From d438b9a7d939e2ba09c083b07965c1136b7c3a6f Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 6 Sep 2023 10:00:28 +0000 Subject: [PATCH] Auto-Update: 2023-09-06T10:00:25.258972+00:00 --- CVE-2023/CVE-2023-228xx/CVE-2023-22809.json | 6 +- CVE-2023/CVE-2023-294xx/CVE-2023-29441.json | 55 ++++++++++++++++ CVE-2023/CVE-2023-304xx/CVE-2023-30497.json | 55 ++++++++++++++++ CVE-2023/CVE-2023-323xx/CVE-2023-32352.json | 6 +- CVE-2023/CVE-2023-323xx/CVE-2023-32379.json | 6 +- CVE-2023/CVE-2023-323xx/CVE-2023-32390.json | 6 +- CVE-2023/CVE-2023-323xx/CVE-2023-32391.json | 6 +- CVE-2023/CVE-2023-324xx/CVE-2023-32400.json | 6 +- CVE-2023/CVE-2023-324xx/CVE-2023-32404.json | 6 +- CVE-2023/CVE-2023-324xx/CVE-2023-32417.json | 6 +- CVE-2023/CVE-2023-324xx/CVE-2023-32422.json | 6 +- CVE-2023/CVE-2023-324xx/CVE-2023-32425.json | 10 ++- CVE-2023/CVE-2023-324xx/CVE-2023-32428.json | 18 +++++- CVE-2023/CVE-2023-324xx/CVE-2023-32432.json | 18 +++++- CVE-2023/CVE-2023-324xx/CVE-2023-32437.json | 20 +++++- CVE-2023/CVE-2023-33xx/CVE-2023-3374.json | 4 +- CVE-2023/CVE-2023-33xx/CVE-2023-3375.json | 4 +- CVE-2023/CVE-2023-343xx/CVE-2023-34352.json | 18 +++++- CVE-2023/CVE-2023-400xx/CVE-2023-40007.json | 55 ++++++++++++++++ CVE-2023/CVE-2023-403xx/CVE-2023-40328.json | 55 ++++++++++++++++ CVE-2023/CVE-2023-403xx/CVE-2023-40329.json | 55 ++++++++++++++++ CVE-2023/CVE-2023-405xx/CVE-2023-40552.json | 55 ++++++++++++++++ CVE-2023/CVE-2023-405xx/CVE-2023-40553.json | 55 ++++++++++++++++ CVE-2023/CVE-2023-405xx/CVE-2023-40554.json | 55 ++++++++++++++++ CVE-2023/CVE-2023-405xx/CVE-2023-40560.json | 55 ++++++++++++++++ CVE-2023/CVE-2023-406xx/CVE-2023-40601.json | 55 ++++++++++++++++ CVE-2023/CVE-2023-46xx/CVE-2023-4634.json | 71 +++++++++++++++++++++ CVE-2023/CVE-2023-47xx/CVE-2023-4705.json | 15 +++++ README.md | 39 +++++++++-- 29 files changed, 796 insertions(+), 25 deletions(-) create mode 100644 CVE-2023/CVE-2023-294xx/CVE-2023-29441.json create mode 100644 CVE-2023/CVE-2023-304xx/CVE-2023-30497.json create mode 100644 CVE-2023/CVE-2023-400xx/CVE-2023-40007.json create mode 100644 CVE-2023/CVE-2023-403xx/CVE-2023-40328.json create mode 100644 CVE-2023/CVE-2023-403xx/CVE-2023-40329.json create mode 100644 CVE-2023/CVE-2023-405xx/CVE-2023-40552.json create mode 100644 CVE-2023/CVE-2023-405xx/CVE-2023-40553.json create mode 100644 CVE-2023/CVE-2023-405xx/CVE-2023-40554.json create mode 100644 CVE-2023/CVE-2023-405xx/CVE-2023-40560.json create mode 100644 CVE-2023/CVE-2023-406xx/CVE-2023-40601.json create mode 100644 CVE-2023/CVE-2023-46xx/CVE-2023-4634.json create mode 100644 CVE-2023/CVE-2023-47xx/CVE-2023-4705.json diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22809.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22809.json index 387f3c7ee8e..432c782e8b4 100644 --- a/CVE-2023/CVE-2023-228xx/CVE-2023-22809.json +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22809.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22809", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-18T17:15:10.353", - "lastModified": "2023-08-18T17:15:09.867", + "lastModified": "2023-09-06T08:15:42.803", "vulnStatus": "Modified", "descriptions": [ { @@ -167,6 +167,10 @@ "Third Party Advisory" ] }, + { + "url": "https://support.apple.com/kb/HT213758", + "source": "cve@mitre.org" + }, { "url": "https://www.debian.org/security/2023/dsa-5321", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29441.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29441.json new file mode 100644 index 00000000000..976e66e9212 --- /dev/null +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29441.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-29441", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-09-06T08:15:43.077", + "lastModified": "2023-09-06T08:15:43.077", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Robert Heller WebLibrarian plugin <=\u00a03.5.8.1 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/weblibrarian/wordpress-weblibrarian-plugin-3-5-8-1-multiple-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30497.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30497.json new file mode 100644 index 00000000000..c9b1ef9b908 --- /dev/null +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30497.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-30497", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-09-06T09:15:07.707", + "lastModified": "2023-09-06T09:15:07.707", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Simon Chuang WP LINE Notify plugin <=\u00a01.4.4 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-line-notify/wordpress-wordpress-line-notify-plugin-1-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32352.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32352.json index 85454e42413..18d22505005 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32352.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32352.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32352", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:11.427", - "lastModified": "2023-07-27T04:15:23.197", + "lastModified": "2023-09-06T08:15:43.167", "vulnStatus": "Modified", "descriptions": [ { @@ -137,6 +137,10 @@ "Release Notes", "Vendor Advisory" ] + }, + { + "url": "https://support.apple.com/kb/HT213761", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32379.