diff --git a/CVE-2018/CVE-2018-88xx/CVE-2018-8863.json b/CVE-2018/CVE-2018-88xx/CVE-2018-8863.json new file mode 100644 index 00000000000..58c18f24325 --- /dev/null +++ b/CVE-2018/CVE-2018-88xx/CVE-2018-8863.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2018-8863", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2023-11-09T23:15:08.740", + "lastModified": "2023-11-09T23:15:08.740", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The HTTP header in Philips EncoreAnywhere contains data an attacker may be able to use to gain sensitive information.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsma-18-137-02", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31086.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31086.json new file mode 100644 index 00000000000..a218e3e216f --- /dev/null +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31086.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-31086", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-09T23:15:09.000", + "lastModified": "2023-11-09T23:15:09.000", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Igor Benic Simple Giveaways \u2013 Grow your business, email lists and traffic with contests plugin <=\u00a02.46.0 versions." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/giveasap/wordpress-simple-giveaways-plugin-2-45-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31088.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31088.json new file mode 100644 index 00000000000..4fc3e33c48b --- /dev/null +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31088.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-31088", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-09T23:15:09.067", + "lastModified": "2023-11-09T23:15:09.067", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Faraz Quazi Floating Action Button plugin <=\u00a01.2.1 versions." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/floating-action-button/wordpress-floating-action-button-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31093.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31093.json new file mode 100644 index 00000000000..252e98b3d90 --- /dev/null +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31093.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-31093", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-09T23:15:09.167", + "lastModified": "2023-11-09T23:15:09.167", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Chronosly Chronosly Events Calendar plugin <=\u00a02.6.2 versions." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/chronosly-events-calendar/wordpress-chronosly-events-calendar-plugin-2-6-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31235.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31235.json new file mode 100644 index 00000000000..f4f1c10bc02 --- /dev/null +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31235.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-31235", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-09T23:15:09.267", + "lastModified": "2023-11-09T23:15:09.267", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Roland Barker, xnau webdesign Participants Database plugin <=\u00a02.4.9 versions." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/participants-database/wordpress-participants-database-plugin-2-4-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32092.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32092.json new file mode 100644 index 00000000000..b4afed27b25 --- /dev/null +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32092.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-32092", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-09T23:15:09.357", + "lastModified": "2023-11-09T23:15:09.357", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in PeepSo Community by PeepSo \u2013 Social Network, Membership, Registration, User Profiles plugin <=\u00a06.0.9.0 versions." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/peepso-core/wordpress-community-by-peepso-social-network-membership-registration-user-profiles-plugin-6-0-9-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32093.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32093.json new file mode 100644 index 00000000000..b24cc4d77ec --- /dev/null +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32093.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-32093", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-09T23:15:09.447", + "lastModified": "2023-11-09T23:15:09.447", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Criss Swaim TPG Redirect plugin <=\u00a01.0.7 versions." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/tpg-redirect/wordpress-tpg-redirect-plugin-1-0-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32125.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32125.json new file mode 100644 index 00000000000..d258a43db19 --- /dev/null +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32125.