diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20588.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20588.json index bde7859fe82..ade21881a43 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20588.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20588.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20588", "sourceIdentifier": "psirt@amd.com", "published": "2023-08-08T18:15:11.653", - "lastModified": "2023-10-04T18:15:11.067", + "lastModified": "2023-10-12T03:15:09.277", "vulnStatus": "Modified", "descriptions": [ { @@ -994,6 +994,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/", "source": "psirt@amd.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/", + "source": "psirt@amd.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/", "source": "psirt@amd.com" diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22338.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22338.json index 8a6985704e0..b158faeaeaa 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22338.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22338.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22338", "sourceIdentifier": "secure@intel.com", "published": "2023-08-11T03:15:16.780", - "lastModified": "2023-10-11T04:15:10.913", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T03:15:09.490", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -95,6 +95,10 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7RNFPWOSFII2JE2KDRHPLJANZC3YATW/", "source": "secure@intel.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TULYSWHC3X76AIGGMUSLBTWOXNND6IEV/", + "source": "secure@intel.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22840.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22840.json index 44bebf45506..8b4c0e79e2b 100644 --- a/CVE-2023/CVE-2023-228xx/CVE-2023-22840.json +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22840.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22840", "sourceIdentifier": "secure@intel.com", "published": "2023-08-11T03:15:17.750", - "lastModified": "2023-10-11T04:15:11.043", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T03:15:09.590", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -95,6 +95,10 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J7RNFPWOSFII2JE2KDRHPLJANZC3YATW/", "source": "secure@intel.com" + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TULYSWHC3X76AIGGMUSLBTWOXNND6IEV/", + "source": "secure@intel.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-359xx/CVE-2023-35990.json b/CVE-2023/CVE-2023-359xx/CVE-2023-35990.json index 2774f6b1ce2..625febc8582 100644 --- a/CVE-2023/CVE-2023-359xx/CVE-2023-35990.json +++ b/CVE-2023/CVE-2023-359xx/CVE-2023-35990.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35990", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:18:52.980", - "lastModified": "2023-10-03T06:15:28.667", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:12:41.530", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -89,19 +89,35 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/4", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/8", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/9", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213927", diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37448.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37448.json index cf56bd3452a..f5cb0fbda9a 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37448.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37448.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37448", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:18:55.120", - "lastModified": "2023-10-03T06:15:29.080", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:11:29.147", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -71,7 +71,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213940", diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38586.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38586.json index 7e107baa6c8..429e7627e85 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38586.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38586.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38586", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:18:55.420", - "lastModified": "2023-10-03T06:15:29.317", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:11:16.153", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -71,7 +71,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213940", diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38596.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38596.json index c3e362a34fa..b3a02a2fb33 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38596.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38596.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38596", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:18:55.537", - "lastModified": "2023-10-03T06:15:29.560", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:10:09.937", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -95,7 +95,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213936", diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38615.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38615.json index 778190a70a0..be337c4b17e 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38615.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38615.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38615", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:18:55.627", - "lastModified": "2023-10-03T06:15:29.760", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:09:51.580", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -71,7 +71,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213940", diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39233.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39233.json index 7045edb442a..dbc14e3f7f2 100644 --- a/CVE-2023/CVE-2023-392xx/CVE-2023-39233.json +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39233.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39233", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:18:55.687", - "lastModified": "2023-10-03T06:15:30.017", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:09:40.257", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -71,7 +71,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213940", diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39434.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39434.json index 56be823c01f..6fb58c504a3 100644 --- a/CVE-2023/CVE-2023-394xx/CVE-2023-39434.json +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39434.