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32379.json index ca44b90234b..9e6e0e98a69 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32379.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32379.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32379", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T02:15:09.120", - "lastModified": "2023-09-06T02:15:09.120", + "lastModified": "2023-09-06T08:15:43.273", "vulnStatus": "Received", "descriptions": [ { @@ -15,6 +15,10 @@ { "url": "https://support.apple.com/en-us/HT213758", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213758", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32390.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32390.json index ff959636653..9ba8d51c143 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32390.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32390.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32390", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:12.510", - "lastModified": "2023-07-27T04:15:28.500", + "lastModified": "2023-09-06T08:15:43.340", "vulnStatus": "Modified", "descriptions": [ { @@ -107,6 +107,10 @@ "Release Notes", "Vendor Advisory" ] + }, + { + "url": "https://support.apple.com/kb/HT213761", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32391.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32391.json index 4b1bc317620..db9050b345a 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32391.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32391.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32391", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:12.557", - "lastModified": "2023-07-27T04:15:28.720", + "lastModified": "2023-09-06T08:15:43.410", "vulnStatus": "Modified", "descriptions": [ { @@ -129,6 +129,10 @@ "Release Notes", "Vendor Advisory" ] + }, + { + "url": "https://support.apple.com/kb/HT213761", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32400.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32400.json index 7f5667e7ec9..626122beb60 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32400.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32400.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32400", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:12.870", - "lastModified": "2023-07-27T01:15:24.803", + "lastModified": "2023-09-06T08:15:43.573", "vulnStatus": "Modified", "descriptions": [ { @@ -107,6 +107,10 @@ "Release Notes", "Vendor Advisory" ] + }, + { + "url": "https://support.apple.com/kb/HT213761", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32404.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32404.json index f4574dcf24c..7a149c648ce 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32404.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32404.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32404", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:13.007", - "lastModified": "2023-07-27T04:15:31.770", + "lastModified": "2023-09-06T08:15:43.653", "vulnStatus": "Modified", "descriptions": [ { @@ -109,6 +109,10 @@ "Release Notes", "Vendor Advisory" ] + }, + { + "url": "https://support.apple.com/kb/HT213761", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32417.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32417.json index 477e03ec571..262efda969f 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32417.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32417.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32417", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:13.497", - "lastModified": "2023-07-27T04:15:36.150", + "lastModified": "2023-09-06T08:15:43.720", "vulnStatus": "Modified", "descriptions": [ { @@ -72,6 +72,10 @@ "Release Notes", "Vendor Advisory" ] + }, + { + "url": "https://support.apple.com/kb/HT213758", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32422.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32422.json index 71c3af5ffeb..b15741e1bb2 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32422.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32422.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32422", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:13.630", - "lastModified": "2023-07-27T04:15:37.567", + "lastModified": "2023-09-06T08:15:43.783", "vulnStatus": "Modified", "descriptions": [ { @@ -107,6 +107,10 @@ "Release Notes", "Vendor Advisory" ] + }, + { + "url": "https://support.apple.com/kb/HT213764", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32425.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32425.json index b2724762f35..24974e2d0f3 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32425.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32425.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32425", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T02:15:09.177", - "lastModified": "2023-09-06T02:15:09.177", + "lastModified": "2023-09-06T08:15:43.850", "vulnStatus": "Received", "descriptions": [ { @@ -19,6 +19,14 @@ { "url": "https://support.apple.com/en-us/HT213764", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213757", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213764", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32428.