb.com", "published": "2023-07-23T02:15:11.460", - "lastModified": "2023-11-07T04:19:48.353", + "lastModified": "2024-02-13T08:16:15.300", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4166.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4166.json index b702123efc6..3f58aa2dd5d 100644 --- a/CVE-2023/CVE-2023-41xx/CVE-2023-4166.json +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4166.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4166", "sourceIdentifier": "cna@vuldb.com", "published": "2023-08-05T16:15:23.747", - "lastModified": "2023-12-16T04:28:21.150", + "lastModified": "2024-02-13T08:16:15.580", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4169.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4169.json index f4ac0e5786c..3c6128d4a42 100644 --- a/CVE-2023/CVE-2023-41xx/CVE-2023-4169.json +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4169.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4169", "sourceIdentifier": "cna@vuldb.com", "published": "2023-08-05T18:15:17.850", - "lastModified": "2023-11-07T04:22:13.740", + "lastModified": "2024-02-13T08:16:15.833", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4186.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4186.json index 51d24f5ecb9..cb0b1fe8d6b 100644 --- a/CVE-2023/CVE-2023-41xx/CVE-2023-4186.json +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4186.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4186", "sourceIdentifier": "cna@vuldb.com", "published": "2023-08-06T14:15:10.167", - "lastModified": "2023-11-07T04:22:17.973", + "lastModified": "2024-02-13T08:16:16.087", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4415.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4415.json index 67a25014f40..d1b559810dd 100644 --- a/CVE-2023/CVE-2023-44xx/CVE-2023-4415.json +++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4415.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4415", "sourceIdentifier": "cna@vuldb.com", "published": "2023-08-18T16:15:11.163", - "lastModified": "2023-11-07T04:22:33.750", + "lastModified": "2024-02-13T08:16:16.417", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4445.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4445.json index 91ec1e1caaf..0e5465de1a7 100644 --- a/CVE-2023/CVE-2023-44xx/CVE-2023-4445.json +++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4445.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4445", "sourceIdentifier": "cna@vuldb.com", "published": "2023-08-21T01:15:10.210", - "lastModified": "2023-11-07T04:22:36.827", + "lastModified": "2024-02-13T08:16:16.810", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4450.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4450.json index ad410f564dd..757dd3fc92a 100644 --- a/CVE-2023/CVE-2023-44xx/CVE-2023-4450.json +++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4450.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4450", "sourceIdentifier": "cna@vuldb.com", "published": "2023-08-21T03:15:13.760", - "lastModified": "2023-11-07T04:22:38.103", + "lastModified": "2024-02-13T08:16:17.063", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -91,7 +91,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4555.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4555.json index e7b53f4782e..aac47c3f92a 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4555.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4555.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4555", "sourceIdentifier": "cna@vuldb.com", "published": "2023-08-27T07:15:07.370", - "lastModified": "2023-11-07T04:22:44.217", + "lastModified": "2024-02-13T08:16:17.340", "vulnStatus": "Modified", "descriptions": [ { @@ -33,7 +33,7 @@ "impactScore": 2.7 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +55,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +81,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4558.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4558.json index f8d53847254..aec4a4def40 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4558.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4558.json @@ -2,12 +2,16 @@ "id": "CVE-2023-4558", "sourceIdentifier": "cna@vuldb.com", "published": "2023-08-27T23:15:36.730", - "lastModified": "2023-11-07T04:22:45.073", + "lastModified": "2024-02-13T08:16:17.623", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in SourceCodester Inventory Management System 1.0. Affected by this vulnerability is an unknown functionality of the file staff_data.php. The manipulation of the argument columns[0][data] leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-238159." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Inventory Management System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo \"staff_data.php\". La manipulaci\u00f3n del argumento \"columns[0][data]\" conduce a una inyecci\u00f3n SQL. El ataque puede ser lanzado remotamente. El exploit ha sido revelado al p\u00fablico y puede ser utilizado. El identificador asociado de esta vulnerabilidad es VDB-238159." } ], "metrics": { @@ -33,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4743.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4743.json index e6df8f09743..d001416953a 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4743.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4743.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4743", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-03T23:15:40.147", - "lastModified": "2023-11-07T04:22:55.587", + "lastModified": "2024-02-13T08:16:17.867", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 2.5 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4747.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4747.json index ee25cdfdc66..1f9f37e7536 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4747.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4747.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4747", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-04T01:15:07.790", - "lastModified": "2023-11-07T04:22:56.783", + "lastModified": "2024-02-13T08:16:18.140", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4748.