From e4500e065fbe2444c9ef206fd3007e58380bb259 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 24 Jan 2024 07:00:28 +0000 Subject: [PATCH] Auto-Update: 2024-01-24T07:00:25.165948+00:00 --- CVE-2020/CVE-2020-256xx/CVE-2020-25613.json | 6 +++- CVE-2021/CVE-2021-318xx/CVE-2021-31810.json | 6 +++- CVE-2021/CVE-2021-320xx/CVE-2021-32066.json | 8 +++-- CVE-2021/CVE-2021-334xx/CVE-2021-33479.json | 8 +++-- CVE-2021/CVE-2021-334xx/CVE-2021-33480.json | 8 +++-- CVE-2021/CVE-2021-334xx/CVE-2021-33481.json | 8 +++-- CVE-2021/CVE-2021-336xx/CVE-2021-33621.json | 10 ++++++- CVE-2021/CVE-2021-418xx/CVE-2021-41816.json | 6 +++- CVE-2021/CVE-2021-418xx/CVE-2021-41817.json | 6 +++- CVE-2021/CVE-2021-418xx/CVE-2021-41819.json | 6 +++- CVE-2022/CVE-2022-287xx/CVE-2022-28738.json | 8 +++-- CVE-2022/CVE-2022-287xx/CVE-2022-28739.json | 6 +++- CVE-2023/CVE-2023-287xx/CVE-2023-28755.json | 6 +++- CVE-2023/CVE-2023-287xx/CVE-2023-28756.json | 6 +++- CVE-2023/CVE-2023-424xx/CVE-2023-42465.json | 8 +++-- CVE-2024/CVE-2024-223xx/CVE-2024-22366.json | 24 +++++++++++++++ CVE-2024/CVE-2024-223xx/CVE-2024-22372.json | 24 +++++++++++++++ README.md | 33 ++++++++++++++------- 18 files changed, 155 insertions(+), 32 deletions(-) create mode 100644 CVE-2024/CVE-2024-223xx/CVE-2024-22366.json create mode 100644 CVE-2024/CVE-2024-223xx/CVE-2024-22372.json diff --git a/CVE-2020/CVE-2020-256xx/CVE-2020-25613.json b/CVE-2020/CVE-2020-256xx/CVE-2020-25613.json index 66dc788e0e5..9116f3a7d32 100644 --- a/CVE-2020/CVE-2020-256xx/CVE-2020-25613.json +++ b/CVE-2020/CVE-2020-256xx/CVE-2020-25613.json @@ -2,7 +2,7 @@ "id": "CVE-2020-25613", "sourceIdentifier": "cve@mitre.org", "published": "2020-10-06T13:15:13.823", - "lastModified": "2023-11-07T03:20:17.137", + "lastModified": "2024-01-24T05:15:08.827", "vulnStatus": "Modified", "descriptions": [ { @@ -162,6 +162,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTZURYROG3FFED3TYCQOBV66BS4K6WOV/", "source": "cve@mitre.org" }, + { + "url": "https://security.gentoo.org/glsa/202401-27", + "source": "cve@mitre.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20210115-0008/", "source": "cve@mitre.org", diff --git a/CVE-2021/CVE-2021-318xx/CVE-2021-31810.json b/CVE-2021/CVE-2021-318xx/CVE-2021-31810.json index f1f7c5e338f..72046783f4c 100644 --- a/CVE-2021/CVE-2021-318xx/CVE-2021-31810.json +++ b/CVE-2021/CVE-2021-318xx/CVE-2021-31810.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31810", "sourceIdentifier": "cve@mitre.org", "published": "2021-07-13T13:15:09.243", - "lastModified": "2023-11-07T03:35:00.337", + "lastModified": "2024-01-24T05:15:09.683", "vulnStatus": "Modified", "descriptions": [ { @@ -176,6 +176,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/", "source": "cve@mitre.org" }, + { + "url": "https://security.gentoo.org/glsa/202401-27", + "source": "cve@mitre.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20210917-0001/", "source": "cve@mitre.org", diff --git a/CVE-2021/CVE-2021-320xx/CVE-2021-32066.json b/CVE-2021/CVE-2021-320xx/CVE-2021-32066.json index e3208ea6c39..86dacab9b02 100644 --- a/CVE-2021/CVE-2021-320xx/CVE-2021-32066.json +++ b/CVE-2021/CVE-2021-320xx/CVE-2021-32066.json @@ -2,7 +2,7 @@ "id": "CVE-2021-32066", "sourceIdentifier": "cve@mitre.org", "published": "2021-08-01T19:15:07.697", - "lastModified": "2023-04-30T23:15:45.157", + "lastModified": "2024-01-24T05:15:10.040", "vulnStatus": "Modified", "descriptions": [ { @@ -70,7 +70,7 @@ "description": [ { "lang": "en", - "value": "CWE-326" + "value": "CWE-755" } ] } @@ -153,6 +153,10 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html", "source": "cve@mitre.org" }, + { + "url": "https://security.gentoo.org/glsa/202401-27", + "source": "cve@mitre.