From ba0b6734bc1b6ebcd3c70091bae16087b5242d01 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 29 Jul 2023 02:00:30 +0000 Subject: [PATCH] Auto-Update: 2023-07-29T02:00:27.101686+00:00 --- CVE-2021/CVE-2021-43xx/CVE-2021-4316.json | 24 ++++++++++++++ CVE-2021/CVE-2021-43xx/CVE-2021-4317.json | 24 ++++++++++++++ CVE-2021/CVE-2021-43xx/CVE-2021-4318.json | 24 ++++++++++++++ CVE-2021/CVE-2021-43xx/CVE-2021-4319.json | 24 ++++++++++++++ CVE-2021/CVE-2021-43xx/CVE-2021-4320.json | 24 ++++++++++++++ CVE-2021/CVE-2021-43xx/CVE-2021-4321.json | 24 ++++++++++++++ CVE-2021/CVE-2021-43xx/CVE-2021-4322.json | 24 ++++++++++++++ CVE-2021/CVE-2021-43xx/CVE-2021-4323.json | 24 ++++++++++++++ CVE-2021/CVE-2021-43xx/CVE-2021-4324.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4906.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4907.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4908.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4909.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4910.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4911.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4912.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4913.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4914.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4915.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4916.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4917.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4918.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4919.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4920.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4921.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4922.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4923.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4924.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4925.json | 24 ++++++++++++++ CVE-2022/CVE-2022-49xx/CVE-2022-4926.json | 24 ++++++++++++++ CVE-2023/CVE-2023-23xx/CVE-2023-2311.json | 24 ++++++++++++++ CVE-2023/CVE-2023-23xx/CVE-2023-2313.json | 24 ++++++++++++++ CVE-2023/CVE-2023-23xx/CVE-2023-2314.json | 24 ++++++++++++++ CVE-2023/CVE-2023-34xx/CVE-2023-3497.json | 12 +++---- README.md | 40 ++++++++++++++++++----- 35 files changed, 828 insertions(+), 16 deletions(-) create mode 100644 CVE-2021/CVE-2021-43xx/CVE-2021-4316.json create mode 100644 CVE-2021/CVE-2021-43xx/CVE-2021-4317.json create mode 100644 CVE-2021/CVE-2021-43xx/CVE-2021-4318.json create mode 100644 CVE-2021/CVE-2021-43xx/CVE-2021-4319.json create mode 100644 CVE-2021/CVE-2021-43xx/CVE-2021-4320.json create mode 100644 CVE-2021/CVE-2021-43xx/CVE-2021-4321.json create mode 100644 CVE-2021/CVE-2021-43xx/CVE-2021-4322.json create mode 100644 CVE-2021/CVE-2021-43xx/CVE-2021-4323.json create mode 100644 CVE-2021/CVE-2021-43xx/CVE-2021-4324.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4906.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4907.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4908.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4909.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4910.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4911.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4912.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4913.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4914.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4915.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4916.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4917.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4918.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4919.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4920.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4921.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4922.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4923.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4924.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4925.json create mode 100644 CVE-2022/CVE-2022-49xx/CVE-2022-4926.json create mode 100644 CVE-2023/CVE-2023-23xx/CVE-2023-2311.json create mode 100644 CVE-2023/CVE-2023-23xx/CVE-2023-2313.json create mode 100644 CVE-2023/CVE-2023-23xx/CVE-2023-2314.json diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4316.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4316.json new file mode 100644 index 00000000000..5a9357bd25f --- /dev/null +++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4316.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2021-4316", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:10.237", + "lastModified": "2023-07-29T00:15:10.237", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in Cast UI in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to spoof browser UI via a crafted HTML page. (Chromium security severity: Low)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2021/11/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1152952", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4317.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4317.json new file mode 100644 index 00000000000..429a61b719a --- /dev/null +++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4317.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2021-4317", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:10.327", + "lastModified": "2023-07-29T00:15:10.327", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1260783", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4318.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4318.json new file mode 100644 index 00000000000..0bff7659047 --- /dev/null +++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4318.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2021-4318", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:10.383", + "lastModified": "2023-07-29T00:15:10.383", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Object corruption in Blink in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1237730", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4319.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4319.json new file mode 100644 index 00000000000..81e645f4d15 --- /dev/null +++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4319.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2021-4319", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:10.440", + "lastModified": "2023-07-29T00:15:10.440", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1214199", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4320.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4320.json new file mode 100644 index 00000000000..222575d51bd --- /dev/null +++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4320.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2021-4320", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:10.493", + "lastModified": "2023-07-29T00:15:10.493", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Blink in Google Chrome prior to 92.0.4515.107 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1224238", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4321.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4321.json new file mode 100644 index 00000000000..b93274e6d18 --- /dev/null +++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4321.