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32428.json index 621e3787fab..682139fc98f 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32428.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32428.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32428", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T02:15:09.270", - "lastModified": "2023-09-06T02:15:09.270", + "lastModified": "2023-09-06T08:15:43.913", "vulnStatus": "Received", "descriptions": [ { @@ -27,6 +27,22 @@ { "url": "https://support.apple.com/en-us/HT213764", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213757", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213758", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213761", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213764", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32432.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32432.json index a849bb42ed0..e7b48e40757 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32432.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32432.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32432", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T02:15:09.327", - "lastModified": "2023-09-06T02:15:09.327", + "lastModified": "2023-09-06T08:15:43.973", "vulnStatus": "Received", "descriptions": [ { @@ -27,6 +27,22 @@ { "url": "https://support.apple.com/en-us/HT213764", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213757", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213758", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213761", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213764", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32437.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32437.json index 7addb49cad8..98467910d20 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32437.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32437.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32437", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T00:15:15.013", - "lastModified": "2023-08-02T00:43:20.510", - "vulnStatus": "Analyzed", + "lastModified": "2023-09-06T08:15:44.033", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -78,6 +78,22 @@ "Release Notes", "Vendor Advisory" ] + }, + { + "url": "https://support.apple.com/kb/HT213757", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213758", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213761", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213764", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3374.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3374.json index 5d927c8a378..cd00273a7e2 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3374.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3374.json @@ -2,12 +2,12 @@ "id": "CVE-2023-3374", "sourceIdentifier": "cve@usom.gov.tr", "published": "2023-09-05T17:15:09.400", - "lastModified": "2023-09-05T17:31:50.810", + "lastModified": "2023-09-06T08:15:44.193", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Incomplete List of Disallowed Inputs vulnerability in Bookreen allows Privilege Escalation.This issue affects Bookreen: before 3.0.0.\n\n" + "value": "Incomplete List of Disallowed Inputs vulnerability in Unisign Bookreen allows Privilege Escalation.This issue affects Bookreen: before 3.0.0.\n\n" } ], "metrics": { diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3375.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3375.json index c20b4aec32b..a51b9bc51fd 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3375.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3375.json @@ -2,12 +2,12 @@ "id": "CVE-2023-3375", "sourceIdentifier": "cve@usom.gov.tr", "published": "2023-09-05T17:15:09.497", - "lastModified": "2023-09-05T17:31:50.810", + "lastModified": "2023-09-06T08:15:44.287", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Bookreen allows OS Command Injection.This issue affects Bookreen: before 3.0.0.\n\n" + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Unisign Bookreen allows OS Command Injection.This issue affects Bookreen: before 3.0.0.\n\n" } ], "metrics": { diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34352.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34352.json index 5997bb0bd74..fe0d589ed17 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34352.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34352.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34352", "sourceIdentifier": "product-security@apple.com", "published": "2023-09-06T02:15:09.440", - "lastModified": "2023-09-06T02:15:09.440", + "lastModified": "2023-09-06T08:15:44.120", "vulnStatus": "Received", "descriptions": [ { @@ -27,6 +27,22 @@ { "url": "https://support.apple.com/en-us/HT213764", "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213757", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213758", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213761", + "source": "product-security@apple.com" + }, + { + "url": "https://support.apple.com/kb/HT213764", + "source": "product-security@apple.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40007.