From c272a8ab04f4cee92ec0996e9d065a191ed94002 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 28 Jul 2023 06:00:33 +0000 Subject: [PATCH] Auto-Update: 2023-07-28T06:00:30.265497+00:00 --- CVE-2023/CVE-2023-09xx/CVE-2023-0958.json | 143 ++++++++++++++++++++ CVE-2023/CVE-2023-282xx/CVE-2023-28203.json | 20 +++ CVE-2023/CVE-2023-324xx/CVE-2023-32427.json | 20 +++ CVE-2023/CVE-2023-324xx/CVE-2023-32444.json | 28 ++++ CVE-2023/CVE-2023-324xx/CVE-2023-32445.json | 40 ++++++ CVE-2023/CVE-2023-326xx/CVE-2023-32654.json | 20 +++ CVE-2023/CVE-2023-344xx/CVE-2023-34425.json | 40 ++++++ CVE-2023/CVE-2023-364xx/CVE-2023-36495.json | 40 ++++++ CVE-2023/CVE-2023-372xx/CVE-2023-37285.json | 32 +++++ CVE-2023/CVE-2023-384xx/CVE-2023-38408.json | 6 +- CVE-2023/CVE-2023-385xx/CVE-2023-38571.json | 28 ++++ CVE-2023/CVE-2023-385xx/CVE-2023-38590.json | 44 ++++++ CVE-2023/CVE-2023-385xx/CVE-2023-38592.json | 32 +++++ CVE-2023/CVE-2023-385xx/CVE-2023-38598.json | 44 ++++++ CVE-2023/CVE-2023-385xx/CVE-2023-38599.json | 40 ++++++ CVE-2023/CVE-2023-386xx/CVE-2023-38601.json | 28 ++++ CVE-2023/CVE-2023-386xx/CVE-2023-38604.json | 44 ++++++ CVE-2023/CVE-2023-386xx/CVE-2023-38609.json | 20 +++ CVE-2023/CVE-2023-39xx/CVE-2023-3977.json | 143 ++++++++++++++++++++ CVE-2023/CVE-2023-39xx/CVE-2023-3985.json | 88 ++++++++++++ CVE-2023/CVE-2023-39xx/CVE-2023-3986.json | 88 ++++++++++++ README.md | 36 +++-- 22 files changed, 1013 insertions(+), 11 deletions(-) create mode 100644 CVE-2023/CVE-2023-09xx/CVE-2023-0958.json create mode 100644 CVE-2023/CVE-2023-282xx/CVE-2023-28203.json create mode 100644 CVE-2023/CVE-2023-324xx/CVE-2023-32427.json create mode 100644 CVE-2023/CVE-2023-324xx/CVE-2023-32444.json create mode 100644 CVE-2023/CVE-2023-324xx/CVE-2023-32445.json create mode 100644 CVE-2023/CVE-2023-326xx/CVE-2023-32654.json create mode 100644 CVE-2023/CVE-2023-344xx/CVE-2023-34425.json create mode 100644 CVE-2023/CVE-2023-364xx/CVE-2023-36495.json create mode 100644 CVE-2023/CVE-2023-372xx/CVE-2023-37285.json create mode 100644 CVE-2023/CVE-2023-385xx/CVE-2023-38571.json create mode 100644 CVE-2023/CVE-2023-385xx/CVE-2023-38590.json create mode 100644 CVE-2023/CVE-2023-385xx/CVE-2023-38592.json create mode 100644 CVE-2023/CVE-2023-385xx/CVE-2023-38598.json create mode 100644 CVE-2023/CVE-2023-385xx/CVE-2023-38599.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38601.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38604.json create mode 100644 CVE-2023/CVE-2023-386xx/CVE-2023-38609.json create mode 100644 CVE-2023/CVE-2023-39xx/CVE-2023-3977.json create mode 100644 CVE-2023/CVE-2023-39xx/CVE-2023-3985.json create mode 100644 CVE-2023/CVE-2023-39xx/CVE-2023-3986.json diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0958.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0958.json new file mode 100644 index 00000000000..98a88964b82 --- /dev/null +++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0958.json @@ -0,0 +1,143 @@ +{ + "id": "CVE-2023-0958", + "sourceIdentifier": "security@wordfence.com", + "published": "2023-07-28T05:15:09.597", + "lastModified": "2023-07-28T05:15:09.597", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Several plugins for WordPress by Inisev are vulnerable to unauthorized installation of plugins due to a missing capability check on the handle_installation function that is called via the inisev_installation AJAX aciton in various versions. This makes it possible for authenticated attackers with minimal permissions, such as subscribers, to install select plugins from Inisev on vulnerable sites. CVE-2023-38514 appears to be a duplicate of this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.2.7/includes/banner/misc.php#L427", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.2.8/includes/banner/misc.php#L434", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/copy-delete-posts/tags/1.3.8/banner/misc.php#L426", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/copy-delete-posts/tags/1.4.0/banner/misc.php#L434", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/enhanced-text-widget/tags/1.5.6/banner/misc.php#L339", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/enhanced-text-widget/tags/1.5.7/banner/misc.php#L351", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/feedburner-alternative-and-rss-redirect/tags/3.7/modules/banner/misc.php#L427", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/http-https-remover/tags/3.2.3/banner/misc.php#L427", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/pop-up-pop-up/tags/1.1.9/modules/banner/misc.php#L427", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/pop-up-pop-up/tags/1.2.0/modules/banner/misc.php#L432", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