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39434", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:18:56.317", - "lastModified": "2023-10-03T06:15:30.287", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:09:26.247", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -89,19 +89,35 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/8", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/9", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/09/28/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213937", diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40384.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40384.json index 3d271f64ff4..368f8d432ce 100644 --- a/CVE-2023/CVE-2023-403xx/CVE-2023-40384.json +++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40384.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40384", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:04.630", - "lastModified": "2023-10-03T06:15:30.507", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:09:05.977", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -89,7 +89,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213936", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40410.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40410.json index ea83ba8d424..929420fb9a6 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40410.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40410.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40410", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:08.987", - "lastModified": "2023-10-03T06:15:33.507", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:13:02.753", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -103,7 +103,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/5", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213931", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40412.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40412.json index 4d88169200d..dfdf81ba7fa 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40412.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40412.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40412", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:09.060", - "lastModified": "2023-10-03T06:15:33.757", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:13:26.083", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -103,7 +103,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/5", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213931", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40417.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40417.json index dfe97f38e17..767e83cbee6 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40417.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40417.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40417", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:09.143", - "lastModified": "2023-10-03T06:15:34.090", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:13:50.047", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -95,19 +95,35 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/2", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/8", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/9", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213937", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40418.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40418.json index ba3120c5265..366bda3a832 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40418.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40418.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40418", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:09.213", - "lastModified": "2023-10-03T06:15:34.477", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:16:11.890", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -88,7 +88,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/9", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213937", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40419.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40419.json index 4bc266a7b59..92c129d1f57 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40419.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40419.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40419", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:09.297", - "lastModified": "2023-10-03T06:15:34.580", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:16:49.670", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -89,7 +89,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213936", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40420.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40420.json index 01ed9910988..c7b4199a692 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40420.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40420.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40420", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:09.533", - "lastModified": "2023-10-03T06:15:34.853", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:17:11.147", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -103,11 +103,19 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/5", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213927", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40422.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40422.json index d371d41f03e..e2b3fe35e56 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40422.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40422.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40422", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:10.417", - "lastModified": "2023-10-03T06:15:35.140", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:17:37.827", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -71,7 +71,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213940", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40424.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40424.json index 3be0559bddc..a432219926b 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40424.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40424.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40424", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:11.160", - "lastModified": "2023-10-03T06:15:35.383", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:18:02.027", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -89,15 +89,27 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/8", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/9", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213937", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40426.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40426.json index 4477bbdd81f..17418edc408 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40426.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40426.