From e78477d80d152c8a87c0cfe75dd272547477eb4c Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 27 May 2023 06:00:28 +0000 Subject: [PATCH] Auto-Update: 2023-05-27T06:00:25.014571+00:00 --- CVE-2020/CVE-2020-359xx/CVE-2020-35980.json | 8 ++- CVE-2021/CVE-2021-218xx/CVE-2021-21852.json | 16 +++-- CVE-2021/CVE-2021-321xx/CVE-2021-32142.json | 6 +- CVE-2021/CVE-2021-333xx/CVE-2021-33361.json | 8 ++- CVE-2021/CVE-2021-333xx/CVE-2021-33363.json | 8 ++- CVE-2021/CVE-2021-333xx/CVE-2021-33364.json | 8 ++- CVE-2021/CVE-2021-333xx/CVE-2021-33365.json | 8 ++- CVE-2021/CVE-2021-333xx/CVE-2021-33366.json | 8 ++- CVE-2021/CVE-2021-364xx/CVE-2021-36412.json | 8 ++- CVE-2021/CVE-2021-364xx/CVE-2021-36414.json | 8 ++- CVE-2021/CVE-2021-364xx/CVE-2021-36417.json | 8 ++- CVE-2021/CVE-2021-405xx/CVE-2021-40559.json | 8 ++- CVE-2021/CVE-2021-405xx/CVE-2021-40562.json | 8 ++- CVE-2021/CVE-2021-405xx/CVE-2021-40563.json | 8 ++- CVE-2021/CVE-2021-405xx/CVE-2021-40564.json | 8 ++- CVE-2021/CVE-2021-405xx/CVE-2021-40565.json | 8 ++- CVE-2021/CVE-2021-405xx/CVE-2021-40566.json | 8 ++- CVE-2021/CVE-2021-405xx/CVE-2021-40567.json | 8 ++- CVE-2021/CVE-2021-405xx/CVE-2021-40568.json | 8 ++- CVE-2021/CVE-2021-405xx/CVE-2021-40569.json | 8 ++- CVE-2021/CVE-2021-405xx/CVE-2021-40570.json | 8 ++- CVE-2021/CVE-2021-405xx/CVE-2021-40571.json | 8 ++- CVE-2021/CVE-2021-405xx/CVE-2021-40572.json | 8 ++- CVE-2021/CVE-2021-405xx/CVE-2021-40574.json | 8 ++- CVE-2021/CVE-2021-405xx/CVE-2021-40575.json | 8 ++- CVE-2021/CVE-2021-405xx/CVE-2021-40576.json | 8 ++- CVE-2021/CVE-2021-405xx/CVE-2021-40592.json | 8 ++- CVE-2021/CVE-2021-406xx/CVE-2021-40606.json | 8 ++- CVE-2021/CVE-2021-406xx/CVE-2021-40608.json | 8 ++- CVE-2021/CVE-2021-406xx/CVE-2021-40609.json | 8 ++- CVE-2021/CVE-2021-409xx/CVE-2021-40944.json | 8 ++- CVE-2021/CVE-2021-40xx/CVE-2021-4043.json | 8 ++- CVE-2021/CVE-2021-414xx/CVE-2021-41456.json | 8 ++- CVE-2021/CVE-2021-414xx/CVE-2021-41457.json | 8 ++- CVE-2021/CVE-2021-414xx/CVE-2021-41459.json | 8 ++- CVE-2021/CVE-2021-452xx/CVE-2021-45262.json | 8 ++- CVE-2021/CVE-2021-452xx/CVE-2021-45263.json | 8 ++- CVE-2021/CVE-2021-452xx/CVE-2021-45267.json | 8 ++- CVE-2021/CVE-2021-452xx/CVE-2021-45291.json | 8 ++- CVE-2021/CVE-2021-452xx/CVE-2021-45292.json | 8 ++- CVE-2021/CVE-2021-452xx/CVE-2021-45297.json | 8 ++- CVE-2021/CVE-2021-457xx/CVE-2021-45760.json | 8 ++- CVE-2021/CVE-2021-457xx/CVE-2021-45762.json | 8 ++- CVE-2021/CVE-2021-457xx/CVE-2021-45763.json | 8 ++- CVE-2021/CVE-2021-457xx/CVE-2021-45764.json | 8 ++- CVE-2021/CVE-2021-457xx/CVE-2021-45767.json | 8 ++- CVE-2021/CVE-2021-458xx/CVE-2021-45831.json | 8 ++- CVE-2021/CVE-2021-460xx/CVE-2021-46038.json | 8 ++- CVE-2021/CVE-2021-460xx/CVE-2021-46039.json | 8 ++- CVE-2021/CVE-2021-460xx/CVE-2021-46040.json | 8 ++- CVE-2021/CVE-2021-460xx/CVE-2021-46041.json | 8 ++- CVE-2021/CVE-2021-460xx/CVE-2021-46042.json | 8 ++- CVE-2021/CVE-2021-460xx/CVE-2021-46043.json | 8 ++- CVE-2021/CVE-2021-460xx/CVE-2021-46044.json | 8 ++- CVE-2021/CVE-2021-460xx/CVE-2021-46045.json | 8 ++- CVE-2021/CVE-2021-460xx/CVE-2021-46046.json | 8 ++- CVE-2021/CVE-2021-460xx/CVE-2021-46047.json | 8 ++- CVE-2021/CVE-2021-460xx/CVE-2021-46049.json | 8 ++- CVE-2021/CVE-2021-460xx/CVE-2021-46051.json | 8 ++- CVE-2022/CVE-2022-10xx/CVE-2022-1035.json | 16 +++-- CVE-2022/CVE-2022-12xx/CVE-2022-1222.json | 8 ++- CVE-2022/CVE-2022-14xx/CVE-2022-1441.json | 8 ++- CVE-2022/CVE-2022-17xx/CVE-2022-1795.json | 12 ++-- CVE-2022/CVE-2022-245xx/CVE-2022-24574.json | 8 ++- CVE-2022/CVE-2022-245xx/CVE-2022-24577.json | 8 ++- CVE-2022/CVE-2022-245xx/CVE-2022-24578.json | 8 ++- CVE-2022/CVE-2022-24xx/CVE-2022-2454.json | 8 ++- CVE-2022/CVE-2022-269xx/CVE-2022-26967.json | 8 ++- CVE-2022/CVE-2022-271xx/CVE-2022-27145.json | 8 ++- CVE-2022/CVE-2022-271xx/CVE-2022-27147.json | 8 ++- CVE-2022/CVE-2022-295xx/CVE-2022-29537.json | 8 ++- CVE-2022/CVE-2022-32xx/CVE-2022-3222.json | 8 ++- CVE-2022/CVE-2022-361xx/CVE-2022-36190.json | 8 ++- CVE-2022/CVE-2022-361xx/CVE-2022-36191.json | 8 ++- CVE-2022/CVE-2022-385xx/CVE-2022-38530.json | 8 ++- CVE-2022/CVE-2022-39xx/CVE-2022-3957.json | 30 +++++---- CVE-2022/CVE-2022-42xx/CVE-2022-4202.json | 8 ++- CVE-2022/CVE-2022-432xx/CVE-2022-43255.json | 8 ++- CVE-2022/CVE-2022-452xx/CVE-2022-45202.json | 13 ++-- CVE-2022/CVE-2022-452xx/CVE-2022-45283.json | 8 ++- CVE-2022/CVE-2022-453xx/CVE-2022-45343.json | 8 ++- CVE-2022/CVE-2022-470xx/CVE-2022-47086.json | 8 ++- CVE-2022/CVE-2022-470xx/CVE-2022-47091.json | 8 ++- CVE-2022/CVE-2022-470xx/CVE-2022-47094.json | 8 ++- CVE-2022/CVE-2022-470xx/CVE-2022-47095.json | 8 ++- CVE-2022/CVE-2022-476xx/CVE-2022-47657.json | 8 ++- CVE-2022/CVE-2022-476xx/CVE-2022-47659.json | 8 ++- CVE-2022/CVE-2022-476xx/CVE-2022-47660.json | 8 ++- CVE-2022/CVE-2022-476xx/CVE-2022-47661.json | 8 ++- CVE-2022/CVE-2022-476xx/CVE-2022-47662.json | 8 ++- CVE-2022/CVE-2022-476xx/CVE-2022-47663.json | 8 ++- CVE-2023/CVE-2023-07xx/CVE-2023-0770.json | 8 ++- CVE-2023/CVE-2023-08xx/CVE-2023-0818.json | 12 ++-- CVE-2023/CVE-2023-08xx/CVE-2023-0819.json | 16 +++-- CVE-2023/CVE-2023-08xx/CVE-2023-0866.json | 8 ++- CVE-2023/CVE-2023-14xx/CVE-2023-1448.json | 8 ++- CVE-2023/CVE-2023-14xx/CVE-2023-1449.json | 8 ++- CVE-2023/CVE-2023-14xx/CVE-2023-1452.json | 8 ++- CVE-2023/CVE-2023-16xx/CVE-2023-1654.json | 8 ++- CVE-2023/CVE-2023-17xx/CVE-2023-1729.json | 8 ++- CVE-2023/CVE-2023-231xx/CVE-2023-23143.json | 8 ++- CVE-2023/CVE-2023-231xx/CVE-2023-23144.json | 8 ++- CVE-2023/CVE-2023-231xx/CVE-2023-23145.json | 8 ++- CVE-2023/CVE-2023-250xx/CVE-2023-25076.json | 6 +- CVE-2023/CVE-2023-261xx/CVE-2023-26127.json | 47 ++++++++++++++ CVE-2023/CVE-2023-261xx/CVE-2023-26128.json | 47 ++++++++++++++ CVE-2023/CVE-2023-261xx/CVE-2023-26129.json | 43 +++++++++++++ CVE-2023/CVE-2023-28xx/CVE-2023-2837.json | 8 ++- CVE-2023/CVE-2023-28xx/CVE-2023-2838.json | 8 ++- CVE-2023/CVE-2023-28xx/CVE-2023-2839.json | 8 ++- CVE-2023/CVE-2023-28xx/CVE-2023-2840.json | 8 ++- CVE-2023/CVE-2023-326xx/CVE-2023-32686.json | 63 +++++++++++++++++++ CVE-2023/CVE-2023-326xx/CVE-2023-32688.json | 63 +++++++++++++++++++ CVE-2023/CVE-2023-331xx/CVE-2023-33184.json | 63 +++++++++++++++++++ CVE-2023/CVE-2023-331xx/CVE-2023-33188.json | 59 ++++++++++++++++++ CVE-2023/CVE-2023-331xx/CVE-2023-33192.json | 59 ++++++++++++++++++ CVE-2023/CVE-2023-331xx/CVE-2023-33195.json | 59 ++++++++++++++++++ README.md | 69 ++++++++++++--------- 118 files changed, 1218 insertions(+), 273 deletions(-) create mode 100644 CVE-2023/CVE-2023-261xx/CVE-2023-26127.json create mode 100644 CVE-2023/CVE-2023-261xx/CVE-2023-26128.json create mode 100644 CVE-2023/CVE-2023-261xx/CVE-2023-26129.json create mode 100644 CVE-2023/CVE-2023-326xx/CVE-2023-32686.json create mode 100644 CVE-2023/CVE-2023-326xx/CVE-2023-32688.json create mode 100644 CVE-2023/CVE-2023-331xx/CVE-2023-33184.json create mode 100644 CVE-2023/CVE-2023-331xx/CVE-2023-33188.json create mode 100644 CVE-2023/CVE-2023-331xx/CVE-2023-33192.json create mode 100644 CVE-2023/CVE-2023-331xx/CVE-2023-33195.json diff --git a/CVE-2020/CVE-2020-359xx/CVE-2020-35980.json b/CVE-2020/CVE-2020-359xx/CVE-2020-35980.json index 0aa186fa035..a8d7168015d 100644 --- a/CVE-2020/CVE-2020-359xx/CVE-2020-35980.json +++ b/CVE-2020/CVE-2020-359xx/CVE-2020-35980.json @@ -2,8 +2,8 @@ "id": "CVE-2020-35980", "sourceIdentifier": "cve@mitre.org", "published": "2021-04-21T16:15:08.687", - "lastModified": "2021-04-23T19:53:53.240", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:14.643", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -113,6 +113,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-218xx/CVE-2021-21852.json b/CVE-2021/CVE-2021-218xx/CVE-2021-21852.json index 5abba153053..298564d1658 100644 --- a/CVE-2021/CVE-2021-218xx/CVE-2021-21852.json +++ b/CVE-2021/CVE-2021-218xx/CVE-2021-21852.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21852", "sourceIdentifier": "talos-cna@cisco.com", "published": "2021-08-18T13:15:07.883", - "lastModified": "2022-05-31T18:38:15.787", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:15.213", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -87,22 +87,22 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "talos-cna@cisco.com", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-190" + "value": "CWE-680" } ] }, { - "source": "talos-cna@cisco.