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20210902-0004/", "source": "cve@mitre.org", diff --git a/CVE-2021/CVE-2021-334xx/CVE-2021-33479.json b/CVE-2021/CVE-2021-334xx/CVE-2021-33479.json index df8414bc2e9..cb0d5751e3a 100644 --- a/CVE-2021/CVE-2021-334xx/CVE-2021-33479.json +++ b/CVE-2021/CVE-2021-334xx/CVE-2021-33479.json @@ -2,8 +2,8 @@ "id": "CVE-2021-33479", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2021-11-17T18:15:07.900", - "lastModified": "2022-12-21T15:01:19.963", - "vulnStatus": "Analyzed", + "lastModified": "2024-01-24T05:15:10.363", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -112,6 +112,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202401-28", + "source": "patrick@puiterwijk.org" + }, { "url": "https://sourceforge.net/p/jocr/bugs/39/", "source": "patrick@puiterwijk.org", diff --git a/CVE-2021/CVE-2021-334xx/CVE-2021-33480.json b/CVE-2021/CVE-2021-334xx/CVE-2021-33480.json index d51785876c3..7823494579a 100644 --- a/CVE-2021/CVE-2021-334xx/CVE-2021-33480.json +++ b/CVE-2021/CVE-2021-334xx/CVE-2021-33480.json @@ -2,8 +2,8 @@ "id": "CVE-2021-33480", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2021-11-17T18:15:07.960", - "lastModified": "2022-12-21T15:01:19.963", - "vulnStatus": "Analyzed", + "lastModified": "2024-01-24T05:15:10.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -112,6 +112,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202401-28", + "source": "patrick@puiterwijk.org" + }, { "url": "https://sourceforge.net/p/jocr/bugs/40/", "source": "patrick@puiterwijk.org", diff --git a/CVE-2021/CVE-2021-334xx/CVE-2021-33481.json b/CVE-2021/CVE-2021-334xx/CVE-2021-33481.json index 5544c548eb1..ffcaba34756 100644 --- a/CVE-2021/CVE-2021-334xx/CVE-2021-33481.json +++ b/CVE-2021/CVE-2021-334xx/CVE-2021-33481.json @@ -2,8 +2,8 @@ "id": "CVE-2021-33481", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2021-11-17T18:15:08.017", - "lastModified": "2022-12-21T15:01:19.963", - "vulnStatus": "Analyzed", + "lastModified": "2024-01-24T05:15:10.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -113,6 +113,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202401-28", + "source": "patrick@puiterwijk.org" + }, { "url": "https://sourceforge.net/p/jocr/bugs/42/", "source": "patrick@puiterwijk.org", diff --git a/CVE-2021/CVE-2021-336xx/CVE-2021-33621.json b/CVE-2021/CVE-2021-336xx/CVE-2021-33621.json index 4fcf25dcda0..8dcdc140f64 100644 --- a/CVE-2021/CVE-2021-336xx/CVE-2021-33621.json +++ b/CVE-2021/CVE-2021-336xx/CVE-2021-33621.json @@ -2,12 +2,16 @@ "id": "CVE-2021-33621", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T23:15:18.987", - "lastModified": "2023-11-07T03:35:53.323", + "lastModified": "2024-01-24T05:15:10.787", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object." + }, + { + "lang": "es", + "value": "La gema cgi anterior a 0.1.0.2, 0.2.x anterior a 0.2.2 y 0.3.x anterior a 0.3.5 para Ruby permite la divisi\u00f3n de respuestas HTTP. Esto es relevante para aplicaciones que utilizan entradas de usuarios que no son de confianza, ya sea para generar una respuesta HTTP o para crear un objeto CGI::Cookie." } ], "metrics": { @@ -151,6 +155,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YACE6ORF2QBXXBK2V2CM36D7TZMEJVAS/", "source": "cve@mitre.org" }, + { + "url": "https://security.gentoo.org/glsa/202401-27", + "source": "cve@mitre.