diff --git a/CVE-2022/CVE-2022-16xx/CVE-2022-1601.json b/CVE-2022/CVE-2022-16xx/CVE-2022-1601.json index 849e1da5ea5..46755fbc31c 100644 --- a/CVE-2022/CVE-2022-16xx/CVE-2022-1601.json +++ b/CVE-2022/CVE-2022-16xx/CVE-2022-1601.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1601", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-30T15:15:08.330", - "lastModified": "2023-08-30T15:15:08.330", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0689.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0689.json index 94d38d622e2..bc7b4d30b6e 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0689.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0689.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0689", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:08.097", - "lastModified": "2023-08-31T06:15:08.097", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1982.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1982.json index 4d0ec5fbc61..f744f52ed1f 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1982.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1982.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1982", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-30T15:15:08.477", - "lastModified": "2023-08-30T15:15:08.477", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-202xx/CVE-2023-20266.json b/CVE-2023/CVE-2023-202xx/CVE-2023-20266.json index a459a9ce57d..40dc9b56a22 100644 --- a/CVE-2023/CVE-2023-202xx/CVE-2023-20266.json +++ b/CVE-2023/CVE-2023-202xx/CVE-2023-20266.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20266", "sourceIdentifier": "ykramarz@cisco.com", "published": "2023-08-30T17:15:08.357", - "lastModified": "2023-08-30T17:15:08.357", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20900.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20900.json new file mode 100644 index 00000000000..1e12d66d37e --- /dev/null +++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20900.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-20900", + "sourceIdentifier": "security@vmware.com", + "published": "2023-08-31T10:15:08.247", + "lastModified": "2023-08-31T10:15:08.247", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "VMware Tools contains a SAML token signature bypass vulnerability.\u00a0A malicious actor with man-in-the-middle (MITM) network positioning between vCenter server and the virtual machine may be able to bypass SAML token signature verification, to perform VMware Tools Guest Operations.\n\n\n\n\n\n\n\n\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.vmware.com/security/advisories/VMSA-2023-0019.html", + "source": "security@vmware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2171.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2171.json index 2a852ce2565..0e039ee5deb 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2171.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2171.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2171", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:08.360", - "lastModified": "2023-08-31T06:15:08.360", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2172.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2172.json index e3c2919f23c..6d8f217e2b2 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2172.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2172.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2172", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:08.523", - "lastModified": "2023-08-31T06:15:08.523", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2173.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2173.json index cc4dbb2a857..83bf00c450c 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2173.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2173.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2173", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:08.650", - "lastModified": "2023-08-31T06:15:08.650", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2174.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2174.json index 8bc14d3460e..31139ef5bd5 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2174.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2174.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2174", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:08.770", - "lastModified": "2023-08-31T06:15:08.770", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2188.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2188.json index 04b6306b28c..b0c82ce6d3a 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2188.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2188.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2188", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:08.957", - "lastModified": "2023-08-31T06:15:08.957", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2229.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2229.json index a2da48b03b1..f7e0d297a7f 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2229.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2229.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2229", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:09.077", - "lastModified": "2023-08-31T06:15:09.077", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2279.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2279.json index f2348b269ca..c561d50fb5a 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2279.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2279.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2279", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:09.187", - "lastModified": "2023-08-31T06:15:09.187", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23765.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23765.json index 194018465d0..3ef984a9ed7 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23765.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23765.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23765", "sourceIdentifier": "product-cna@github.com", "published": "2023-08-30T23:15:08.447", - "lastModified": "2023-08-30T23:15:08.447", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2352.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2352.json index e67c48a4c3e..def1799ac6d 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2352.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2352.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2352", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:09.313", - "lastModified": "2023-08-31T06:15:09.313", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2353.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2353.json index bd251aee721..c1cf8d1c22e 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2353.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2353.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2353", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:09.503", - "lastModified": "2023-08-31T06:15:09.503", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2354.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2354.json index 9bd0b77f0a4..75584caae5c 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2354.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2354.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2354", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:09.617", - "lastModified": "2023-08-31T06:15:09.617", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-243xx/CVE-2023-24397.json b/CVE-2023/CVE-2023-243xx/CVE-2023-24397.json index c5ecb671f48..5cd87cfe814 100644 --- a/CVE-2023/CVE-2023-243xx/CVE-2023-24397.json +++ b/CVE-2023/CVE-2023-243xx/CVE-2023-24397.