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-680" + "value": "CWE-190" } ] } @@ -133,6 +133,10 @@ "Technical Description", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-321xx/CVE-2021-32142.json b/CVE-2021/CVE-2021-321xx/CVE-2021-32142.json index 9c16d96852a..fe91f589971 100644 --- a/CVE-2021/CVE-2021-321xx/CVE-2021-32142.json +++ b/CVE-2021/CVE-2021-321xx/CVE-2021-32142.json @@ -2,7 +2,7 @@ "id": "CVE-2021-32142", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-17T18:15:10.860", - "lastModified": "2023-03-16T20:15:11.100", + "lastModified": "2023-05-27T04:15:15.363", "vulnStatus": "Modified", "descriptions": [ { @@ -86,6 +86,10 @@ "Not Applicable" ] }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html", + "source": "cve@mitre.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5ICTVDRGBWGIFBTUWJLGX7QM5GWBWUG7/", "source": "cve@mitre.org" diff --git a/CVE-2021/CVE-2021-333xx/CVE-2021-33361.json b/CVE-2021/CVE-2021-333xx/CVE-2021-33361.json index c441722cf31..b5f37cf4fa5 100644 --- a/CVE-2021/CVE-2021-333xx/CVE-2021-33361.json +++ b/CVE-2021/CVE-2021-333xx/CVE-2021-33361.json @@ -2,8 +2,8 @@ "id": "CVE-2021-33361", "sourceIdentifier": "cve@mitre.org", "published": "2021-09-13T20:15:08.510", - "lastModified": "2022-05-03T16:04:40.443", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:15.463", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -110,6 +110,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-333xx/CVE-2021-33363.json b/CVE-2021/CVE-2021-333xx/CVE-2021-33363.json index 4105566e1f1..37f6bbbaa3d 100644 --- a/CVE-2021/CVE-2021-333xx/CVE-2021-33363.json +++ b/CVE-2021/CVE-2021-333xx/CVE-2021-33363.json @@ -2,8 +2,8 @@ "id": "CVE-2021-33363", "sourceIdentifier": "cve@mitre.org", "published": "2021-09-13T20:15:08.567", - "lastModified": "2022-05-03T16:04:40.443", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:15.560", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -109,6 +109,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-333xx/CVE-2021-33364.json b/CVE-2021/CVE-2021-333xx/CVE-2021-33364.json index 8698002c535..8ab320d144d 100644 --- a/CVE-2021/CVE-2021-333xx/CVE-2021-33364.json +++ b/CVE-2021/CVE-2021-333xx/CVE-2021-33364.json @@ -2,8 +2,8 @@ "id": "CVE-2021-33364", "sourceIdentifier": "cve@mitre.org", "published": "2021-09-13T19:15:13.987", - "lastModified": "2021-09-23T18:28:10.790", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:15.633", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -110,6 +110,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-333xx/CVE-2021-33365.json b/CVE-2021/CVE-2021-333xx/CVE-2021-33365.json index c7f4af6b259..c7e42908e59 100644 --- a/CVE-2021/CVE-2021-333xx/CVE-2021-33365.json +++ b/CVE-2021/CVE-2021-333xx/CVE-2021-33365.json @@ -2,8 +2,8 @@ "id": "CVE-2021-33365", "sourceIdentifier": "cve@mitre.org", "published": "2021-09-13T20:15:08.627", - "lastModified": "2022-05-03T16:04:40.443", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:15.717", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -109,6 +109,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-333xx/CVE-2021-33366.json b/CVE-2021/CVE-2021-333xx/CVE-2021-33366.json index 7e9b59a685a..f9360388c31 100644 --- a/CVE-2021/CVE-2021-333xx/CVE-2021-33366.json +++ b/CVE-2021/CVE-2021-333xx/CVE-2021-33366.json @@ -2,8 +2,8 @@ "id": "CVE-2021-33366", "sourceIdentifier": "cve@mitre.org", "published": "2021-09-13T19:15:14.587", - "lastModified": "2021-09-23T19:01:31.910", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:15.797", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -110,6 +110,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-364xx/CVE-2021-36412.json b/CVE-2021/CVE-2021-364xx/CVE-2021-36412.json index aa175758323..f27f7de208d 100644 --- a/CVE-2021/CVE-2021-364xx/CVE-2021-36412.json +++ b/CVE-2021/CVE-2021-364xx/CVE-2021-36412.json @@ -2,8 +2,8 @@ "id": "CVE-2021-36412", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-10T23:15:09.177", - "lastModified": "2022-01-19T14:44:17.107", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:15.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-364xx/CVE-2021-36414.json b/CVE-2021/CVE-2021-364xx/CVE-2021-36414.json index b52283a0bfe..e2697b3cd59 100644 --- a/CVE-2021/CVE-2021-364xx/CVE-2021-36414.json +++ b/CVE-2021/CVE-2021-364xx/CVE-2021-36414.json @@ -2,8 +2,8 @@ "id": "CVE-2021-36414", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-10T23:15:09.223", - "lastModified": "2022-01-19T14:46:30.923", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:15.973", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -102,6 +102,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-364xx/CVE-2021-36417.json b/CVE-2021/CVE-2021-364xx/CVE-2021-36417.json index 5ff815a7fbd..d96f6b597ec 100644 --- a/CVE-2021/CVE-2021-364xx/CVE-2021-36417.json +++ b/CVE-2021/CVE-2021-364xx/CVE-2021-36417.json @@ -2,8 +2,8 @@ "id": "CVE-2021-36417", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-12T19:15:08.207", - "lastModified": "2022-01-14T20:00:42.513", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:16.047", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40559.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40559.json index 0f721e1c0e2..bd231745613 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40559.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40559.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40559", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-12T21:15:07.573", - "lastModified": "2022-01-14T13:34:13.453", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:16.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40562.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40562.json index eaf7ae3bbb2..d371d6fdd41 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40562.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40562.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40562", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-12T22:15:07.760", - "lastModified": "2022-01-14T13:43:51.817", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:16.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -108,6 +108,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40563.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40563.json index a18eb5f0f85..4c63dadcf7b 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40563.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40563.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40563", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-12T22:15:07.807", - "lastModified": "2022-01-14T13:44:54.663", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:16.293", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -108,6 +108,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40564.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40564.json index 7677ec2b4d5..3988e900d6c 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40564.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40564.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40564", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-12T22:15:07.847", - "lastModified": "2022-01-14T13:45:56.243", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:16.367", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -108,6 +108,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40565.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40565.json index f77698f5e3a..3dca6b1a043 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40565.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40565.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40565", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-12T22:15:07.890", - "lastModified": "2022-01-14T13:46:39.050", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:16.440", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -108,6 +108,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40566.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40566.json index a50df4e68ad..7f5c727b4ba 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40566.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40566.