Auto-Update: 2023-06-26T16:00:25.710327+00:00

This commit is contained in:
cad-safe-bot 2023-06-26 16:00:29 +00:00
parent 7419faa12a
commit cc276a5656
15 changed files with 566 additions and 69 deletions

View File

@ -2,19 +2,87 @@
"id": "CVE-2022-38156",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-12T14:15:17.660",
"lastModified": "2023-06-12T16:20:38.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-26T15:29:57.323",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A remote command injection issues exists in the web server of the Kratos SpectralNet device with SpectralNet Narrowband (NB) before 1.7.5. As an admin user, an attacker can send a crafted password in order to execute Linux commands as the root user."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:kratosdefense:spectralnet_narrowband_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.7.5",
"matchCriteriaId": "E2F5E425-0EBF-4DAD-8AD0-35A4A62123FC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:kratosdefense:spectralnet_narrowband:-:*:*:*:*:*:*:*",
"matchCriteriaId": "323D119B-F21C-4908-BAE4-1BAE4B52324D"
}
]
}
]
}
],
"references": [
{
"url": "https://www.kratosdefense.com/-/media/k/pdf/s/sy/os-011-spectralnet-narrowband.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-25306",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-26T15:15:09.653",
"lastModified": "2023-06-26T15:15:09.653",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "MultiMC Launcher <= 0.6.16 is vulnerable to Directory Traversal."
}
],
"metrics": {},
"references": [
{
"url": "https://quiltmc.org/en/blog/2023-02-04-five-installer-vulnerabilities/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-25307",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-26T15:15:09.703",
"lastModified": "2023-06-26T15:15:09.703",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "nothub mrpack-install <= v0.16.2 is vulnerable to Directory Traversal."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/nothub/mrpack-install/security/advisories/GHSA-r887-gfxh-m9rr",
"source": "cve@mitre.org"
},
{
"url": "https://quiltmc.org/en/blog/2023-02-04-five-installer-vulnerabilities/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2778",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2023-06-13T21:15:10.103",
"lastModified": "2023-06-13T21:27:45.680",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-26T14:05:00.940",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
},
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
@ -46,10 +76,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:factorytalk_transaction_manager:*:*:*:*:*:*:*:*",
"versionEndIncluding": "13.10",
"matchCriteriaId": "F257388C-3757-4714-9E3F-358FDC5C6C67"
}
]
}
]
}
],
"references": [
{
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139744",
"source": "PSIRT@rockwellautomation.com"
"source": "PSIRT@rockwellautomation.com",
"tags": [
"Permissions Required",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2827",
"sourceIdentifier": "cna@sap.com",
"published": "2023-06-13T03:15:09.223",
"lastModified": "2023-06-13T13:00:53.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-26T14:08:41.080",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
},
{
"source": "cna@sap.com",
"type": "Secondary",
@ -46,14 +66,42 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "AND",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:digital_manufacturing:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3358F9F1-5AAD-4A1E-BDAA-553FE88BD2CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:plant_connectivity:15.5:*:*:*:*:*:*:*",
"matchCriteriaId": "963D048A-4A27-4E52-BFDE-EB954C569751"
}
]
}
]
}
],
"references": [
{
"url": "https://launchpad.support.sap.com/#/notes/3301942",
"source": "cna@sap.com"
"source": "cna@sap.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"source": "cna@sap.com"
"source": "cna@sap.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29437",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-06-26T13:15:09.493",
"lastModified": "2023-06-26T13:15:09.493",
"vulnStatus": "Received",
"lastModified": "2023-06-26T15:02:18.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29438",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-06-26T13:15:09.560",
"lastModified": "2023-06-26T13:15:09.560",
"vulnStatus": "Received",
"lastModified": "2023-06-26T15:02:18.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-30261",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-26T14:15:10.223",
"lastModified": "2023-06-26T15:02:18.713",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Command Injection vulnerability in OpenWB 1.6 and 1.7 allows remote attackers to run arbitrary commands via crafted GET request."
