From c360832662cd40fe3459ef253fe9d58180ba1a20 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 9 Jun 2023 16:00:30 +0000 Subject: [PATCH] Auto-Update: 2023-06-09T16:00:26.965995+00:00 --- CVE-2016/CVE-2016-150xx/CVE-2016-15032.json | 65 ++++++- CVE-2022/CVE-2022-43xx/CVE-2022-4332.json | 186 +++++++++++++++++++- CVE-2023/CVE-2023-05xx/CVE-2023-0583.json | 62 ++++++- CVE-2023/CVE-2023-05xx/CVE-2023-0584.json | 62 ++++++- CVE-2023/CVE-2023-22xx/CVE-2023-2298.json | 67 ++++++- CVE-2023/CVE-2023-22xx/CVE-2023-2299.json | 67 ++++++- CVE-2023/CVE-2023-261xx/CVE-2023-26130.json | 74 +++++++- CVE-2023/CVE-2023-276xx/CVE-2023-27639.json | 66 ++++++- CVE-2023/CVE-2023-280xx/CVE-2023-28066.json | 51 +++++- CVE-2023/CVE-2023-295xx/CVE-2023-29541.json | 4 +- CVE-2023/CVE-2023-30xx/CVE-2023-3083.json | 56 +++++- CVE-2023/CVE-2023-30xx/CVE-2023-3084.json | 56 +++++- CVE-2023/CVE-2023-337xx/CVE-2023-33754.json | 65 ++++++- CVE-2023/CVE-2023-340xx/CVE-2023-34091.json | 62 ++++++- README.md | 53 ++---- 15 files changed, 902 insertions(+), 94 deletions(-) diff --git a/CVE-2016/CVE-2016-150xx/CVE-2016-15032.json b/CVE-2016/CVE-2016-150xx/CVE-2016-15032.json index 6eae3f871e9..22860dd24b0 100644 --- a/CVE-2016/CVE-2016-150xx/CVE-2016-15032.json +++ b/CVE-2016/CVE-2016-150xx/CVE-2016-15032.json @@ -2,8 +2,8 @@ "id": "CVE-2016-15032", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-02T00:15:09.443", - "lastModified": "2023-06-02T00:38:44.903", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-09T14:03:36.020", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,22 +93,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mh_httpbl_project:mh_httpbl:*:*:*:*:*:typo3:*:*", + "versionEndExcluding": "1.1.8", + "matchCriteriaId": "496EB296-734C-47B9-8E30-9135EAC83E90" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mback2k/mh_httpbl/commit/a754bf306a433a8c18b55e25595593e8f19b9463", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/mback2k/mh_httpbl/releases/tag/mh_httpbl_1.1.8_security", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://vuldb.com/?ctiid.230391", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.230391", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-43xx/CVE-2022-4332.json b/CVE-2022/CVE-2022-43xx/CVE-2022-4332.json index 65273c6fbe3..e4429e1e903 100644 --- a/CVE-2022/CVE-2022-43xx/CVE-2022-4332.json +++ b/CVE-2022/CVE-2022-43xx/CVE-2022-4332.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4332", "sourceIdentifier": "info@cert.vde.com", "published": "2023-06-01T06:15:09.877", - "lastModified": "2023-06-01T13:00:30.717", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-09T15:51:18.877", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -36,8 +36,18 @@ }, "weaknesses": [ { - "source": "info@cert.vde.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "info@cert.vde.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,10 +56,178 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-p_dq6-1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CA59F65-3A20-4E7F-A888-224521DCDAFF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-p_dq6-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "664F4B0C-7EEE-4AAA-9C87-EA6FDAB9B10C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-p_dl6-1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45E23CA6-0DA8-451E-A0A8-48FD794963D9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-p_dl6-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD753ACD-77BF-4F2D-AA06-5083082F9C00" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-p_ds6-0_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7A8BB9E-BF76-475E-8A75-FC6517D07C71" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-p_ds6-0:-:*:*:*:*:*:*:*", + "matchCriteriaId": "59815159-1AF0-4E23-94B1-040312259591" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-c_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9DF00EFE-05D9-48D1-9D32-B0E4E40D14F3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7DE018DD-422E-441D-8096-0AA6DC308A2A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-t3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0BDEAF2-092F-413D-9D16-AAFA484D13AB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-t3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3D74929-4546-441B-8D8D-3E9F0FA7EE7E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sprecher-automation:sprecon-e-tc_ax-3110_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BAA3CF3D-B264-4929-BE7D-97E6415D5208" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sprecher-automation:sprecon-e-tc_ax-3110:-:*:*:*:*:*:*:*", + "matchCriteriaId": "994140F8-2E5C-4CAB-8721-D91F66BCB109" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.sprecher-automation.com/fileadmin/itSecurity/PDF/2022-12_Advisories.pdf", - "source": "info@cert.vde.com" + "source": "info@cert.vde.