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24397", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T16:15:08.460", - "lastModified": "2023-08-30T16:15:08.460", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24401.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24401.json index 86e2f91d5d5..6d94d6b769c 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24401.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24401.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24401", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T16:15:08.747", - "lastModified": "2023-08-30T16:15:08.747", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25453.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25453.json index ba6ea62cde3..4ec723dfb32 100644 --- a/CVE-2023/CVE-2023-254xx/CVE-2023-25453.json +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25453.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25453", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T16:15:08.977", - "lastModified": "2023-08-30T16:15:08.977", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25466.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25466.json index 2926761bf02..6016adb553f 100644 --- a/CVE-2023/CVE-2023-254xx/CVE-2023-25466.json +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25466.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25466", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T16:15:09.187", - "lastModified": "2023-08-30T16:15:09.187", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25471.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25471.json index 23312eb081b..8644f24aeb8 100644 --- a/CVE-2023/CVE-2023-254xx/CVE-2023-25471.json +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25471.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25471", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T16:15:09.337", - "lastModified": "2023-08-30T16:15:09.337", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27621.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27621.json index c5df5abc168..97fd881acef 100644 --- a/CVE-2023/CVE-2023-276xx/CVE-2023-27621.json +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27621.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27621", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T16:15:09.540", - "lastModified": "2023-08-30T16:15:09.540", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28415.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28415.json index 44fa345e518..fe609612a2a 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28415.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28415.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28415", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T16:15:09.730", - "lastModified": "2023-08-30T16:15:09.730", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28692.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28692.json index bff40c6f046..1acfa79f35c 100644 --- a/CVE-2023/CVE-2023-286xx/CVE-2023-28692.json +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28692.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28692", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T16:15:09.917", - "lastModified": "2023-08-30T16:15:09.917", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31423.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31423.json index 9cde98af9de..be5b1812550 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31423.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31423.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31423", "sourceIdentifier": "sirt@brocade.com", "published": "2023-08-31T01:15:07.860", - "lastModified": "2023-08-31T01:15:07.860", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31424.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31424.json index 279824f941b..d2311b628f9 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31424.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31424.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31424", "sourceIdentifier": "sirt@brocade.com", "published": "2023-08-31T01:15:08.537", - "lastModified": "2023-08-31T01:15:08.537", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31714.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31714.json index 7959e9c6877..d79764852fa 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31714.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31714.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31714", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T22:15:08.013", - "lastModified": "2023-08-30T22:15:08.013", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31925.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31925.json index 006cc7c8743..828e304ff0c 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31925.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31925.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31925", "sourceIdentifier": "sirt@brocade.com", "published": "2023-08-31T01:15:08.753", - "lastModified": "2023-08-31T01:15:08.753", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3162.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3162.json index 691df7bcafc..3a0d5095566 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3162.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3162.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3162", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:09.737", - "lastModified": "2023-08-31T06:15:09.737", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32294.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32294.json index 71f4cb79453..9b95e00d2cb 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32294.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32294.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32294", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T16:15:10.153", - "lastModified": "2023-08-30T16:15:10.153", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3356.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3356.json index d6728f05e38..3d8f882ac5f 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3356.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3356.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3356", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-30T15:15:09.257", - "lastModified": "2023-08-30T15:15:09.257", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34004.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34004.json index 9f2539259cd..70860630c1d 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34004.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34004.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34004", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T15:15:08.557", - "lastModified": "2023-08-30T15:15:08.557", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34008.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34008.json index 00027dfcb7c..77b42d0c989 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34008.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34008.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34008", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T15:15:08.643", - "lastModified": "2023-08-30T15:15:08.643", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34022.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34022.json index 95ac88a4309..7d3c344aeba 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34022.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34022.