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40566", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-12T22:15:07.933", - "lastModified": "2022-01-14T13:52:28.427", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:16.510", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -108,6 +108,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40567.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40567.json index 87fa1dd2517..c8647abf828 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40567.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40567.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40567", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-13T18:15:07.933", - "lastModified": "2022-01-14T16:30:38.813", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:16.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -110,6 +110,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40568.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40568.json index 5bf5531ce4a..854b7bf0751 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40568.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40568.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40568", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-13T18:15:07.977", - "lastModified": "2022-01-14T16:33:57.140", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:16.660", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -110,6 +110,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40569.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40569.json index ce8a0d09e6a..95480e1e5d3 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40569.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40569.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40569", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-13T18:15:08.020", - "lastModified": "2022-01-14T16:35:51.787", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:16.737", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -110,6 +110,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40570.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40570.json index d99e928840b..1bb164212c9 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40570.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40570.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40570", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-13T18:15:08.063", - "lastModified": "2022-01-14T16:36:27.727", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:16.817", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -109,6 +109,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40571.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40571.json index f99f92bc26f..4e6577f6b03 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40571.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40571.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40571", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-13T18:15:08.113", - "lastModified": "2022-01-14T16:36:57.857", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:16.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -109,6 +109,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40572.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40572.json index da9fa2591dd..7487b03109c 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40572.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40572.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40572", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-13T19:15:08.217", - "lastModified": "2022-01-14T16:37:11.613", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:16.980", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -109,6 +109,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40574.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40574.json index bf03f435280..be65e78054c 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40574.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40574.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40574", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-13T19:15:08.317", - "lastModified": "2022-01-14T16:37:36.837", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:17.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -109,6 +109,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40575.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40575.json index e605dea5542..c84d07e9c34 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40575.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40575.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40575", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-13T19:15:08.367", - "lastModified": "2022-01-14T16:38:07.673", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:17.127", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -109,6 +109,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40576.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40576.json index 33e2e7f5dcd..1a800a12a77 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40576.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40576.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40576", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-13T19:15:08.407", - "lastModified": "2022-01-14T16:38:17.173", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:17.203", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -109,6 +109,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-405xx/CVE-2021-40592.json b/CVE-2021/CVE-2021-405xx/CVE-2021-40592.json index 1f1c7ebff88..a88100ab554 100644 --- a/CVE-2021/CVE-2021-405xx/CVE-2021-40592.json +++ b/CVE-2021/CVE-2021-405xx/CVE-2021-40592.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40592", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-08T18:15:08.173", - "lastModified": "2022-06-15T14:13:31.733", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:17.280", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -110,6 +110,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-406xx/CVE-2021-40606.json b/CVE-2021/CVE-2021-406xx/CVE-2021-40606.json index f549d3030ea..3f719827c7c 100644 --- a/CVE-2021/CVE-2021-406xx/CVE-2021-40606.json +++ b/CVE-2021/CVE-2021-406xx/CVE-2021-40606.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40606", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-28T13:15:09.740", - "lastModified": "2022-07-07T16:08:17.270", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:17.377", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -103,6 +103,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-406xx/CVE-2021-40608.json b/CVE-2021/CVE-2021-406xx/CVE-2021-40608.json index 6c375f6bd2b..55c1577c92b 100644 --- a/CVE-2021/CVE-2021-406xx/CVE-2021-40608.json +++ b/CVE-2021/CVE-2021-406xx/CVE-2021-40608.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40608", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-28T13:15:09.840", - "lastModified": "2022-07-07T16:06:07.657", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:17.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -103,6 +103,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-406xx/CVE-2021-40609.json b/CVE-2021/CVE-2021-406xx/CVE-2021-40609.json index 841a02ef36c..f5465d7794b 100644 --- a/CVE-2021/CVE-2021-406xx/CVE-2021-40609.json +++ b/CVE-2021/CVE-2021-406xx/CVE-2021-40609.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40609", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-28T13:15:09.880", - "lastModified": "2022-07-07T18:30:17.763", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:17.547", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -103,6 +103,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-409xx/CVE-2021-40944.json b/CVE-2021/CVE-2021-409xx/CVE-2021-40944.json index cb58c1fbd77..3c9a11bb080 100644 --- a/CVE-2021/CVE-2021-409xx/CVE-2021-40944.json +++ b/CVE-2021/CVE-2021-409xx/CVE-2021-40944.json @@ -2,8 +2,8 @@ "id": "CVE-2021-40944", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-28T13:15:09.963", - "lastModified": "2022-07-07T18:20:16.550", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:17.623", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -102,6 +102,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-40xx/CVE-2021-4043.json b/CVE-2021/CVE-2021-40xx/CVE-2021-4043.json index 747c86111b4..317051a5b45 100644 --- a/CVE-2021/CVE-2021-40xx/CVE-2021-4043.json +++ b/CVE-2021/CVE-2021-40xx/CVE-2021-4043.json @@ -2,8 +2,8 @@ "id": "CVE-2021-4043", "sourceIdentifier": "security@huntr.dev", "published": "2022-02-04T23:15:12.250", - "lastModified": "2022-02-09T03:13:42.833", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:20.003", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -133,6 +133,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-414xx/CVE-2021-41456.json b/CVE-2021/CVE-2021-414xx/CVE-2021-41456.json index ddddd7d339b..355c2deb5bb 100644 --- a/CVE-2021/CVE-2021-414xx/CVE-2021-41456.json +++ b/CVE-2021/CVE-2021-414xx/CVE-2021-41456.json @@ -2,8 +2,8 @@ "id": "CVE-2021-41456", "sourceIdentifier": "cve@mitre.org", "published": "2021-10-01T12:15:07.443", - "lastModified": "2021-10-07T21:13:55.113", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:17.