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2021-4321", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:10.553", + "lastModified": "2023-07-29T00:15:10.553", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Policy bypass in Blink in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1161891", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4322.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4322.json new file mode 100644 index 00000000000..5dc02fa29c7 --- /dev/null +++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4322.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2021-4322", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:10.610", + "lastModified": "2023-07-29T00:15:10.610", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in DevTools in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2021/05/stable-channel-update-for-desktop_25.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1190550", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4323.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4323.json new file mode 100644 index 00000000000..9ad0a8e382e --- /dev/null +++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4323.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2021-4323", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:10.667", + "lastModified": "2023-07-29T00:15:10.667", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Insufficient validation of untrusted input in Extensions in Google Chrome prior to 90.0.4430.72 allowed an attacker who convinced a user to install a malicious extension to access local files via a crafted Chrome Extension. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_14.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1176031", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4324.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4324.json new file mode 100644 index 00000000000..c112b9beb29 --- /dev/null +++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4324.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2021-4324", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:10.720", + "lastModified": "2023-07-29T00:15:10.720", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Insufficient policy enforcement in Google Update in Google Chrome prior to 90.0.4430.93 allowed a remote attacker to read arbitrary files via a malicious file. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2021/04/stable-channel-update-for-desktop_26.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1193233", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4906.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4906.json new file mode 100644 index 00000000000..cac521e098a --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4906.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4906", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:10.800", + "lastModified": "2023-07-29T00:15:10.800", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in Blink in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_29.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1382434", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4907.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4907.json new file mode 100644 index 00000000000..da1fff9b325 --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4907.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4907", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:10.860", + "lastModified": "2023-07-29T00:15:10.860", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Uninitialized Use in FFmpeg in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop_29.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1358168", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4908.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4908.json new file mode 100644 index 00000000000..b9fd42ab3a8 --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4908.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4908", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:10.917", + "lastModified": "2023-07-29T00:15:10.917", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in iFrame Sandbox in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_25.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1359122", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4909.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4909.json new file mode 100644 index 00000000000..b2b84744ba1 --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4909.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4909", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:10.970", + "lastModified": "2023-07-29T00:15:10.970", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in XML in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to potentially perform an ASLR bypass via a crafted HTML page. (Chromium security severity: Low)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_25.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1356211", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4910.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4910.json new file mode 100644 index 00000000000..e97aaa94c10 --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4910.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4910", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.023", + "lastModified": "2023-07-29T00:15:11.023", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in Autofill in Google Chrome prior to 107.0.5304.62 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/10/stable-channel-update-for-desktop_25.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1279268", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4911.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4911.json new file mode 100644 index 00000000000..aafa300d523 --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4911.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4911", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.080", + "lastModified": "2023-07-29T00:15:11.080", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Insufficient data validation in DevTools in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1349493", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4912.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4912.json new file mode 100644 index 00000000000..39c2027eacc --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4912.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4912", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.137", + "lastModified": "2023-07-29T00:15:11.137", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Type Confusion in MathML in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1350909", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4913.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4913.json new file mode 100644 index 00000000000..6ac725f7427 --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4913.