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34022", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T15:15:08.747", - "lastModified": "2023-08-30T15:15:08.747", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34023.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34023.json index 03323bafdf1..fed31b8de54 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34023.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34023.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34023", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T15:15:08.840", - "lastModified": "2023-08-30T15:15:08.840", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34032.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34032.json index 616ffd3d12d..5fb69464310 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34032.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34032.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34032", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T15:15:08.980", - "lastModified": "2023-08-30T15:15:08.980", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34172.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34172.json index 1451daf7b55..e9f1f140760 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34172.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34172.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34172", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T15:15:09.063", - "lastModified": "2023-08-30T15:15:09.063", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34173.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34173.json index 2d63b3c85ad..88baea0ed68 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34173.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34173.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34173", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T15:15:09.157", - "lastModified": "2023-08-30T15:15:09.157", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34174.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34174.json index 155eaac663e..e84815aa209 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34174.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34174.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34174", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T14:15:08.747", - "lastModified": "2023-08-30T14:15:08.747", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34175.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34175.json index c1f03321565..3152f2ee854 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34175.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34175.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34175", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T14:15:09.013", - "lastModified": "2023-08-30T14:15:09.013", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34176.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34176.json index 5abb9e13157..38d2f731a6e 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34176.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34176.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34176", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T14:15:09.253", - "lastModified": "2023-08-30T14:15:09.253", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34180.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34180.json index 297a6ca219b..4daf6871b00 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34180.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34180.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34180", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T14:15:09.473", - "lastModified": "2023-08-30T14:15:09.473", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34183.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34183.json index b3b664910f0..87c94af41d7 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34183.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34183.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34183", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T14:15:09.690", - "lastModified": "2023-08-30T14:15:09.690", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34184.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34184.json index 86cb306130c..162e7df1a47 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34184.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34184.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34184", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T14:15:09.877", - "lastModified": "2023-08-30T14:15:09.877", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34187.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34187.json index 8b815cc691f..82eb422d703 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34187.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34187.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34187", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T14:15:10.043", - "lastModified": "2023-08-30T14:15:10.043", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34372.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34372.json index 892c10c2c5f..d5603e16ce7 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34372.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34372.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34372", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T16:15:10.363", - "lastModified": "2023-08-30T16:15:10.363", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3404.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3404.json index accc9d5554c..c9b3f5d46ca 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3404.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3404.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3404", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:09.860", - "lastModified": "2023-08-31T06:15:09.860", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3489.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3489.json index 94e5914cb33..3cfe3d9652e 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3489.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3489.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3489", "sourceIdentifier": "sirt@brocade.com", "published": "2023-08-31T00:15:07.913", - "lastModified": "2023-08-31T00:15:07.913", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35092.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35092.json index e210d1f0156..611b91276d2 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35092.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35092.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35092", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T16:15:10.600", - "lastModified": "2023-08-30T16:15:10.600", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35094.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35094.json index 9eba9d96a07..0550dd61eb0 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35094.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35094.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35094", "sourceIdentifier": "audit@patchstack.com", "published": "2023-08-30T16:15:10.873", - "lastModified": "2023-08-30T16:15:10.873", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-35xx/CVE-2023-3501.json b/CVE-2023/CVE-2023-35xx/CVE-2023-3501.json index 60d1b3841c0..f6413958ddf 100644 --- a/CVE-2023/CVE-2023-35xx/CVE-2023-3501.json +++ b/CVE-2023/CVE-2023-35xx/CVE-2023-3501.