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-414xx/CVE-2021-41457.json b/CVE-2021/CVE-2021-414xx/CVE-2021-41457.json index 1acea6549f0..7feff9071a9 100644 --- a/CVE-2021/CVE-2021-414xx/CVE-2021-41457.json +++ b/CVE-2021/CVE-2021-414xx/CVE-2021-41457.json @@ -2,8 +2,8 @@ "id": "CVE-2021-41457", "sourceIdentifier": "cve@mitre.org", "published": "2021-10-01T12:15:07.500", - "lastModified": "2021-10-07T21:13:36.177", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:17.800", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-414xx/CVE-2021-41459.json b/CVE-2021/CVE-2021-414xx/CVE-2021-41459.json index e3c012f7151..ad1b3f7d894 100644 --- a/CVE-2021/CVE-2021-414xx/CVE-2021-41459.json +++ b/CVE-2021/CVE-2021-414xx/CVE-2021-41459.json @@ -2,8 +2,8 @@ "id": "CVE-2021-41459", "sourceIdentifier": "cve@mitre.org", "published": "2021-10-01T12:15:07.543", - "lastModified": "2021-10-07T21:11:17.037", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:17.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-452xx/CVE-2021-45262.json b/CVE-2021/CVE-2021-452xx/CVE-2021-45262.json index e5ebedc7fdf..a20e4c46b95 100644 --- a/CVE-2021/CVE-2021-452xx/CVE-2021-45262.json +++ b/CVE-2021/CVE-2021-452xx/CVE-2021-45262.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45262", "sourceIdentifier": "cve@mitre.org", "published": "2021-12-22T18:15:08.140", - "lastModified": "2021-12-27T21:25:20.193", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:17.957", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-452xx/CVE-2021-45263.json b/CVE-2021/CVE-2021-452xx/CVE-2021-45263.json index f5675b11770..bdaba148370 100644 --- a/CVE-2021/CVE-2021-452xx/CVE-2021-45263.json +++ b/CVE-2021/CVE-2021-452xx/CVE-2021-45263.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45263", "sourceIdentifier": "cve@mitre.org", "published": "2021-12-22T18:15:08.180", - "lastModified": "2021-12-27T21:30:12.930", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:18.047", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-452xx/CVE-2021-45267.json b/CVE-2021/CVE-2021-452xx/CVE-2021-45267.json index c7276704c23..e175876160b 100644 --- a/CVE-2021/CVE-2021-452xx/CVE-2021-45267.json +++ b/CVE-2021/CVE-2021-452xx/CVE-2021-45267.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45267", "sourceIdentifier": "cve@mitre.org", "published": "2021-12-22T18:15:08.257", - "lastModified": "2021-12-27T21:29:51.990", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:18.130", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-452xx/CVE-2021-45291.json b/CVE-2021/CVE-2021-452xx/CVE-2021-45291.json index 2013cc54a50..d99e213a464 100644 --- a/CVE-2021/CVE-2021-452xx/CVE-2021-45291.json +++ b/CVE-2021/CVE-2021-452xx/CVE-2021-45291.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45291", "sourceIdentifier": "cve@mitre.org", "published": "2021-12-21T18:15:08.257", - "lastModified": "2021-12-30T21:19:58.407", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:18.210", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-452xx/CVE-2021-45292.json b/CVE-2021/CVE-2021-452xx/CVE-2021-45292.json index 83f6524a7a1..7e8c2651576 100644 --- a/CVE-2021/CVE-2021-452xx/CVE-2021-45292.json +++ b/CVE-2021/CVE-2021-452xx/CVE-2021-45292.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45292", "sourceIdentifier": "cve@mitre.org", "published": "2021-12-21T18:15:08.297", - "lastModified": "2021-12-30T21:19:24.880", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:18.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-452xx/CVE-2021-45297.json b/CVE-2021/CVE-2021-452xx/CVE-2021-45297.json index f7d068e2bb6..68c852f2d9f 100644 --- a/CVE-2021/CVE-2021-452xx/CVE-2021-45297.json +++ b/CVE-2021/CVE-2021-452xx/CVE-2021-45297.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45297", "sourceIdentifier": "cve@mitre.org", "published": "2021-12-21T19:15:08.100", - "lastModified": "2021-12-27T19:17:45.633", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:18.507", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-457xx/CVE-2021-45760.json b/CVE-2021/CVE-2021-457xx/CVE-2021-45760.json index f8b77a9f273..ab20cae168a 100644 --- a/CVE-2021/CVE-2021-457xx/CVE-2021-45760.json +++ b/CVE-2021/CVE-2021-457xx/CVE-2021-45760.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45760", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-14T00:15:07.767", - "lastModified": "2022-01-20T13:26:24.383", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:18.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -100,6 +100,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-457xx/CVE-2021-45762.json b/CVE-2021/CVE-2021-457xx/CVE-2021-45762.json index deee9a04391..47d3235a6d9 100644 --- a/CVE-2021/CVE-2021-457xx/CVE-2021-45762.json +++ b/CVE-2021/CVE-2021-457xx/CVE-2021-45762.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45762", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-14T19:15:08.027", - "lastModified": "2022-01-20T17:42:00.460", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:18.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -100,6 +100,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-457xx/CVE-2021-45763.json b/CVE-2021/CVE-2021-457xx/CVE-2021-45763.json index d7ac85de325..6f36fd60606 100644 --- a/CVE-2021/CVE-2021-457xx/CVE-2021-45763.json +++ b/CVE-2021/CVE-2021-457xx/CVE-2021-45763.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45763", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-14T19:15:08.077", - "lastModified": "2022-01-20T17:36:57.127", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:18.757", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -100,6 +100,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-457xx/CVE-2021-45764.json b/CVE-2021/CVE-2021-457xx/CVE-2021-45764.json index 3a72857c826..eeb36f09b23 100644 --- a/CVE-2021/CVE-2021-457xx/CVE-2021-45764.json +++ b/CVE-2021/CVE-2021-457xx/CVE-2021-45764.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45764", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-14T20:15:14.977", - "lastModified": "2022-01-22T01:21:19.987", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:18.827", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -100,6 +100,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-457xx/CVE-2021-45767.json b/CVE-2021/CVE-2021-457xx/CVE-2021-45767.json index 754cb3b5625..ea20999a09f 100644 --- a/CVE-2021/CVE-2021-457xx/CVE-2021-45767.json +++ b/CVE-2021/CVE-2021-457xx/CVE-2021-45767.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45767", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-14T20:15:15.020", - "lastModified": "2022-01-22T01:22:37.147", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:18.907", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -100,6 +100,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-458xx/CVE-2021-45831.json b/CVE-2021/CVE-2021-458xx/CVE-2021-45831.json index 406e7d34258..e4d50f5c116 100644 --- a/CVE-2021/CVE-2021-458xx/CVE-2021-45831.json +++ b/CVE-2021/CVE-2021-458xx/CVE-2021-45831.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45831", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-05T20:15:07.950", - "lastModified": "2022-01-08T02:52:05.760", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:18.997", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-460xx/CVE-2021-46038.json b/CVE-2021/CVE-2021-460xx/CVE-2021-46038.json index b5f83c17aeb..ca0f91e90cc 100644 --- a/CVE-2021/CVE-2021-460xx/CVE-2021-46038.json +++ b/CVE-2021/CVE-2021-460xx/CVE-2021-46038.