/redirect-redirection/tags/1.1.3/includes/banner/misc.php#L427", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-posts-widget/tags/2.2.4/banner/misc.php#L343", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-posts-widget/tags/2.2.5/banner/misc.php#L351", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-social-media-icons/tags/2.8.0/banner/misc.php#L424", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-social-media-icons/tags/2.8.2/banner/misc.php#L434", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-social-media-plus/tags/3.5.7/banner/misc.php#L424", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-clone-by-wp-academy/tags/2.3.7/modules/banner/misc.php#L438", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-clone-by-wp-academy/tags/2.3.8/modules/banner/misc.php#L432", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/2944041/ultimate-social-media-plus/tags/3.5.8/banner/misc.php?old=2823720&old_path=ultimate-social-media-plus%2Ftags%2F3.5.7%2Fbanner%2Fmisc.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?old_path=%2Fcopy-delete-posts%2Ftags%2F1.3.8&old=2923021&new_path=%2Fcopy-delete-posts%2Ftags%2F1.3.9&new=2923021&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2823769%40http-https-remover%2Ftags%2F3.2.3&new=2944114%40http-https-remover%2Ftags%2F3.2.4", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2823770%40feedburner-alternative-and-rss-redirect%2Ftags%2F3.7&new=2944116%40feedburner-alternative-and-rss-redirect%2Ftags%2F3.8#file115", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7bdd0e-f3b3-4be5-8a30-2c6d9cb783a3?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28203.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28203.json new file mode 100644 index 00000000000..59e687aa4ed --- /dev/null +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28203.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-28203", + "sourceIdentifier": "product-security@apple.com", + "published": "2023-07-28T05:15:10.290", + "lastModified": "2023-07-28T05:15:10.290", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved checks. This issue is fixed in Apple Music 4.2.0 for Android. An app may be able to access contacts." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT213833", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32427.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32427.json new file mode 100644 index 00000000000..ffdd9dcbb77 --- /dev/null +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32427.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-32427", + "sourceIdentifier": "product-security@apple.com", + "published": "2023-07-28T05:15:10.350", + "lastModified": "2023-07-28T05:15:10.350", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed by using HTTPS when sending information over the network. This issue is fixed in Apple Music 4.2.0 for Android. An attacker in a privileged network position may be able to intercept network traffic." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT213833", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32444.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32444.json new file mode 100644 index 00000000000..4b7bc6370c5 --- /dev/null +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32444.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-32444", + "sourceIdentifier": "product-security@apple.com", + "published": "2023-07-28T05:15:10.403", + "lastModified": "2023-07-28T05:15:10.403", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved validation. This issue is fixed in macOS Big Sur 11.7.9, macOS Monterey 12.6.8, macOS Ventura 13.5. A sandboxed process may be able to circumvent sandbox restrictions." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213845", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32445.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32445.json new file mode 100644 index 00000000000..565622b3def --- /dev/null +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32445.json @@ -0,0 +1,40 @@ +{ + "id": "CVE-2023-32445", + "sourceIdentifier": "product-security@apple.com", + "published": "2023-07-28T05:15:10.460", + "lastModified": "2023-07-28T05:15:10.460", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved checks. This issue is fixed in Safari 16.6, watchOS 9.6, iOS 15.7.8 and iPadOS 15.7.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. Processing a document may lead to a cross site scripting attack." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT213841", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213846", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213847", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213848", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32654.