Auto-Update: 2023-12-14T11:00:18.298653+00:00

This commit is contained in:
cad-safe-bot 2023-12-14 11:00:21 +00:00
parent 3f26f0280f
commit c95e7ad265
26 changed files with 517 additions and 51 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34053",
"sourceIdentifier": "security@vmware.com",
"published": "2023-11-28T09:15:06.960",
"lastModified": "2023-12-04T19:59:51.297",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-14T10:15:07.520",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -90,6 +90,10 @@
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20231214-0007/",
"source": "security@vmware.com"
},
{
"url": "https://spring.io/security/cve-2023-34053",
"source": "security@vmware.com",

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-40627",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.397",
"lastModified": "2023-12-14T09:15:41.397",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A reflected XSS vulnerability was discovered in the LivingWord component for Joomla."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/livingword/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-40628",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.480",
"lastModified": "2023-12-14T09:15:41.480",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A reflected XSS vulnerability was discovered in the Extplorer component for Joomla."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/extplorer/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-40629",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.550",
"lastModified": "2023-12-14T09:15:41.550",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQLi vulnerability in LMS Lite component for Joomla."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/lms-lite/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-40630",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.630",
"lastModified": "2023-12-14T09:15:41.630",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Unauthenticated LFI/SSRF in JCDashboards component for Joomla."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/jcdashboards/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-40655",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.707",
"lastModified": "2023-12-14T09:15:41.707",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A reflected XSS vulnerability was discovered in the Proforms Basic component for Joomla."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/proforms-basic/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-40656",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.780",
"lastModified": "2023-12-14T09:15:41.780",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A reflected XSS vulnerability was discovered in the Quickform component for Joomla."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/quickform/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-40657",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.850",
"lastModified": "2023-12-14T09:15:41.850",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A reflected XSS vulnerability was discovered in the Joomdoc component for Joomla."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/joomdoc/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-40658",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.920",
"lastModified": "2023-12-14T09:15:41.920",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A reflected XSS vulnerability was discovered in the Clicky Analytics Dashboard module for Joomla."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://deconf.com/clicky-analytics-dashboard-joomla/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-40659",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:41.993",
"lastModified": "2023-12-14T09:15:41.993",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A reflected XSS vulnerability was discovered in the Easy Quick Contact module for Joomla."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/contacts-and-feedback/contact-forms/easy-quick-contact/",
"source": "security@joomla.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41164",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T05:15:29.447",
"lastModified": "2023-11-13T15:32:53.353",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-14T10:15:07.630",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -121,6 +121,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231214-0002/",
"source": "cve@mitre.org"
},
{
"url": "https://www.djangoproject.com/weblog/2023/sep/04/security-releases/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41268",
"sourceIdentifier": "PSIRT@samsung.com",
"published": "2023-12-06T04:15:07.773",
"lastModified": "2023-12-11T18:39:45.353",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-14T10:15:07.723",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -41,8 +41,8 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
@ -50,10 +50,10 @@
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.0,
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-45283",
"sourceIdentifier": "security@golang.org",
"published": "2023-11-09T17:15:08.757",
"lastModified": "2023-12-06T17:15:07.233",
"lastModified": "2023-12-14T10:15:07.947",
"vulnStatus": "Modified",
"descriptions": [
{
@ -136,6 +136,10 @@
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231214-0008/",
"source": "security@golang.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-46348",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T09:15:42.060",
"lastModified": "2023-12-14T09:15:42.060",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL njection vulnerability in SunnyToo sturls before version 1.1.13, allows attackers to escalate privileges and obtain sensitive information via StUrls::hookActionDispatcher and StUrls::getInstanceId methods."
}
],
"metrics": {},
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2023/12/07/sturls.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46589",
"sourceIdentifier": "security@apache.org",
"published": "2023-11-28T16:15:06.943",
"lastModified": "2023-12-13T21:26:23.650",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-14T10:15:08.053",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -152,6 +152,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231214-0009/",
"source": "security@apache.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2023/11/28/2",
"source": "security@apache.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46695",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T06:15:08.000",
"lastModified": "2023-11-09T17:58:25.887",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-14T10:15:08.170",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -98,6 +98,10 @@
"Permissions Required"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231214-0001/",
"source": "cve@mitre.org"
},
{
"url": "https://www.djangoproject.com/weblog/2023/nov/01/security-releases/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46728",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-06T18:15:08.637",
"lastModified": "2023-11-14T20:00:43.180",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-14T10:15:08.277",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -102,6 +102,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231214-0006/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-46750",
"sourceIdentifier": "security@apache.org",
"published": "2023-12-14T09:15:42.107",
"lastModified": "2023-12-14T09:15:42.107",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability when \"form\" authentication is used in Apache Shiro.\nMitigation: Update to Apache Shiro 1.13.0+ or 2.0.0-alpha-4+.\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/hoc9zdyzmmrfj1zhctsvvtx844tcq6w9",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-46848",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-03T08:15:08.117",
"lastModified": "2023-12-13T08:15:50.683",
"lastModified": "2023-12-14T10:15:08.390",
"vulnStatus": "Modified",
"descriptions": [
{
@ -171,6 +171,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231214-0005/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-48925",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-14T09:15:42.193",
"lastModified": "2023-12-14T09:15:42.193",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in Buy Addons bavideotab before version 1.0.6, allows attackers to escalate privileges and obtain sensitive information via the component BaVideoTabSaveVideoModuleFrontController::run()."