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3501", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-30T15:15:09.340", - "lastModified": "2023-08-30T15:15:09.340", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-368xx/CVE-2023-36811.json b/CVE-2023/CVE-2023-368xx/CVE-2023-36811.json index 40b644e8121..e733ef1d2e0 100644 --- a/CVE-2023/CVE-2023-368xx/CVE-2023-36811.json +++ b/CVE-2023/CVE-2023-368xx/CVE-2023-36811.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36811", "sourceIdentifier": "security-advisories@github.com", "published": "2023-08-30T18:15:09.487", - "lastModified": "2023-08-30T18:15:09.487", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3636.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3636.json index d988d3dc073..72c004a1fa3 100644 --- a/CVE-2023/CVE-2023-36xx/CVE-2023-3636.json +++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3636.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3636", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:10.003", - "lastModified": "2023-08-31T06:15:10.003", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3677.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3677.json index e14e95335b8..72d67b9dc46 100644 --- a/CVE-2023/CVE-2023-36xx/CVE-2023-3677.json +++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3677.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3677", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:10.113", - "lastModified": "2023-08-31T06:15:10.113", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3720.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3720.json index f97687ff480..2f3c5b27e69 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3720.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3720.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3720", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-30T15:15:09.410", - "lastModified": "2023-08-30T15:15:09.410", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-37xx/CVE-2023-3764.json b/CVE-2023/CVE-2023-37xx/CVE-2023-3764.json index 0db9e58fd9f..3171c12c411 100644 --- a/CVE-2023/CVE-2023-37xx/CVE-2023-3764.json +++ b/CVE-2023/CVE-2023-37xx/CVE-2023-3764.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3764", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:10.243", - "lastModified": "2023-08-31T06:15:10.243", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-389xx/CVE-2023-38970.json b/CVE-2023/CVE-2023-389xx/CVE-2023-38970.json index e2ba2a22dbc..7a1d15ffc53 100644 --- a/CVE-2023/CVE-2023-389xx/CVE-2023-38970.json +++ b/CVE-2023/CVE-2023-389xx/CVE-2023-38970.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38970", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T22:15:08.717", - "lastModified": "2023-08-30T22:15:08.717", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39135.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39135.json index 75237fd5bb0..452a211893c 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39135.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39135.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39135", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T22:15:08.920", - "lastModified": "2023-08-30T22:15:08.920", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39136.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39136.json index 1cb7f2fce23..26fc581a0ca 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39136.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39136.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39136", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T22:15:08.977", - "lastModified": "2023-08-30T22:15:08.977", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39137.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39137.json index 2be3ce4b234..d893863acb1 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39137.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39137.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39137", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T22:15:09.030", - "lastModified": "2023-08-30T22:15:09.030", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39138.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39138.json index 5e01bf6f22e..88212250ee7 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39138.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39138.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39138", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T22:15:09.083", - "lastModified": "2023-08-30T22:15:09.083", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39139.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39139.json index 37a8f5058b0..6ee23da1cf4 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39139.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39139.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39139", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T22:15:09.300", - "lastModified": "2023-08-30T22:15:09.300", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3992.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3992.json index 8a20498a655..7065523b78f 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3992.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3992.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3992", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-30T15:15:09.493", - "lastModified": "2023-08-30T15:15:09.493", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3999.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3999.json index c4e614ca444..f7c5c3c2c6d 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3999.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3999.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3999", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:10.360", - "lastModified": "2023-08-31T06:15:10.360", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40184.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40184.json index 6ed274b4b1b..6a6eb5a827a 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40184.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40184.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40184", "sourceIdentifier": "security-advisories@github.com", "published": "2023-08-30T18:15:09.690", - "lastModified": "2023-08-30T18:15:09.690", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40582.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40582.json index 778e942005f..7166c858ed3 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40582.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40582.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40582", "sourceIdentifier": "security-advisories@github.com", "published": "2023-08-30T18:15:09.783", - "lastModified": "2023-08-30T18:15:09.783", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40592.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40592.json index bf89053e5cb..1f1b98ad3fb 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40592.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40592.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40592", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-08-30T17:15:09.763", - "lastModified": "2023-08-30T17:15:09.763", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40593.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40593.json index 61bba98551c..320f08f3d75 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40593.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40593.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40593", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-08-30T17:15:09.853", - "lastModified": "2023-08-30T17:15:09.853", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40594.