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20221228-0004/", "source": "cve@mitre.org", diff --git a/CVE-2021/CVE-2021-418xx/CVE-2021-41816.json b/CVE-2021/CVE-2021-418xx/CVE-2021-41816.json index 4d6606b1814..9df95c38cb0 100644 --- a/CVE-2021/CVE-2021-418xx/CVE-2021-41816.json +++ b/CVE-2021/CVE-2021-418xx/CVE-2021-41816.json @@ -2,7 +2,7 @@ "id": "CVE-2021-41816", "sourceIdentifier": "cve@mitre.org", "published": "2022-02-06T21:15:07.887", - "lastModified": "2023-11-07T03:39:01.280", + "lastModified": "2024-01-24T05:15:11.280", "vulnStatus": "Modified", "descriptions": [ { @@ -197,6 +197,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202401-27", + "source": "cve@mitre.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20220303-0006/", "source": "cve@mitre.org", diff --git a/CVE-2021/CVE-2021-418xx/CVE-2021-41817.json b/CVE-2021/CVE-2021-418xx/CVE-2021-41817.json index 9eabad136bf..015d839414d 100644 --- a/CVE-2021/CVE-2021-418xx/CVE-2021-41817.json +++ b/CVE-2021/CVE-2021-418xx/CVE-2021-41817.json @@ -2,7 +2,7 @@ "id": "CVE-2021-41817", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-01T05:15:08.197", - "lastModified": "2023-11-07T03:39:01.370", + "lastModified": "2024-01-24T05:15:11.520", "vulnStatus": "Modified", "descriptions": [ { @@ -259,6 +259,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/", "source": "cve@mitre.org" }, + { + "url": "https://security.gentoo.org/glsa/202401-27", + "source": "cve@mitre.org" + }, { "url": "https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/", "source": "cve@mitre.org", diff --git a/CVE-2021/CVE-2021-418xx/CVE-2021-41819.json b/CVE-2021/CVE-2021-418xx/CVE-2021-41819.json index 88e8a43ecf7..7973f242a0a 100644 --- a/CVE-2021/CVE-2021-418xx/CVE-2021-41819.json +++ b/CVE-2021/CVE-2021-418xx/CVE-2021-41819.json @@ -2,7 +2,7 @@ "id": "CVE-2021-41819", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-01T06:15:07.293", - "lastModified": "2023-11-07T03:39:01.443", + "lastModified": "2024-01-24T05:15:11.853", "vulnStatus": "Modified", "descriptions": [ { @@ -249,6 +249,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/", "source": "cve@mitre.org" }, + { + "url": "https://security.gentoo.org/glsa/202401-27", + "source": "cve@mitre.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20220121-0003/", "source": "cve@mitre.org", diff --git a/CVE-2022/CVE-2022-287xx/CVE-2022-28738.json b/CVE-2022/CVE-2022-287xx/CVE-2022-28738.json index d95d2287f9f..695b62c6eeb 100644 --- a/CVE-2022/CVE-2022-287xx/CVE-2022-28738.json +++ b/CVE-2022/CVE-2022-287xx/CVE-2022-28738.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28738", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-09T18:15:08.490", - "lastModified": "2022-11-29T17:18:23.413", - "vulnStatus": "Analyzed", + "lastModified": "2024-01-24T05:15:12.147", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -118,6 +118,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202401-27", + "source": "cve@mitre.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20220624-0002/", "source": "cve@mitre.org", diff --git a/CVE-2022/CVE-2022-287xx/CVE-2022-28739.json b/CVE-2022/CVE-2022-287xx/CVE-2022-28739.json index 0ffbabfa700..e9f17ddcaab 100644 --- a/CVE-2022/CVE-2022-287xx/CVE-2022-28739.json +++ b/CVE-2022/CVE-2022-287xx/CVE-2022-28739.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28739", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-09T18:15:08.540", - "lastModified": "2023-06-09T13:15:09.503", + "lastModified": "2024-01-24T05:15:12.390", "vulnStatus": "Modified", "descriptions": [ { @@ -207,6 +207,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202401-27", + "source": "cve@mitre.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20220624-0002/", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28755.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28755.json index 801d61bb3cc..1955197a484 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28755.