Auto-Update: 2023-05-22 04:00:47.051516+00:00

This commit is contained in:
cad-safe-bot 2023-05-22 04:00:50 +00:00
parent 375ba12d9a
commit d409be7c33
26 changed files with 274 additions and 56 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-20176",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-02-06T00:15:12.920",
"lastModified": "2021-06-02T19:29:25.323",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-22T02:15:09.393",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -66,7 +66,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -130,6 +130,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-20241",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-03-09T18:15:14.877",
"lastModified": "2021-03-25T18:40:34.863",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-22T02:15:09.670",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -66,7 +66,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -139,6 +139,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-20243",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-03-09T18:15:15.033",
"lastModified": "2022-01-01T18:02:39.223",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-22T02:15:09.877",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -66,7 +66,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -132,6 +132,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-20244",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-03-09T19:15:12.423",
"lastModified": "2021-03-25T18:45:32.870",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-22T02:15:10.003",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -66,7 +66,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -173,6 +173,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-20245",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-03-09T19:15:12.500",
"lastModified": "2022-01-01T18:02:56.527",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-22T02:15:10.167",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -66,7 +66,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -181,6 +181,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-20246",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-03-09T19:15:12.580",
"lastModified": "2021-03-25T18:46:01.747",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-22T02:15:10.317",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -66,7 +66,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -172,6 +172,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-20309",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-05-11T23:15:08.720",
"lastModified": "2021-12-03T19:32:39.380",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-22T02:15:10.477",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -66,7 +66,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -132,6 +132,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-20312",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-05-11T23:15:08.850",
"lastModified": "2021-12-03T19:32:46.077",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-22T02:15:10.603",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -66,7 +66,7 @@
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -125,6 +125,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-20313",
"sourceIdentifier": "secalert@redhat.com",
"published": "2021-05-11T23:15:08.893",
"lastModified": "2022-10-21T20:01:14.840",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-22T02:15:10.730",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -135,6 +135,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-31239",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-09T02:15:08.907",
"lastModified": "2023-05-16T21:03:51.827",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-22T03:15:09.240",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -72,6 +72,10 @@
"Patch"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/",
"source": "cve@mitre.org"
},
{
"url": "https://www.sqlite.org/cves.html",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-39212",
"sourceIdentifier": "security-advisories@github.com",
"published": "2021-09-13T18:15:23.907",
"lastModified": "2022-08-05T10:58:29.943",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-22T02:15:10.910",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -85,22 +85,22 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
"value": "CWE-668"
}
]
},
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "CWE-362"
}
]
}
@ -154,6 +154,10 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28463",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-08T23:15:17.820",
"lastModified": "2022-05-17T18:07:55.110",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-22T02:15:11.120",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -140,6 +140,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-32545",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-06-16T18:15:10.873",
"lastModified": "2022-06-30T13:40:18.547",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-22T02:15:11.247",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -160,6 +160,10 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-32546",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-06-16T18:15:10.927",
"lastModified": "2022-06-30T17:55:10.310",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-22T02:15:11.357",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -165,6 +165,10 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-32547",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-06-16T18:15:10.983",
"lastModified": "2023-01-24T15:35:48.300",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-22T02:15:11.483",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -150,6 +150,10 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-24805",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-17T18:15:09.177",
"lastModified": "2023-05-19T03:15:08.763",
"lastModified": "2023-05-22T02:15:11.633",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -55,6 +55,10 @@
"url": "https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00021.html",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNCGL2ZTAS2GFF23QFT55UFWIDMI4ZJK/",
"source": "security-advisories@github.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2721",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.160",
"lastModified": "2023-05-18T04:15:10.187",
"lastModified": "2023-05-22T03:15:09.363",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -20,6 +20,10 @@
"url": "https://crbug.com/1444360",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5404",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2722",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.217",
"lastModified": "2023-05-18T04:15:10.263",
"lastModified": "2023-05-22T03:15:09.430",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -20,6 +20,10 @@
"url": "https://crbug.com/1400905",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5404",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2723",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.277",
"lastModified": "2023-05-18T04:15:10.330",
"lastModified": "2023-05-22T03:15:09.487",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -20,6 +20,10 @@
"url": "https://crbug.com/1435166",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5404",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2724",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.327",
"lastModified": "2023-05-18T04:15:10.400",
"lastModified": "2023-05-22T03:15:09.540",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -20,6 +20,10 @@
"url": "https://crbug.com/1433211",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5404",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2725",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.383",
"lastModified": "2023-05-18T04:15:10.463",
"lastModified": "2023-05-22T03:15:09.590",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -20,6 +20,10 @@
"url": "https://crbug.com/1442516",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5404",
"source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2726",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-16T19:15:09.433",
"lastModified": "2023-05-18T04:15:10.530",
"lastModified": "2023-05-22T03:15:09.647",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
@ -20,6 +20,10 @@
"url": "https://crbug.com/1442018",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5404",
"source": "chrome-cve-admin@google.com"

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-33281",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-22T02:15:11.837",
"lastModified": "2023-05-22T02:15:11.837",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The remote keyfob system on Nissan Sylphy Classic 2021 sends the same RF signal for each door-open request, which allows for a replay attack."