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40007.json new file mode 100644 index 00000000000..65ef485be31 --- /dev/null +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40007.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-40007", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-09-06T09:15:08.137", + "lastModified": "2023-09-06T09:15:08.137", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ujwol Bastakoti CT Commerce plugin <=\u00a02.0.1 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ct-commerce/wordpress-ct-commerce-plugin-2-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40328.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40328.json new file mode 100644 index 00000000000..8b6db0107e6 --- /dev/null +++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40328.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-40328", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-09-06T09:15:08.243", + "lastModified": "2023-09-06T09:15:08.243", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Carrrot plugin <=\u00a01.1.0 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/carrrot/wordpress-carrot-plugin-1-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40329.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40329.json new file mode 100644 index 00000000000..c8f3e7f9dd6 --- /dev/null +++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40329.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-40329", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-09-06T09:15:08.330", + "lastModified": "2023-09-06T09:15:08.330", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPZest Custom Admin Login Page | WPZest plugin <=\u00a01.2.0 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/custom-admin-login-styler-wpzest/wordpress-custom-admin-login-page-wpzest-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40552.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40552.json new file mode 100644 index 00000000000..f2f50cef2dd --- /dev/null +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40552.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-40552", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-09-06T09:15:08.413", + "lastModified": "2023-09-06T09:15:08.413", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Gurcharan Singh Fitness calculators plugin plugin <=\u00a02.0.7 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/fitness-calculators/wordpress-fitness-calculators-plugin-plugin-2-0-7-cross-site-scripting-xss?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40553.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40553.json new file mode 100644 index 00000000000..d7b2a6b2122 --- /dev/null +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40553.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-40553", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-09-06T09:15:08.507", + "lastModified": "2023-09-06T09:15:08.507", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Plausible.Io Plausible Analytics plugin <=\u00a01.3.3 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/plausible-analytics/wordpress-plausible-analytics-plugin-1-3-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40554.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40554.json new file mode 100644 index 00000000000..48da640a1ef --- /dev/null +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40554.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-40554", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-09-06T09:15:08.587", + "lastModified": "2023-09-06T09:15:08.587", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Blog2Social, Adenion Blog2Social: Social Media Auto Post & Scheduler plugin <=\u00a07.2.0 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/blog2social/wordpress-blog2social-plugin-7-2-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-405xx/CVE-2023-40560.json b/CVE-2023/CVE-2023-405xx/CVE-2023-40560.json new file mode 100644 index 00000000000..0e91459c9bb --- /dev/null +++ b/CVE-2023/CVE-2023-405xx/CVE-2023-40560.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-40560", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-09-06T09:15:08.670", + "lastModified": "2023-09-06T09:15:08.670", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Greg Ross Schedule Posts Calendar plugin <=\u00a05.2 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/schedule-posts-calendar/wordpress-schedule-posts-calendar-plugin-5-2-cross-site-scripting-xss?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40601.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40601.json new file mode 100644 index 00000000000..5e08ae3995b --- /dev/null +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40601.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-40601", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-09-06T09:15:08.753", + "lastModified": "2023-09-06T09:15:08.753", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Estatik Estatik Mortgage Calculator plugin <=\u00a02.0.7 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/estatik-mortgage-calculator/wordpress-mortgage-calculator-estatik-plugin-2-0-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4634.