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28755.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28755", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-31T04:15:09.037", - "lastModified": "2023-11-07T04:10:50.830", + "lastModified": "2024-01-24T05:15:12.900", "vulnStatus": "Modified", "descriptions": [ { @@ -137,6 +137,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMIOPLBAAM3FEQNAXA2L7BDKOGSVUT5Z/", "source": "cve@mitre.org" }, + { + "url": "https://security.gentoo.org/glsa/202401-27", + "source": "cve@mitre.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20230526-0003/", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28756.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28756.json index fda283793b7..32c92e84781 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28756.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28756.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28756", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-31T04:15:09.090", - "lastModified": "2023-11-07T04:10:51.830", + "lastModified": "2024-01-24T05:15:13.297", "vulnStatus": "Modified", "descriptions": [ { @@ -132,6 +132,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WMIOPLBAAM3FEQNAXA2L7BDKOGSVUT5Z/", "source": "cve@mitre.org" }, + { + "url": "https://security.gentoo.org/glsa/202401-27", + "source": "cve@mitre.org" + }, { "url": "https://security.netapp.com/advisory/ntap-20230526-0004/", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42465.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42465.json index dab4162c822..b4c8528118d 100644 --- a/CVE-2023/CVE-2023-424xx/CVE-2023-42465.json +++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42465.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42465", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-22T16:15:08.057", - "lastModified": "2024-01-03T17:40:23.540", - "vulnStatus": "Analyzed", + "lastModified": "2024-01-24T05:15:13.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -91,6 +91,10 @@ "Release Notes" ] }, + { + "url": "https://security.gentoo.org/glsa/202401-29", + "source": "cve@mitre.org" + }, { "url": "https://www.openwall.com/lists/oss-security/2023/12/21/9", "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22366.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22366.json new file mode 100644 index 00000000000..6d47496b399 --- /dev/null +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22366.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-22366", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-01-24T05:15:13.823", + "lastModified": "2024-01-24T05:15:13.823", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Active debug code exists in Yamaha wireless LAN access point devices. If a logged-in user who knows how to use the debug function accesses the device's management page, this function can be enabled by performing specific operations. As a result, an arbitrary OS command may be executed and/or configuration settings of the device may be altered. Affected products and versions are as follows: WLX222 firmware Rev.24.00.03 and earlier, WLX413 firmware Rev.22.00.05 and earlier, WLX212 firmware Rev.21.00.12 and earlier, WLX313 firmware Rev.18.00.12 and earlier, and WLX202 firmware Rev.16.00.18 and earlier." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://www.rtpro.yamaha.co.jp/RT/FAQ/Security/JVNVU99896362.html", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU99896362/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22372.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22372.json new file mode 100644 index 00000000000..ea8c27f8696 --- /dev/null +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22372.