Auto-Update: 2024-02-21T23:00:25.482001+00:00

This commit is contained in:
cad-safe-bot 2024-02-21 23:00:29 +00:00
parent cb677de7f6
commit c32086d00b
20 changed files with 484 additions and 122 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2010-3322",
"sourceIdentifier": "cve@mitre.org",
"published": "2010-09-14T17:00:02.400",
"lastModified": "2010-09-14T17:00:02.400",
"lastModified": "2024-02-21T21:08:34.413",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -48,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-264"
"value": "CWE-611"
}
]
}
@ -62,88 +84,10 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4FCFC155-E9C9-4AE3-9CB8-D2244B9E0269"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "368E31F0-E8F2-459E-B78E-EEC3AB544669"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CDCB0EF9-08B5-4B91-876D-2C7CF7880AF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1709D44B-DC91-4BCC-982F-7BE361A09FF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "62042A83-23C7-478A-BE5C-8C66B6FB59C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "FDB5CDED-459E-4AF9-8747-1F58FA1950E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0705659E-3230-4C28-BA56-F1F2E8BEB83A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8FD076DE-EBF4-4829-847A-8B20DD614414"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B16311C2-2BB3-42E3-BFF8-860467C10611"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "07F6F485-280B-408C-A381-76807862785D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "551D7F83-61DD-4333-86ED-B1D38659B76E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "43BD38F5-B7C6-4CE9-A1B0-1E201CD0979E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6B16A56F-EACF-47AC-B541-2D865CC31705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C96B57A4-D586-444B-BD14-311AEBC40C00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "335BA0E8-428B-4163-A809-90BEE79A7395"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1AE5B6A8-FB1E-4C0A-AC53-C0ABABE595C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:splunk:splunk:4.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AE95A88B-F94B-4B3C-B0FC-0202E9E70FC5"
"criteria": "cpe:2.3:a:splunk:splunk:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0",
"versionEndIncluding": "4.1.4",
"matchCriteriaId": "8E3F8A4B-A6D8-4784-9C8F-F1706AB743C2"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-25644",
"sourceIdentifier": "secalert@redhat.com",
"published": "2020-10-06T14:15:12.760",
"lastModified": "2022-11-07T19:54:08.847",
"lastModified": "2024-02-21T21:08:54.470",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -115,8 +115,8 @@
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:jboss_data_grid:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB93575-124B-4385-B230-EF14EA8D3EAA"
"criteria": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD354E32-A8B0-484C-B4C6-9FBCD3430D2D"
},
{
"vulnerable": true,

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-39155",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-08-24T23:15:07.093",
"lastModified": "2021-08-31T19:35:53.257",
"lastModified": "2024-02-21T21:01:31.320",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -91,6 +91,10 @@
{
"lang": "en",
"value": "CWE-178"
},
{
"lang": "en",
"value": "CWE-863"
}
]
},

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-24330",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T21:15:08.503",
"lastModified": "2024-02-21T21:15:08.503",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Command Injection vulnerability in D-Link Dir 882 with firmware version DIR882A1_FW130B06 allows attackers to run arbitrary commands via crafted POST request to /HNAP1/."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/caoyebo/CVE/tree/main/dlink%20882%20-%20CVE-2023-24330",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-24331",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T21:15:08.567",
"lastModified": "2024-02-21T21:15:08.567",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Command Injection vulnerability in D-Link Dir 816 with firmware version DIR-816_A2_v1.10CNB04 allows attackers to run arbitrary commands via the urlAdd parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/caoyebo/CVE/tree/main/Dlink%20816%20-%20CVE-2023-24331",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-24332",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T21:15:08.617",
"lastModified": "2024-02-21T21:15:08.617",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stack overflow vulnerability in Tenda AC6 with firmware version US_AC6V5.0re_V03.03.02.01_cn_TDC01 allows attackers to run arbitrary commands via crafted POST request to /goform/PowerSaveSet."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/caoyebo/CVE/tree/main/Tenda%20AC6%20-%20CVE-2023-24332",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-24333",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T21:15:08.673",
"lastModified": "2024-02-21T21:15:08.673",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stack overflow vulnerability in Tenda AC21 with firmware version US_AC21V1.0re_V16.03.08.15_cn_TDC01 allows attackers to run arbitrary commands via crafted POST request to /goform/openSchedWifi."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/caoyebo/CVE/tree/main/TENDA%20AC21%20-%20CVE-2023-24333",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-24334",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T21:15:08.723",
"lastModified": "2024-02-21T21:15:08.723",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A stack overflow vulnerability in Tenda AC23 with firmware version US_AC23V1.0re_V16.03.07.45_cn_TDC01 allows attackers to run arbitrary commands via schedStartTime parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/caoyebo/CVE/tree/main/TENDA%20AC23%20-%20CVE-2023-24334",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-37177",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T21:15:08.773",
"lastModified": "2024-02-21T21:15:08.773",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in PMB Services PMB v.7.4.7 and before allows a remote unauthenticated attacker to execute arbitrary code via the query parameter in the /admin/convert/export_z3950.php endpoint."