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40594.json index 116a4bd3afc..c73440faa4e 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40594.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40594.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40594", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-08-30T17:15:09.940", - "lastModified": "2023-08-30T17:15:09.940", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40595.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40595.json index 29716d17272..2f9ce2e2b41 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40595.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40595.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40595", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-08-30T17:15:10.027", - "lastModified": "2023-08-30T17:15:10.027", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40596.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40596.json index d2ccd8a516d..e90cf95c3b4 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40596.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40596.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40596", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-08-30T17:15:10.103", - "lastModified": "2023-08-30T17:15:10.103", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40597.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40597.json index 87b6f55b00e..e9975d97a74 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40597.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40597.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40597", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-08-30T17:15:10.180", - "lastModified": "2023-08-30T17:15:10.180", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40598.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40598.json index 070e7796168..9eba7d2c33d 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40598.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40598.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40598", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-08-30T17:15:10.267", - "lastModified": "2023-08-30T17:15:10.267", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-408xx/CVE-2023-40837.json b/CVE-2023/CVE-2023-408xx/CVE-2023-40837.json index 03ab3d9c0d4..53f532430c8 100644 --- a/CVE-2023/CVE-2023-408xx/CVE-2023-40837.json +++ b/CVE-2023/CVE-2023-408xx/CVE-2023-40837.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40837", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T17:15:10.337", - "lastModified": "2023-08-30T17:15:10.337", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-408xx/CVE-2023-40838.json b/CVE-2023/CVE-2023-408xx/CVE-2023-40838.json index 491ec8c2612..aad6076e9a2 100644 --- a/CVE-2023/CVE-2023-408xx/CVE-2023-40838.json +++ b/CVE-2023/CVE-2023-408xx/CVE-2023-40838.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40838", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T17:15:10.397", - "lastModified": "2023-08-30T17:15:10.397", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-408xx/CVE-2023-40839.json b/CVE-2023/CVE-2023-408xx/CVE-2023-40839.json index f8ba33c8a4e..34a3279a735 100644 --- a/CVE-2023/CVE-2023-408xx/CVE-2023-40839.json +++ b/CVE-2023/CVE-2023-408xx/CVE-2023-40839.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40839", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T17:15:10.453", - "lastModified": "2023-08-30T17:15:10.453", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-408xx/CVE-2023-40840.json b/CVE-2023/CVE-2023-408xx/CVE-2023-40840.json index 9fe3f744987..9c65fff28ff 100644 --- a/CVE-2023/CVE-2023-408xx/CVE-2023-40840.json +++ b/CVE-2023/CVE-2023-408xx/CVE-2023-40840.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40840", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T17:15:10.517", - "lastModified": "2023-08-30T17:15:10.517", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-408xx/CVE-2023-40841.json b/CVE-2023/CVE-2023-408xx/CVE-2023-40841.json index f6afdb39e3e..6095f0a2d0c 100644 --- a/CVE-2023/CVE-2023-408xx/CVE-2023-40841.json +++ b/CVE-2023/CVE-2023-408xx/CVE-2023-40841.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40841", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T17:15:10.577", - "lastModified": "2023-08-30T17:15:10.577", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-408xx/CVE-2023-40842.json b/CVE-2023/CVE-2023-408xx/CVE-2023-40842.json index 6d9fc3b64ed..301e703aed3 100644 --- a/CVE-2023/CVE-2023-408xx/CVE-2023-40842.json +++ b/CVE-2023/CVE-2023-408xx/CVE-2023-40842.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40842", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T17:15:10.640", - "lastModified": "2023-08-30T17:15:10.640", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-408xx/CVE-2023-40843.json b/CVE-2023/CVE-2023-408xx/CVE-2023-40843.json index fe1d1201ef4..0c989c17a6c 100644 --- a/CVE-2023/CVE-2023-408xx/CVE-2023-40843.json +++ b/CVE-2023/CVE-2023-408xx/CVE-2023-40843.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40843", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T17:15:10.697", - "lastModified": "2023-08-30T17:15:10.697", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-408xx/CVE-2023-40844.json b/CVE-2023/CVE-2023-408xx/CVE-2023-40844.json index 35dc5e635ed..161e5aaa4be 100644 --- a/CVE-2023/CVE-2023-408xx/CVE-2023-40844.json +++ b/CVE-2023/CVE-2023-408xx/CVE-2023-40844.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40844", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T17:15:10.757", - "lastModified": "2023-08-30T17:15:10.757", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-408xx/CVE-2023-40845.json b/CVE-2023/CVE-2023-408xx/CVE-2023-40845.json index 9a67b80ea17..4260250cb98 100644 --- a/CVE-2023/CVE-2023-408xx/CVE-2023-40845.json +++ b/CVE-2023/CVE-2023-408xx/CVE-2023-40845.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40845", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T17:15:10.817", - "lastModified": "2023-08-30T17:15:10.817", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-408xx/CVE-2023-40847.json b/CVE-2023/CVE-2023-408xx/CVE-2023-40847.json index a0711526fb5..7f0d782a6ad 100644 --- a/CVE-2023/CVE-2023-408xx/CVE-2023-40847.json +++ b/CVE-2023/CVE-2023-408xx/CVE-2023-40847.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40847", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T17:15:10.877", - "lastModified": "2023-08-30T17:15:10.877", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-408xx/CVE-2023-40848.json b/CVE-2023/CVE-2023-408xx/CVE-2023-40848.json index a4583571c2e..08619d23996 100644 --- a/CVE-2023/CVE-2023-408xx/CVE-2023-40848.json +++ b/CVE-2023/CVE-2023-408xx/CVE-2023-40848.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40848", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T17:15:10.943", - "lastModified": "2023-08-30T17:15:10.943", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4000.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4000.json index dc77bc0751c..c9014c67d45 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4000.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4000.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4000", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:10.487", - "lastModified": "2023-08-31T06:15:10.487", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4013.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4013.json index 66248b1f87b..40f16f10c96 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4013.