From bea17bcfc314500f2180f5c902b839d7ca5cbe4e Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 18 Nov 2023 23:00:21 +0000 Subject: [PATCH] Auto-Update: 2023-11-18T23:00:17.990878+00:00 --- CVE-2023/CVE-2023-344xx/CVE-2023-34462.json | 6 ++- CVE-2023/CVE-2023-444xx/CVE-2023-44487.json | 6 ++- CVE-2023/CVE-2023-472xx/CVE-2023-47243.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-475xx/CVE-2023-47519.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-475xx/CVE-2023-47531.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-475xx/CVE-2023-47551.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-475xx/CVE-2023-47552.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-475xx/CVE-2023-47553.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-475xx/CVE-2023-47556.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-476xx/CVE-2023-47644.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-476xx/CVE-2023-47649.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-476xx/CVE-2023-47650.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-476xx/CVE-2023-47651.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-476xx/CVE-2023-47655.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-476xx/CVE-2023-47664.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-476xx/CVE-2023-47666.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-476xx/CVE-2023-47667.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-476xx/CVE-2023-47670.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-476xx/CVE-2023-47671.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-476xx/CVE-2023-47672.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-476xx/CVE-2023-47685.json | 55 +++++++++++++++++++++ README.md | 32 +++++++++--- 22 files changed, 1081 insertions(+), 8 deletions(-) create mode 100644 CVE-2023/CVE-2023-472xx/CVE-2023-47243.json create mode 100644 CVE-2023/CVE-2023-475xx/CVE-2023-47519.json create mode 100644 CVE-2023/CVE-2023-475xx/CVE-2023-47531.json create mode 100644 CVE-2023/CVE-2023-475xx/CVE-2023-47551.json create mode 100644 CVE-2023/CVE-2023-475xx/CVE-2023-47552.json create mode 100644 CVE-2023/CVE-2023-475xx/CVE-2023-47553.json create mode 100644 CVE-2023/CVE-2023-475xx/CVE-2023-47556.json create mode 100644 CVE-2023/CVE-2023-476xx/CVE-2023-47644.json create mode 100644 CVE-2023/CVE-2023-476xx/CVE-2023-47649.json create mode 100644 CVE-2023/CVE-2023-476xx/CVE-2023-47650.json create mode 100644 CVE-2023/CVE-2023-476xx/CVE-2023-47651.json create mode 100644 CVE-2023/CVE-2023-476xx/CVE-2023-47655.json create mode 100644 CVE-2023/CVE-2023-476xx/CVE-2023-47664.json create mode 100644 CVE-2023/CVE-2023-476xx/CVE-2023-47666.json create mode 100644 CVE-2023/CVE-2023-476xx/CVE-2023-47667.json create mode 100644 CVE-2023/CVE-2023-476xx/CVE-2023-47670.json create mode 100644 CVE-2023/CVE-2023-476xx/CVE-2023-47671.json create mode 100644 CVE-2023/CVE-2023-476xx/CVE-2023-47672.json create mode 100644 CVE-2023/CVE-2023-476xx/CVE-2023-47685.json diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34462.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34462.json index 74602bdd47e..372e391c1bc 100644 --- a/CVE-2023/CVE-2023-344xx/CVE-2023-34462.json +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34462.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34462", "sourceIdentifier": "security-advisories@github.com", "published": "2023-06-22T23:15:09.573", - "lastModified": "2023-08-03T15:15:25.213", + "lastModified": "2023-11-18T21:15:07.830", "vulnStatus": "Modified", "descriptions": [ { @@ -113,6 +113,10 @@ { "url": "https://security.netapp.com/advisory/ntap-20230803-0001/", "source": "security-advisories@github.com" + }, + { + "url": "https://www.debian.org/security/2023/dsa-5558", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json b/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json index 84898649ef4..5fe9f95da51 100644 --- a/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json +++ b/CVE-2023/CVE-2023-444xx/CVE-2023-44487.json @@ -2,7 +2,7 @@ "id": "CVE-2023-44487", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-10T14:15:10.883", - "lastModified": "2023-11-07T05:15:12.430", + "lastModified": "2023-11-18T21:15:07.997", "vulnStatus": "Undergoing Analysis", "cisaExploitAdd": "2023-10-10", "cisaActionDue": "2023-10-31", @@ -2776,6 +2776,10 @@ "url": "https://www.debian.org/security/2023/dsa-5549", "source": "cve@mitre.org" }, + { + "url": "https://www.debian.org/security/2023/dsa-5558", + "source": "cve@mitre.org" + }, { "url": "https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-472xx/CVE-2023-47243.json b/CVE-2023/CVE-2023-472xx/CVE-2023-47243.json new file mode 100644 index 00000000000..40f32d03908 --- /dev/null +++ b/CVE-2023/CVE-2023-472xx/CVE-2023-47243.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47243", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T22:15:07.100", + "lastModified": "2023-11-18T22:15:07.100", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in CodeMShop \ucf54\ub4dc\uc5e0\uc0f5 \ub9c8\uc774\uc0ac\uc774\ud2b8 \u2013 MSHOP MY SITE.This issue affects \ucf54\ub4dc\uc5e0\uc0f5 \ub9c8\uc774\uc0ac\uc774\ud2b8 \u2013 MSHOP MY SITE: from n/a through 1.1.6.