}
],
"metrics": {},
"references": [
{
"url": "https://security.friendsofpresta.org/modules/2023/12/07/bavideotab.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-49707",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:42.240",
"lastModified": "2023-12-14T09:15:42.240",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQLi vulnerability in S5 Register module for Joomla."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/s5-register/",
"source": "security@joomla.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-49708",
"sourceIdentifier": "security@joomla.org",
"published": "2023-12-14T09:15:42.310",
"lastModified": "2023-12-14T09:15:42.310",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "SQLi vulnerability in Starshop component for Joomla."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@joomla.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://extensions.joomla.org/extension/starshop/",
"source": "security@joomla.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-50164",
"sourceIdentifier": "security@apache.org",
"published": "2023-12-07T09:15:07.060",
"lastModified": "2023-12-13T17:15:07.290",
"lastModified": "2023-12-14T10:15:08.530",
"vulnStatus": "Modified",
"descriptions": [
{
@ -89,6 +89,10 @@
"Patch"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231214-0010/",
"source": "security@apache.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2023/12/07/1",
"source": "security@apache.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5941",
"sourceIdentifier": "secteam@freebsd.org",
"published": "2023-11-08T09:15:07.847",
"lastModified": "2023-11-16T15:37:21.363",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-14T10:15:08.630",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -170,6 +170,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231214-0004/",
"source": "secteam@freebsd.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5978",
"sourceIdentifier": "secteam@freebsd.org",
"published": "2023-11-08T09:15:07.933",
"lastModified": "2023-11-16T15:17:16.337",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-14T10:15:08.727",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -111,6 +111,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231214-0003/",
"source": "secteam@freebsd.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-12-14T09:00:18.487937+00:00
2023-12-14T11:00:18.298653+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-12-14T08:15:43.187000+00:00
2023-12-14T10:15:08.727000+00:00
```
### Last Data Feed Release
@ -29,42 +29,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
233105
233119
```
### CVEs added in the last Commit
Recently added CVEs: `9`
Recently added CVEs: `14`
* [CVE-2023-25648](CVE-2023/CVE-2023-256xx/CVE-2023-25648.json) (`2023-12-14T07:15:07.180`)
* [CVE-2023-25650](CVE-2023/CVE-2023-256xx/CVE-2023-25650.json) (`2023-12-14T07:15:07.783`)
* [CVE-2023-25651](CVE-2023/CVE-2023-256xx/CVE-2023-25651.json) (`2023-12-14T07:15:08.270`)
* [CVE-2023-48084](CVE-2023/CVE-2023-480xx/CVE-2023-48084.json) (`2023-12-14T07:15:08.890`)
* [CVE-2023-48085](CVE-2023/CVE-2023-480xx/CVE-2023-48085.json) (`2023-12-14T07:15:09.033`)
* [CVE-2023-1904](CVE-2023/CVE-2023-19xx/CVE-2023-1904.json) (`2023-12-14T08:15:36.550`)
* [CVE-2023-25642](CVE-2023/CVE-2023-256xx/CVE-2023-25642.json) (`2023-12-14T08:15:37.717`)
* [CVE-2023-25643](CVE-2023/CVE-2023-256xx/CVE-2023-25643.json) (`2023-12-14T08:15:38.357`)
* [CVE-2023-25644](CVE-2023/CVE-2023-256xx/CVE-2023-25644.json) (`2023-12-14T08:15:38.997`)
* [CVE-2023-40627](CVE-2023/CVE-2023-406xx/CVE-2023-40627.json) (`2023-12-14T09:15:41.397`)