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4013.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4013", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-30T15:15:09.567", - "lastModified": "2023-08-30T15:15:09.567", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4023.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4023.json index 46499127165..f3d5d8e1bd5 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4023.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4023.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4023", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-30T15:15:09.657", - "lastModified": "2023-08-30T15:15:09.657", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4035.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4035.json index f114f8e3b64..87fa76bca34 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4035.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4035.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4035", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-30T15:15:09.727", - "lastModified": "2023-08-30T15:15:09.727", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4036.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4036.json index c384e76fe4a..8bddc4e1cbc 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4036.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4036.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4036", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-30T15:15:09.813", - "lastModified": "2023-08-30T15:15:09.813", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41039.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41039.json index bdb19212071..b6741aa65de 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41039.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41039.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41039", "sourceIdentifier": "security-advisories@github.com", "published": "2023-08-30T18:15:09.880", - "lastModified": "2023-08-30T18:15:09.880", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41040.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41040.json index f98fce7fdd0..49975309cd5 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41040.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41040.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41040", "sourceIdentifier": "security-advisories@github.com", "published": "2023-08-30T22:15:09.857", - "lastModified": "2023-08-30T22:15:09.857", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41041.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41041.json index 0ee9655a819..30fba3f2a85 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41041.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41041.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41041", "sourceIdentifier": "security-advisories@github.com", "published": "2023-08-30T22:15:10.043", - "lastModified": "2023-08-30T22:15:10.043", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-411xx/CVE-2023-41163.json b/CVE-2023/CVE-2023-411xx/CVE-2023-41163.json index 4013d92f24c..b7f80b623e9 100644 --- a/CVE-2023/CVE-2023-411xx/CVE-2023-41163.json +++ b/CVE-2023/CVE-2023-411xx/CVE-2023-41163.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41163", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T22:15:10.297", - "lastModified": "2023-08-30T22:15:10.297", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-415xx/CVE-2023-41537.json b/CVE-2023/CVE-2023-415xx/CVE-2023-41537.json index 3b897d9cab4..7d0e6974f6a 100644 --- a/CVE-2023/CVE-2023-415xx/CVE-2023-41537.json +++ b/CVE-2023/CVE-2023-415xx/CVE-2023-41537.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41537", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T14:15:10.847", - "lastModified": "2023-08-30T14:15:10.847", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-415xx/CVE-2023-41538.json b/CVE-2023/CVE-2023-415xx/CVE-2023-41538.json index 11c26445de6..440f2df194b 100644 --- a/CVE-2023/CVE-2023-415xx/CVE-2023-41538.json +++ b/CVE-2023/CVE-2023-415xx/CVE-2023-41538.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41538", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T14:15:11.023", - "lastModified": "2023-08-30T14:15:11.023", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-415xx/CVE-2023-41539.json b/CVE-2023/CVE-2023-415xx/CVE-2023-41539.json index a9b5dd7167d..549a8df85cf 100644 --- a/CVE-2023/CVE-2023-415xx/CVE-2023-41539.json +++ b/CVE-2023/CVE-2023-415xx/CVE-2023-41539.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41539", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-30T14:15:11.120", - "lastModified": "2023-08-30T14:15:11.120", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41738.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41738.json new file mode 100644 index 00000000000..bbe5fd56811 --- /dev/null +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41738.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-41738", + "sourceIdentifier": "security@synology.com", + "published": "2023-08-31T10:15:08.417", + "lastModified": "2023-08-31T10:15:08.417", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability in Directory Domain Functionality in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote authenticated users to execute arbitrary commands via unspecified vectors." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@synology.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@synology.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_10", + "source": "security@synology.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41739.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41739.json new file mode 100644 index 00000000000..9c4fa1218c9 --- /dev/null +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41739.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-41739", + "sourceIdentifier": "security@synology.com", + "published": "2023-08-31T10:15:08.533", + "lastModified": "2023-08-31T10:15:08.533", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Uncontrolled resource consumption vulnerability in File Functionality in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote authenticated users to conduct denial-of-service attacks via unspecified vectors." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@synology.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@synology.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_10", + "source": "security@synology.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41740.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41740.json new file mode 100644 index 00000000000..1ecae59d1c6 --- /dev/null +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41740.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-41740", + "sourceIdentifier": "security@synology.com", + "published": "2023-08-31T10:15:08.637", + "lastModified": "2023-08-31T10:15:08.637", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in cgi component in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote attackers to read specific files via unspecified vectors." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@synology.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@synology.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_10", + "source": "security@synology.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-417xx/CVE-2023-41741.json b/CVE-2023/CVE-2023-417xx/CVE-2023-41741.json new file mode 100644 index 00000000000..b62a323ef1b --- /dev/null +++ b/CVE-2023/CVE-2023-417xx/CVE-2023-41741.