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0583.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0583.json index f76adb4aeb1..6fcb1fe5140 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0583.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0583.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0583", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T02:15:09.050", - "lastModified": "2023-06-05T13:03:17.903", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-09T15:19:33.683", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -46,14 +76,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vektor-inc:vk_blocks:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.57.0.5", + "matchCriteriaId": "95A67B1B-443E-4B73-97A4-FED30E73A622" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/vk-blocks/trunk/inc/vk-blocks/App/RestAPI/BlockMeta/class-vk-blocks-entrypoint.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/12a94f5b-bc30-4a65-b397-54488c836ec3?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0584.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0584.json index 2a9ed20c604..20805f41ea0 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0584.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0584.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0584", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T02:15:09.120", - "lastModified": "2023-06-05T13:03:17.903", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-09T15:20:24.817", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -46,14 +76,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vektor-inc:vk_blocks:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.57.0.5", + "matchCriteriaId": "95A67B1B-443E-4B73-97A4-FED30E73A622" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/vk-blocks/trunk/inc/vk-blocks/font-awesome/class-vk-blocks-font-awesome-api.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b90b7f6c-df7f-48a5-b283-cf5facbd71e5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2298.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2298.json index 2c61b22a33f..d4395d5269c 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2298.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2298.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2298", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.173", - "lastModified": "2023-06-05T13:03:17.903", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-09T14:01:53.567", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -46,18 +76,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.2.10", + "matchCriteriaId": "49D6D1DC-9F19-4BB2-84AC-59CE9952111D" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/meeting-scheduler-by-vcita/trunk/vcita-api-functions.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7e6a0bf9-4767-4d4c-9a1e-adcb3c7719d9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2299.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2299.json index 64704b582c6..e3dbb8caf3c 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2299.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2299.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2299", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-03T05:15:09.267", - "lastModified": "2023-06-05T13:03:17.903", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-09T14:01:17.650", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -46,18 +76,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.2.10", + "matchCriteriaId": "49D6D1DC-9F19-4BB2-84AC-59CE9952111D" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/meeting-scheduler-by-vcita/trunk/vcita-api-functions.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4855627a-de56-49ee-b0b0-01b9735d8557?