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46038", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-05T23:15:08.947", - "lastModified": "2022-01-08T02:53:03.457", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:19.083", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-460xx/CVE-2021-46039.json b/CVE-2021/CVE-2021-460xx/CVE-2021-46039.json index a8f8128caa8..f54dee64ec2 100644 --- a/CVE-2021/CVE-2021-460xx/CVE-2021-46039.json +++ b/CVE-2021/CVE-2021-460xx/CVE-2021-46039.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46039", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-06T20:15:08.657", - "lastModified": "2022-01-12T17:05:16.323", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:19.153", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-460xx/CVE-2021-46040.json b/CVE-2021/CVE-2021-460xx/CVE-2021-46040.json index ccf0c711f74..2d3df48a214 100644 --- a/CVE-2021/CVE-2021-460xx/CVE-2021-46040.json +++ b/CVE-2021/CVE-2021-460xx/CVE-2021-46040.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46040", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-06T20:15:08.723", - "lastModified": "2022-01-12T17:13:23.337", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:19.233", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-460xx/CVE-2021-46041.json b/CVE-2021/CVE-2021-460xx/CVE-2021-46041.json index 08486c825f1..564caab2e5e 100644 --- a/CVE-2021/CVE-2021-460xx/CVE-2021-46041.json +++ b/CVE-2021/CVE-2021-460xx/CVE-2021-46041.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46041", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-06T20:15:08.777", - "lastModified": "2022-01-12T17:22:35.437", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:19.317", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-460xx/CVE-2021-46042.json b/CVE-2021/CVE-2021-460xx/CVE-2021-46042.json index bb4ea668d74..35de03a819b 100644 --- a/CVE-2021/CVE-2021-460xx/CVE-2021-46042.json +++ b/CVE-2021/CVE-2021-460xx/CVE-2021-46042.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46042", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-06T20:15:08.843", - "lastModified": "2022-01-12T17:23:23.943", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:19.390", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-460xx/CVE-2021-46043.json b/CVE-2021/CVE-2021-460xx/CVE-2021-46043.json index 590155a98ce..17d78948807 100644 --- a/CVE-2021/CVE-2021-460xx/CVE-2021-46043.json +++ b/CVE-2021/CVE-2021-460xx/CVE-2021-46043.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46043", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-06T21:15:08.130", - "lastModified": "2022-01-12T17:23:51.900", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:19.470", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-460xx/CVE-2021-46044.json b/CVE-2021/CVE-2021-460xx/CVE-2021-46044.json index 477c4212955..e3d2f764af2 100644 --- a/CVE-2021/CVE-2021-460xx/CVE-2021-46044.json +++ b/CVE-2021/CVE-2021-460xx/CVE-2021-46044.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46044", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-06T21:15:08.177", - "lastModified": "2022-01-12T17:24:18.860", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:19.547", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-460xx/CVE-2021-46045.json b/CVE-2021/CVE-2021-460xx/CVE-2021-46045.json index 201d89933a3..f432a51876d 100644 --- a/CVE-2021/CVE-2021-460xx/CVE-2021-46045.json +++ b/CVE-2021/CVE-2021-460xx/CVE-2021-46045.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46045", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-10T14:11:16.110", - "lastModified": "2022-01-13T14:03:57.873", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:19.623", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-460xx/CVE-2021-46046.json b/CVE-2021/CVE-2021-460xx/CVE-2021-46046.json index e4460635d58..89b234c6bb1 100644 --- a/CVE-2021/CVE-2021-460xx/CVE-2021-46046.json +++ b/CVE-2021/CVE-2021-460xx/CVE-2021-46046.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46046", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-10T14:11:16.600", - "lastModified": "2022-01-13T14:02:56.337", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:19.703", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-460xx/CVE-2021-46047.json b/CVE-2021/CVE-2021-460xx/CVE-2021-46047.json index e4b905546db..27e84938cb0 100644 --- a/CVE-2021/CVE-2021-460xx/CVE-2021-46047.json +++ b/CVE-2021/CVE-2021-460xx/CVE-2021-46047.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46047", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-10T14:11:17.010", - "lastModified": "2022-01-13T14:01:50.437", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:19.783", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -102,6 +102,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-460xx/CVE-2021-46049.json b/CVE-2021/CVE-2021-460xx/CVE-2021-46049.json index 3fc4e26b308..a69e0c0aaaf 100644 --- a/CVE-2021/CVE-2021-460xx/CVE-2021-46049.json +++ b/CVE-2021/CVE-2021-460xx/CVE-2021-46049.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46049", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-10T14:11:18.057", - "lastModified": "2022-01-13T13:58:39.420", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:19.850", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-460xx/CVE-2021-46051.json b/CVE-2021/CVE-2021-460xx/CVE-2021-46051.json index 1df5bcfbbf4..7ab81f5afb9 100644 --- a/CVE-2021/CVE-2021-460xx/CVE-2021-46051.json +++ b/CVE-2021/CVE-2021-460xx/CVE-2021-46051.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46051", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-10T14:11:19.437", - "lastModified": "2022-01-13T13:56:37.910", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:19.923", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-10xx/CVE-2022-1035.json b/CVE-2022/CVE-2022-10xx/CVE-2022-1035.json index 4c490ea3f75..36bb90b3170 100644 --- a/CVE-2022/CVE-2022-10xx/CVE-2022-1035.json +++ b/CVE-2022/CVE-2022-10xx/CVE-2022-1035.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1035", "sourceIdentifier": "security@huntr.dev", "published": "2022-03-21T13:15:08.827", - "lastModified": "2022-03-28T17:10:33.447", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:20.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -87,22 +87,22 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security@huntr.dev", "type": "Primary", "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-476" } ] }, { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-476" + "value": "NVD-CWE-noinfo" } ] } @@ -142,6 +142,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-12xx/CVE-2022-1222.json b/CVE-2022/CVE-2022-12xx/CVE-2022-1222.json index 7d42a123496..dbc73e838b0 100644 --- a/CVE-2022/CVE-2022-12xx/CVE-2022-1222.json +++ b/CVE-2022/CVE-2022-12xx/CVE-2022-1222.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1222", "sourceIdentifier": "security@huntr.dev", "published": "2022-04-04T10:15:08.567", - "lastModified": "2022-04-11T17:04:17.163", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:20.260", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -132,6 +132,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-14xx/CVE-2022-1441.json b/CVE-2022/CVE-2022-14xx/CVE-2022-1441.json index 33287b1a5d3..8e5750b4986 100644 --- a/CVE-2022/CVE-2022-14xx/CVE-2022-1441.json +++ b/CVE-2022/CVE-2022-14xx/CVE-2022-1441.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1441", "sourceIdentifier": "secalert@redhat.com", "published": "2022-04-25T17:15:36.547", - "lastModified": "2022-05-05T19:57:36.373", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:20.370", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -119,6 +119,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-17xx/CVE-2022-1795.json b/CVE-2022/CVE-2022-17xx/CVE-2022-1795.json index 2923aae2fa0..937601d653f 100644 --- a/CVE-2022/CVE-2022-17xx/CVE-2022-1795.json +++ b/CVE-2022/CVE-2022-17xx/CVE-2022-1795.