Auto-Update: 2023-08-24T14:00:36.171355+00:00

This commit is contained in:
cad-safe-bot 2023-08-24 14:00:39 +00:00
parent 1c67fbba94
commit baf5387d51
25 changed files with 2378 additions and 1975 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-33503",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-06-29T11:15:07.847",
"lastModified": "2023-01-24T19:35:56.233",
"lastModified": "2023-08-24T13:42:23.033",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -85,15 +85,9 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.25.4",
"matchCriteriaId": "DE6ED8B6-5858-42F0-A646-503FAB8EE39C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.26.0",
"versionStartIncluding": "1.25.4",
"versionEndExcluding": "1.26.5",
"matchCriteriaId": "F4967244-2BB6-4780-9FC3-00FD40248457"
"matchCriteriaId": "39285E88-6838-4253-AD93-2717B1A8D1BC"
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-25399",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-05T17:15:09.320",
"lastModified": "2023-07-11T19:14:10.753",
"lastModified": "2023-08-24T13:42:37.750",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -56,8 +56,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:scipy:scipy:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.11.1",
"matchCriteriaId": "DE57F752-50C6-4FEB-BBDB-340B6AFC0566"
"versionEndExcluding": "1.10.0",
"matchCriteriaId": "9DF61E05-B983-4CF9-AF1E-4C498AFF89CA"
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27522",
"sourceIdentifier": "security@apache.org",
"published": "2023-03-07T16:15:09.613",
"lastModified": "2023-05-26T15:05:01.460",
"lastModified": "2023-08-24T13:42:30.817",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -87,8 +87,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unbit:uwsgi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C23FC18-50AD-48F9-A74E-68DC1DA3A270"
"criteria": "cpe:2.3:a:unbit:uwsgi:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.22",
"matchCriteriaId": "6E6426EB-867D-4727-AE12-917B2BDA35D1"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-32510",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-24T12:15:07.740",
"lastModified": "2023-08-24T12:55:22.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Rolf van Gelder Order Your Posts Manually plugin <=\u00a02.2.5 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/order-your-posts-manually/wordpress-order-your-posts-manually-plugin-2-2-5-reflected-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-32511",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-24T12:15:07.903",
"lastModified": "2023-08-24T12:55:22.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Booking Ultra Pro Booking Ultra Pro Appointments Booking Calendar Plugin plugin <=\u00a01.1.8 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/booking-ultra-pro/wordpress-booking-ultra-pro-appointments-booking-calendar-plugin-plugin-1-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-32516",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-24T12:15:07.990",
"lastModified": "2023-08-24T12:55:22.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in GloriaFood Restaurant Menu \u2013 Food Ordering System \u2013 Table Reservation plugin <=\u00a02.3.6 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/menu-ordering-reservations/wordpress-restaurant-menu-food-ordering-system-table-reservation-plugin-2-3-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32559",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-08-24T02:15:09.210",
"lastModified": "2023-08-24T02:15:09.210",
"vulnStatus": "Received",
"lastModified": "2023-08-24T12:55:22.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34040",
"sourceIdentifier": "security@vmware.com",
"published": "2023-08-24T13:15:07.453",
"lastModified": "2023-08-24T13:15:07.453",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In Spring for Apache Kafka 3.0.9 and earlier and versions 2.9.10 and earlier, a possible deserialization attack vector existed, but only if unusual configuration was applied. An attacker would have to construct a malicious serialized object in one of the deserialization exception record headers.\n\nSpecifically, an application is vulnerable when all of the following are true:\n\n * The user does not\u00a0configure an ErrorHandlingDeserializer for the key and/or value of the record\n * The user explicitly sets container properties checkDeserExWhenKeyNull and/or checkDeserExWhenValueNull container properties to true.\n * The user allows untrusted sources to publish to a Kafka topic\n\n\nBy default, these properties are false, and the container only attempts to deserialize the headers if an ErrorHandlingDeserializer is configured. The ErrorHandlingDeserializer prevents the vulnerability by removing any such malicious headers before processing the record.\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@vmware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://spring.io/security/cve-2023-34040",