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40426", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:11.620", - "lastModified": "2023-10-03T06:15:35.653", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:18:17.673", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -71,7 +71,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213940", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40427.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40427.json index a5b1afd5d42..728f4478633 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40427.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40427.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40427", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:12.040", - "lastModified": "2023-10-03T06:15:36.003", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:18:40.130", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -72,9 +72,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", - "versionStartIncluding": "12.0", + "versionStartIncluding": "12.0.0", "versionEndExcluding": "12.7", - "matchCriteriaId": "F05757BB-26B5-40A5-B37C-577706EA11C8" + "matchCriteriaId": "38A33420-FEB8-498F-A513-5DC0EEC52B1E" }, { "vulnerable": true, @@ -103,7 +103,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/5", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213931", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40428.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40428.json index d4102a9ee16..d2ad09a95a1 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40428.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40428.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40428", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:12.527", - "lastModified": "2023-10-03T06:15:36.287", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:21:10.233", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -77,7 +77,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/8", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213938", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40429.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40429.json index 956472ef724..3e0ca3905ae 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40429.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40429.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40429", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:13.107", - "lastModified": "2023-10-03T06:15:36.543", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:21:37.227", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -95,7 +95,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213936", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40431.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40431.json index 32d69305f3d..ad484a43d60 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40431.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40431.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40431", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:13.910", - "lastModified": "2023-10-03T06:15:36.900", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:22:41.713", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -77,7 +77,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/8", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213938", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40432.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40432.json index 58f4078402c..cedfaed3d77 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40432.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40432.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40432", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:14.660", - "lastModified": "2023-10-03T06:15:37.127", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:23:02.357", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -95,7 +95,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213936", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40434.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40434.json index b25ac91faa4..a2c0b0944e1 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40434.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40434.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40434", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:15.147", - "lastModified": "2023-10-03T06:15:37.453", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:23:29.957", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -83,11 +83,19 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/8", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213938", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40435.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40435.json index 3b5e439b980..8cc3ff07afa 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40435.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40435.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40435", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:15.613", - "lastModified": "2023-10-03T06:15:37.903", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:25:06.873", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -71,7 +71,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/7", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213939", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40436.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40436.json index f7064fc6ae4..a2721c92400 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40436.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40436.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40436", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:15.910", - "lastModified": "2023-10-03T06:15:38.337", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:26:39.720", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -71,7 +71,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213940", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40441.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40441.json index f22b2ad4499..caaad3f8e51 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40441.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40441.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40441", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:16.137", - "lastModified": "2023-10-03T06:15:38.593", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:26:57.743", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -83,11 +83,19 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/8", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213938", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40443.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40443.json index c1fd9628fbf..dc38a4db7af 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40443.