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2024-22372", + "sourceIdentifier": "vultures@jpcert.or.jp", + "published": "2024-01-24T05:15:14.137", + "lastModified": "2024-01-24T05:15:14.137", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "OS command injection vulnerability in ELECOM wireless LAN routers allows a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by sending a specially crafted request to the product. Affected products and versions are as follows: WRC-X1800GS-B v1.17 and earlier, WRC-X1800GSA-B v1.17 and earlier, WRC-X1800GSH-B v1.17 and earlier, WRC-X6000XS-G v1.09, and WRC-X6000XST-G v1.12 and earlier." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://jvn.jp/en/vu/JVNVU90908488/", + "source": "vultures@jpcert.or.jp" + }, + { + "url": "https://www.elecom.co.jp/news/security/20240123-01/", + "source": "vultures@jpcert.or.jp" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f24a4a78500..8ab0354dffb 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-24T05:00:25.051511+00:00 +2024-01-24T07:00:25.165948+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-24T03:15:08.553000+00:00 +2024-01-24T05:15:14.137000+00:00 ``` ### Last Data Feed Release @@ -29,25 +29,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -236699 +236701 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `2` -* [CVE-2023-31037](CVE-2023/CVE-2023-310xx/CVE-2023-31037.json) (`2024-01-24T03:15:08.100`) +* [CVE-2024-22366](CVE-2024/CVE-2024-223xx/CVE-2024-22366.json) (`2024-01-24T05:15:13.823`) +* [CVE-2024-22372](CVE-2024/CVE-2024-223xx/CVE-2024-22372.json) (`2024-01-24T05:15:14.137`) ### CVEs modified in the last Commit -Recently modified CVEs: `5` +Recently modified CVEs: `15` -* [CVE-2022-48541](CVE-2022/CVE-2022-485xx/CVE-2022-48541.json) (`2024-01-24T03:15:07.763`) -* [CVE-2023-0437](CVE-2023/CVE-2023-04xx/CVE-2023-0437.json) (`2024-01-24T03:15:07.967`) -* [CVE-2023-51257](CVE-2023/CVE-2023-512xx/CVE-2023-51257.json) (`2024-01-24T03:15:08.353`) -* [CVE-2023-5341](CVE-2023/CVE-2023-53xx/CVE-2023-5341.json) (`2024-01-24T03:15:08.430`) -* [CVE-2023-7008](CVE-2023/CVE-2023-70xx/CVE-2023-7008.json) (`2024-01-24T03:15:08.553`) +* [CVE-2020-25613](CVE-2020/CVE-2020-256xx/CVE-2020-25613.json) (`2024-01-24T05:15:08.827`) +* [CVE-2021-31810](CVE-2021/CVE-2021-318xx/CVE-2021-31810.json) (`2024-01-24T05:15:09.683`) +* [CVE-2021-32066](CVE-2021/CVE-2021-320xx/CVE-2021-32066.json) (`2024-01-24T05:15:10.040`) +* [CVE-2021-33479](CVE-2021/CVE-2021-334xx/CVE-2021-33479.json) (`2024-01-24T05:15:10.363`) +* [CVE-2021-33480](CVE-2021/CVE-2021-334xx/CVE-2021-33480.json) (`2024-01-24T05:15:10.610`) +* [CVE-2021-33481](CVE-2021/CVE-2021-334xx/CVE-2021-33481.json) (`2024-01-24T05:15:10.700`) +* [CVE-2021-33621](CVE-2021/CVE-2021-336xx/CVE-2021-33621.json) (`2024-01-24T05:15:10.787`) +* [CVE-2021-41816](CVE-2021/CVE-2021-418xx/CVE-2021-41816.json) (`2024-01-24T05:15:11.280`) +* [CVE-2021-41817](CVE-2021/CVE-2021-418xx/CVE-2021-41817.json) (`2024-01-24T05:15:11.520`) +* [CVE-2021-41819](CVE-2021/CVE-2021-418xx/CVE-2021-41819.json) (`2024-01-24T05:15:11.853`) +* [CVE-2022-28738](CVE-2022/CVE-2022-287xx/CVE-2022-28738.json) (`2024-01-24T05:15:12.147`) +* [CVE-2022-28739](CVE-2022/CVE-2022-287xx/CVE-2022-28739.json) (`2024-01-24T05:15:12.390`) +* [CVE-2023-28755](CVE-2023/CVE-2023-287xx/CVE-2023-28755.json) (`2024-01-24T05:15:12.900`) +* [CVE-2023-28756](CVE-2023/CVE-2023-287xx/CVE-2023-28756.json) (`2024-01-24T05:15:13.297`) +* [CVE-2023-42465](CVE-2023/CVE-2023-424xx/CVE-2023-42465.json) (`2024-01-24T05:15:13.660`) ## Download and Usage