* [CVE-2023-40628](CVE-2023/CVE-2023-406xx/CVE-2023-40628.json) (`2023-12-14T09:15:41.480`)
* [CVE-2023-40629](CVE-2023/CVE-2023-406xx/CVE-2023-40629.json) (`2023-12-14T09:15:41.550`)
* [CVE-2023-40630](CVE-2023/CVE-2023-406xx/CVE-2023-40630.json) (`2023-12-14T09:15:41.630`)
* [CVE-2023-40655](CVE-2023/CVE-2023-406xx/CVE-2023-40655.json) (`2023-12-14T09:15:41.707`)
* [CVE-2023-40656](CVE-2023/CVE-2023-406xx/CVE-2023-40656.json) (`2023-12-14T09:15:41.780`)
* [CVE-2023-40657](CVE-2023/CVE-2023-406xx/CVE-2023-40657.json) (`2023-12-14T09:15:41.850`)
* [CVE-2023-40658](CVE-2023/CVE-2023-406xx/CVE-2023-40658.json) (`2023-12-14T09:15:41.920`)
* [CVE-2023-40659](CVE-2023/CVE-2023-406xx/CVE-2023-40659.json) (`2023-12-14T09:15:41.993`)
* [CVE-2023-46348](CVE-2023/CVE-2023-463xx/CVE-2023-46348.json) (`2023-12-14T09:15:42.060`)
* [CVE-2023-46750](CVE-2023/CVE-2023-467xx/CVE-2023-46750.json) (`2023-12-14T09:15:42.107`)
* [CVE-2023-48925](CVE-2023/CVE-2023-489xx/CVE-2023-48925.json) (`2023-12-14T09:15:42.193`)
* [CVE-2023-49707](CVE-2023/CVE-2023-497xx/CVE-2023-49707.json) (`2023-12-14T09:15:42.240`)
* [CVE-2023-49708](CVE-2023/CVE-2023-497xx/CVE-2023-49708.json) (`2023-12-14T09:15:42.310`)
### CVEs modified in the last Commit
Recently modified CVEs: `14`
Recently modified CVEs: `11`
* [CVE-2023-2247](CVE-2023/CVE-2023-22xx/CVE-2023-2247.json) (`2023-12-14T07:15:08.650`)
* [CVE-2023-40997](CVE-2023/CVE-2023-409xx/CVE-2023-40997.json) (`2023-12-14T08:15:39.727`)
* [CVE-2023-40998](CVE-2023/CVE-2023-409xx/CVE-2023-40998.json) (`2023-12-14T08:15:40.460`)
* [CVE-2023-41627](CVE-2023/CVE-2023-416xx/CVE-2023-41627.json) (`2023-12-14T08:15:40.697`)
* [CVE-2023-46380](CVE-2023/CVE-2023-463xx/CVE-2023-46380.json) (`2023-12-14T08:15:41.037`)
* [CVE-2023-46381](CVE-2023/CVE-2023-463xx/CVE-2023-46381.json) (`2023-12-14T08:15:41.450`)
* [CVE-2023-46382](CVE-2023/CVE-2023-463xx/CVE-2023-46382.json) (`2023-12-14T08:15:41.690`)
* [CVE-2023-46383](CVE-2023/CVE-2023-463xx/CVE-2023-46383.json) (`2023-12-14T08:15:41.873`)
* [CVE-2023-46384](CVE-2023/CVE-2023-463xx/CVE-2023-46384.json) (`2023-12-14T08:15:42.140`)
* [CVE-2023-46385](CVE-2023/CVE-2023-463xx/CVE-2023-46385.json) (`2023-12-14T08:15:42.350`)
* [CVE-2023-46386](CVE-2023/CVE-2023-463xx/CVE-2023-46386.json) (`2023-12-14T08:15:42.550`)
* [CVE-2023-46387](CVE-2023/CVE-2023-463xx/CVE-2023-46387.json) (`2023-12-14T08:15:42.770`)
* [CVE-2023-46388](CVE-2023/CVE-2023-463xx/CVE-2023-46388.json) (`2023-12-14T08:15:42.987`)
* [CVE-2023-46389](CVE-2023/CVE-2023-463xx/CVE-2023-46389.json) (`2023-12-14T08:15:43.187`)
* [CVE-2023-34053](CVE-2023/CVE-2023-340xx/CVE-2023-34053.json) (`2023-12-14T10:15:07.520`)
* [CVE-2023-41164](CVE-2023/CVE-2023-411xx/CVE-2023-41164.json) (`2023-12-14T10:15:07.630`)
* [CVE-2023-41268](CVE-2023/CVE-2023-412xx/CVE-2023-41268.json) (`2023-12-14T10:15:07.723`)
* [CVE-2023-45283](CVE-2023/CVE-2023-452xx/CVE-2023-45283.json) (`2023-12-14T10:15:07.947`)
* [CVE-2023-46589](CVE-2023/CVE-2023-465xx/CVE-2023-46589.json) (`2023-12-14T10:15:08.053`)
* [CVE-2023-46695](CVE-2023/CVE-2023-466xx/CVE-2023-46695.json) (`2023-12-14T10:15:08.170`)
* [CVE-2023-46728](CVE-2023/CVE-2023-467xx/CVE-2023-46728.json) (`2023-12-14T10:15:08.277`)
* [CVE-2023-46848](CVE-2023/CVE-2023-468xx/CVE-2023-46848.json) (`2023-12-14T10:15:08.390`)
* [CVE-2023-50164](CVE-2023/CVE-2023-501xx/CVE-2023-50164.json) (`2023-12-14T10:15:08.530`)
* [CVE-2023-5941](CVE-2023/CVE-2023-59xx/CVE-2023-5941.json) (`2023-12-14T10:15:08.630`)
* [CVE-2023-5978](CVE-2023/CVE-2023-59xx/CVE-2023-5978.json) (`2023-12-14T10:15:08.727`)
## Download and Usage