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40443.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40443", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:16.337", - "lastModified": "2023-10-03T06:15:38.897", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:27:28.793", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -77,7 +77,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/8", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213938", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40448.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40448.json index 47386237701..2677a62b4dd 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40448.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40448.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40448", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:16.493", - "lastModified": "2023-10-03T06:15:39.170", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:28:08.943", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -72,8 +72,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", - "versionEndExcluding": "14", - "matchCriteriaId": "267A67AB-4F66-4B5B-A34A-632234BC17AC" + "versionEndExcluding": "14.0", + "matchCriteriaId": "7A5DD3D5-FB4F-4313-B873-DCED87FC4605" }, { "vulnerable": true, @@ -95,7 +95,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213927", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40450.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40450.json index 642272b9cfb..b049779f21a 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40450.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40450.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40450", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:16.797", - "lastModified": "2023-10-03T06:15:39.597", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:28:48.060", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -71,7 +71,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213940", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40452.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40452.json index d77b723d869..0bcae0f6d50 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40452.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40452.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40452", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:17.413", - "lastModified": "2023-10-03T06:15:39.687", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:29:11.097", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -72,9 +72,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", - "versionStartIncluding": "12.0", + "versionStartIncluding": "12.0.0", "versionEndExcluding": "12.7", - "matchCriteriaId": "F05757BB-26B5-40A5-B37C-577706EA11C8" + "matchCriteriaId": "38A33420-FEB8-498F-A513-5DC0EEC52B1E" }, { "vulnerable": true, @@ -103,11 +103,19 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/5", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213931", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40454.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40454.json index 7f99a1b1823..544191596e0 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40454.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40454.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40454", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:18.070", - "lastModified": "2023-10-03T06:15:40.023", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:31:02.603", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -72,9 +72,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", - "versionStartIncluding": "12.0", + "versionStartIncluding": "12.0.0", "versionEndExcluding": "12.7", - "matchCriteriaId": "F05757BB-26B5-40A5-B37C-577706EA11C8" + "matchCriteriaId": "38A33420-FEB8-498F-A513-5DC0EEC52B1E" }, { "vulnerable": true, @@ -103,11 +103,19 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/5", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213927", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40455.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40455.json index d78c18fd650..421aa2459c0 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40455.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40455.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40455", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:18.590", - "lastModified": "2023-10-03T06:15:40.267", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:29:35.947", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -71,7 +71,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213940", diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40456.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40456.json index 97e9873b9f8..ecce307e5a9 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40456.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40456.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40456", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:18.883", - "lastModified": "2023-10-03T06:15:40.530", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:31:21.823", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -89,7 +89,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213936", diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40520.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40520.json index b344330e7bc..62fcc2b8fe5 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40520.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40520.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40520", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:19.293", - "lastModified": "2023-10-03T06:15:40.837", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:31:33.977", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -89,7 +89,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213936", diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40541.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40541.json index 1ca084b4f16..aa6fcda5c15 100644 --- a/CVE-2023/CVE-2023-405xx/CVE-2023-40541.json +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40541.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40541", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:19.907", - "lastModified": "2023-10-03T06:15:41.200", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:32:07.413", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -71,7 +71,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213940", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41063.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41063.json index ae823c58fb3..bb9c212adf1 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41063.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41063.