}
],
"metrics": {},
"references": [
{
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-38844",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T21:15:08.840",
"lastModified": "2024-02-21T21:15:08.840",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in PMB v.7.4.7 and earlier allows a remote attacker to execute arbitrary code via the thesaurus parameter in export_skos.php."
}
],
"metrics": {},
"references": [
{
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42503",
"sourceIdentifier": "security@apache.org",
"published": "2023-09-14T08:15:08.057",
"lastModified": "2023-10-20T15:15:12.170",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-02-21T21:27:10.477",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -40,8 +40,18 @@
},
"weaknesses": [
{
"source": "security@apache.org",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -85,7 +95,10 @@
},
{
"url": "https://security.netapp.com/advisory/ntap-20231020-0003/",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44981",
"sourceIdentifier": "security@apache.org",
"published": "2023-10-11T12:15:11.760",
"lastModified": "2023-11-01T07:15:09.027",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-02-21T21:10:46.910",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -78,6 +78,31 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
}
]
}
]
}
],
"references": [
@ -99,11 +124,18 @@
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00029.html",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5544",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-51828",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T22:15:48.960",
"lastModified": "2024-02-21T22:15:48.960",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A SQL Injection vulnerability in /admin/convert/export.class.php in PMB 7.4.7 and earlier versions allows remote unauthenticated attackers to execute arbitrary SQL commands via the query parameter in get_next_notice function."
}
],
"metrics": {},
"references": [
{
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-52153",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T22:15:49.023",
"lastModified": "2024-02-21T22:15:49.023",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A SQL Injection vulnerability in /pmb/opac_css/includes/sessions.inc.php in PMB 7.4.7 and earlier allows remote unauthenticated attackers to inject arbitrary SQL commands via the PmbOpac-LOGIN cookie value."
}
],
"metrics": {},
"references": [
{
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-52154",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T22:15:49.073",
"lastModified": "2024-02-21T22:15:49.073",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "File Upload vulnerability in pmb/camera_upload.php in PMB 7.4.7 and earlier allows attackers to run arbitrary code via upload of crafted PHTML files."
}
],
"metrics": {},
"references": [
{
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-52155",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T22:15:49.117",
"lastModified": "2024-02-21T22:15:49.117",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A SQL Injection vulnerability in /admin/sauvegarde/run.php in PMB 7.4.7 and earlier allows remote authenticated attackers to execute arbitrary SQL commands via the sauvegardes variable through the /admin/sauvegarde/run.php endpoint."