}
],
"metrics": {},
"references": [
{
"url": "https://eldstal.se/advisories/230329-openwb.html",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/snaptec/openWB/issues/2672",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/snaptec/openWB/pull/2673",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,23 +2,82 @@
"id": "CVE-2023-30453",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-16T16:15:09.313",
"lastModified": "2023-06-16T16:41:02.630",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-26T15:21:14.993",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Teamlead Reminder plugin through 2.6.5 for Jira allows persistent XSS via the message parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:teamlead:reminder:*:*:*:*:*:jira:*:*",
"versionEndIncluding": "2.6.5",
"matchCriteriaId": "867D12C7-B3C4-4927-97C7-80ADA68EEDBF"
}
]
}
]
}
],
"references": [
{
"url": "https://marketplace.atlassian.com/apps/1217030/reminder-for-jira-follow-up-issues?tab=overview&hosting=cloud",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://y-security.de/news-en/reminder-for-jira-cross-site-scripting-cve-2023-30453/index.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32221",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2023-06-12T21:15:22.737",
"lastModified": "2023-06-13T13:00:53.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-26T15:43:42.757",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
@ -34,10 +54,42 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:easeus:todo_backup:20220111.390:*:*:*:*:*:*:*",
"matchCriteriaId": "AF0C89AF-0851-4325-85CB-FDE0D95E25AE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
"source": "cna@cyber.gov.il",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,49 @@
"id": "CVE-2023-3268",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-16T19:15:14.707",
"lastModified": "2023-06-17T02:32:29.473",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-26T15:25:20.910",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An out of bounds (OOB) memory access flaw was found in the Linux kernel in relay_file_read_start_pos in kernel/relay.c in the relayfs. This flaw could allow a local attacker to crash the system or leak kernel internal information."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -23,10 +56,34 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.4",
"matchCriteriaId": "18D12E25-2947-44E7-989D-24450E013A1F"
}
]
}
]
}
],
"references": [
{
"url": "https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc@wangsu.com/T/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Mailing List",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34095",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-06-14T17:15:09.243",
"lastModified": "2023-06-14T21:15:09.707",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-26T15:24:27.403",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,30 +66,90 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openprinting:cpdb-libs:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0",
"versionEndExcluding": "2.0",
"matchCriteriaId": "57F84EB4-6BF2-4AAA-9BC6-F881F046A97B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openprinting:cpdb-libs:2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "367C92BD-4CA9-4024-B9FA-7430236C9F6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openprinting:cpdb-libs:2.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "CED72D06-A6D2-486F-B3FA-6ADA82262C6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openprinting:cpdb-libs:2.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "8545935C-24E9-49F6-8EBE-4D49F2C72F81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openprinting:cpdb-libs:2.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "F7330E46-2ACD-4832-89F9-D0372C9BFF06"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/06/14/7",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://github.com/OpenPrinting/cpdb-libs/blob/85555fba64d34f53a2fce099b0488904cc48ed35/cpdb/cpdb-frontend.c#L372",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/OpenPrinting/cpdb-libs/blob/85555fba64d34f53a2fce099b0488904cc48ed35/tools/cpdb-text-frontend.c#L362",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/OpenPrinting/cpdb-libs/blob/85555fba64d34f53a2fce099b0488904cc48ed35/tools/cpdb-text-frontend.c#L453",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/OpenPrinting/cpdb-libs/commit/f181bd1f14757c2ae0f17cc76dc20421a40f30b7",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/OpenPrinting/cpdb-libs/security/advisories/GHSA-25j7-9gfc-f46x",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34241",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-06-22T23:15:09.493",
"lastModified": "2023-06-23T18:15:13.860",
"lastModified": "2023-06-26T15:15:09.760",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -51,6 +51,10 @@
"url": "http://www.openwall.com/lists/oss-security/2023/06/23/10",