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41063", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:24.917", - "lastModified": "2023-10-03T06:15:41.463", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:32:25.927", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -84,11 +84,19 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/5", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213927", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41065.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41065.json index 31e6b7e6015..4daaec847db 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41065.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41065.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41065", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:25.397", - "lastModified": "2023-10-03T06:15:41.593", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:35:43.833", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -95,19 +95,35 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/8", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/9", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213936", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41066.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41066.json index d0568f97d41..9c4df16603d 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41066.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41066.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41066", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:25.900", - "lastModified": "2023-10-03T06:15:41.870", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:36:20.743", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -71,7 +71,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213940", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41067.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41067.json index 656ef77fdb8..dbba8cdbe28 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41067.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41067.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41067", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:26.023", - "lastModified": "2023-10-03T06:15:42.317", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:37:44.647", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -71,7 +71,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213940", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41068.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41068.json index 85ab9380850..541f30e9133 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41068.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41068.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41068", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:26.157", - "lastModified": "2023-10-03T06:15:43.013", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:38:01.330", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -89,7 +89,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213927", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41070.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41070.json index f8c13f938bb..9679327bbaa 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41070.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41070.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41070", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:26.273", - "lastModified": "2023-10-03T06:15:43.233", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:38:53.627", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -90,7 +90,11 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/5", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213927", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41071.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41071.json index 51bd4643fd2..3f6e7aa12a7 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41071.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41071.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41071", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:26.373", - "lastModified": "2023-10-03T06:15:43.443", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:40:02.397", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -96,11 +96,19 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/5", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213931", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41073.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41073.json index 95fdcd9407b..1c5c036dce8 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41073.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41073.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41073", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:26.463", - "lastModified": "2023-10-03T06:15:43.807", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:40:29.053", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -103,11 +103,19 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/5", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213927", diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41074.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41074.json index 502951252bf..889809c4a24 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41074.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41074.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41074", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-27T15:19:26.570", - "lastModified": "2023-10-03T06:15:44.263", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:40:54.100", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -101,23 +101,43 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/10", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/2", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/8", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/9", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/09/28/3", diff --git a/CVE-2023/CVE-2023-412xx/CVE-2023-41295.json b/CVE-2023/CVE-2023-412xx/CVE-2023-41295.json index 0a8fdfebb61..240f8a80bbc 100644 --- a/CVE-2023/CVE-2023-412xx/CVE-2023-41295.json +++ b/CVE-2023/CVE-2023-412xx/CVE-2023-41295.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41295", "sourceIdentifier": "psirt@huawei.com", "published": "2023-09-25T12:15:10.897", - "lastModified": "2023-09-26T19:50:32.080", - "vulnStatus": "Analyzed", + "lastModified": "2023-10-12T02:15:09.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -74,18 +74,12 @@ ], "references": [ { - "url": "https://consumer.huawei.com/en/support/bulletin/2023/9/", - "source": "psirt@huawei.com", - "tags": [ - "Vendor Advisory" - ] + "url": "https://consumer.huawei.com/en/support/bulletin/2023/10/", + "source": "psirt@huawei.com" }, { - "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202309-0000001638925158", - "source": "psirt@huawei.com", - "tags": [ - "Vendor Advisory" - ] + "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202310-0000001663676540", + "source": "psirt@huawei.