}
],
"metrics": {},
"references": [
{
"url": "https://chaos-lab.blogspot.com/2023/05/nissan-sylphy-classic-2021-fixed-code.html",
"source": "cve@mitre.org"
},
{
"url": "https://twitter.com/Kevin2600/status/1658059570806415365",
"source": "cve@mitre.org"
},
{
"url": "https://www.youtube.com/watch?v=GG1utSdYG1k",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-33285",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-22T03:15:09.720",
"lastModified": "2023-05-22T03:15:09.720",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Qt 5.x before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. QDnsLookup has a buffer over-read via a crafted reply from a DNS server."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://codereview.qt-project.org/c/qt/qtbase/+/477644",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-33288",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-22T03:15:09.797",
"lastModified": "2023-05-22T03:15:09.797",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the Linux kernel before 6.2.9. A use-after-free flaw was found in bq24190_remove in drivers/power/supply/bq24190_charger.c. It could allow a local attacker to crash the system due to a race problem."
}
],
"metrics": {},
"references": [
{
"url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9",
"source": "cve@mitre.org"
},
{
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=47c29d69212911f50bdcdd0564b5999a559010d4",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/torvalds/linux/commit/47c29d69212911f50bdcdd0564b5999a559010d4",
"source": "cve@mitre.org"
},
{
"url": "https://lore.kernel.org/all/CAHk-=whcaHLNpb7Mu_QX7ABwPgyRyfW-V8=v4Mv0S22fpjY4JQ@mail.gmail.com/",
"source": "cve@mitre.org"
},
{
"url": "https://lore.kernel.org/lkml/20230309174728.233732-1-zyytlz.wz@163.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-22T02:00:28.809557+00:00
2023-05-22T04:00:47.051516+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-22T01:15:44.333000+00:00
2023-05-22T03:15:09.797000+00:00
```
### Last Data Feed Release
@ -29,21 +29,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
215706
215709
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `3`
* [CVE-2023-32336](CVE-2023/CVE-2023-323xx/CVE-2023-32336.json) (`2023-05-22T01:15:42.787`)
* [CVE-2023-33264](CVE-2023/CVE-2023-332xx/CVE-2023-33264.json) (`2023-05-22T01:15:44.333`)
* [CVE-2023-33281](CVE-2023/CVE-2023-332xx/CVE-2023-33281.json) (`2023-05-22T02:15:11.837`)
* [CVE-2023-33285](CVE-2023/CVE-2023-332xx/CVE-2023-33285.json) (`2023-05-22T03:15:09.720`)
* [CVE-2023-33288](CVE-2023/CVE-2023-332xx/CVE-2023-33288.json) (`2023-05-22T03:15:09.797`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `22`
* [CVE-2021-20176](CVE-2021/CVE-2021-201xx/CVE-2021-20176.json) (`2023-05-22T02:15:09.393`)
* [CVE-2021-20241](CVE-2021/CVE-2021-202xx/CVE-2021-20241.json) (`2023-05-22T02:15:09.670`)
* [CVE-2021-20243](CVE-2021/CVE-2021-202xx/CVE-2021-20243.json) (`2023-05-22T02:15:09.877`)
* [CVE-2021-20244](CVE-2021/CVE-2021-202xx/CVE-2021-20244.json) (`2023-05-22T02:15:10.003`)
* [CVE-2021-20245](CVE-2021/CVE-2021-202xx/CVE-2021-20245.json) (`2023-05-22T02:15:10.167`)
* [CVE-2021-20246](CVE-2021/CVE-2021-202xx/CVE-2021-20246.json) (`2023-05-22T02:15:10.317`)
* [CVE-2021-20309](CVE-2021/CVE-2021-203xx/CVE-2021-20309.json) (`2023-05-22T02:15:10.477`)
* [CVE-2021-20312](CVE-2021/CVE-2021-203xx/CVE-2021-20312.json) (`2023-05-22T02:15:10.603`)
* [CVE-2021-20313](CVE-2021/CVE-2021-203xx/CVE-2021-20313.json) (`2023-05-22T02:15:10.730`)
* [CVE-2021-39212](CVE-2021/CVE-2021-392xx/CVE-2021-39212.json) (`2023-05-22T02:15:10.910`)
* [CVE-2021-31239](CVE-2021/CVE-2021-312xx/CVE-2021-31239.json) (`2023-05-22T03:15:09.240`)
* [CVE-2022-28463](CVE-2022/CVE-2022-284xx/CVE-2022-28463.json) (`2023-05-22T02:15:11.120`)
* [CVE-2022-32545](CVE-2022/CVE-2022-325xx/CVE-2022-32545.json) (`2023-05-22T02:15:11.247`)
* [CVE-2022-32546](CVE-2022/CVE-2022-325xx/CVE-2022-32546.json) (`2023-05-22T02:15:11.357`)
* [CVE-2022-32547](CVE-2022/CVE-2022-325xx/CVE-2022-32547.json) (`2023-05-22T02:15:11.483`)
* [CVE-2023-24805](CVE-2023/CVE-2023-248xx/CVE-2023-24805.json) (`2023-05-22T02:15:11.633`)
* [CVE-2023-2721](CVE-2023/CVE-2023-27xx/CVE-2023-2721.json) (`2023-05-22T03:15:09.363`)
* [CVE-2023-2722](CVE-2023/CVE-2023-27xx/CVE-2023-2722.json) (`2023-05-22T03:15:09.430`)
* [CVE-2023-2723](CVE-2023/CVE-2023-27xx/CVE-2023-2723.json) (`2023-05-22T03:15:09.487`)
* [CVE-2023-2724](CVE-2023/CVE-2023-27xx/CVE-2023-2724.json) (`2023-05-22T03:15:09.540`)
* [CVE-2023-2725](CVE-2023/CVE-2023-27xx/CVE-2023-2725.json) (`2023-05-22T03:15:09.590`)
* [CVE-2023-2726](CVE-2023/CVE-2023-27xx/CVE-2023-2726.json) (`2023-05-22T03:15:09.647`)
## Download and Usage