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4634.json new file mode 100644 index 00000000000..444e985f9b9 --- /dev/null +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4634.json @@ -0,0 +1,71 @@ +{ + "id": "CVE-2023-4634", + "sourceIdentifier": "security@wordfence.com", + "published": "2023-09-06T09:15:08.873", + "lastModified": "2023-09-06T09:15:08.873", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Media Library Assistant plugin for WordPress is vulnerable to Local File Inclusion and Remote Code Execution in versions up to, and including, 3.09. This is due to insufficient controls on file paths being supplied to the 'mla_stream_file' parameter from the ~/includes/mla-stream-image.php file, where images are processed via Imagick(). This makes it possible for unauthenticated attackers to supply files via FTP that will make directory lists, local file inclusion, and remote code execution possible." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Patrowl/CVE-2023-4634/", + "source": "security@wordfence.com" + }, + { + "url": "https://packetstormsecurity.com/files/174508/wpmla309-lfiexec.tgz", + "source": "security@wordfence.com" + }, + { + "url": "https://patrowl.io/blog-wordpress-media-library-rce-cve-2023-4634/", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2955933%40media-library-assistant&new=2955933%40media-library-assistant&sfp_email=&sfph_mail=#file4", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/05c68377-feb6-442d-a3a0-1fbc246c7cbf?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4705.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4705.json new file mode 100644 index 00000000000..fedf9eaf117 --- /dev/null +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4705.json @@ -0,0 +1,15 @@ +{ + "id": "CVE-2023-4705", + "sourceIdentifier": "secalert@redhat.com", + "published": "2023-09-06T08:15:44.380", + "lastModified": "2023-09-06T08:15:44.380", + "vulnStatus": "Rejected", + "descriptions": [ + { + "lang": "en", + "value": "** REJECT ** CVE-2023-4705 was wrongly assigned to a bug that was deemed to be a non-security issue by the Linux kernel security team." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/README.md b/README.md index b1c0e39c504..7a933f8e3da 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-09-06T08:00:25.926713+00:00 +2023-09-06T10:00:25.258972+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-09-06T07:15:09.690000+00:00 +2023-09-06T09:15:08.873000+00:00 ``` ### Last Data Feed Release @@ -29,20 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -224316 +224328 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `12` -* [CVE-2023-4779](CVE-2023/CVE-2023-47xx/CVE-2023-4779.json) (`2023-09-06T07:15:09.690`) +* [CVE-2023-29441](CVE-2023/CVE-2023-294xx/CVE-2023-29441.json) (`2023-09-06T08:15:43.077`) +* [CVE-2023-4705](CVE-2023/CVE-2023-47xx/CVE-2023-4705.json) (`2023-09-06T08:15:44.380`) +* [CVE-2023-30497](CVE-2023/CVE-2023-304xx/CVE-2023-30497.json) (`2023-09-06T09:15:07.707`) +* [CVE-2023-40007](CVE-2023/CVE-2023-400xx/CVE-2023-40007.json) (`2023-09-06T09:15:08.137`) +* [CVE-2023-40328](CVE-2023/CVE-2023-403xx/CVE-2023-40328.json) (`2023-09-06T09:15:08.243`) +* [CVE-2023-40329](CVE-2023/CVE-2023-403xx/CVE-2023-40329.json) (`2023-09-06T09:15:08.330`) +* [CVE-2023-40552](CVE-2023/CVE-2023-405xx/CVE-2023-40552.json) (`2023-09-06T09:15:08.413`) +* [CVE-2023-40553](CVE-2023/CVE-2023-405xx/CVE-2023-40553.json) (`2023-09-06T09:15:08.507`) +* [CVE-2023-40554](CVE-2023/CVE-2023-405xx/CVE-2023-40554.json) (`2023-09-06T09:15:08.587`) +* [CVE-2023-40560](CVE-2023/CVE-2023-405xx/CVE-2023-40560.json) (`2023-09-06T09:15:08.670`) +* [CVE-2023-40601](CVE-2023/CVE-2023-406xx/CVE-2023-40601.json) (`2023-09-06T09:15:08.753`) +* [CVE-2023-4634](CVE-2023/CVE-2023-46xx/CVE-2023-4634.json) (`2023-09-06T09:15:08.873`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `16` +* [CVE-2023-22809](CVE-2023/CVE-2023-228xx/CVE-2023-22809.json) (`2023-09-06T08:15:42.803`) +* [CVE-2023-32352](CVE-2023/CVE-2023-323xx/CVE-2023-32352.json) (`2023-09-06T08:15:43.167`) +* [CVE-2023-32379](CVE-2023/CVE-2023-323xx/CVE-2023-32379.json) (`2023-09-06T08:15:43.273`) +* [CVE-2023-32390](CVE-2023/CVE-2023-323xx/CVE-2023-32390.json) (`2023-09-06T08:15:43.340`) +* [CVE-2023-32391](CVE-2023/CVE-2023-323xx/CVE-2023-32391.json) (`2023-09-06T08:15:43.410`) +* [CVE-2023-32400](CVE-2023/CVE-2023-324xx/CVE-2023-32400.json) (`2023-09-06T08:15:43.573`) +* [CVE-2023-32404](CVE-2023/CVE-2023-324xx/CVE-2023-32404.json) (`2023-09-06T08:15:43.653`) +* [CVE-2023-32417](CVE-2023/CVE-2023-324xx/CVE-2023-32417.json) (`2023-09-06T08:15:43.720`) +* [CVE-2023-32422](CVE-2023/CVE-2023-324xx/CVE-2023-32422.json) (`2023-09-06T08:15:43.783`) +* [CVE-2023-32425](CVE-2023/CVE-2023-324xx/CVE-2023-32425.json) (`2023-09-06T08:15:43.850`) +* [CVE-2023-32428](CVE-2023/CVE-2023-324xx/CVE-2023-32428.json) (`2023-09-06T08:15:43.913`) +* [CVE-2023-32432](CVE-2023/CVE-2023-324xx/CVE-2023-32432.json) (`2023-09-06T08:15:43.973`) +* [CVE-2023-32437](CVE-2023/CVE-2023-324xx/CVE-2023-32437.json) (`2023-09-06T08:15:44.033`) +* [CVE-2023-34352](CVE-2023/CVE-2023-343xx/CVE-2023-34352.json) (`2023-09-06T08:15:44.120`) +* [CVE-2023-3374](CVE-2023/CVE-2023-33xx/CVE-2023-3374.json) (`2023-09-06T08:15:44.193`) +* [CVE-2023-3375](CVE-2023/CVE-2023-33xx/CVE-2023-3375.json) (`2023-09-06T08:15:44.287`) ## Download and Usage