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26130.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26130.json index a6ca432a3af..cf14e54f218 100644 --- a/CVE-2023/CVE-2023-261xx/CVE-2023-26130.json +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26130.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26130", "sourceIdentifier": "report@snyk.io", "published": "2023-05-30T05:15:10.640", - "lastModified": "2023-05-30T12:52:56.613", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-09T15:18:21.537", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "report@snyk.io", "type": "Secondary", @@ -34,22 +54,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cpp-httplib_project:cpp-httplib:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.12.4", + "matchCriteriaId": "82D45946-8A73-4582-8C24-7B6F4955A9BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/dellalibera/094aece17a86069a7d27f93c8aba2280", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/yhirose/cpp-httplib/commit/5b397d455d25a391ba346863830c1949627b4d08", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/yhirose/cpp-httplib/releases/tag/v0.12.4", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Release Notes" + ] }, { "url": "https://security.snyk.io/vuln/SNYK-UNMANAGED-YHIROSECPPHTTPLIB-5591194", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27639.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27639.json index 4954d78984e..cc0d5f6455b 100644 --- a/CVE-2023/CVE-2023-276xx/CVE-2023-27639.json +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27639.json @@ -2,19 +2,77 @@ "id": "CVE-2023-27639", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T21:15:09.260", - "lastModified": "2023-06-02T00:07:04.253", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-09T15:48:23.720", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue was discovered in the tshirtecommerce (aka Custom Product Designer) component 2.1.4 for PrestaShop. An HTTP request can be forged with the POST parameter file_name in the tshirtecommerce/ajax.php?type=svg endpoint, to allow a remote attacker to traverse directories on the system in order to open files (without restriction on the extension and path). Only files that can be parsed in XML can be opened. This is exploited in the wild in March 2023." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tshirtecommerce:custom_product_designer:*:*:*:*:*:prestashop:*:*", + "versionEndIncluding": "2.1.4", + "matchCriteriaId": "25A9D470-1B6E-4A27-9D50-C96E5A4E135F" + } + ] + } + ] + } + ], "references": [ { "url": "https://friends-of-presta.github.io/security-advisories/module/2023/03/30/tshirtecommerce_cwe-22.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-280xx/CVE-2023-28066.json b/CVE-2023/CVE-2023-280xx/CVE-2023-28066.json index 5aaee5e0a90..b58d009a9ca 100644 --- a/CVE-2023/CVE-2023-280xx/CVE-2023-28066.json +++ b/CVE-2023/CVE-2023-280xx/CVE-2023-28066.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28066", "sourceIdentifier": "security_alert@emc.com", "published": "2023-06-01T16:15:09.577", - "lastModified": "2023-06-01T17:29:59.710", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-09T15:11:19.580", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -46,10 +66,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:os_recovery_tool:2.2.4013:*:*:*:*:*:*:*", + "matchCriteriaId": "27D7466E-1ADC-4C9C-9AD8-77021108838F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:os_recovery_tool:2.3.7012.0:*:*:*:*:*:*:*", + "matchCriteriaId": "935BB4EC-A154-41EF-A7FB-7804081CF675" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000212575/dsa-2023-147", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29541.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29541.json index b0c10f9d1a0..9921dbbfec7 100644 --- a/CVE-2023/CVE-2023-295xx/CVE-2023-29541.json +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29541.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29541", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:12.697", - "lastModified": "2023-06-09T03:56:16.603", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-06-09T14:13:03.163", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3083.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3083.json index d1a08680c7e..2c8a2e3a1ca 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3083.