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-32125", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-09T23:15:09.540", + "lastModified": "2023-11-09T23:15:09.540", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Daniel Powney Multi Rating plugin <=\u00a05.0.6 versions." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/multi-rating/wordpress-multi-rating-plugin-5-0-6-cross-site-request-forgery-csrf?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32500.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32500.json new file mode 100644 index 00000000000..62be369e1b8 --- /dev/null +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32500.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-32500", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-09T23:15:09.633", + "lastModified": "2023-11-09T23:15:09.633", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in xtemos WoodMart - Multipurpose WooCommerce Theme <=\u00a07.1.1 versions." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/woodmart/wordpress-woodmart-theme-7-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32501.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32501.json new file mode 100644 index 00000000000..aaa8250e396 --- /dev/null +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32501.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-32501", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-09T23:15:09.733", + "lastModified": "2023-11-09T23:15:09.733", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in E4J s.R.L. VikBooking Hotel Booking Engine & PMS plugin <=\u00a01.6.1 versions." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/vikbooking/wordpress-vikbooking-hotel-booking-engine-pms-plugin-1-6-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32502.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32502.json new file mode 100644 index 00000000000..48171f4c3db --- /dev/null +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32502.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-32502", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-09T23:15:09.823", + "lastModified": "2023-11-09T23:15:09.823", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Sybre Waaijer Pro Mime Types \u2013 Manage file media types plugin <=\u00a01.0.7 versions." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/pro-mime-types/wordpress-pro-mime-types-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36014.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36014.json new file mode 100644 index 00000000000..84f0426994d --- /dev/null +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36014.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36014", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-11-10T00:15:08.640", + "lastModified": "2023-11-10T00:15:08.640", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36014", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36024.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36024.json new file mode 100644 index 00000000000..e796e58c6c7 --- /dev/null +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36024.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-36024", + "sourceIdentifier": "secure@microsoft.com", + "published": "2023-11-10T00:15:08.840", + "lastModified": "2023-11-10T00:15:08.840", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36024", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36034.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36034.json index 367516d3553..436ebdbef77 100644 --- a/CVE-2023/CVE-2023-360xx/CVE-2023-36034.json +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36034.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36034", "sourceIdentifier": "secure@microsoft.com", "published": "2023-11-03T01:15:08.047", - "lastModified": "2023-11-03T13:22:51.977", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-11-10T00:15:09.017", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", @@ -21,20 +21,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "LOW", + "integrityImpact": "HIGH", "availabilityImpact": "LOW", - "baseScore": 6.6, - "baseSeverity": "MEDIUM" + "baseScore": 7.3, + "baseSeverity": "HIGH" }, "exploitabilityScore": 1.8, - "impactScore": 4.7 + "impactScore": 5.5 } ] }, diff --git a/README.md b/README.md index e4fde614d28..fac9d81f849 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-09T23:00:18.752024+00:00 +2023-11-10T00:55:14.638776+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-09T22:18:24.930000+00:00 +2023-11-10T00:15:09.017000+00:00 ``` ### Last Data Feed Release @@ -29,57 +29,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -230293 +230306 ``` ### CVEs added in the last Commit -Recently added CVEs: `17` +Recently added CVEs: `13` -* [CVE-2023-32594](CVE-2023/CVE-2023-325xx/CVE-2023-32594.json) (`2023-11-09T21:15:24.090`) -* [CVE-2023-32602](CVE-2023/CVE-2023-326xx/CVE-2023-32602.json) (`2023-11-09T21:15:24.180`) -* [CVE-2023-32739](CVE-2023/CVE-2023-327xx/CVE-2023-32739.json) (`2023-11-09T21:15:24.270`) -* [CVE-2023-32744](CVE-2023/CVE-2023-327xx/CVE-2023-32744.json) (`2023-11-09T21:15:24.370`) -* [CVE-2023-32745](CVE-2023/CVE-2023-327xx/CVE-2023-32745.json) (`2023-11-09T21:15:24.463`) -* [CVE-2023-32794](CVE-2023/CVE-2023-327xx/CVE-2023-32794.json) (`2023-11-09T21:15:24.553`) -* [CVE-2023-34024](CVE-2023/CVE-2023-340xx/CVE-2023-34024.json) (`2023-11-09T21:15:24.647`) -* [CVE-2023-34025](CVE-2023/CVE-2023-340xx/CVE-2023-34025.json) (`2023-11-09T21:15:24.740`) -* [CVE-2023-34031](CVE-2023/CVE-2023-340xx/CVE-2023-34031.json) (`2023-11-09T21:15:24.827`) -* [CVE-2023-4379](CVE-2023/CVE-2023-43xx/CVE-2023-4379.json) (`2023-11-09T21:15:24.930`) -* [CVE-2023-5954](CVE-2023/CVE-2023-59xx/CVE-2023-5954.json) (`2023-11-09T21:15:25.143`) -* [CVE-2023-29975](CVE-2023/CVE-2023-299xx/CVE-2023-29975.json) (`2023-11-09T22:15:10.583`) -* [CVE-2023-32512](CVE-2023/CVE-2023-325xx/CVE-2023-32512.json) (`2023-11-09T22:15:10.633`) -* [CVE-2023-32579](CVE-2023/CVE-2023-325xx/CVE-2023-32579.json) (`2023-11-09T22:15:10.730`) -* [CVE-2023-32587](CVE-2023/CVE-2023-325xx/CVE-2023-32587.json) (`2023-11-09T22:15:10.817`) -* [CVE-2023-32592](CVE-2023/CVE-2023-325xx/CVE-2023-32592.json) (`2023-11-09T22:15:10.900`) -* [CVE-2023-5543](CVE-2023/CVE-2023-55xx/CVE-2023-5543.json) (`2023-11-09T22:15:11.000`) +* [CVE-2018-8863](CVE-2018/CVE-2018-88xx/CVE-2018-8863.json) (`2023-11-09T23:15:08.740`) +* [CVE-2023-31086](CVE-2023/CVE-2023-310xx/CVE-2023-31086.json) (`2023-11-09T23:15:09.000`) +* [CVE-2023-31088](CVE-2023/CVE-2023-310xx/CVE-2023-31088.json) (`2023-11-09T23:15:09.067`) +* [CVE-2023-31093](CVE-2023/CVE-2023-310xx/CVE-2023-31093.json) (`2023-11-09T23:15:09.167`) +* [CVE-2023-31235](CVE-2023/CVE-2023-312xx/CVE-2023-31235.json) (`2023-11-09T23:15:09.267`) +* [CVE-2023-32092](CVE-2023/CVE-2023-320xx/CVE-2023-32092.json) (`2023-11-09T23:15:09.357`) +* [CVE-2023-32093](CVE-2023/CVE-2023-320xx/CVE-2023-32093.json) (`2023-11-09T23:15:09.447`) +* [CVE-2023-32125](CVE-2023/CVE-2023-321xx/CVE-2023-32125.json) (`2023-11-09T23:15:09.540`) +* [CVE-2023-32500](CVE-2023/CVE-2023-325xx/CVE-2023-32500.json) (`2023-11-09T23:15:09.633`) +* [CVE-2023-32501](CVE-2023/CVE-2023-325xx/CVE-2023-32501.json) (`2023-11-09T23:15:09.733`) +* [CVE-2023-32502](CVE-2023/CVE-2023-325xx/CVE-2023-32502.json) (`2023-11-09T23:15:09.823`) +* [CVE-2023-36014](CVE-2023/CVE-2023-360xx/CVE-2023-36014.json) (`2023-11-10T00:15:08.640`) +* [CVE-2023-36024](CVE-2023/CVE-2023-360xx/CVE-2023-36024.json) (`2023-11-10T00:15:08.840`) ### CVEs modified in the last Commit -Recently modified CVEs: `21` +Recently modified CVEs: `1` -* [CVE-2020-28407](CVE-2020/CVE-2020-284xx/CVE-2020-28407.json) (`2023-11-09T21:42:24.177`) -* [CVE-2022-41076](CVE-2022/CVE-2022-410xx/CVE-2022-41076.json) (`2023-11-09T22:15:09.223`) -* [CVE-2022-41089](CVE-2022/CVE-2022-410xx/CVE-2022-41089.json) (`2023-11-09T22:15:09.370`) -* [CVE-2022-41115](CVE-2022/CVE-2022-411xx/CVE-2022-41115.json) (`2023-11-09T22:15:09.610`) -* [CVE-2022-41121](CVE-2022/CVE-2022-411xx/CVE-2022-41121.json) (`2023-11-09T22:15:09.700`) -* [CVE-2022-44689](CVE-2022/CVE-2022-446xx/CVE-2022-44689.json) (`2023-11-09T22:15:10.077`) -* [CVE-2022-44702](CVE-2022/CVE-2022-447xx/CVE-2022-44702.json) (`2023-11-09T22:15:10.273`) -* [CVE-2022-44704](CVE-2022/CVE-2022-447xx/CVE-2022-44704.json) (`2023-11-09T22:15:10.347`) -* [CVE-2022-44708](CVE-2022/CVE-2022-447xx/CVE-2022-44708.json) (`2023-11-09T22:15:10.447`) -* [CVE-2023-5924](CVE-2023/CVE-2023-59xx/CVE-2023-5924.json) (`2023-11-09T21:07:52.570`) -* [CVE-2023-1720](CVE-2023/CVE-2023-17xx/CVE-2023-1720.json) (`2023-11-09T21:12:21.233`) -* [CVE-2023-5923](CVE-2023/CVE-2023-59xx/CVE-2023-5923.json) (`2023-11-09T21:14:25.430`) -* [CVE-2023-46725](CVE-2023/CVE-2023-467xx/CVE-2023-46725.json) (`2023-11-09T21:16:04.827`) -* [CVE-2023-31579](CVE-2023/CVE-2023-315xx/CVE-2023-31579.json) (`2023-11-09T21:17:52.387`) -* [CVE-2023-46954](CVE-2023/CVE-2023-469xx/CVE-2023-46954.json) (`2023-11-09T21:38:55.393`) -* [CVE-2023-36621](CVE-2023/CVE-2023-366xx/CVE-2023-36621.json) (`2023-11-09T21:55:49.257`) -* [CVE-2023-41343](CVE-2023/CVE-2023-413xx/CVE-2023-41343.json) (`2023-11-09T21:59:36.353`) -* [CVE-2023-44271](CVE-2023/CVE-2023-442xx/CVE-2023-44271.json) (`2023-11-09T22:01:30.133`) -* [CVE-2023-43982](CVE-2023/CVE-2023-439xx/CVE-2023-43982.json) (`2023-11-09T22:07:27.420`) -* [CVE-2023-41914](CVE-2023/CVE-2023-419xx/CVE-2023-41914.json) (`2023-11-09T22:11:29.870`) -* [CVE-2023-45360](CVE-2023/CVE-2023-453xx/CVE-2023-45360.json) (`2023-11-09T22:18:24.930`) +* [CVE-2023-36034](CVE-2023/CVE-2023-360xx/CVE-2023-36034.json) (`2023-11-10T00:15:09.017`) ## Download and Usage