}
],
"metrics": {},
"references": [
{
"url": "https://nexacybersecurity.blogspot.com/2024/02/journey-finding-vulnerabilities-in-pmb-library-management-system.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0822",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-25T16:15:08.743",
"lastModified": "2024-02-08T13:15:08.643",
"lastModified": "2024-02-21T21:15:08.900",
"vulnStatus": "Modified",
"descriptions": [
{
@ -98,6 +98,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:0934",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-0822",
"source": "secalert@redhat.com",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2024-23654",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-21T21:15:09.060",
"lastModified": "2024-02-21T21:15:09.060",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "discourse-ai is the AI plugin for the open-source discussion platform Discourse. Prior to commit 94ba0dadc2cf38e8f81c3936974c167219878edd, interactions with different AI services are vulnerable to admin-initiated SSRF attacks. Versions of the plugin that include commit 94ba0dadc2cf38e8f81c3936974c167219878edd contain a patch. As a workaround, one may disable the discourse-ai plugin.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/discourse/discourse-ai/commit/94ba0dadc2cf38e8f81c3936974c167219878edd",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/discourse/discourse-ai/security/advisories/GHSA-32cj-rm2q-22cc",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,87 @@
{
"id": "CVE-2024-25124",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-21T21:15:09.250",
"lastModified": "2024-02-21T21:15:09.250",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Fiber is a web framework written in go. Prior to version 2.52.1, the CORS middleware allows for insecure configurations that could potentially expose the application to multiple CORS-related vulnerabilities. Specifically, it allows setting the Access-Control-Allow-Origin header to a wildcard (`*`) while also having the Access-Control-Allow-Credentials set to true, which goes against recommended security best practices. The impact of this misconfiguration is high as it can lead to unauthorized access to sensitive user data and expose the system to various types of attacks listed in the PortSwigger article linked in the references. Version 2.52.1 contains a patch for this issue. As a workaround, users may manually validate the CORS configurations in their implementation to ensure that they do not allow a wildcard origin when credentials are enabled. The browser fetch api, as well as browsers and utilities that enforce CORS policies, are not affected by this."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 9.4,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-346"
},
{
"lang": "en",
"value": "CWE-942"
}
]
}
],
"references": [
{
"url": "http://blog.portswigger.net/2016/10/exploiting-cors-misconfigurations-for.html",
"source": "security-advisories@github.com"
},
{
"url": "https://codeql.github.com/codeql-query-help/javascript/js-cors-misconfiguration-for-credentials",
"source": "security-advisories@github.com"
},
{
"url": "https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS/Errors/CORSNotSupportingCredentials",
"source": "security-advisories@github.com"
},
{
"url": "https://fetch.spec.whatwg.org/#cors-protocol-and-credentials",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gofiber/fiber/commit/f0cd3b44b086544a37886232d0530601f2406c23",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gofiber/fiber/releases/tag/v2.52.1",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gofiber/fiber/security/advisories/GHSA-fmg4-x8pw-hjhg",
"source": "security-advisories@github.com"
},
{
"url": "https://saturncloud.io/blog/cors-cannot-use-wildcard-in-accesscontrolalloworigin-when-credentials-flag-is-true",
"source": "security-advisories@github.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-21T21:00:24.703311+00:00