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4913", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.193", + "lastModified": "2023-07-29T00:15:11.193", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in Extensions in Google Chrome prior to 105.0.5195.52 allowed a remote attacker who had compromised the renderer process to spoof extension storage via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1183604", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4914.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4914.json new file mode 100644 index 00000000000..6655789132e --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4914.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4914", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.247", + "lastModified": "2023-07-29T00:15:11.247", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Heap buffer overflow in PrintPreview in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1232402", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4915.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4915.json new file mode 100644 index 00000000000..c935e958bb3 --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4915.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4915", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.303", + "lastModified": "2023-07-29T00:15:11.303", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in URL Formatting in Google Chrome prior to 103.0.5060.134 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop_19.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1329541", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4916.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4916.json new file mode 100644 index 00000000000..67aeb469711 --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4916.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4916", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.357", + "lastModified": "2023-07-29T00:15:11.357", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Media in Google Chrome prior to 103.0.5060.53 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1317714", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4917.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4917.json new file mode 100644 index 00000000000..5b769654aaf --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4917.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4917", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.410", + "lastModified": "2023-07-29T00:15:11.410", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Incorrect security UI in Notifications in Google Chrome on Android prior to 103.0.5060.53 allowed a remote attacker to obscure the full screen notification via a crafted HTML page. (Chromium security severity: Low)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/06/stable-channel-update-for-desktop_21.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1311683", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4918.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4918.json new file mode 100644 index 00000000000..01e7285c217 --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4918.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4918", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.463", + "lastModified": "2023-07-29T00:15:11.463", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in UI in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/05/stable-channel-update-for-desktop_24.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1315102", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4919.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4919.json new file mode 100644 index 00000000000..a4b13e9ee31 --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4919.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4919", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.517", + "lastModified": "2023-07-29T00:15:11.517", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Base Internals in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/04/stable-channel-update-for-desktop_26.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1312450", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4920.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4920.json new file mode 100644 index 00000000000..373171cf437 --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4920.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4920", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.573", + "lastModified": "2023-07-29T00:15:11.573", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Heap buffer overflow in Blink in Google Chrome prior to 101.0.4951.41 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/04/stable-channel-update-for-desktop_26.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1306861", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4921.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4921.json new file mode 100644 index 00000000000..490b771b3c1 --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4921.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4921", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.627", + "lastModified": "2023-07-29T00:15:11.627", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Accessibility in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Low)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1262902", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4922.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4922.json new file mode 100644 index 00000000000..e06e782fcb9 --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4922.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4922", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.683", + "lastModified": "2023-07-29T00:15:11.683", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in Blink in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1261191", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4923.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4923.json new file mode 100644 index 00000000000..828bf550af3 --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4923.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4923", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.733", + "lastModified": "2023-07-29T00:15:11.733", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in Omnibox in Google Chrome prior to 99.0.4844.51 allowed an attacker in a privileged network position to perform a man-in-the-middle attack via malicious network traffic. (Chromium security severity: Low)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/03/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1251065", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4924.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4924.json new file mode 100644 index 00000000000..c2aaddbe167 --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4924.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4924", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.787", + "lastModified": "2023-07-29T00:15:11.787", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in WebRTC in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1272967", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4925.