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3083.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3083", "sourceIdentifier": "security@huntr.dev", "published": "2023-06-03T08:15:08.853", - "lastModified": "2023-06-05T13:03:03.327", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-09T14:21:02.083", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.8 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -46,14 +68,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:teampass:teampass:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.0.9", + "matchCriteriaId": "1FBD6586-DC7F-4FD6-BB8D-9874CCFACB2E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nilsteampassnet/teampass/commit/79731553fa305d45dabb7a227f3074d56d7c94c1", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.dev/bounties/c6b29e46-02e0-43ad-920f-28ac482ea2ab", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3084.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3084.json index 06c42dccab8..eb53de54448 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3084.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3084.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3084", "sourceIdentifier": "security@huntr.dev", "published": "2023-06-03T11:15:20.737", - "lastModified": "2023-06-05T13:03:03.327", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-09T14:01:32.793", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -46,14 +68,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:teampass:teampass:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.0.9", + "matchCriteriaId": "1FBD6586-DC7F-4FD6-BB8D-9874CCFACB2E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nilsteampassnet/teampass/commit/61b9b7d4e33bbaad2cd61a7ee988f9c22298bf1a", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.dev/bounties/4b86b56b-c51b-4be8-8ee4-6e385d1e9e8a", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33754.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33754.json index 080a2a22804..de391af4810 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33754.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33754.json @@ -2,19 +2,76 @@ "id": "CVE-2023-33754", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-01T20:15:09.467", - "lastModified": "2023-06-02T00:07:04.253", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-09T14:21:58.830", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "The captive portal in Inpiazza Cloud WiFi versions prior to v4.2.17 does not enforce limits on the number of attempts for password recovery, allowing attackers to brute force valid user accounts to gain access to login credentials." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:inpiazza:cloud_wifi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.2.17", + "matchCriteriaId": "52E35BA6-25EC-4A10-BF97-06AD7D757B7C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Alkatraz97/CVEs/blob/main/CVE-2023-33754.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-340xx/CVE-2023-34091.json b/CVE-2023/CVE-2023-340xx/CVE-2023-34091.json index 371c137010f..c5f72fae226 100644 --- a/CVE-2023/CVE-2023-340xx/CVE-2023-34091.json +++ b/CVE-2023/CVE-2023-340xx/CVE-2023-34091.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34091", "sourceIdentifier": "security-advisories@github.com", "published": "2023-06-01T17:15:10.873", - "lastModified": "2023-06-01T17:29:59.710", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-09T15:18:11.957", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,14 +76,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nirmata:kyverno:*:*:*:*:*:go:*:*", + "versionEndExcluding": "1.10.0", + "matchCriteriaId": "28CB043D-1AA1-4C06-9A01-0917ED153B5A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/kyverno/kyverno/releases/tag/v1.10.0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/kyverno/kyverno/security/advisories/GHSA-hq4m-4948-64cc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 86acf2599b8..7f26cb8e47c 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-09T14:00:25.922819+00:00 +2023-06-09T16:00:26.965995+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-09T13:59:50.113000+00:00 +2023-06-09T15:51:18.877000+00:00 ``` ### Last Data Feed Release @@ -34,45 +34,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `0` -* [CVE-2023-2261](CVE-2023/CVE-2023-22xx/CVE-2023-2261.json) (`2023-06-09T13:15:09.653`) -* [CVE-2023-2284](CVE-2023/CVE-2023-22xx/CVE-2023-2284.json) (`2023-06-09T13:15:09.767`) -* [CVE-2023-2285](CVE-2023/CVE-2023-22xx/CVE-2023-2285.json) (`2023-06-09T13:15:09.897`) -* [CVE-2023-2286](CVE-2023/CVE-2023-22xx/CVE-2023-2286.json) (`2023-06-09T13:15:10.003`) -* [CVE-2023-3183](CVE-2023/CVE-2023-31xx/CVE-2023-3183.json) (`2023-06-09T13:15:10.087`) -* [CVE-2023-3184](CVE-2023/CVE-2023-31xx/CVE-2023-3184.json) (`2023-06-09T13:15:10.170`) ### CVEs modified in the last Commit -Recently modified CVEs: `115` +Recently modified CVEs: `14` -* [CVE-2023-29403](CVE-2023/CVE-2023-294xx/CVE-2023-29403.json) (`2023-06-09T13:03:48.703`) -* [CVE-2023-29404](CVE-2023/CVE-2023-294xx/CVE-2023-29404.json) (`2023-06-09T13:03:48.703`) -* [CVE-2023-29405](CVE-2023/CVE-2023-294xx/CVE-2023-29405.json) (`2023-06-09T13:03:48.703`) -* [CVE-2023-32750](CVE-2023/CVE-2023-327xx/CVE-2023-32750.json) (`2023-06-09T13:03:48.703`) -* [CVE-2023-32751](CVE-2023/CVE-2023-327xx/CVE-2023-32751.json) (`2023-06-09T13:03:48.703`) -* [CVE-2023-34230](CVE-2023/CVE-2023-342xx/CVE-2023-34230.json) (`2023-06-09T13:03:48.703`) -* [CVE-2023-34232](CVE-2023/CVE-2023-342xx/CVE-2023-34232.json) (`2023-06-09T13:03:48.703`) -* [CVE-2023-34233](CVE-2023/CVE-2023-342xx/CVE-2023-34233.json) (`2023-06-09T13:03:48.703`) -* [CVE-2023-34243](CVE-2023/CVE-2023-342xx/CVE-2023-34243.json) (`2023-06-09T13:03:48.703`) -* [CVE-2023-34112](CVE-2023/CVE-2023-341xx/CVE-2023-34112.json) (`2023-06-09T13:03:48.703`) -* [CVE-2023-3172](CVE-2023/CVE-2023-31xx/CVE-2023-3172.json) (`2023-06-09T13:03:48.703`) -* [CVE-2023-3173](CVE-2023/CVE-2023-31xx/CVE-2023-3173.json) (`2023-06-09T13:03:48.703`) -* [CVE-2023-0291](CVE-2023/CVE-2023-02xx/CVE-2023-0291.json) (`2023-06-09T13:03:48.703`) -* [CVE-2023-3165](CVE-2023/CVE-2023-31xx/CVE-2023-3165.json) (`2023-06-09T13:03:52.847`) -* [CVE-2023-34096](CVE-2023/CVE-2023-340xx/CVE-2023-34096.json) (`2023-06-09T13:03:52.847`) -* [CVE-2023-34958](CVE-2023/CVE-2023-349xx/CVE-2023-34958.json) (`2023-06-09T13:03:52.847`) -* [CVE-2023-34959](CVE-2023/CVE-2023-349xx/CVE-2023-34959.json) (`2023-06-09T13:03:52.847`) -* [CVE-2023-34961](CVE-2023/CVE-2023-349xx/CVE-2023-34961.json) (`2023-06-09T13:03:52.847`) -* [CVE-2023-33965](CVE-2023/CVE-2023-339xx/CVE-2023-33965.json) (`2023-06-09T13:31:46.507`) -* [CVE-2023-28043](CVE-2023/CVE-2023-280xx/CVE-2023-28043.json) (`2023-06-09T13:34:22.607`) -* [CVE-2023-2303](CVE-2023/CVE-2023-23xx/CVE-2023-2303.json) (`2023-06-09T13:43:38.690`) -* [CVE-2023-2302](CVE-2023/CVE-2023-23xx/CVE-2023-2302.json) (`2023-06-09T13:47:46.267`) -* [CVE-2023-2301](CVE-2023/CVE-2023-23xx/CVE-2023-2301.json) (`2023-06-09T13:48:33.113`) -* [CVE-2023-2300](CVE-2023/CVE-2023-23xx/CVE-2023-2300.json) (`2023-06-09T13:59:14.243`) -* [CVE-2023-3086](CVE-2023/CVE-2023-30xx/CVE-2023-3086.json) (`2023-06-09T13:59:50.113`) +* [CVE-2016-15032](CVE-2016/CVE-2016-150xx/CVE-2016-15032.json) (`2023-06-09T14:03:36.020`) +* [CVE-2022-4332](CVE-2022/CVE-2022-43xx/CVE-2022-4332.json) (`2023-06-09T15:51:18.877`) +* [CVE-2023-2299](CVE-2023/CVE-2023-22xx/CVE-2023-2299.json) (`2023-06-09T14:01:17.650`) +* [CVE-2023-3084](CVE-2023/CVE-2023-30xx/CVE-2023-3084.json) (`2023-06-09T14:01:32.793`) +* [CVE-2023-2298](CVE-2023/CVE-2023-22xx/CVE-2023-2298.json) (`2023-06-09T14:01:53.567`) +* [CVE-2023-29541](CVE-2023/CVE-2023-295xx/CVE-2023-29541.json) (`2023-06-09T14:13:03.163`) +* [CVE-2023-3083](CVE-2023/CVE-2023-30xx/CVE-2023-3083.json) (`2023-06-09T14:21:02.083`) +* [CVE-2023-33754](CVE-2023/CVE-2023-337xx/CVE-2023-33754.json) (`2023-06-09T14:21:58.830`) +* [CVE-2023-28066](CVE-2023/CVE-2023-280xx/CVE-2023-28066.json) (`2023-06-09T15:11:19.580`) +* [CVE-2023-34091](CVE-2023/CVE-2023-340xx/CVE-2023-34091.json) (`2023-06-09T15:18:11.957`) +* [CVE-2023-26130](CVE-2023/CVE-2023-261xx/CVE-2023-26130.json) (`2023-06-09T15:18:21.537`) +* [CVE-2023-0583](CVE-2023/CVE-2023-05xx/CVE-2023-0583.json) (`2023-06-09T15:19:33.683`) +* [CVE-2023-0584](CVE-2023/CVE-2023-05xx/CVE-2023-0584.json) (`2023-06-09T15:20:24.817`) +* [CVE-2023-27639](CVE-2023/CVE-2023-276xx/CVE-2023-27639.json) (`2023-06-09T15:48:23.720`) ## Download and Usage