2024-02-21T23:00:25.482001+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-21T20:57:31.090000+00:00
2024-02-21T22:15:49.117000+00:00
```
### Last Data Feed Release
@ -29,39 +29,38 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
239143
239156
```
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `13`
* [CVE-2023-50975](CVE-2023/CVE-2023-509xx/CVE-2023-50975.json) (`2024-02-21T19:15:08.373`)
* [CVE-2023-6533](CVE-2023/CVE-2023-65xx/CVE-2023-6533.json) (`2024-02-21T20:15:46.283`)
* [CVE-2023-6640](CVE-2023/CVE-2023-66xx/CVE-2023-6640.json) (`2024-02-21T20:15:46.497`)
* [CVE-2024-1707](CVE-2024/CVE-2024-17xx/CVE-2024-1707.json) (`2024-02-21T19:15:08.453`)
* [CVE-2024-22473](CVE-2024/CVE-2024-224xx/CVE-2024-22473.json) (`2024-02-21T19:15:08.813`)
* [CVE-2024-24476](CVE-2024/CVE-2024-244xx/CVE-2024-24476.json) (`2024-02-21T19:15:09.030`)
* [CVE-2024-24479](CVE-2024/CVE-2024-244xx/CVE-2024-24479.json) (`2024-02-21T19:15:09.077`)
* [CVE-2024-25381](CVE-2024/CVE-2024-253xx/CVE-2024-25381.json) (`2024-02-21T19:15:09.123`)
* [CVE-2024-25249](CVE-2024/CVE-2024-252xx/CVE-2024-25249.json) (`2024-02-21T20:15:46.670`)
* [CVE-2024-25461](CVE-2024/CVE-2024-254xx/CVE-2024-25461.json) (`2024-02-21T20:15:46.727`)
* [CVE-2024-26310](CVE-2024/CVE-2024-263xx/CVE-2024-26310.json) (`2024-02-21T20:15:46.800`)
* [CVE-2024-26311](CVE-2024/CVE-2024-263xx/CVE-2024-26311.json) (`2024-02-21T20:15:46.967`)
* [CVE-2023-24330](CVE-2023/CVE-2023-243xx/CVE-2023-24330.json) (`2024-02-21T21:15:08.503`)
* [CVE-2023-24331](CVE-2023/CVE-2023-243xx/CVE-2023-24331.json) (`2024-02-21T21:15:08.567`)
* [CVE-2023-24332](CVE-2023/CVE-2023-243xx/CVE-2023-24332.json) (`2024-02-21T21:15:08.617`)
* [CVE-2023-24333](CVE-2023/CVE-2023-243xx/CVE-2023-24333.json) (`2024-02-21T21:15:08.673`)
* [CVE-2023-24334](CVE-2023/CVE-2023-243xx/CVE-2023-24334.json) (`2024-02-21T21:15:08.723`)
* [CVE-2023-37177](CVE-2023/CVE-2023-371xx/CVE-2023-37177.json) (`2024-02-21T21:15:08.773`)
* [CVE-2023-38844](CVE-2023/CVE-2023-388xx/CVE-2023-38844.json) (`2024-02-21T21:15:08.840`)
* [CVE-2023-51828](CVE-2023/CVE-2023-518xx/CVE-2023-51828.json) (`2024-02-21T22:15:48.960`)
* [CVE-2023-52153](CVE-2023/CVE-2023-521xx/CVE-2023-52153.json) (`2024-02-21T22:15:49.023`)
* [CVE-2023-52154](CVE-2023/CVE-2023-521xx/CVE-2023-52154.json) (`2024-02-21T22:15:49.073`)
* [CVE-2023-52155](CVE-2023/CVE-2023-521xx/CVE-2023-52155.json) (`2024-02-21T22:15:49.117`)
* [CVE-2024-23654](CVE-2024/CVE-2024-236xx/CVE-2024-23654.json) (`2024-02-21T21:15:09.060`)
* [CVE-2024-25124](CVE-2024/CVE-2024-251xx/CVE-2024-25124.json) (`2024-02-21T21:15:09.250`)
### CVEs modified in the last Commit
Recently modified CVEs: `8`
Recently modified CVEs: `6`
* [CVE-2002-0725](CVE-2002/CVE-2002-07xx/CVE-2002-0725.json) (`2024-02-21T20:38:22.460`)
* [CVE-2020-27833](CVE-2020/CVE-2020-278xx/CVE-2020-27833.json) (`2024-02-21T20:55:45.830`)
* [CVE-2020-3452](CVE-2020/CVE-2020-34xx/CVE-2020-3452.json) (`2024-02-21T20:57:31.090`)
* [CVE-2021-21272](CVE-2021/CVE-2021-212xx/CVE-2021-21272.json) (`2024-02-21T20:39:19.723`)
* [CVE-2023-22392](CVE-2023/CVE-2023-223xx/CVE-2023-22392.json) (`2024-02-21T20:08:50.277`)
* [CVE-2023-4194](CVE-2023/CVE-2023-41xx/CVE-2023-4194.json) (`2024-02-21T20:37:17.953`)
* [CVE-2024-1708](CVE-2024/CVE-2024-17xx/CVE-2024-1708.json) (`2024-02-21T19:15:08.683`)
* [CVE-2024-1709](CVE-2024/CVE-2024-17xx/CVE-2024-1709.json) (`2024-02-21T19:15:08.747`)
* [CVE-2010-3322](CVE-2010/CVE-2010-33xx/CVE-2010-3322.json) (`2024-02-21T21:08:34.413`)
* [CVE-2020-25644](CVE-2020/CVE-2020-256xx/CVE-2020-25644.json) (`2024-02-21T21:08:54.470`)
* [CVE-2021-39155](CVE-2021/CVE-2021-391xx/CVE-2021-39155.json) (`2024-02-21T21:01:31.320`)
* [CVE-2023-44981](CVE-2023/CVE-2023-449xx/CVE-2023-44981.json) (`2024-02-21T21:10:46.910`)
* [CVE-2023-42503](CVE-2023/CVE-2023-425xx/CVE-2023-42503.json) (`2024-02-21T21:27:10.477`)
* [CVE-2024-0822](CVE-2024/CVE-2024-08xx/CVE-2024-0822.json) (`2024-02-21T21:15:08.900`)
## Download and Usage