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4748.json index 1bd82c837a0..9431924e07c 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4748.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4748.json @@ -2,12 +2,16 @@ "id": "CVE-2023-4748", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-05T06:15:07.760", - "lastModified": "2023-11-07T04:22:57.050", + "lastModified": "2024-02-13T08:16:18.380", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Yongyou UFIDA-NC up to 20230807. This issue affects some unknown processing of the file PrintTemplateFileServlet.java. The manipulation of the argument filePath leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-238637 was assigned to this vulnerability." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Yongyou UFIDA-NC hasta 20230807. Este problema afecta un procesamiento desconocido del archivo PrintTemplateFileServlet.java. La manipulaci\u00f3n del argumento filePath conduce a un path traversal. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-238637" } ], "metrics": { @@ -33,7 +37,7 @@ "impactScore": 3.6 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4851.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4851.json index af368d4c1d0..db9d99201e9 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4851.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4851.json @@ -2,12 +2,16 @@ "id": "CVE-2023-4851", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-09T12:15:08.300", - "lastModified": "2023-11-07T04:23:04.007", + "lastModified": "2024-02-13T08:16:18.607", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in IBOS OA 4.5.5 and classified as critical. This vulnerability affects unknown code of the file ?r=dashboard/position/edit&op=member. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239260." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en IBOS OA 4.5.5 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo ?r=dashboard/position/edit&op=member. La manipulaci\u00f3n conduce a la inyecci\u00f3n de SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es DB-239260." } ], "metrics": { @@ -33,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -55,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -81,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4867.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4867.json index 98e6b950b94..986c3e0bf95 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4867.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4867.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4867", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-10T01:15:07.207", - "lastModified": "2023-11-07T04:23:06.103", + "lastModified": "2024-02-13T08:16:18.873", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5014.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5014.json index bcb62e7ed96..485e09269f9 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5014.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5014.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5014", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-17T01:15:34.430", - "lastModified": "2023-11-07T04:23:18.673", + "lastModified": "2024-02-13T08:16:19.127", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5016.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5016.json index 01a3e3d94c2..72111911f95 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5016.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5016.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5016", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-17T02:15:08.013", - "lastModified": "2023-11-07T04:23:19.220", + "lastModified": "2024-02-13T08:16:19.380", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5020.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5020.json index e5465be8aa3..42d83d2984c 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5020.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5020.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5020", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-17T05:15:10.283", - "lastModified": "2023-11-07T04:23:20.237", + "lastModified": "2024-02-13T08:16:19.600", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5022.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5022.json index 73c45f347e7..80ba820b56e 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5022.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5022.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5022", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-17T06:15:07.530", - "lastModified": "2023-11-07T04:23:20.750", + "lastModified": "2024-02-13T08:16:19.857", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5026.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5026.json index c0ae60579d0..e6fcd9bd87b 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5026.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5026.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5026", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-17T10:15:07.560", - "lastModified": "2023-12-16T04:28:21.150", + "lastModified": "2024-02-13T08:16:20.133", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5142.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5142.json index 83032d72a01..6e86e97ffa1 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5142.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5142.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5142", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-24T22:15:10.087", - "lastModified": "2023-11-07T04:23:30.233", + "lastModified": "2024-02-13T08:16:20.517", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 1.4 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -95,7 +95,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5223.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5223.json index ee9ed2ec440..7d8a0393d5d 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5223.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5223.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5223", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-27T15:19:43.490", - "lastModified": "2023-11-07T04:23:37.830", + "lastModified": "2024-02-13T08:16:20.873", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 6.0 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5260.