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41991.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41991.json index ade8e273593..723cac8375a 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41991.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41991.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41991", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-21T19:15:11.283", - "lastModified": "2023-10-03T06:15:47.193", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:45:00.457", + "vulnStatus": "Analyzed", "cisaExploitAdd": "2023-09-25", "cisaActionDue": "2023-10-16", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -63,14 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.7", - "matchCriteriaId": "0379BAF3-B879-4710-A2B6-97CA03B19373" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D7F45FD5-BD2C-41B5-ADCA-D7F99A0FD4A3" + "matchCriteriaId": "1CEB5BA1-7092-4ADE-B19F-FD34CB53CCC3" }, { "vulnerable": true, @@ -78,28 +73,12 @@ "versionEndExcluding": "16.7", "matchCriteriaId": "3FC8EB94-1D4F-4CE8-83D0-9086D1EBBC8F" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "502CD624-FA22-4C7B-9CA3-53CA938BE1AB" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "versionStartIncluding": "13.0", "versionEndExcluding": "13.6", "matchCriteriaId": "7A78DA60-AE3B-4B3C-B338-97DAFABEBB1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", - "versionEndExcluding": "9.6.3", - "matchCriteriaId": "87E56518-DB8C-4F2F-8928-F9A074FB4B91" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:watchos:10.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "894D48EB-A3F0-4EAC-8FF0-59F5C5B85A27" } ] } @@ -109,12 +88,17 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/5", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213927", "source": "product-security@apple.com", "tags": [ + "Release Notes", "Vendor Advisory" ] }, @@ -122,6 +106,7 @@ "url": "https://support.apple.com/en-us/HT213931", "source": "product-security@apple.com", "tags": [ + "Release Notes", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41992.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41992.json index 2174b6adadb..3358ef56737 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41992.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41992.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41992", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-21T19:15:11.520", - "lastModified": "2023-10-03T06:15:47.630", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:44:38.967", + "vulnStatus": "Analyzed", "cisaExploitAdd": "2023-09-25", "cisaActionDue": "2023-10-16", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -63,14 +63,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.7", - "matchCriteriaId": "0379BAF3-B879-4710-A2B6-97CA03B19373" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D7F45FD5-BD2C-41B5-ADCA-D7F99A0FD4A3" + "matchCriteriaId": "1CEB5BA1-7092-4ADE-B19F-FD34CB53CCC3" }, { "vulnerable": true, @@ -78,17 +73,12 @@ "versionEndExcluding": "16.7", "matchCriteriaId": "3FC8EB94-1D4F-4CE8-83D0-9086D1EBBC8F" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "502CD624-FA22-4C7B-9CA3-53CA938BE1AB" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", - "versionStartIncluding": "12.0", + "versionStartIncluding": "12.0.0", "versionEndExcluding": "12.7", - "matchCriteriaId": "F05757BB-26B5-40A5-B37C-577706EA11C8" + "matchCriteriaId": "38A33420-FEB8-498F-A513-5DC0EEC52B1E" }, { "vulnerable": true, @@ -96,17 +86,6 @@ "versionStartIncluding": "13.0", "versionEndExcluding": "13.6", "matchCriteriaId": "7A78DA60-AE3B-4B3C-B338-97DAFABEBB1F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", - "versionEndExcluding": "9.6.3", - "matchCriteriaId": "87E56518-DB8C-4F2F-8928-F9A074FB4B91" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:watchos:10.0.0:*:*:*:*:*:*:*", - "matchCriteriaId": "894D48EB-A3F0-4EAC-8FF0-59F5C5B85A27" } ] } @@ -116,12 +95,17 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/5", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213927", "source": "product-security@apple.com", "tags": [ + "Release Notes", "Vendor Advisory" ] }, @@ -129,6 +113,7 @@ "url": "https://support.apple.com/en-us/HT213931", "source": "product-security@apple.com", "tags": [ + "Release Notes", "Vendor Advisory" ] }, @@ -136,6 +121,7 @@ "url": "https://support.apple.com/en-us/HT213932", "source": "product-security@apple.com", "tags": [ + "Release Notes", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41993.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41993.json index 6c90b451054..d98685c32fa 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41993.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41993.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41993", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-21T19:15:11.660", - "lastModified": "2023-10-03T06:15:47.883", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:42:54.773", + "vulnStatus": "Analyzed", "cisaExploitAdd": "2023-09-25", "cisaActionDue": "2023-10-16", "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", @@ -64,19 +64,14 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", - "versionEndExcluding": "16.6.1", - "matchCriteriaId": "16D97A63-468F-462E-BB16-47C4C4D904C6" + "versionEndExcluding": "17.0", + "matchCriteriaId": "93FB6D0F-A668-47CF-A63D-755CA3BA259A" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "versionEndExcluding": "16.7", - "matchCriteriaId": "0379BAF3-B879-4710-A2B6-97CA03B19373" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:ipad_os:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "D7F45FD5-BD2C-41B5-ADCA-D7F99A0FD4A3" + "matchCriteriaId": "1CEB5BA1-7092-4ADE-B19F-FD34CB53CCC3" }, { "vulnerable": true, @@ -86,8 +81,29 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*", - "matchCriteriaId": "502CD624-FA22-4C7B-9CA3-53CA938BE1AB" + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.0", + "matchCriteriaId": "7A5DD3D5-FB4F-4313-B873-DCED87FC4605" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" } ] } @@ -97,42 +113,75 @@ "references": [ { "url": "http://seclists.org/fulldisclosure/2023/Oct/2", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2023/Oct/4", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2023/09/28/3", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ELXBV26Q54BIOVN5LBCJFM2G6VQZ7FO/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EYRHTFVN6FTXLZ27IPTNRSXKBAR2SOMA/", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213927", "source": "product-security@apple.com", "tags": [ + "Release Notes", "Vendor Advisory" ] }, { "url": "https://support.apple.com/en-us/HT213940", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213941", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json b/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json index 5b4421f9e0c..4941f7bd1dd 100644 --- a/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json +++ b/CVE-2023/CVE-2023-436xx/CVE-2023-43641.