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1795", "sourceIdentifier": "security@huntr.dev", "published": "2022-05-18T15:15:09.143", - "lastModified": "2022-05-26T03:12:06.593", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:20.487", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -87,7 +87,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security@huntr.dev", "type": "Primary", "description": [ { @@ -97,7 +97,7 @@ ] }, { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { @@ -141,6 +141,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-245xx/CVE-2022-24574.json b/CVE-2022/CVE-2022-245xx/CVE-2022-24574.json index b415c16f1b2..a589e97d438 100644 --- a/CVE-2022/CVE-2022-245xx/CVE-2022-24574.json +++ b/CVE-2022/CVE-2022-245xx/CVE-2022-24574.json @@ -2,8 +2,8 @@ "id": "CVE-2022-24574", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-14T14:15:07.787", - "lastModified": "2022-03-20T01:46:14.010", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:20.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -100,6 +100,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-245xx/CVE-2022-24577.json b/CVE-2022/CVE-2022-245xx/CVE-2022-24577.json index 0c76ae56cbf..9963ed1935b 100644 --- a/CVE-2022/CVE-2022-245xx/CVE-2022-24577.json +++ b/CVE-2022/CVE-2022-245xx/CVE-2022-24577.json @@ -2,8 +2,8 @@ "id": "CVE-2022-24577", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-14T15:15:11.257", - "lastModified": "2022-09-30T02:34:28.403", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:20.707", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -116,6 +116,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-245xx/CVE-2022-24578.json b/CVE-2022/CVE-2022-245xx/CVE-2022-24578.json index 198b68a9b74..f93d4478af1 100644 --- a/CVE-2022/CVE-2022-245xx/CVE-2022-24578.json +++ b/CVE-2022/CVE-2022-245xx/CVE-2022-24578.json @@ -2,8 +2,8 @@ "id": "CVE-2022-24578", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-14T19:15:12.110", - "lastModified": "2022-03-22T17:12:35.057", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:20.797", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -100,6 +100,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-24xx/CVE-2022-2454.json b/CVE-2022/CVE-2022-24xx/CVE-2022-2454.json index 9a795d9f253..5f5be2999a8 100644 --- a/CVE-2022/CVE-2022-24xx/CVE-2022-2454.json +++ b/CVE-2022/CVE-2022-24xx/CVE-2022-2454.json @@ -2,8 +2,8 @@ "id": "CVE-2022-2454", "sourceIdentifier": "security@huntr.dev", "published": "2022-07-19T14:15:08.710", - "lastModified": "2022-07-26T15:17:51.150", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:21.350", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -108,6 +108,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-269xx/CVE-2022-26967.json b/CVE-2022/CVE-2022-269xx/CVE-2022-26967.json index 251db353418..de96c81d9cd 100644 --- a/CVE-2022/CVE-2022-269xx/CVE-2022-26967.json +++ b/CVE-2022/CVE-2022-269xx/CVE-2022-26967.json @@ -2,8 +2,8 @@ "id": "CVE-2022-26967", "sourceIdentifier": "cve@mitre.org", "published": "2022-03-12T22:15:08.757", - "lastModified": "2022-03-18T19:16:11.467", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:20.877", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-271xx/CVE-2022-27145.json b/CVE-2022/CVE-2022-271xx/CVE-2022-27145.json index 2003b5393bf..949375e7c05 100644 --- a/CVE-2022/CVE-2022-271xx/CVE-2022-27145.json +++ b/CVE-2022/CVE-2022-271xx/CVE-2022-27145.json @@ -2,8 +2,8 @@ "id": "CVE-2022-27145", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-08T16:15:08.327", - "lastModified": "2023-05-03T16:48:11.460", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:20.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-271xx/CVE-2022-27147.json b/CVE-2022/CVE-2022-271xx/CVE-2022-27147.json index 733a60ba343..33c9c26376f 100644 --- a/CVE-2022/CVE-2022-271xx/CVE-2022-27147.json +++ b/CVE-2022/CVE-2022-271xx/CVE-2022-27147.json @@ -2,8 +2,8 @@ "id": "CVE-2022-27147", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-08T16:15:08.407", - "lastModified": "2023-05-05T19:41:18.380", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:21.047", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-295xx/CVE-2022-29537.json b/CVE-2022/CVE-2022-295xx/CVE-2022-29537.json index d7efd035215..6258041b7b7 100644 --- a/CVE-2022/CVE-2022-295xx/CVE-2022-29537.json +++ b/CVE-2022/CVE-2022-295xx/CVE-2022-29537.json @@ -2,8 +2,8 @@ "id": "CVE-2022-29537", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-20T23:15:08.777", - "lastModified": "2022-05-03T13:17:03.307", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:21.157", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-32xx/CVE-2022-3222.json b/CVE-2022/CVE-2022-32xx/CVE-2022-3222.json index b46ec74831b..962fcecbe51 100644 --- a/CVE-2022/CVE-2022-32xx/CVE-2022-3222.json +++ b/CVE-2022/CVE-2022-32xx/CVE-2022-3222.json @@ -2,8 +2,8 @@ "id": "CVE-2022-3222", "sourceIdentifier": "security@huntr.dev", "published": "2022-09-15T09:15:09.723", - "lastModified": "2022-09-19T17:05:26.390", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:22.017", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -112,6 +112,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-361xx/CVE-2022-36190.json b/CVE-2022/CVE-2022-361xx/CVE-2022-36190.json index 27a7d9f2a11..22f8e633d5d 100644 --- a/CVE-2022/CVE-2022-361xx/CVE-2022-36190.json +++ b/CVE-2022/CVE-2022-361xx/CVE-2022-36190.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36190", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-17T15:15:08.543", - "lastModified": "2023-05-05T19:41:29.807", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:21.467", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -78,6 +78,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-361xx/CVE-2022-36191.json b/CVE-2022/CVE-2022-361xx/CVE-2022-36191.json index 61f28a39342..466908f4450 100644 --- a/CVE-2022/CVE-2022-361xx/CVE-2022-36191.json +++ b/CVE-2022/CVE-2022-361xx/CVE-2022-36191.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36191", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-17T16:15:07.920", - "lastModified": "2023-05-05T19:44:35.683", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:21.550", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -78,6 +78,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-385xx/CVE-2022-38530.json b/CVE-2022/CVE-2022-385xx/CVE-2022-38530.json index 20aad359f42..0bdf49ca744 100644 --- a/CVE-2022/CVE-2022-385xx/CVE-2022-38530.json +++ b/CVE-2022/CVE-2022-385xx/CVE-2022-38530.json @@ -2,8 +2,8 @@ "id": "CVE-2022-38530", "sourceIdentifier": "cve@mitre.org", "published": "2022-09-06T23:15:09.010", - "lastModified": "2023-05-05T19:41:13.080", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:21.620", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -78,6 +78,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-39xx/CVE-2022-3957.json b/CVE-2022/CVE-2022-39xx/CVE-2022-3957.json index fe4dcbd5ddc..9419d7d3bfe 100644 --- a/CVE-2022/CVE-2022-39xx/CVE-2022-3957.json +++ b/CVE-2022/CVE-2022-39xx/CVE-2022-3957.json @@ -2,8 +2,8 @@ "id": "CVE-2022-3957", "sourceIdentifier": "cna@vuldb.com", "published": "2022-11-11T16:15:16.707", - "lastModified": "2023-05-05T19:45:44.160", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:22.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -55,19 +55,9 @@ ] }, "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-401" - } - ] - }, { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -78,6 +68,16 @@ "value": "CWE-404" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] } ], "configurations": [ @@ -115,6 +115,10 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cna@vuldb.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4202.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4202.json index 1e8cf3287f3..3e1587726b3 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4202.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4202.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4202", "sourceIdentifier": "cna@vuldb.com", "published": "2022-11-29T09:15:09.460", - "lastModified": "2023-02-01T16:08:24.880", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:23.443", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -119,6 +119,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cna@vuldb.