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-41741", + "sourceIdentifier": "security@synology.com", + "published": "2023-08-31T10:15:08.737", + "lastModified": "2023-08-31T10:15:08.737", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Exposure of sensitive information to an unauthorized actor vulnerability in cgi component in Synology Router Manager (SRM) before 1.3.1-9346-6 allows remote attackers to obtain sensitive information via unspecified vectors." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@synology.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@synology.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.synology.com/en-global/security/advisory/Synology_SA_23_10", + "source": "security@synology.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4109.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4109.json index d1858850699..579f70db466 100644 --- a/CVE-2023/CVE-2023-41xx/CVE-2023-4109.json +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4109.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4109", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-30T15:15:09.887", - "lastModified": "2023-08-30T15:15:09.887", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4150.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4150.json index 280380639b4..2d27ca309e4 100644 --- a/CVE-2023/CVE-2023-41xx/CVE-2023-4150.json +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4150.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4150", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-30T15:15:09.963", - "lastModified": "2023-08-30T15:15:09.963", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4160.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4160.json index df8719df369..1316470552b 100644 --- a/CVE-2023/CVE-2023-41xx/CVE-2023-4160.json +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4160.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4160", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:10.747", - "lastModified": "2023-08-31T06:15:10.747", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4161.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4161.json index 2a3ef36e49b..16127760f96 100644 --- a/CVE-2023/CVE-2023-41xx/CVE-2023-4161.json +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4161.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4161", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:10.870", - "lastModified": "2023-08-31T06:15:10.870", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4162.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4162.json index a721bc3eccf..5b776e2469b 100644 --- a/CVE-2023/CVE-2023-41xx/CVE-2023-4162.json +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4162.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4162", "sourceIdentifier": "sirt@brocade.com", "published": "2023-08-31T01:15:08.943", - "lastModified": "2023-08-31T01:15:08.943", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-41xx/CVE-2023-4163.json b/CVE-2023/CVE-2023-41xx/CVE-2023-4163.json index 7a91bc9f8c2..947b3a3a496 100644 --- a/CVE-2023/CVE-2023-41xx/CVE-2023-4163.json +++ b/CVE-2023/CVE-2023-41xx/CVE-2023-4163.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4163", "sourceIdentifier": "sirt@brocade.com", "published": "2023-08-31T01:15:09.190", - "lastModified": "2023-08-31T01:15:09.190", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4209.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4209.json index 518c2979df9..f7d94149821 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4209.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4209.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4209", "sourceIdentifier": "contact@wpscan.com", "published": "2023-08-30T15:15:10.047", - "lastModified": "2023-08-30T15:15:10.047", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4245.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4245.json index f5c9ab27865..d9861fb77c6 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4245.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4245.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4245", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:10.983", - "lastModified": "2023-08-31T06:15:10.983", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4315.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4315.json index 526cd64ba84..b8920a15142 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4315.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4315.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4315", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:11.100", - "lastModified": "2023-08-31T06:15:11.100", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-44xx/CVE-2023-4471.json b/CVE-2023/CVE-2023-44xx/CVE-2023-4471.json index 9ec1b1af5cb..23c273f34ae 100644 --- a/CVE-2023/CVE-2023-44xx/CVE-2023-4471.json +++ b/CVE-2023/CVE-2023-44xx/CVE-2023-4471.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4471", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:11.207", - "lastModified": "2023-08-31T06:15:11.207", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4500.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4500.json index 73f1141bcf6..b6e2b0cea9a 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4500.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4500.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4500", "sourceIdentifier": "security@wordfence.com", "published": "2023-08-31T06:15:11.327", - "lastModified": "2023-08-31T06:15:11.327", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4571.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4571.json index 02f8f5c81a6..56b854b340a 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4571.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4571.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4571", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-08-30T17:15:11.080", - "lastModified": "2023-08-30T17:15:11.080", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4640.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4640.json index 05148884491..bc251073f01 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4640.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4640.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4640", "sourceIdentifier": "security@yugabyte.com", "published": "2023-08-30T17:15:11.157", - "lastModified": "2023-08-30T17:15:11.157", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4649.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4649.json index dd62d73dab6..39501e54c1c 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4649.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4649.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4649", "sourceIdentifier": "security@huntr.dev", "published": "2023-08-31T01:15:09.390", - "lastModified": "2023-08-31T01:15:09.390", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4650.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4650.json index 01642ec035c..97873f5795a 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4650.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4650.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4650", "sourceIdentifier": "security@huntr.dev", "published": "2023-08-31T01:15:09.623", - "lastModified": "2023-08-31T01:15:09.623", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4651.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4651.json index 4272bd97bda..b4726bb4cf8 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4651.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4651.