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32654.json new file mode 100644 index 00000000000..9ddebc70169 --- /dev/null +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32654.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-32654", + "sourceIdentifier": "product-security@apple.com", + "published": "2023-07-28T05:15:10.517", + "lastModified": "2023-07-28T05:15:10.517", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved state management. This issue is fixed in macOS Ventura 13.5. A user may be able to read information belonging to another user." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT213843", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34425.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34425.json new file mode 100644 index 00000000000..d4a015b614e --- /dev/null +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34425.json @@ -0,0 +1,40 @@ +{ + "id": "CVE-2023-34425", + "sourceIdentifier": "product-security@apple.com", + "published": "2023-07-28T05:15:10.577", + "lastModified": "2023-07-28T05:15:10.577", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The issue was addressed with improved memory handling. This issue is fixed in watchOS 9.6, macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, macOS Big Sur 11.7.9, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT213841", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213845", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213848", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36495.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36495.json new file mode 100644 index 00000000000..2b5321791b4 --- /dev/null +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36495.json @@ -0,0 +1,40 @@ +{ + "id": "CVE-2023-36495", + "sourceIdentifier": "product-security@apple.com", + "published": "2023-07-28T05:15:10.637", + "lastModified": "2023-07-28T05:15:10.637", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An integer overflow was addressed with improved input validation. This issue is fixed in watchOS 9.6, macOS Monterey 12.6.8, iOS 15.7.8 and iPadOS 15.7.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT213841", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213846", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213848", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-372xx/CVE-2023-37285.json b/CVE-2023/CVE-2023-372xx/CVE-2023-37285.json new file mode 100644 index 00000000000..ac5224fff53 --- /dev/null +++ b/CVE-2023/CVE-2023-372xx/CVE-2023-37285.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-37285", + "sourceIdentifier": "product-security@apple.com", + "published": "2023-07-28T05:15:10.690", + "lastModified": "2023-07-28T05:15:10.690", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 15.7.8 and iPadOS 15.7.8, macOS Big Sur 11.7.9, macOS Monterey 12.6.8, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213845", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38408.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38408.json index fc9c4a77c44..2faf8cc1d14 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38408.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38408.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38408", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-20T03:15:10.170", - "lastModified": "2023-07-23T03:15:09.820", + "lastModified": "2023-07-28T04:15:10.777", "vulnStatus": "Awaiting Analysis", "descriptions": [ { @@ -40,6 +40,10 @@ "url": "https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca", "source": "cve@mitre.org" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/", + "source": "cve@mitre.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38571.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38571.json new file mode 100644 index 00000000000..208042c6072 --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38571.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-38571", + "sourceIdentifier": "product-security@apple.com", + "published": "2023-07-28T05:15:10.743", + "lastModified": "2023-07-28T05:15:10.743", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Big Sur 11.7.9, macOS Monterey 12.6.8, macOS Ventura 13.5. An app may be able to bypass Privacy preferences." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213845", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38590.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38590.json new file mode 100644 index 00000000000..b03cc9ae507 --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38590.