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5260.json index adc93ab05b0..0c564769b2a 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5260.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5260.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5260", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-29T12:15:13.287", - "lastModified": "2023-11-07T04:23:41.600", + "lastModified": "2024-02-13T08:16:21.153", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -85,7 +85,7 @@ }, "weaknesses": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5298.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5298.json index d2dcb1f7ad6..5e50dfbf6b3 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5298.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5298.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5298", "sourceIdentifier": "cna@vuldb.com", "published": "2023-09-30T06:15:11.483", - "lastModified": "2023-12-16T04:28:21.150", + "lastModified": "2024-02-13T08:16:21.430", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5683.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5683.json index 89a639a6607..1d15807ee5c 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5683.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5683.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5683", "sourceIdentifier": "cna@vuldb.com", "published": "2023-10-21T05:16:07.347", - "lastModified": "2023-11-07T04:24:14.850", + "lastModified": "2024-02-13T08:16:21.730", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -95,7 +95,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5782.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5782.json index b5d0bfd51c4..30f84f13c42 100644 --- a/CVE-2023/CVE-2023-57xx/CVE-2023-5782.json +++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5782.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5782", "sourceIdentifier": "cna@vuldb.com", "published": "2023-10-26T14:15:08.893", - "lastModified": "2023-12-16T04:28:21.150", + "lastModified": "2024-02-13T08:16:22.020", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5787.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5787.json index 0b91d75790a..0db6dcb5b48 100644 --- a/CVE-2023/CVE-2023-57xx/CVE-2023-5787.json +++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5787.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5787", "sourceIdentifier": "cna@vuldb.com", "published": "2023-10-26T16:15:08.643", - "lastModified": "2023-11-07T04:24:21.973", + "lastModified": "2024-02-13T08:16:22.400", "vulnStatus": "Modified", "descriptions": [ { @@ -37,7 +37,7 @@ "impactScore": 5.9 }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "3.1", @@ -59,7 +59,7 @@ ], "cvssMetricV2": [ { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "cvssData": { "version": "2.0", @@ -95,7 +95,7 @@ ] }, { - "source": "1af790b2-7ee1-4545-860a-a788eba489b5", + "source": "cna@vuldb.com", "type": "Secondary", "description": [ { diff --git a/CVE-2023/CVE-2023-58xx/CVE-2023-5828.json b/CVE-2023/CVE-2023-58xx/CVE-2023-5828.json index 7f915ae89ad..0b177403b03 100644 --- a/CVE-2023/CVE-2023-58xx/CVE-2023-5828.json +++ b/CVE-2023/CVE-2023-58xx/CVE-2023-5828.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5828", "sourceIdentifier": "cna@vuldb.com", "published": "2023-10-27T20:15:09.227", - "lastModified": "2023-11-08T14:15:31.307", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:22.650", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -86,7 +86,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-59xx/CVE-2023-5910.json b/CVE-2023/CVE-2023-59xx/CVE-2023-5910.json index b1c741d4b7c..34521485522 100644 --- a/CVE-2023/CVE-2023-59xx/CVE-2023-5910.json +++ b/CVE-2023/CVE-2023-59xx/CVE-2023-5910.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5910", "sourceIdentifier": "cna@vuldb.com", "published": "2023-11-02T00:15:23.373", - "lastModified": "2023-11-08T23:11:55.373", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:22.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6307.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6307.json index 83cb924a33c..08200779483 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6307.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6307.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6307", "sourceIdentifier": "cna@vuldb.com", "published": "2023-11-27T02:15:42.353", - "lastModified": "2023-12-01T19:24:20.483", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:23.223", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6654.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6654.json index fb485855e1c..a17b0c8a4a7 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6654.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6654.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6654", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-10T15:15:07.160", - "lastModified": "2024-01-11T16:15:54.413", + "lastModified": "2024-02-13T08:16:23.480", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6656.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6656.json index 42e506ca0b4..4a6252e6d1a 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6656.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6656.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6656", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-10T21:15:07.093", - "lastModified": "2024-02-10T11:15:08.557", + "lastModified": "2024-02-13T08:16:23.730", "vulnStatus": "Modified", "descriptions": [ { diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6815.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6815.json new file mode 100644 index 00000000000..336a940412a --- /dev/null +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6815.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-6815", + "sourceIdentifier": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "published": "2024-02-13T07:15:46.843", + "lastModified": "2024-02-13T07:15:46.843", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Privilege Assignment vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series Safety CPU R08/16/32/120SFCPU all versions and MELSEC iQ-R Series SIL2 Process CPU R08/16/32/120PSFCPU all versions allows a remote authenticated attacker who has logged into the product as a non-administrator user to disclose the credentials (user ID and password) of a user with a lower access level than the attacker by sending a specially crafted packet." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/vu/JVNVU95085830/index.html", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + }, + { + "url": "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-021_en.pdf", + "source": "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6848.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6848.json index 34e80f73c23..66fa6602ebf 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6848.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6848.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6848", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-16T07:15:44.407", - "lastModified": "2023-12-20T04:09:40.720", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:24.067", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6849.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6849.json index 009d958d415..b17b74bdcb8 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6849.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6849.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6849", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-16T08:15:06.663", - "lastModified": "2023-12-20T04:09:52.890", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:24.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6850.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6850.json index a204d63ce0c..c8b8e397fea 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6850.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6850.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6850", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-16T09:15:07.030", - "lastModified": "2023-12-20T04:10:03.370", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:24.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6851.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6851.json index d24d2e10f1b..74b92e18983 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6851.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6851.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6851", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-16T11:15:07.163", - "lastModified": "2023-12-20T04:10:59.200", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:24.913", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6852.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6852.json index 88c25f48d88..aabcef9e106 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6852.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6852.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6852", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-16T12:15:07.220", - "lastModified": "2023-12-20T04:14:54.340", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:25.180", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6853.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6853.json index c6d3d34dcc9..9985a3174d4 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6853.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6853.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6853", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-16T12:15:07.467", - "lastModified": "2023-12-20T04:14:27.880", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:25.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7025.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7025.json index c1131d27bd0..a3a56a48218 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7025.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7025.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7025", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-21T03:15:07.857", - "lastModified": "2024-01-02T18:31:31.617", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:25.867", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7093.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7093.json index 83a7ba42827..efd14778177 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7093.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7093.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7093", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-25T00:15:08.400", - "lastModified": "2024-01-05T18:35:55.833", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:26.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7098.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7098.json index 8f5a16d30ea..a82a802711d 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7098.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7098.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7098", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-25T02:15:44.603", - "lastModified": "2024-01-04T19:20:00.477", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:26.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7099.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7099.json index bfb61d8810e..7202e4b496c 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7099.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7099.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7099", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-25T03:15:08.620", - "lastModified": "2023-12-29T06:21:11.367", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:26.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7144.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7144.json index 5e0fcd0b765..8d99200356a 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7144.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7144.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7144", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-29T01:15:44.137", - "lastModified": "2024-01-05T00:15:42.040", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:27.190", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7145.