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43641", "sourceIdentifier": "security-advisories@github.com", "published": "2023-10-09T22:15:12.707", - "lastModified": "2023-10-12T01:15:12.773", + "lastModified": "2023-10-12T03:15:09.680", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -74,6 +74,10 @@ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/57JEYTRFG4PVGZZ7HIEFTX5I7OONFFMI/", "source": "security-advisories@github.com" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5524", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-43xx/CVE-2023-4354.json b/CVE-2023/CVE-2023-43xx/CVE-2023-4354.json index 98fc536dc78..0920c2a97e2 100644 --- a/CVE-2023/CVE-2023-43xx/CVE-2023-4354.json +++ b/CVE-2023/CVE-2023-43xx/CVE-2023-4354.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4354", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-08-15T18:15:11.763", - "lastModified": "2023-10-05T18:15:12.923", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:56:56.870", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -78,6 +78,21 @@ "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" }, { "vulnerable": true, @@ -92,7 +107,11 @@ "references": [ { "url": "http://packetstormsecurity.com/files/174949/Chrome-SKIA-Integer-Overflow.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html", @@ -111,7 +130,11 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/", diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44464.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44464.json index e932d5715da..c93ec056990 100644 --- a/CVE-2023/CVE-2023-444xx/CVE-2023-44464.json +++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44464.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44464", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-29T05:15:46.757", - "lastModified": "2023-10-04T20:15:10.527", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:47:15.840", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -60,8 +60,22 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:rami:pretix:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.20.4", + "matchCriteriaId": "D3ACC75C-F588-4750-AD6B-0B417191D6BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rami:pretix:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2023.6.0", + "versionEndExcluding": "2023.6.3", + "matchCriteriaId": "449BC544-C630-4258-9B82-025C32230953" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rami:pretix:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2023.7.0", "versionEndExcluding": "2023.7.2", - "matchCriteriaId": "AA2101CA-673B-4A5D-91F3-3FD1D1474582" + "matchCriteriaId": "35C3E175-B498-444E-8919-6F643B036BF5" } ] } @@ -92,7 +106,10 @@ }, { "url": "https://pretix.eu/about/de/blog/20230912-release-2023-7-2/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://pretix.eu/about/en/ticketing", diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44488.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44488.json index a14c87fe7ee..f54cee31f77 100644 --- a/CVE-2023/CVE-2023-444xx/CVE-2023-44488.json +++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44488.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44488", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-30T20:15:10.200", - "lastModified": "2023-10-06T03:15:10.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-10-12T02:48:57.420", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -97,6 +97,16 @@ "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" } ] } @@ -117,7 +127,8 @@ "source": "cve@mitre.org", "tags": [ "Issue Tracking", - "Patch" + "Patch", + "Third Party Advisory" ] }, { @@ -157,11 +168,17 @@ }, { "url": "https://security.gentoo.org/glsa/202310-04", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5518", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5169.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5169.json index 58757b528d0..2a7fe1a013e 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5169.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5169.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5169", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-27T15:19:42.127", - "lastModified": "2023-10-09T16:15:10.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-10-12T02:53:26.827", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -103,6 +103,21 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] } ], "references": [ @@ -124,11 +139,19 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5506", @@ -140,7 +163,10 @@ }, { "url": "https://www.debian.org/security/2023/dsa-5513", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-41/", diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5171.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5171.json index ffdadd174bb..9af98d10b58 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5171.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5171.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5171", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-27T15:19:42.227", - "lastModified": "2023-10-09T16:15:10.783", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-10-12T02:52:09.820", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -103,6 +103,21 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] } ], "references": [ @@ -125,11 +140,19 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5506", @@ -141,7 +164,10 @@ }, { "url": "https://www.debian.org/security/2023/dsa-5513", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-41/", diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5176.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5176.json index 9196f472849..6bf2e4dc7f4 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5176.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5176.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5176", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-27T15:19:42.767", - "lastModified": "2023-10-09T16:15:10.870", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-10-12T02:56:05.727", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -85,6 +85,11 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", @@ -105,6 +110,8 @@ "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836353%2C1842674%2C1843824%2C1843962%2C1848890%2C1850180%2C1850983%2C1851195", "source": "security@mozilla.org", "tags": [ + "Broken Link", + "Issue Tracking", "Permissions Required" ] }, @@ -118,7 +125,11 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5506", @@ -129,7 +140,10 @@ }, { "url": "https://www.debian.org/security/2023/dsa-5513", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-41/", diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5186.