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/mshop-mysite/wordpress-mshop-my-site-plugin-1-1-6-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47519.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47519.json new file mode 100644 index 00000000000..8980977b124 --- /dev/null +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47519.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47519", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T22:15:07.297", + "lastModified": "2023-11-18T22:15:07.297", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in WC Product Table WooCommerce Product Table Lite.This issue affects WooCommerce Product Table Lite: from n/a through 2.6.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wc-product-table-lite/wordpress-woocommerce-product-table-lite-plugin-2-6-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47531.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47531.json new file mode 100644 index 00000000000..26062446836 --- /dev/null +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47531.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47531", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T22:15:07.477", + "lastModified": "2023-11-18T22:15:07.477", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in DroitThemes Droit Dark Mode.This issue affects Droit Dark Mode: from n/a through 1.1.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/droit-dark-mode/wordpress-droit-dark-mode-plugin-1-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47551.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47551.json new file mode 100644 index 00000000000..ae885c43e12 --- /dev/null +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47551.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47551", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T22:15:07.670", + "lastModified": "2023-11-18T22:15:07.670", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in RedNao Donations Made Easy \u2013 Smart Donations.This issue affects Donations Made Easy \u2013 Smart Donations: from n/a through 4.0.12.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/smart-donations/wordpress-donations-made-easy-smart-donations-plugin-4-0-12-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47552.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47552.json new file mode 100644 index 00000000000..06857897b9c --- /dev/null +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47552.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47552", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T22:15:07.857", + "lastModified": "2023-11-18T22:15:07.857", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Labib Ahmed Image Hover Effects \u2013 WordPress Plugin.This issue affects Image Hover Effects \u2013 WordPress Plugin: from n/a through 5.5.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/image-hover-effects/wordpress-image-hover-effects-plugin-5-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47553.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47553.json new file mode 100644 index 00000000000..e4a672bd73b --- /dev/null +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47553.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47553", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T22:15:08.037", + "lastModified": "2023-11-18T22:15:08.037", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in User Local Inc UserHeat Plugin.This issue affects UserHeat Plugin: from n/a through 1.1.6.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/userheat/wordpress-userheat-plugin-plugin-1-1-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47556.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47556.json new file mode 100644 index 00000000000..b47787d2547 --- /dev/null +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47556.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47556", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T22:15:08.217", + "lastModified": "2023-11-18T22:15:08.217", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in James Mehorter Device Theme Switcher.This issue affects Device Theme Switcher: from n/a through 3.0.2.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/device-theme-switcher/wordpress-plugin-name-device-theme-switcher-plugin-3-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47644.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47644.json new file mode 100644 index 00000000000..0ffa0c4404b --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47644.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47644", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T22:15:08.403", + "lastModified": "2023-11-18T22:15:08.403", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in profilegrid ProfileGrid \u2013 User Profiles, Memberships, Groups and Communities.This issue affects ProfileGrid \u2013 User Profiles, Memberships, Groups and Communities: from n/a through 5.6.6.