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2023-38590", + "sourceIdentifier": "product-security@apple.com", + "published": "2023-07-28T05:15:10.810", + "lastModified": "2023-07-28T05:15:10.810", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in watchOS 9.6, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Monterey 12.6.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. A remote user may be able to cause unexpected system termination or corrupt kernel memory." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT213841", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213845", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213846", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213848", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38592.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38592.json new file mode 100644 index 00000000000..d92182821ca --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38592.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-38592", + "sourceIdentifier": "product-security@apple.com", + "published": "2023-07-28T05:15:10.873", + "lastModified": "2023-07-28T05:15:10.873", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, watchOS 9.6, tvOS 16.6, macOS Ventura 13.5. Processing web content may lead to arbitrary code execution." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT213841", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213846", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213848", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38598.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38598.json new file mode 100644 index 00000000000..5a13ae144a0 --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38598.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2023-38598", + "sourceIdentifier": "product-security@apple.com", + "published": "2023-07-28T05:15:10.937", + "lastModified": "2023-07-28T05:15:10.937", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.6, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Monterey 12.6.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT213841", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213845", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213846", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213848", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38599.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38599.json new file mode 100644 index 00000000000..1190a337ae2 --- /dev/null +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38599.json @@ -0,0 +1,40 @@ +{ + "id": "CVE-2023-38599", + "sourceIdentifier": "product-security@apple.com", + "published": "2023-07-28T05:15:10.997", + "lastModified": "2023-07-28T05:15:10.997", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A logic issue was addressed with improved state management. This issue is fixed in Safari 16.6, watchOS 9.6, iOS 15.7.8 and iPadOS 15.7.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. A website may be able to track sensitive user information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT213841", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213846", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213847", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213848", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38601.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38601.json new file mode 100644 index 00000000000..84db64803fd --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38601.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-38601", + "sourceIdentifier": "product-security@apple.com", + "published": "2023-07-28T05:15:11.050", + "lastModified": "2023-07-28T05:15:11.050", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Big Sur 11.7.9, macOS Monterey 12.6.8, macOS Ventura 13.5. An app may be able to modify protected parts of the file system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213845", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38604.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38604.json new file mode 100644 index 00000000000..529d80567ab --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38604.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2023-38604", + "sourceIdentifier": "product-security@apple.com", + "published": "2023-07-28T05:15:11.097", + "lastModified": "2023-07-28T05:15:11.097", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in watchOS 9.6, macOS Big Sur 11.7.9, iOS 15.7.8 and iPadOS 15.7.8, macOS Monterey 12.6.8, tvOS 16.6, iOS 16.6 and iPadOS 16.6, macOS Ventura 13.5. An app may be able to execute arbitrary code with kernel privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT213841", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213842", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213843", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213844", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213845", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213846", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/en-us/HT213848", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38609.