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5186.json index c2b69762db2..f7fab0f93cc 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5186.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5186.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5186", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-09-28T16:15:10.760", - "lastModified": "2023-10-02T03:15:10.283", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:46:12.913", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -66,6 +66,51 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] } ], "references": [ @@ -86,19 +131,34 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5508", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5187.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5187.json index f379becdef8..093c35fea37 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5187.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5187.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5187", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-09-28T16:15:10.883", - "lastModified": "2023-10-02T03:15:10.343", - "vulnStatus": "Modified", + "lastModified": "2023-10-12T02:45:40.760", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -66,6 +66,51 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] } ], "references": [ @@ -86,19 +131,34 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5508", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 8f5e7f76dc4..aa158880470 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-10-12T02:00:26.649664+00:00 +2023-10-12T04:00:25.389610+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-10-12T01:59:56.563000+00:00 +2023-10-12T03:15:09.680000+00:00 ``` ### Last Data Feed Release @@ -34,39 +34,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `0` -* [CVE-2023-1943](CVE-2023/CVE-2023-19xx/CVE-2023-1943.json) (`2023-10-12T00:15:10.067`) ### CVEs modified in the last Commit -Recently modified CVEs: `24` +Recently modified CVEs: `60` -* [CVE-2023-44259](CVE-2023/CVE-2023-442xx/CVE-2023-44259.json) (`2023-10-12T00:41:15.513`) -* [CVE-2023-44261](CVE-2023/CVE-2023-442xx/CVE-2023-44261.json) (`2023-10-12T00:41:29.813`) -* [CVE-2023-44081](CVE-2023/CVE-2023-440xx/CVE-2023-44081.json) (`2023-10-12T00:42:21.237`) -* [CVE-2023-44083](CVE-2023/CVE-2023-440xx/CVE-2023-44083.json) (`2023-10-12T00:42:31.957`) -* [CVE-2023-44082](CVE-2023/CVE-2023-440xx/CVE-2023-44082.json) (`2023-10-12T00:42:40.427`) -* [CVE-2023-44084](CVE-2023/CVE-2023-440xx/CVE-2023-44084.json) (`2023-10-12T00:42:54.377`) -* [CVE-2023-44085](CVE-2023/CVE-2023-440xx/CVE-2023-44085.json) (`2023-10-12T00:43:03.957`) -* [CVE-2023-44087](CVE-2023/CVE-2023-440xx/CVE-2023-44087.json) (`2023-10-12T00:43:13.640`) -* [CVE-2023-44086](CVE-2023/CVE-2023-440xx/CVE-2023-44086.json) (`2023-10-12T00:43:21.853`) -* [CVE-2023-44315](CVE-2023/CVE-2023-443xx/CVE-2023-44315.json) (`2023-10-12T00:43:38.827`) -* [CVE-2023-45204](CVE-2023/CVE-2023-452xx/CVE-2023-45204.json) (`2023-10-12T00:44:00.243`) -* [CVE-2023-45601](CVE-2023/CVE-2023-456xx/CVE-2023-45601.json) (`2023-10-12T00:44:25.833`) -* [CVE-2023-43641](CVE-2023/CVE-2023-436xx/CVE-2023-43641.json) (`2023-10-12T01:15:12.773`) -* [CVE-2023-44257](CVE-2023/CVE-2023-442xx/CVE-2023-44257.json) (`2023-10-12T01:48:28.493`) -* [CVE-2023-40407](CVE-2023/CVE-2023-404xx/CVE-2023-40407.json) (`2023-10-12T01:54:23.947`) -* [CVE-2023-40406](CVE-2023/CVE-2023-404xx/CVE-2023-40406.json) (`2023-10-12T01:54:51.397`) -* [CVE-2023-40403](CVE-2023/CVE-2023-404xx/CVE-2023-40403.json) (`2023-10-12T01:55:28.497`) -* [CVE-2023-40402](CVE-2023/CVE-2023-404xx/CVE-2023-40402.json) (`2023-10-12T01:55:51.857`) -* [CVE-2023-40400](CVE-2023/CVE-2023-404xx/CVE-2023-40400.json) (`2023-10-12T01:56:02.253`) -* [CVE-2023-40399](CVE-2023/CVE-2023-403xx/CVE-2023-40399.json) (`2023-10-12T01:58:23.280`) -* [CVE-2023-40395](CVE-2023/CVE-2023-403xx/CVE-2023-40395.json) (`2023-10-12T01:58:35.510`) -* [CVE-2023-40391](CVE-2023/CVE-2023-403xx/CVE-2023-40391.json) (`2023-10-12T01:58:49.023`) -* [CVE-2023-40388](CVE-2023/CVE-2023-403xx/CVE-2023-40388.json) (`2023-10-12T01:59:05.793`) -* [CVE-2023-40386](CVE-2023/CVE-2023-403xx/CVE-2023-40386.json) (`2023-10-12T01:59:56.563`) +* [CVE-2023-40541](CVE-2023/CVE-2023-405xx/CVE-2023-40541.json) (`2023-10-12T02:32:07.413`) +* [CVE-2023-41063](CVE-2023/CVE-2023-410xx/CVE-2023-41063.json) (`2023-10-12T02:32:25.927`) +* [CVE-2023-41065](CVE-2023/CVE-2023-410xx/CVE-2023-41065.json) (`2023-10-12T02:35:43.833`) +* [CVE-2023-41066](CVE-2023/CVE-2023-410xx/CVE-2023-41066.json) (`2023-10-12T02:36:20.743`) +* [CVE-2023-41067](CVE-2023/CVE-2023-410xx/CVE-2023-41067.json) (`2023-10-12T02:37:44.647`) +* [CVE-2023-41068](CVE-2023/CVE-2023-410xx/CVE-2023-41068.json) (`2023-10-12T02:38:01.330`) +* [CVE-2023-41070](CVE-2023/CVE-2023-410xx/CVE-2023-41070.json) (`2023-10-12T02:38:53.627`) +* [CVE-2023-41071](CVE-2023/CVE-2023-410xx/CVE-2023-41071.json) (`2023-10-12T02:40:02.397`) +* [CVE-2023-41073](CVE-2023/CVE-2023-410xx/CVE-2023-41073.json) (`2023-10-12T02:40:29.053`) +* [CVE-2023-41074](CVE-2023/CVE-2023-410xx/CVE-2023-41074.json) (`2023-10-12T02:40:54.100`) +* [CVE-2023-41993](CVE-2023/CVE-2023-419xx/CVE-2023-41993.json) (`2023-10-12T02:42:54.773`) +* [CVE-2023-41992](CVE-2023/CVE-2023-419xx/CVE-2023-41992.json) (`2023-10-12T02:44:38.967`) +* [CVE-2023-41991](CVE-2023/CVE-2023-419xx/CVE-2023-41991.json) (`2023-10-12T02:45:00.457`) +* [CVE-2023-5187](CVE-2023/CVE-2023-51xx/CVE-2023-5187.json) (`2023-10-12T02:45:40.760`) +* [CVE-2023-5186](CVE-2023/CVE-2023-51xx/CVE-2023-5186.json) (`2023-10-12T02:46:12.913`) +* [CVE-2023-44464](CVE-2023/CVE-2023-444xx/CVE-2023-44464.json) (`2023-10-12T02:47:15.840`) +* [CVE-2023-44488](CVE-2023/CVE-2023-444xx/CVE-2023-44488.json) (`2023-10-12T02:48:57.420`) +* [CVE-2023-5171](CVE-2023/CVE-2023-51xx/CVE-2023-5171.json) (`2023-10-12T02:52:09.820`) +* [CVE-2023-5169](CVE-2023/CVE-2023-51xx/CVE-2023-5169.json) (`2023-10-12T02:53:26.827`) +* [CVE-2023-5176](CVE-2023/CVE-2023-51xx/CVE-2023-5176.json) (`2023-10-12T02:56:05.727`) +* [CVE-2023-4354](CVE-2023/CVE-2023-43xx/CVE-2023-4354.json) (`2023-10-12T02:56:56.870`) +* [CVE-2023-20588](CVE-2023/CVE-2023-205xx/CVE-2023-20588.json) (`2023-10-12T03:15:09.277`) +* [CVE-2023-22338](CVE-2023/CVE-2023-223xx/CVE-2023-22338.json) (`2023-10-12T03:15:09.490`) +* [CVE-2023-22840](CVE-2023/CVE-2023-228xx/CVE-2023-22840.json) (`2023-10-12T03:15:09.590`) +* [CVE-2023-43641](CVE-2023/CVE-2023-436xx/CVE-2023-43641.json) (`2023-10-12T03:15:09.680`) ## Download and Usage