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/profilegrid-user-profiles-groups-and-communities/wordpress-profilegrid-plugin-5-6-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47649.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47649.json new file mode 100644 index 00000000000..10c1ea9606e --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47649.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47649", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T22:15:08.583", + "lastModified": "2023-11-18T22:15:08.583", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in PriceListo Best Restaurant Menu by PriceListo.This issue affects Best Restaurant Menu by PriceListo: from n/a through 1.3.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/best-restaurant-menu-by-pricelisto/wordpress-best-restaurant-menu-by-pricelisto-plugin-1-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47650.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47650.json new file mode 100644 index 00000000000..6ba31d90c24 --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47650.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47650", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T22:15:08.760", + "lastModified": "2023-11-18T22:15:08.760", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Peter Sterling Add Local Avatar.This issue affects Add Local Avatar: from n/a through 12.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/add-local-avatar/wordpress-add-local-avatar-plugin-12-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47651.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47651.json new file mode 100644 index 00000000000..6afa7e82887 --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47651.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47651", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T22:15:08.943", + "lastModified": "2023-11-18T22:15:08.943", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Robert Macchi WP Links Page.This issue affects WP Links Page: from n/a through 4.9.4.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-links-page/wordpress-wp-links-page-plugin-4-9-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47655.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47655.json new file mode 100644 index 00000000000..54dcdeeb085 --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47655.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47655", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T22:15:09.130", + "lastModified": "2023-11-18T22:15:09.130", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Marco Milesi ANAC XML Bandi di Gara.This issue affects ANAC XML Bandi di Gara: from n/a through 7.5.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/avcp/wordpress-anac-xml-bandi-di-gara-plugin-7-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47664.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47664.json new file mode 100644 index 00000000000..ef9f685e0e6 --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47664.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47664", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T21:15:08.810", + "lastModified": "2023-11-18T21:15:08.810", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in edward_plainview Plainview Protect Passwords.This issue affects Plainview Protect Passwords: from n/a through 1.4.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/plainview-protect-passwords/wordpress-plainview-protect-passwords-plugin-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47666.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47666.json new file mode 100644 index 00000000000..9d7d315b9c4 --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47666.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47666", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T21:15:09.017", + "lastModified": "2023-11-18T21:15:09.017", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Code Snippets Pro Code Snippets.This issue affects Code Snippets: from n/a through 3.5.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/code-snippets/wordpress-code-snippets-plugin-3-5-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47667.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47667.json new file mode 100644 index 00000000000..d823643a3db --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47667.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47667", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T21:15:09.240", + "lastModified": "2023-11-18T21:15:09.240", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Mammothology WP Full Stripe Free.This issue affects WP Full Stripe Free: from n/a through 1.6.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-full-stripe-free/wordpress-wp-full-stripe-free-plugin-1-6-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47670.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47670.json new file mode 100644 index 00000000000..3905ae32186 --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47670.