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4651", "sourceIdentifier": "security@huntr.dev", "published": "2023-08-31T01:15:09.787", - "lastModified": "2023-08-31T01:15:09.787", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4652.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4652.json index c4e092e2922..c7a1960013c 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4652.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4652.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4652", "sourceIdentifier": "security@huntr.dev", "published": "2023-08-31T01:15:10.063", - "lastModified": "2023-08-31T01:15:10.063", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4653.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4653.json index 636f9608297..d847ca53840 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4653.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4653.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4653", "sourceIdentifier": "security@huntr.dev", "published": "2023-08-31T01:15:10.297", - "lastModified": "2023-08-31T01:15:10.297", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4654.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4654.json index 233566a8a81..6611f529f04 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4654.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4654.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4654", "sourceIdentifier": "security@huntr.dev", "published": "2023-08-31T01:15:10.573", - "lastModified": "2023-08-31T01:15:10.573", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4655.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4655.json index acce03ef696..02432730009 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4655.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4655.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4655", "sourceIdentifier": "security@huntr.dev", "published": "2023-08-31T01:15:10.740", - "lastModified": "2023-08-31T01:15:10.740", - "vulnStatus": "Received", + "lastModified": "2023-08-31T10:02:10.690", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 361d182818a..0cb8cc8d67d 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-08-31T08:00:25.187352+00:00 +2023-08-31T12:00:24.908529+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-08-31T06:15:11.327000+00:00 +2023-08-31T10:15:08.737000+00:00 ``` ### Last Data Feed Release @@ -29,43 +29,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -223797 +223802 ``` ### CVEs added in the last Commit -Recently added CVEs: `24` +Recently added CVEs: `5` -* [CVE-2023-0689](CVE-2023/CVE-2023-06xx/CVE-2023-0689.json) (`2023-08-31T06:15:08.097`) -* [CVE-2023-2171](CVE-2023/CVE-2023-21xx/CVE-2023-2171.json) (`2023-08-31T06:15:08.360`) -* [CVE-2023-2172](CVE-2023/CVE-2023-21xx/CVE-2023-2172.json) (`2023-08-31T06:15:08.523`) -* [CVE-2023-2173](CVE-2023/CVE-2023-21xx/CVE-2023-2173.json) (`2023-08-31T06:15:08.650`) -* [CVE-2023-2174](CVE-2023/CVE-2023-21xx/CVE-2023-2174.json) (`2023-08-31T06:15:08.770`) -* [CVE-2023-2188](CVE-2023/CVE-2023-21xx/CVE-2023-2188.json) (`2023-08-31T06:15:08.957`) -* [CVE-2023-2229](CVE-2023/CVE-2023-22xx/CVE-2023-2229.json) (`2023-08-31T06:15:09.077`) -* [CVE-2023-2279](CVE-2023/CVE-2023-22xx/CVE-2023-2279.json) (`2023-08-31T06:15:09.187`) -* [CVE-2023-2352](CVE-2023/CVE-2023-23xx/CVE-2023-2352.json) (`2023-08-31T06:15:09.313`) -* [CVE-2023-2353](CVE-2023/CVE-2023-23xx/CVE-2023-2353.json) (`2023-08-31T06:15:09.503`) -* [CVE-2023-2354](CVE-2023/CVE-2023-23xx/CVE-2023-2354.json) (`2023-08-31T06:15:09.617`) -* [CVE-2023-3162](CVE-2023/CVE-2023-31xx/CVE-2023-3162.json) (`2023-08-31T06:15:09.737`) -* [CVE-2023-3404](CVE-2023/CVE-2023-34xx/CVE-2023-3404.json) (`2023-08-31T06:15:09.860`) -* [CVE-2023-3636](CVE-2023/CVE-2023-36xx/CVE-2023-3636.json) (`2023-08-31T06:15:10.003`) -* [CVE-2023-3677](CVE-2023/CVE-2023-36xx/CVE-2023-3677.json) (`2023-08-31T06:15:10.113`) -* [CVE-2023-3764](CVE-2023/CVE-2023-37xx/CVE-2023-3764.json) (`2023-08-31T06:15:10.243`) -* [CVE-2023-3999](CVE-2023/CVE-2023-39xx/CVE-2023-3999.json) (`2023-08-31T06:15:10.360`) -* [CVE-2023-4000](CVE-2023/CVE-2023-40xx/CVE-2023-4000.json) (`2023-08-31T06:15:10.487`) -* [CVE-2023-4160](CVE-2023/CVE-2023-41xx/CVE-2023-4160.json) (`2023-08-31T06:15:10.747`) -* [CVE-2023-4161](CVE-2023/CVE-2023-41xx/CVE-2023-4161.json) (`2023-08-31T06:15:10.870`) -* [CVE-2023-4245](CVE-2023/CVE-2023-42xx/CVE-2023-4245.json) (`2023-08-31T06:15:10.983`) -* [CVE-2023-4315](CVE-2023/CVE-2023-43xx/CVE-2023-4315.json) (`2023-08-31T06:15:11.100`) -* [CVE-2023-4471](CVE-2023/CVE-2023-44xx/CVE-2023-4471.json) (`2023-08-31T06:15:11.207`) -* [CVE-2023-4500](CVE-2023/CVE-2023-45xx/CVE-2023-4500.json) (`2023-08-31T06:15:11.327`) +* [CVE-2023-20900](CVE-2023/CVE-2023-209xx/CVE-2023-20900.json) (`2023-08-31T10:15:08.247`) +* [CVE-2023-41738](CVE-2023/CVE-2023-417xx/CVE-2023-41738.json) (`2023-08-31T10:15:08.417`) +* [CVE-2023-41739](CVE-2023/CVE-2023-417xx/CVE-2023-41739.json) (`2023-08-31T10:15:08.533`) +* [CVE-2023-41740](CVE-2023/CVE-2023-417xx/CVE-2023-41740.json) (`2023-08-31T10:15:08.637`) +* [CVE-2023-41741](CVE-2023/CVE-2023-417xx/CVE-2023-41741.json) (`2023-08-31T10:15:08.737`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `115` +* [CVE-2023-4655](CVE-2023/CVE-2023-46xx/CVE-2023-4655.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-0689](CVE-2023/CVE-2023-06xx/CVE-2023-0689.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-2171](CVE-2023/CVE-2023-21xx/CVE-2023-2171.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-2172](CVE-2023/CVE-2023-21xx/CVE-2023-2172.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-2173](CVE-2023/CVE-2023-21xx/CVE-2023-2173.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-2174](CVE-2023/CVE-2023-21xx/CVE-2023-2174.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-2188](CVE-2023/CVE-2023-21xx/CVE-2023-2188.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-2229](CVE-2023/CVE-2023-22xx/CVE-2023-2229.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-2279](CVE-2023/CVE-2023-22xx/CVE-2023-2279.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-2352](CVE-2023/CVE-2023-23xx/CVE-2023-2352.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-2353](CVE-2023/CVE-2023-23xx/CVE-2023-2353.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-2354](CVE-2023/CVE-2023-23xx/CVE-2023-2354.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-3162](CVE-2023/CVE-2023-31xx/CVE-2023-3162.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-3404](CVE-2023/CVE-2023-34xx/CVE-2023-3404.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-3636](CVE-2023/CVE-2023-36xx/CVE-2023-3636.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-3677](CVE-2023/CVE-2023-36xx/CVE-2023-3677.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-3764](CVE-2023/CVE-2023-37xx/CVE-2023-3764.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-3999](CVE-2023/CVE-2023-39xx/CVE-2023-3999.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-4000](CVE-2023/CVE-2023-40xx/CVE-2023-4000.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-4160](CVE-2023/CVE-2023-41xx/CVE-2023-4160.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-4161](CVE-2023/CVE-2023-41xx/CVE-2023-4161.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-4245](CVE-2023/CVE-2023-42xx/CVE-2023-4245.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-4315](CVE-2023/CVE-2023-43xx/CVE-2023-4315.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-4471](CVE-2023/CVE-2023-44xx/CVE-2023-4471.json) (`2023-08-31T10:02:10.690`) +* [CVE-2023-4500](CVE-2023/CVE-2023-45xx/CVE-2023-4500.json) (`2023-08-31T10:02:10.690`) ## Download and Usage