"source": "security@vmware.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3704",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2023-08-24T07:15:11.670",
"lastModified": "2023-08-24T07:15:11.670",
"vulnStatus": "Received",
"lastModified": "2023-08-24T12:55:22.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3705",
"sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2023-08-24T08:15:09.040",
"lastModified": "2023-08-24T08:15:09.040",
"vulnStatus": "Received",
"lastModified": "2023-08-24T12:55:22.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40572",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-24T02:15:09.643",
"lastModified": "2023-08-24T02:15:09.643",
"vulnStatus": "Received",
"lastModified": "2023-08-24T12:55:22.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40573",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-08-24T02:15:09.973",
"lastModified": "2023-08-24T02:15:09.973",
"vulnStatus": "Received",
"lastModified": "2023-08-24T12:55:22.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4227",
"sourceIdentifier": "psirt@moxa.com",
"published": "2023-08-24T06:15:44.177",
"lastModified": "2023-08-24T06:15:44.177",
"vulnStatus": "Received",
"lastModified": "2023-08-24T12:55:22.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4228",
"sourceIdentifier": "psirt@moxa.com",
"published": "2023-08-24T07:15:11.823",
"lastModified": "2023-08-24T07:15:11.823",
"vulnStatus": "Received",
"lastModified": "2023-08-24T12:55:22.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4229",
"sourceIdentifier": "psirt@moxa.com",
"published": "2023-08-24T07:15:11.930",
"lastModified": "2023-08-24T07:15:11.930",
"vulnStatus": "Received",
"lastModified": "2023-08-24T12:55:22.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4230",
"sourceIdentifier": "psirt@moxa.com",
"published": "2023-08-24T07:15:12.013",
"lastModified": "2023-08-24T07:15:12.013",
"vulnStatus": "Received",
"lastModified": "2023-08-24T12:55:22.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4413",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-18T15:15:10.353",
"lastModified": "2023-08-18T16:39:17.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-24T13:30:56.523",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.0,
"impactScore": 1.4
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -61,7 +83,7 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -69,24 +91,69 @@
"value": "CWE-532"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4177EB00-7A16-4C54-A2EE-F51DC9C60B2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rootkit_hunter_project:rootkit_hunter:1.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF379E1-B1BF-4FF1-8556-61F3EEC69E72"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/MatheuZSecurity/16ef0219db8f85f49f945a25d5eb42d7",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.237516",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.237516",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://youtu.be/etHt1TNAgs8",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4414",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-18T16:15:11.070",
"lastModified": "2023-08-18T16:39:17.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-24T13:51:00.467",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +93,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:byzoro:smart_s85f:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2023-08-07",
"matchCriteriaId": "C582A488-EA35-4EC0-8E85-35E66E3517FD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/RCEraser/cve/blob/main/S85F.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.237517",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.237517",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4436",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-08-20T22:15:10.273",