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4925.json new file mode 100644 index 00000000000..d7dedef5080 --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4925.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4925", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.840", + "lastModified": "2023-07-29T00:15:11.840", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Insufficient validation of untrusted input in QUIC in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to perform header splitting via malicious network traffic. (Chromium security severity: Low)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1238309", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4926.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4926.json new file mode 100644 index 00000000000..7feae54af8d --- /dev/null +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4926.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2022-4926", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.893", + "lastModified": "2023-07-29T00:15:11.893", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Insufficient policy enforcement in Intents in Google Chrome on Android prior to 109.0.5414.119 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1368230", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2311.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2311.json new file mode 100644 index 00000000000..65ef7bbb891 --- /dev/null +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2311.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-2311", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:11.967", + "lastModified": "2023-07-29T00:15:11.967", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Insufficient policy enforcement in File System API in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to bypass filesystem restrictions via a crafted HTML page. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1354505", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2313.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2313.json new file mode 100644 index 00000000000..d868e5f4136 --- /dev/null +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2313.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-2313", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:12.023", + "lastModified": "2023-07-29T00:15:12.023", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in Sandbox in Google Chrome on Windows prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a malicious file. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1335974", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2314.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2314.json new file mode 100644 index 00000000000..5cb02819456 --- /dev/null +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2314.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-2314", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-07-29T00:15:12.077", + "lastModified": "2023-07-29T00:15:12.077", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Insufficient data validation in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/813542", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3497.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3497.json index b90e72e977d..b38a893f4dc 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3497.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3497.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3497", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-07-03T17:15:09.540", - "lastModified": "2023-07-11T15:03:53.777", - "vulnStatus": "Analyzed", + "lastModified": "2023-07-29T01:15:09.270", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -78,12 +78,8 @@ ], "references": [ { - "url": "https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html", - "source": "chrome-cve-admin@google.com", - "tags": [ - "Release Notes", - "Vendor Advisory" - ] + "url": "https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-chromeos.html", + "source": "chrome-cve-admin@google.com" }, { "url": "https://crbug.com/1459277", diff --git a/README.md b/README.md index d8a03ec3788..60e32397ff3 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-07-28T23:55:25.069053+00:00 +2023-07-29T02:00:27.101686+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-07-28T22:24:41.520000+00:00 +2023-07-29T01:15:09.270000+00:00 ``` ### Last Data Feed Release @@ -23,27 +23,51 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2023-07-28T00:00:13.561196+00:00 +2023-07-29T00:00:13.550868+00:00 ``` ### Total Number of included CVEs ```plain -221238 +221271 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `33` +* [CVE-2021-4324](CVE-2021/CVE-2021-43xx/CVE-2021-4324.json) (`2023-07-29T00:15:10.720`) +* [CVE-2022-4906](CVE-2022/CVE-2022-49xx/CVE-2022-4906.json) (`2023-07-29T00:15:10.800`) +* [CVE-2022-4907](CVE-2022/CVE-2022-49xx/CVE-2022-4907.json) (`2023-07-29T00:15:10.860`) +* [CVE-2022-4908](CVE-2022/CVE-2022-49xx/CVE-2022-4908.json) (`2023-07-29T00:15:10.917`) +* [CVE-2022-4909](CVE-2022/CVE-2022-49xx/CVE-2022-4909.json) (`2023-07-29T00:15:10.970`) +* [CVE-2022-4910](CVE-2022/CVE-2022-49xx/CVE-2022-4910.json) (`2023-07-29T00:15:11.023`) +* [CVE-2022-4911](CVE-2022/CVE-2022-49xx/CVE-2022-4911.json) (`2023-07-29T00:15:11.080`) +* [CVE-2022-4912](CVE-2022/CVE-2022-49xx/CVE-2022-4912.json) (`2023-07-29T00:15:11.137`) +* [CVE-2022-4913](CVE-2022/CVE-2022-49xx/CVE-2022-4913.json) (`2023-07-29T00:15:11.193`) +* [CVE-2022-4914](CVE-2022/CVE-2022-49xx/CVE-2022-4914.json) (`2023-07-29T00:15:11.247`) +* [CVE-2022-4915](CVE-2022/CVE-2022-49xx/CVE-2022-4915.json) (`2023-07-29T00:15:11.303`) +* [CVE-2022-4916](CVE-2022/CVE-2022-49xx/CVE-2022-4916.json) (`2023-07-29T00:15:11.357`) +* [CVE-2022-4917](CVE-2022/CVE-2022-49xx/CVE-2022-4917.json) (`2023-07-29T00:15:11.410`) +* [CVE-2022-4918](CVE-2022/CVE-2022-49xx/CVE-2022-4918.json) (`2023-07-29T00:15:11.463`) +* [CVE-2022-4919](CVE-2022/CVE-2022-49xx/CVE-2022-4919.json) (`2023-07-29T00:15:11.517`) +* [CVE-2022-4920](CVE-2022/CVE-2022-49xx/CVE-2022-4920.json) (`2023-07-29T00:15:11.573`) +* [CVE-2022-4921](CVE-2022/CVE-2022-49xx/CVE-2022-4921.json) (`2023-07-29T00:15:11.627`) +* [CVE-2022-4922](CVE-2022/CVE-2022-49xx/CVE-2022-4922.json) (`2023-07-29T00:15:11.683`) +* [CVE-2022-4923](CVE-2022/CVE-2022-49xx/CVE-2022-4923.json) (`2023-07-29T00:15:11.733`) +* [CVE-2022-4924](CVE-2022/CVE-2022-49xx/CVE-2022-4924.json) (`2023-07-29T00:15:11.787`) +* [CVE-2022-4925](CVE-2022/CVE-2022-49xx/CVE-2022-4925.json) (`2023-07-29T00:15:11.840`) +* [CVE-2022-4926](CVE-2022/CVE-2022-49xx/CVE-2022-4926.json) (`2023-07-29T00:15:11.893`) +* [CVE-2023-2311](CVE-2023/CVE-2023-23xx/CVE-2023-2311.json) (`2023-07-29T00:15:11.967`) +* [CVE-2023-2313](CVE-2023/CVE-2023-23xx/CVE-2023-2313.json) (`2023-07-29T00:15:12.023`) +* [CVE-2023-2314](CVE-2023/CVE-2023-23xx/CVE-2023-2314.json) (`2023-07-29T00:15:12.077`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `1` -* [CVE-2023-3527](CVE-2023/CVE-2023-35xx/CVE-2023-3527.json) (`2023-07-28T22:17:17.167`) -* [CVE-2023-37897](CVE-2023/CVE-2023-378xx/CVE-2023-37897.json) (`2023-07-28T22:24:41.520`) +* [CVE-2023-3497](CVE-2023/CVE-2023-34xx/CVE-2023-3497.json) (`2023-07-29T01:15:09.270`) ## Download and Usage