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-432xx/CVE-2022-43255.json b/CVE-2022/CVE-2022-432xx/CVE-2022-43255.json index f83bdaaf8c8..7bb79888f46 100644 --- a/CVE-2022/CVE-2022-432xx/CVE-2022-43255.json +++ b/CVE-2022/CVE-2022-432xx/CVE-2022-43255.json @@ -2,8 +2,8 @@ "id": "CVE-2022-43255", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-02T14:15:15.917", - "lastModified": "2023-05-05T20:02:31.100", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:22.260", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -74,6 +74,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-452xx/CVE-2022-45202.json b/CVE-2022/CVE-2022-452xx/CVE-2022-45202.json index 5ee1055d978..fe0645f140c 100644 --- a/CVE-2022/CVE-2022-452xx/CVE-2022-45202.json +++ b/CVE-2022/CVE-2022-452xx/CVE-2022-45202.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45202", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-29T04:15:11.207", - "lastModified": "2022-12-01T21:10:52.020", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:22.340", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -55,8 +55,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev428-gcb8ae46c8-master:*:*:*:*:*:*:*", - "matchCriteriaId": "1B99DAA3-219F-4E47-B284-CAFC786A9F78" + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C" } ] } @@ -72,6 +73,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-452xx/CVE-2022-45283.json b/CVE-2022/CVE-2022-452xx/CVE-2022-45283.json index 80a17ce367f..a7176edcd4c 100644 --- a/CVE-2022/CVE-2022-452xx/CVE-2022-45283.json +++ b/CVE-2022/CVE-2022-452xx/CVE-2022-45283.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45283", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-06T00:15:10.257", - "lastModified": "2022-12-06T20:18:34.987", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:22.423", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -72,6 +72,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45343.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45343.json index de142b69604..fccd34631e1 100644 --- a/CVE-2022/CVE-2022-453xx/CVE-2022-45343.json +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45343.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45343", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-29T16:15:09.293", - "lastModified": "2023-05-05T19:44:42.427", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:22.513", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -74,6 +74,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-470xx/CVE-2022-47086.json b/CVE-2022/CVE-2022-470xx/CVE-2022-47086.json index dd4202bc334..9dab9baec20 100644 --- a/CVE-2022/CVE-2022-470xx/CVE-2022-47086.json +++ b/CVE-2022/CVE-2022-470xx/CVE-2022-47086.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47086", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-05T15:15:10.573", - "lastModified": "2023-05-05T19:45:24.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:22.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -73,6 +73,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-470xx/CVE-2022-47091.json b/CVE-2022/CVE-2022-470xx/CVE-2022-47091.json index 89c2965755a..057b7f590d1 100644 --- a/CVE-2022/CVE-2022-470xx/CVE-2022-47091.json +++ b/CVE-2022/CVE-2022-470xx/CVE-2022-47091.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47091", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-05T15:15:10.750", - "lastModified": "2023-05-05T19:50:47.057", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:22.670", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -73,6 +73,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-470xx/CVE-2022-47094.json b/CVE-2022/CVE-2022-470xx/CVE-2022-47094.json index 6ec69710b30..16fae87a3ff 100644 --- a/CVE-2022/CVE-2022-470xx/CVE-2022-47094.json +++ b/CVE-2022/CVE-2022-470xx/CVE-2022-47094.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47094", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-05T15:15:10.880", - "lastModified": "2023-05-05T19:40:26.283", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:22.737", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -73,6 +73,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-470xx/CVE-2022-47095.json b/CVE-2022/CVE-2022-470xx/CVE-2022-47095.json index 12cde55183d..3baae4b9d59 100644 --- a/CVE-2022/CVE-2022-470xx/CVE-2022-47095.json +++ b/CVE-2022/CVE-2022-470xx/CVE-2022-47095.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47095", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-05T15:15:10.927", - "lastModified": "2023-05-05T19:40:30.743", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:22.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -73,6 +73,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-476xx/CVE-2022-47657.json b/CVE-2022/CVE-2022-476xx/CVE-2022-47657.json index 1ca3d93c051..f3171da933e 100644 --- a/CVE-2022/CVE-2022-476xx/CVE-2022-47657.json +++ b/CVE-2022/CVE-2022-476xx/CVE-2022-47657.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47657", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-05T16:15:10.233", - "lastModified": "2023-05-05T19:38:05.143", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:22.883", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -74,6 +74,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-476xx/CVE-2022-47659.json b/CVE-2022/CVE-2022-476xx/CVE-2022-47659.json index ac37c01f6f4..faa89644ce1 100644 --- a/CVE-2022/CVE-2022-476xx/CVE-2022-47659.json +++ b/CVE-2022/CVE-2022-476xx/CVE-2022-47659.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47659", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-05T16:15:10.670", - "lastModified": "2023-05-05T19:39:01.907", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:22.950", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -74,6 +74,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-476xx/CVE-2022-47660.json b/CVE-2022/CVE-2022-476xx/CVE-2022-47660.json index a158312638d..a9167609bba 100644 --- a/CVE-2022/CVE-2022-476xx/CVE-2022-47660.json +++ b/CVE-2022/CVE-2022-476xx/CVE-2022-47660.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47660", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-05T16:15:10.890", - "lastModified": "2023-05-05T19:39:08.303", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:23.023", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -74,6 +74,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-476xx/CVE-2022-47661.json b/CVE-2022/CVE-2022-476xx/CVE-2022-47661.json index d81759dcdfc..25e937310e3 100644 --- a/CVE-2022/CVE-2022-476xx/CVE-2022-47661.json +++ b/CVE-2022/CVE-2022-476xx/CVE-2022-47661.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47661", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-05T16:15:11.103", - "lastModified": "2023-05-05T19:37:33.643", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:23.093", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -74,6 +74,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-476xx/CVE-2022-47662.json b/CVE-2022/CVE-2022-476xx/CVE-2022-47662.json index 2a5977c45f5..53cfad841ac 100644 --- a/CVE-2022/CVE-2022-476xx/CVE-2022-47662.json +++ b/CVE-2022/CVE-2022-476xx/CVE-2022-47662.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47662", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-05T16:15:11.400", - "lastModified": "2023-05-05T19:49:30.243", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:23.167", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -74,6 +74,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-476xx/CVE-2022-47663.json b/CVE-2022/CVE-2022-476xx/CVE-2022-47663.json index 228e67b2890..25b1b537c52 100644 --- a/CVE-2022/CVE-2022-476xx/CVE-2022-47663.json +++ b/CVE-2022/CVE-2022-476xx/CVE-2022-47663.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47663", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-05T16:15:11.623", - "lastModified": "2023-05-05T19:50:24.380", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:23.247", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -74,6 +74,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0770.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0770.json index dbe89b6f4ac..005472288c0 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0770.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0770.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0770", "sourceIdentifier": "security@huntr.dev", "published": "2023-02-09T22:15:11.170", - "lastModified": "2023-02-16T19:01:36.123", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:23.577", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -103,6 +103,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0818.