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7145.json index 608f30cd8d2..0e7ea7202bf 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7145.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7145.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7145", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-29T02:15:45.180", - "lastModified": "2024-01-04T21:53:07.467", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:27.547", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7146.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7146.json index 5e4e253005d..77d06f9114c 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7146.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7146.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7146", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-29T02:15:45.387", - "lastModified": "2024-01-04T21:52:53.167", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:27.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7147.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7147.json index eeb381432ae..fb6699f9647 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7147.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7147.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7147", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-29T03:15:11.847", - "lastModified": "2024-01-05T13:45:10.057", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:28.100", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7150.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7150.json index fdf981fa37e..3cc7619bd70 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7150.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7150.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7150", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-29T04:15:11.333", - "lastModified": "2024-01-05T16:07:13.047", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:28.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7159.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7159.json index f09a8c93fa7..7fd0b801d7b 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7159.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7159.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7159", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-29T07:15:11.420", - "lastModified": "2024-01-05T15:02:21.507", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:28.753", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7183.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7183.json index 0d2913573d8..c6b8b6ab830 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7183.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7183.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7183", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-31T11:15:09.377", - "lastModified": "2024-01-05T22:24:57.750", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:29.027", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7184.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7184.json index 94faaf5bccc..16abb6f9668 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7184.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7184.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7184", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-31T11:15:09.653", - "lastModified": "2024-01-05T22:25:17.277", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:29.460", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7185.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7185.json index 4c2fcdcf976..98c429dc689 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7185.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7185.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7185", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-31T12:15:32.483", - "lastModified": "2024-01-05T22:25:25.280", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:29.760", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7186.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7186.json index 37153f8efb6..bddfb2b9905 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7186.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7186.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7186", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-31T13:15:07.827", - "lastModified": "2024-01-05T22:25:32.113", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:30.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7187.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7187.json index 890930b038c..b96d9f749a6 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7187.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7187.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7187", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-31T14:15:42.383", - "lastModified": "2024-01-05T22:19:30.973", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:30.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7188.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7188.json index caa3fc1b631..7ea2a691954 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7188.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7188.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7188", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-31T15:15:08.403", - "lastModified": "2024-01-05T22:19:11.897", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:30.667", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7189.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7189.json index 8a6a083ff1b..8d2a33b66f1 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7189.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7189.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7189", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-31T15:15:08.650", - "lastModified": "2024-01-05T22:23:53.007", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:31.153", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7190.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7190.json index 674ec31b2e7..0f26efe9490 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7190.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7190.