"source": "security-advisories@github.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/06/26/1",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/OpenPrinting/cups/commit/9809947a959e18409dcf562a3466ef246cb90cb2",
"source": "security-advisories@github.com"

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-36301",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-26T15:15:09.853",
"lastModified": "2023-06-26T15:15:09.853",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Talend Data Catalog before 8.0-20230221 contain a directory traversal vulnerability in HeaderImageServlet."
}
],
"metrics": {},
"references": [
{
"url": "https://help.talend.com/r/en-US/Talend-Products-CVEs/Talend-Products-CVEs",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-06-26T14:00:34.416933+00:00
2023-06-26T16:00:25.710327+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-06-26T13:55:12.110000+00:00
2023-06-26T15:43:42.757000+00:00
```
### Last Data Feed Release
@ -29,48 +29,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
218541
218545
```
### CVEs added in the last Commit
Recently added CVEs: `4`
* [CVE-2023-29435](CVE-2023/CVE-2023-294xx/CVE-2023-29435.json) (`2023-06-26T12:15:09.440`)
* [CVE-2023-36631](CVE-2023/CVE-2023-366xx/CVE-2023-36631.json) (`2023-06-26T12:15:09.523`)
* [CVE-2023-29437](CVE-2023/CVE-2023-294xx/CVE-2023-29437.json) (`2023-06-26T13:15:09.493`)
* [CVE-2023-29438](CVE-2023/CVE-2023-294xx/CVE-2023-29438.json) (`2023-06-26T13:15:09.560`)
* [CVE-2023-30261](CVE-2023/CVE-2023-302xx/CVE-2023-30261.json) (`2023-06-26T14:15:10.223`)
* [CVE-2023-25306](CVE-2023/CVE-2023-253xx/CVE-2023-25306.json) (`2023-06-26T15:15:09.653`)
* [CVE-2023-25307](CVE-2023/CVE-2023-253xx/CVE-2023-25307.json) (`2023-06-26T15:15:09.703`)
* [CVE-2023-36301](CVE-2023/CVE-2023-363xx/CVE-2023-36301.json) (`2023-06-26T15:15:09.853`)
### CVEs modified in the last Commit
Recently modified CVEs: `33`
Recently modified CVEs: `10`
* [CVE-2023-29093](CVE-2023/CVE-2023-290xx/CVE-2023-29093.json) (`2023-06-26T13:02:32.107`)
* [CVE-2023-1150](CVE-2023/CVE-2023-11xx/CVE-2023-1150.json) (`2023-06-26T13:02:32.107`)
* [CVE-2023-1619](CVE-2023/CVE-2023-16xx/CVE-2023-1619.json) (`2023-06-26T13:02:32.107`)
* [CVE-2023-1620](CVE-2023/CVE-2023-16xx/CVE-2023-1620.json) (`2023-06-26T13:02:32.107`)
* [CVE-2023-22359](CVE-2023/CVE-2023-223xx/CVE-2023-22359.json) (`2023-06-26T13:02:32.107`)
* [CVE-2023-29423](CVE-2023/CVE-2023-294xx/CVE-2023-29423.json) (`2023-06-26T13:02:32.107`)
* [CVE-2023-29424](CVE-2023/CVE-2023-294xx/CVE-2023-29424.json) (`2023-06-26T13:02:32.107`)
* [CVE-2023-29427](CVE-2023/CVE-2023-294xx/CVE-2023-29427.json) (`2023-06-26T13:02:32.107`)
* [CVE-2023-29434](CVE-2023/CVE-2023-294xx/CVE-2023-29434.json) (`2023-06-26T13:02:32.107`)
* [CVE-2023-29436](CVE-2023/CVE-2023-294xx/CVE-2023-29436.json) (`2023-06-26T13:02:32.107`)
* [CVE-2023-3398](CVE-2023/CVE-2023-33xx/CVE-2023-3398.json) (`2023-06-26T13:02:32.107`)
* [CVE-2023-36612](CVE-2023/CVE-2023-366xx/CVE-2023-36612.json) (`2023-06-26T13:02:36.297`)
* [CVE-2023-36630](CVE-2023/CVE-2023-366xx/CVE-2023-36630.json) (`2023-06-26T13:02:36.297`)
* [CVE-2023-36632](CVE-2023/CVE-2023-366xx/CVE-2023-36632.json) (`2023-06-26T13:02:36.297`)
* [CVE-2023-3396](CVE-2023/CVE-2023-33xx/CVE-2023-3396.json) (`2023-06-26T13:02:36.297`)
* [CVE-2023-36663](CVE-2023/CVE-2023-366xx/CVE-2023-36663.json) (`2023-06-26T13:02:36.297`)
* [CVE-2023-36660](CVE-2023/CVE-2023-366xx/CVE-2023-36660.json) (`2023-06-26T13:02:36.297`)
* [CVE-2023-36661](CVE-2023/CVE-2023-366xx/CVE-2023-36661.json) (`2023-06-26T13:02:36.297`)
* [CVE-2023-36664](CVE-2023/CVE-2023-366xx/CVE-2023-36664.json) (`2023-06-26T13:02:36.297`)
* [CVE-2023-29430](CVE-2023/CVE-2023-294xx/CVE-2023-29430.json) (`2023-06-26T13:15:09.407`)
* [CVE-2023-34797](CVE-2023/CVE-2023-347xx/CVE-2023-34797.json) (`2023-06-26T13:24:20.443`)
* [CVE-2023-34880](CVE-2023/CVE-2023-348xx/CVE-2023-34880.json) (`2023-06-26T13:29:58.467`)
* [CVE-2023-34833](CVE-2023/CVE-2023-348xx/CVE-2023-34833.json) (`2023-06-26T13:44:48.833`)
* [CVE-2023-31746](CVE-2023/CVE-2023-317xx/CVE-2023-31746.json) (`2023-06-26T13:50:53.057`)
* [CVE-2023-32115](CVE-2023/CVE-2023-321xx/CVE-2023-32115.json) (`2023-06-26T13:55:12.110`)
* [CVE-2022-38156](CVE-2022/CVE-2022-381xx/CVE-2022-38156.json) (`2023-06-26T15:29:57.323`)
* [CVE-2023-2778](CVE-2023/CVE-2023-27xx/CVE-2023-2778.json) (`2023-06-26T14:05:00.940`)
* [CVE-2023-2827](CVE-2023/CVE-2023-28xx/CVE-2023-2827.json) (`2023-06-26T14:08:41.080`)
* [CVE-2023-29437](CVE-2023/CVE-2023-294xx/CVE-2023-29437.json) (`2023-06-26T15:02:18.713`)
* [CVE-2023-29438](CVE-2023/CVE-2023-294xx/CVE-2023-29438.json) (`2023-06-26T15:02:18.713`)
* [CVE-2023-34241](CVE-2023/CVE-2023-342xx/CVE-2023-34241.json) (`2023-06-26T15:15:09.760`)
* [CVE-2023-30453](CVE-2023/CVE-2023-304xx/CVE-2023-30453.json) (`2023-06-26T15:21:14.993`)
* [CVE-2023-34095](CVE-2023/CVE-2023-340xx/CVE-2023-34095.json) (`2023-06-26T15:24:27.403`)
* [CVE-2023-3268](CVE-2023/CVE-2023-32xx/CVE-2023-3268.json) (`2023-06-26T15:25:20.910`)
* [CVE-2023-32221](CVE-2023/CVE-2023-322xx/CVE-2023-32221.json) (`2023-06-26T15:43:42.757`)
## Download and Usage