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47670", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T21:15:09.510", + "lastModified": "2023-11-18T21:15:09.510", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Jongmyoung Kim Korea SNS.This issue affects Korea SNS: from n/a through 1.6.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/korea-sns/wordpress-korea-sns-plugin-1-6-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47671.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47671.json new file mode 100644 index 00000000000..70b8ea7643c --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47671.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47671", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T21:15:09.767", + "lastModified": "2023-11-18T21:15:09.767", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Gopi Ramasamy Vertical scroll recent.This issue affects Vertical scroll recent post: from n/a through 14.0.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/vertical-scroll-recent-post/wordpress-vertical-scroll-recent-post-plugin-14-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47672.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47672.json new file mode 100644 index 00000000000..ad0d9a7ca70 --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47672.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47672", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T21:15:09.960", + "lastModified": "2023-11-18T21:15:09.960", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Swashata WP Category Post List Widget.This issue affects WP Category Post List Widget: from n/a through 2.0.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-category-posts-list/wordpress-wp-category-post-list-widget-plugin-2-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-476xx/CVE-2023-47685.json b/CVE-2023/CVE-2023-476xx/CVE-2023-47685.json new file mode 100644 index 00000000000..7edcc758086 --- /dev/null +++ b/CVE-2023/CVE-2023-476xx/CVE-2023-47685.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-47685", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-18T21:15:10.147", + "lastModified": "2023-11-18T21:15:10.147", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Lukman Nakib Preloader Matrix.This issue affects Preloader Matrix: from n/a through 2.0.1.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/matrix-pre-loader/wordpress-preloader-matrix-plugin-2-0-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index a851c640210..21c3c02aec3 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-18T21:00:18.217805+00:00 +2023-11-18T23:00:17.990878+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-18T19:15:07.903000+00:00 +2023-11-18T22:15:09.130000+00:00 ``` ### Last Data Feed Release @@ -29,20 +29,40 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -231089 +231108 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `19` -* [CVE-2023-48736](CVE-2023/CVE-2023-487xx/CVE-2023-48736.json) (`2023-11-18T19:15:07.903`) +* [CVE-2023-47664](CVE-2023/CVE-2023-476xx/CVE-2023-47664.json) (`2023-11-18T21:15:08.810`) +* [CVE-2023-47666](CVE-2023/CVE-2023-476xx/CVE-2023-47666.json) (`2023-11-18T21:15:09.017`) +* [CVE-2023-47667](CVE-2023/CVE-2023-476xx/CVE-2023-47667.json) (`2023-11-18T21:15:09.240`) +* [CVE-2023-47670](CVE-2023/CVE-2023-476xx/CVE-2023-47670.json) (`2023-11-18T21:15:09.510`) +* [CVE-2023-47671](CVE-2023/CVE-2023-476xx/CVE-2023-47671.json) (`2023-11-18T21:15:09.767`) +* [CVE-2023-47672](CVE-2023/CVE-2023-476xx/CVE-2023-47672.json) (`2023-11-18T21:15:09.960`) +* [CVE-2023-47685](CVE-2023/CVE-2023-476xx/CVE-2023-47685.json) (`2023-11-18T21:15:10.147`) +* [CVE-2023-47243](CVE-2023/CVE-2023-472xx/CVE-2023-47243.json) (`2023-11-18T22:15:07.100`) +* [CVE-2023-47519](CVE-2023/CVE-2023-475xx/CVE-2023-47519.json) (`2023-11-18T22:15:07.297`) +* [CVE-2023-47531](CVE-2023/CVE-2023-475xx/CVE-2023-47531.json) (`2023-11-18T22:15:07.477`) +* [CVE-2023-47551](CVE-2023/CVE-2023-475xx/CVE-2023-47551.json) (`2023-11-18T22:15:07.670`) +* [CVE-2023-47552](CVE-2023/CVE-2023-475xx/CVE-2023-47552.json) (`2023-11-18T22:15:07.857`) +* [CVE-2023-47553](CVE-2023/CVE-2023-475xx/CVE-2023-47553.json) (`2023-11-18T22:15:08.037`) +* [CVE-2023-47556](CVE-2023/CVE-2023-475xx/CVE-2023-47556.json) (`2023-11-18T22:15:08.217`) +* [CVE-2023-47644](CVE-2023/CVE-2023-476xx/CVE-2023-47644.json) (`2023-11-18T22:15:08.403`) +* [CVE-2023-47649](CVE-2023/CVE-2023-476xx/CVE-2023-47649.json) (`2023-11-18T22:15:08.583`) +* [CVE-2023-47650](CVE-2023/CVE-2023-476xx/CVE-2023-47650.json) (`2023-11-18T22:15:08.760`) +* [CVE-2023-47651](CVE-2023/CVE-2023-476xx/CVE-2023-47651.json) (`2023-11-18T22:15:08.943`) +* [CVE-2023-47655](CVE-2023/CVE-2023-476xx/CVE-2023-47655.json) (`2023-11-18T22:15:09.130`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `2` +* [CVE-2023-34462](CVE-2023/CVE-2023-344xx/CVE-2023-34462.json) (`2023-11-18T21:15:07.830`) +* [CVE-2023-44487](CVE-2023/CVE-2023-444xx/CVE-2023-44487.json) (`2023-11-18T21:15:07.997`) ## Download and Usage