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7190", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-31T16:15:44.207", - "lastModified": "2024-01-05T22:24:05.917", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:31.497", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7191.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7191.json index 6ad25b392da..4e4cbfb93a7 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7191.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7191.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7191", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-31T16:15:44.430", - "lastModified": "2024-01-05T22:24:14.347", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:31.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7193.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7193.json index d1858723601..cca11356d4a 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7193.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7193.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7193", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-31T17:15:08.720", - "lastModified": "2024-01-05T22:20:43.460", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:32.140", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7210.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7210.json index 085acb14eea..a9ed839ddd1 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7210.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7210.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7210", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-07T10:15:08.660", - "lastModified": "2024-01-11T16:38:36.473", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:32.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7213.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7213.json index cb202b4c4fd..3981b0155a4 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7213.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7213.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7213", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-07T19:15:08.230", - "lastModified": "2024-01-11T15:59:41.537", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:32.770", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7214.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7214.json index 4be1cb2c104..4fbebf069b4 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7214.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7214.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7214", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-07T20:15:47.560", - "lastModified": "2024-01-11T15:59:23.280", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:33.153", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7218.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7218.json index 15a25ff5fc3..add2fd9f9f3 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7218.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7218.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7218", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-08T21:15:10.850", - "lastModified": "2024-01-11T20:06:57.847", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:33.540", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7219.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7219.json index 66a77b6cf9a..dc683391d0e 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7219.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7219.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7219", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-09T06:15:45.930", - "lastModified": "2024-01-12T15:28:13.237", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:33.930", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7220.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7220.json index 8928c6e38ae..8077a09fabe 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7220.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7220.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7220", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-09T08:15:36.490", - "lastModified": "2024-01-12T15:28:32.377", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:34.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7221.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7221.json index eaa41b5c5c5..e6a39ef5c72 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7221.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7221.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7221", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-09T14:15:46.200", - "lastModified": "2024-01-11T20:29:07.103", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:34.713", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7222.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7222.json index 37a2ad99e35..aa77a9782ef 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7222.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7222.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7222", "sourceIdentifier": "cna@vuldb.com", "published": "2024-01-09T16:15:43.693", - "lastModified": "2024-01-11T20:32:52.540", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T08:16:34.977", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1432.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1432.json index 64a1e56b509..d76cfe16997 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1432.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1432.json @@ -2,12 +2,16 @@ "id": "CVE-2024-1432", "sourceIdentifier": "cna@vuldb.com", "published": "2024-02-11T03:15:08.930", - "lastModified": "2024-02-11T22:29:15.837", + "lastModified": "2024-02-13T08:16:35.337", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in DeepFaceLab pretrained DF.wf.288res.384.92.72.22 and classified as problematic. This issue affects the function apply_xseg of the file main.py. The manipulation leads to deserialization. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-253391. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "** NO COMPATIBLE CUANDO SE ASIGN\u00d3 ** Se encontr\u00f3 una vulnerabilidad en DF.wf.288res.384.92.72.22 previamente entrenado en DeepFaceLab y se clasific\u00f3 como problem\u00e1tica. Este problema afecta la funci\u00f3n apply_xseg del archivo main.py. La manipulaci\u00f3n conduce a la deserializaci\u00f3n. El ataque puede iniciarse de forma remota. La complejidad de un ataque es bastante alta. Se sabe que la explotaci\u00f3n es dif\u00edcil. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-253391. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22445.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22445.json new file mode 100644 index 00000000000..6eedee777b0 --- /dev/null +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22445.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-22445", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-02-13T08:16:35.723", + "lastModified": "2024-02-13T08:16:35.723", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nDell PowerProtect Data Manager, version 19.15 and prior versions, contain an OS command injection vulnerability. A remote high privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000222025/dsa-2024-061-dell-power-protect-data-manager-update-for-multiple-security-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22454.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22454.json new file mode 100644 index 00000000000..4a6f7f18c6a --- /dev/null +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22454.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-22454", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-02-13T08:16:35.993", + "lastModified": "2024-02-13T08:16:35.993", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nDell PowerProtect Data Manager, version 19.15 and prior versions, contain a weak password recovery mechanism for forgotten passwords. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to unauthorized access to the application with privileges of the compromised account. The attacker could retrieve the reset password token without authorization and then perform the password change\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000222025/dsa-2024-061-dell-power-protect-data-manager-update-for-multiple-security-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-228xx/CVE-2024-22851.json b/CVE-2024/CVE-2024-228xx/CVE-2024-22851.json index 9108e938f7b..c40f4fd350d 100644 --- a/CVE-2024/CVE-2024-228xx/CVE-2024-22851.json +++ b/CVE-2024/CVE-2024-228xx/CVE-2024-22851.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22851", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-02T09:15:37.473", - "lastModified": "2024-02-09T18:03:33.997", - "vulnStatus": "Analyzed", + "lastModified": "2024-02-13T07:15:48.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -75,6 +75,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://www.liveconfig.com/de/kb/cve/cve-2024-22851/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/README.md b/README.md index 665ecfd0d83..c0bbce33d4f 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-13T07:00:24.763665+00:00 +2024-02-13T09:00:30.947115+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-13T05:15:09.320000+00:00 +2024-02-13T08:16:35.993000+00:00 ``` ### Last Data Feed Release @@ -29,23 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -238240 +238243 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `3` -* [CVE-2022-48623](CVE-2022/CVE-2022-486xx/CVE-2022-48623.json) (`2024-02-13T05:15:08.530`) -* [CVE-2023-52431](CVE-2023/CVE-2023-524xx/CVE-2023-52431.json) (`2024-02-13T05:15:08.797`) -* [CVE-2024-21491](CVE-2024/CVE-2024-214xx/CVE-2024-21491.json) (`2024-02-13T05:15:08.873`) -* [CVE-2024-25914](CVE-2024/CVE-2024-259xx/CVE-2024-25914.json) (`2024-02-13T05:15:09.320`) +* [CVE-2023-6815](CVE-2023/CVE-2023-68xx/CVE-2023-6815.json) (`2024-02-13T07:15:46.843`) +* [CVE-2024-22445](CVE-2024/CVE-2024-224xx/CVE-2024-22445.json) (`2024-02-13T08:16:35.723`) +* [CVE-2024-22454](CVE-2024/CVE-2024-224xx/CVE-2024-22454.json) (`2024-02-13T08:16:35.993`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `199` +* [CVE-2023-7145](CVE-2023/CVE-2023-71xx/CVE-2023-7145.json) (`2024-02-13T08:16:27.547`) +* [CVE-2023-7146](CVE-2023/CVE-2023-71xx/CVE-2023-7146.json) (`2024-02-13T08:16:27.810`) +* [CVE-2023-7147](CVE-2023/CVE-2023-71xx/CVE-2023-7147.json) (`2024-02-13T08:16:28.100`) +* [CVE-2023-7150](CVE-2023/CVE-2023-71xx/CVE-2023-7150.json) (`2024-02-13T08:16:28.490`) +* [CVE-2023-7159](CVE-2023/CVE-2023-71xx/CVE-2023-7159.json) (`2024-02-13T08:16:28.753`) +* [CVE-2023-7183](CVE-2023/CVE-2023-71xx/CVE-2023-7183.json) (`2024-02-13T08:16:29.027`) +* [CVE-2023-7184](CVE-2023/CVE-2023-71xx/CVE-2023-7184.json) (`2024-02-13T08:16:29.460`) +* [CVE-2023-7185](CVE-2023/CVE-2023-71xx/CVE-2023-7185.json) (`2024-02-13T08:16:29.760`) +* [CVE-2023-7186](CVE-2023/CVE-2023-71xx/CVE-2023-7186.json) (`2024-02-13T08:16:30.083`) +* [CVE-2023-7187](CVE-2023/CVE-2023-71xx/CVE-2023-7187.json) (`2024-02-13T08:16:30.363`) +* [CVE-2023-7188](CVE-2023/CVE-2023-71xx/CVE-2023-7188.json) (`2024-02-13T08:16:30.667`) +* [CVE-2023-7189](CVE-2023/CVE-2023-71xx/CVE-2023-7189.json) (`2024-02-13T08:16:31.153`) +* [CVE-2023-7190](CVE-2023/CVE-2023-71xx/CVE-2023-7190.json) (`2024-02-13T08:16:31.497`) +* [CVE-2023-7191](CVE-2023/CVE-2023-71xx/CVE-2023-7191.json) (`2024-02-13T08:16:31.763`) +* [CVE-2023-7193](CVE-2023/CVE-2023-71xx/CVE-2023-7193.json) (`2024-02-13T08:16:32.140`) +* [CVE-2023-7210](CVE-2023/CVE-2023-72xx/CVE-2023-7210.json) (`2024-02-13T08:16:32.510`) +* [CVE-2023-7213](CVE-2023/CVE-2023-72xx/CVE-2023-7213.json) (`2024-02-13T08:16:32.770`) +* [CVE-2023-7214](CVE-2023/CVE-2023-72xx/CVE-2023-7214.json) (`2024-02-13T08:16:33.153`) +* [CVE-2023-7218](CVE-2023/CVE-2023-72xx/CVE-2023-7218.json) (`2024-02-13T08:16:33.540`) +* [CVE-2023-7219](CVE-2023/CVE-2023-72xx/CVE-2023-7219.json) (`2024-02-13T08:16:33.930`) +* [CVE-2023-7220](CVE-2023/CVE-2023-72xx/CVE-2023-7220.json) (`2024-02-13T08:16:34.313`) +* [CVE-2023-7221](CVE-2023/CVE-2023-72xx/CVE-2023-7221.json) (`2024-02-13T08:16:34.713`) +* [CVE-2023-7222](CVE-2023/CVE-2023-72xx/CVE-2023-7222.json) (`2024-02-13T08:16:34.977`) +* [CVE-2024-22851](CVE-2024/CVE-2024-228xx/CVE-2024-22851.json) (`2024-02-13T07:15:48.500`) +* [CVE-2024-1432](CVE-2024/CVE-2024-14xx/CVE-2024-1432.json) (`2024-02-13T08:16:35.337`) ## Download and Usage