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38609.json new file mode 100644 index 00000000000..3978dfc666f --- /dev/null +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38609.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-38609", + "sourceIdentifier": "product-security@apple.com", + "published": "2023-07-28T05:15:11.150", + "lastModified": "2023-07-28T05:15:11.150", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An injection issue was addressed with improved input validation. This issue is fixed in macOS Ventura 13.5. An app may be able to bypass certain Privacy preferences." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.apple.com/en-us/HT213843", + "source": "product-security@apple.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3977.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3977.json new file mode 100644 index 00000000000..35a73a478c7 --- /dev/null +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3977.json @@ -0,0 +1,143 @@ +{ + "id": "CVE-2023-3977", + "sourceIdentifier": "security@wordfence.com", + "published": "2023-07-28T05:15:11.200", + "lastModified": "2023-07-28T05:15:11.200", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Several plugins for WordPress by Inisev are vulnerable to Cross-Site Request Forgery to unauthorized installation of plugins due to a missing nonce check on the handle_installation function that is called via the inisev_installation AJAX aciton in various versions. This makes it possible for unauthenticated attackers to install plugins from the limited list via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.2.7/includes/banner/misc.php#L427", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.2.8/includes/banner/misc.php#L434", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/copy-delete-posts/tags/1.3.8/banner/misc.php#L426", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/copy-delete-posts/tags/1.4.0/banner/misc.php#L434", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/enhanced-text-widget/tags/1.5.6/banner/misc.php#L339", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/enhanced-text-widget/tags/1.5.7/banner/misc.php#L351", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/feedburner-alternative-and-rss-redirect/tags/3.7/modules/banner/misc.php#L427", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/http-https-remover/tags/3.2.3/banner/misc.php#L427", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/pop-up-pop-up/tags/1.1.9/modules/banner/misc.php#L427", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/pop-up-pop-up/tags/1.2.0/modules/banner/misc.php#L432", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/redirect-redirection/tags/1.1.3/includes/banner/misc.php#L427", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-posts-widget/tags/2.2.4/banner/misc.php#L343", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-posts-widget/tags/2.2.5/banner/misc.php#L351", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-social-media-icons/tags/2.8.0/banner/misc.php#L424", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-social-media-icons/tags/2.8.2/banner/misc.php#L434", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/ultimate-social-media-plus/tags/3.5.7/banner/misc.php#L424", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-clone-by-wp-academy/tags/2.3.7/modules/banner/misc.php#L438", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-clone-by-wp-academy/tags/2.3.8/modules/banner/misc.php#L432", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/2944041/ultimate-social-media-plus/tags/3.5.8/banner/misc.php?old=2823720&old_path=ultimate-social-media-plus%2Ftags%2F3.5.7%2Fbanner%2Fmisc.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?old_path=%2Fcopy-delete-posts%2Ftags%2F1.3.8&old=2923021&new_path=%2Fcopy-delete-posts%2Ftags%2F1.3.9&new=2923021&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2823769%40http-https-remover%2Ftags%2F3.2.3&new=2944114%40http-https-remover%2Ftags%2F3.2.4", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2823770%40feedburner-alternative-and-rss-redirect%2Ftags%2F3.7&new=2944116%40feedburner-alternative-and-rss-redirect%2Ftags%2F3.8#file115", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab7c8926-c762-49b1-bc97-4b7a2f4f97fc?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3985.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3985.json new file mode 100644 index 00000000000..f3ed5ff78e3 --- /dev/null +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3985.