"lastModified": "2023-08-21T12:47:13.573",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-08-24T12:57:52.717",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +93,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:inventory_management_system_project:inventory_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BE3D9475-43F9-4544-973D-E5B41DDB2695"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/PUBLIC%20CVE%20HUB/Free%20and%20Open%20Source%20inventory%20management%20system%20-%20vuln%201.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.237557",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.237557",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4511",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-08-24T07:15:12.107",
"lastModified": "2023-08-24T07:15:12.107",
"vulnStatus": "Received",
"lastModified": "2023-08-24T12:55:22.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4512",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-08-24T07:15:12.207",
"lastModified": "2023-08-24T07:15:12.207",
"vulnStatus": "Received",
"lastModified": "2023-08-24T12:55:22.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4513",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-08-24T07:15:12.300",
"lastModified": "2023-08-24T07:15:12.300",
"vulnStatus": "Received",
"lastModified": "2023-08-24T12:55:22.900",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-08-24T10:00:29.975195+00:00
2023-08-24T14:00:36.171355+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-08-24T09:15:10.510000+00:00
2023-08-24T13:51:00.467000+00:00
```
### Last Data Feed Release
@ -29,23 +29,43 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
223357
223361
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `4`
* [CVE-2023-3705](CVE-2023/CVE-2023-37xx/CVE-2023-3705.json) (`2023-08-24T08:15:09.040`)
* [CVE-2023-38288](CVE-2023/CVE-2023-382xx/CVE-2023-38288.json) (`2023-08-24T09:15:10.283`)
* [CVE-2023-38289](CVE-2023/CVE-2023-382xx/CVE-2023-38289.json) (`2023-08-24T09:15:10.510`)
* [CVE-2023-32510](CVE-2023/CVE-2023-325xx/CVE-2023-32510.json) (`2023-08-24T12:15:07.740`)
* [CVE-2023-32511](CVE-2023/CVE-2023-325xx/CVE-2023-32511.json) (`2023-08-24T12:15:07.903`)
* [CVE-2023-32516](CVE-2023/CVE-2023-325xx/CVE-2023-32516.json) (`2023-08-24T12:15:07.990`)
* [CVE-2023-34040](CVE-2023/CVE-2023-340xx/CVE-2023-34040.json) (`2023-08-24T13:15:07.453`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `20`
* [CVE-2023-37581](CVE-2023/CVE-2023-375xx/CVE-2023-37581.json) (`2023-08-24T09:15:08.953`)
* [CVE-2021-33503](CVE-2021/CVE-2021-335xx/CVE-2021-33503.json) (`2023-08-24T13:42:23.033`)
* [CVE-2023-32559](CVE-2023/CVE-2023-325xx/CVE-2023-32559.json) (`2023-08-24T12:55:22.900`)
* [CVE-2023-40572](CVE-2023/CVE-2023-405xx/CVE-2023-40572.json) (`2023-08-24T12:55:22.900`)
* [CVE-2023-40573](CVE-2023/CVE-2023-405xx/CVE-2023-40573.json) (`2023-08-24T12:55:22.900`)
* [CVE-2023-4227](CVE-2023/CVE-2023-42xx/CVE-2023-4227.json) (`2023-08-24T12:55:22.900`)
* [CVE-2023-3704](CVE-2023/CVE-2023-37xx/CVE-2023-3704.json) (`2023-08-24T12:55:22.900`)
* [CVE-2023-4228](CVE-2023/CVE-2023-42xx/CVE-2023-4228.json) (`2023-08-24T12:55:22.900`)
* [CVE-2023-4229](CVE-2023/CVE-2023-42xx/CVE-2023-4229.json) (`2023-08-24T12:55:22.900`)
* [CVE-2023-4230](CVE-2023/CVE-2023-42xx/CVE-2023-4230.json) (`2023-08-24T12:55:22.900`)
* [CVE-2023-4511](CVE-2023/CVE-2023-45xx/CVE-2023-4511.json) (`2023-08-24T12:55:22.900`)
* [CVE-2023-4512](CVE-2023/CVE-2023-45xx/CVE-2023-4512.json) (`2023-08-24T12:55:22.900`)
* [CVE-2023-4513](CVE-2023/CVE-2023-45xx/CVE-2023-4513.json) (`2023-08-24T12:55:22.900`)
* [CVE-2023-3705](CVE-2023/CVE-2023-37xx/CVE-2023-3705.json) (`2023-08-24T12:55:22.900`)
* [CVE-2023-4436](CVE-2023/CVE-2023-44xx/CVE-2023-4436.json) (`2023-08-24T12:57:52.717`)
* [CVE-2023-4413](CVE-2023/CVE-2023-44xx/CVE-2023-4413.json) (`2023-08-24T13:30:56.523`)
* [CVE-2023-27520](CVE-2023/CVE-2023-275xx/CVE-2023-27520.json) (`2023-08-24T13:33:15.207`)
* [CVE-2023-23572](CVE-2023/CVE-2023-235xx/CVE-2023-23572.json) (`2023-08-24T13:33:32.147`)
* [CVE-2023-27522](CVE-2023/CVE-2023-275xx/CVE-2023-27522.json) (`2023-08-24T13:42:30.817`)
* [CVE-2023-25399](CVE-2023/CVE-2023-253xx/CVE-2023-25399.json) (`2023-08-24T13:42:37.750`)
* [CVE-2023-4414](CVE-2023/CVE-2023-44xx/CVE-2023-4414.json) (`2023-08-24T13:51:00.467`)
## Download and Usage