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-3985", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-07-28T05:15:11.307", + "lastModified": "2023-07-28T05:15:11.307", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in SourceCodester Online Jewelry Store 1.0 and classified as critical. This vulnerability affects unknown code of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235606 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/MaxLiu98/Jewelry-Store-System/blob/main/Jewelry%20Store%20System%20login.php%20has%20Sqlinjection.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.235606", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.235606", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3986.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3986.json new file mode 100644 index 00000000000..606b8b7abb9 --- /dev/null +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3986.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-3986", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-07-28T05:15:11.407", + "lastModified": "2023-07-28T05:15:11.407", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Simple Online Mens Salon Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/?page=user/list. The manipulation of the argument First Name/Last Name/Username leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235607." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 3.3 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/draco1725/POC/blob/main/Exploit/Simple%20Online%20Men's%20Salon%20Management%20System/Stored%20XSS", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.235607", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.235607", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 53c714b35d2..ff7684b064f 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-07-28T04:00:27.689294+00:00 +2023-07-28T06:00:30.265497+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-07-28T03:15:09.623000+00:00 +2023-07-28T05:15:11.407000+00:00 ``` ### Last Data Feed Release @@ -29,24 +29,40 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -221184 +221204 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `20` -* [CVE-2022-31454](CVE-2022/CVE-2022-314xx/CVE-2022-31454.json) (`2023-07-28T02:15:10.400`) -* [CVE-2023-38331](CVE-2023/CVE-2023-383xx/CVE-2023-38331.json) (`2023-07-28T02:15:10.497`) -* [CVE-2023-3984](CVE-2023/CVE-2023-39xx/CVE-2023-3984.json) (`2023-07-28T03:15:09.623`) +* [CVE-2023-0958](CVE-2023/CVE-2023-09xx/CVE-2023-0958.json) (`2023-07-28T05:15:09.597`) +* [CVE-2023-28203](CVE-2023/CVE-2023-282xx/CVE-2023-28203.json) (`2023-07-28T05:15:10.290`) +* [CVE-2023-32427](CVE-2023/CVE-2023-324xx/CVE-2023-32427.json) (`2023-07-28T05:15:10.350`) +* [CVE-2023-32444](CVE-2023/CVE-2023-324xx/CVE-2023-32444.json) (`2023-07-28T05:15:10.403`) +* [CVE-2023-32445](CVE-2023/CVE-2023-324xx/CVE-2023-32445.json) (`2023-07-28T05:15:10.460`) +* [CVE-2023-32654](CVE-2023/CVE-2023-326xx/CVE-2023-32654.json) (`2023-07-28T05:15:10.517`) +* [CVE-2023-34425](CVE-2023/CVE-2023-344xx/CVE-2023-34425.json) (`2023-07-28T05:15:10.577`) +* [CVE-2023-36495](CVE-2023/CVE-2023-364xx/CVE-2023-36495.json) (`2023-07-28T05:15:10.637`) +* [CVE-2023-37285](CVE-2023/CVE-2023-372xx/CVE-2023-37285.json) (`2023-07-28T05:15:10.690`) +* [CVE-2023-38571](CVE-2023/CVE-2023-385xx/CVE-2023-38571.json) (`2023-07-28T05:15:10.743`) +* [CVE-2023-38590](CVE-2023/CVE-2023-385xx/CVE-2023-38590.json) (`2023-07-28T05:15:10.810`) +* [CVE-2023-38592](CVE-2023/CVE-2023-385xx/CVE-2023-38592.json) (`2023-07-28T05:15:10.873`) +* [CVE-2023-38598](CVE-2023/CVE-2023-385xx/CVE-2023-38598.json) (`2023-07-28T05:15:10.937`) +* [CVE-2023-38599](CVE-2023/CVE-2023-385xx/CVE-2023-38599.json) (`2023-07-28T05:15:10.997`) +* [CVE-2023-38601](CVE-2023/CVE-2023-386xx/CVE-2023-38601.json) (`2023-07-28T05:15:11.050`) +* [CVE-2023-38604](CVE-2023/CVE-2023-386xx/CVE-2023-38604.json) (`2023-07-28T05:15:11.097`) +* [CVE-2023-38609](CVE-2023/CVE-2023-386xx/CVE-2023-38609.json) (`2023-07-28T05:15:11.150`) +* [CVE-2023-3977](CVE-2023/CVE-2023-39xx/CVE-2023-3977.json) (`2023-07-28T05:15:11.200`) +* [CVE-2023-3985](CVE-2023/CVE-2023-39xx/CVE-2023-3985.json) (`2023-07-28T05:15:11.307`) +* [CVE-2023-3986](CVE-2023/CVE-2023-39xx/CVE-2023-3986.json) (`2023-07-28T05:15:11.407`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `1` -* [CVE-2022-28860](CVE-2022/CVE-2022-288xx/CVE-2022-28860.json) (`2023-07-28T02:15:09.837`) -* [CVE-2022-28861](CVE-2022/CVE-2022-288xx/CVE-2022-28861.json) (`2023-07-28T02:15:10.313`) +* [CVE-2023-38408](CVE-2023/CVE-2023-384xx/CVE-2023-38408.json) (`2023-07-28T04:15:10.777`) ## Download and Usage