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0818.json index 255dd8c8c94..1ffd2feb840 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0818.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0818.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0818", "sourceIdentifier": "security@huntr.dev", "published": "2023-02-13T22:15:13.527", - "lastModified": "2023-02-22T20:41:41.600", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:23.697", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -58,7 +58,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security@huntr.dev", "type": "Primary", "description": [ { @@ -68,7 +68,7 @@ ] }, { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { @@ -111,6 +111,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0819.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0819.json index 61ee04976c7..cb4d860aedf 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0819.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0819.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0819", "sourceIdentifier": "security@huntr.dev", "published": "2023-02-13T22:15:13.653", - "lastModified": "2023-02-22T17:55:56.377", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:23.807", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -58,22 +58,22 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security@huntr.dev", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-787" + "value": "CWE-122" } ] }, { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-122" + "value": "CWE-787" } ] } @@ -112,6 +112,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0866.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0866.json index f9a316e6289..e2b8900f9c4 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0866.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0866.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0866", "sourceIdentifier": "security@huntr.dev", "published": "2023-02-16T20:15:15.173", - "lastModified": "2023-02-24T20:35:05.937", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:23.910", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -102,6 +102,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1448.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1448.json index 2b11e9d7736..e207e7c68e9 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1448.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1448.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1448", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-17T07:15:12.093", - "lastModified": "2023-03-23T16:10:19.140", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:24.037", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -143,6 +143,10 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cna@vuldb.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1449.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1449.json index 761da5873a6..d2b026cf7bf 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1449.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1449.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1449", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-17T07:15:12.347", - "lastModified": "2023-03-23T15:46:31.557", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:24.177", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -144,6 +144,10 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cna@vuldb.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1452.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1452.json index 962c30eef79..843af7a276b 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1452.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1452.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1452", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-17T07:15:12.947", - "lastModified": "2023-03-23T15:48:54.197", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:24.287", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -144,6 +144,10 @@ "Third Party Advisory", "VDB Entry" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cna@vuldb.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1654.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1654.json index 7bc403f438e..732922dc64e 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1654.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1654.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1654", "sourceIdentifier": "security@huntr.dev", "published": "2023-03-27T16:15:10.017", - "lastModified": "2023-04-01T01:33:51.577", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:24.377", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -100,6 +100,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1729.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1729.json index 08b582d2e2b..fa814ad35b5 100644 --- a/CVE-2023/CVE-2023-17xx/CVE-2023-1729.json +++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1729.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1729", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-15T22:15:10.350", - "lastModified": "2023-05-24T20:55:15.687", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:24.490", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -143,6 +143,10 @@ "Third Party Advisory" ] }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html", + "source": "secalert@redhat.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZ6XF5WTPJ4GLXQ62JVRDZSVSJHXNQU/", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-231xx/CVE-2023-23143.json b/CVE-2023/CVE-2023-231xx/CVE-2023-23143.json index f0ee7834795..e0c48512dcb 100644 --- a/CVE-2023/CVE-2023-231xx/CVE-2023-23143.json +++ b/CVE-2023/CVE-2023-231xx/CVE-2023-23143.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23143", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:18.277", - "lastModified": "2023-02-01T15:29:26.977", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:24.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -72,6 +72,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-231xx/CVE-2023-23144.json b/CVE-2023/CVE-2023-231xx/CVE-2023-23144.json index e1153dee138..83e59657621 100644 --- a/CVE-2023/CVE-2023-231xx/CVE-2023-23144.json +++ b/CVE-2023/CVE-2023-231xx/CVE-2023-23144.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23144", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:18.333", - "lastModified": "2023-02-01T15:29:37.560", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:24.687", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -72,6 +72,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-231xx/CVE-2023-23145.json b/CVE-2023/CVE-2023-231xx/CVE-2023-23145.json index 015edc696db..4207109cdb2 100644 --- a/CVE-2023/CVE-2023-231xx/CVE-2023-23145.json +++ b/CVE-2023/CVE-2023-231xx/CVE-2023-23145.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23145", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-20T19:15:18.387", - "lastModified": "2023-02-01T15:15:03.497", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:24.763", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -72,6 +72,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25076.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25076.json index 0b3fd022564..97edb76992d 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25076.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25076.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25076", "sourceIdentifier": "talos-cna@cisco.com", "published": "2023-03-30T15:15:07.370", - "lastModified": "2023-04-30T14:15:46.043", + "lastModified": "2023-05-27T04:15:24.837", "vulnStatus": "Modified", "descriptions": [ { @@ -108,6 +108,10 @@ "Mitigation", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5413", + "source": "talos-cna@cisco.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26127.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26127.json new file mode 100644 index 00000000000..1ae7e4ad987 --- /dev/null +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26127.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2023-26127", + "sourceIdentifier": "report@snyk.io", + "published": "2023-05-27T05:15:09.300", + "lastModified": "2023-05-27T05:15:09.300", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "All versions of the package n158 are vulnerable to Command Injection due to improper input sanitization in the 'module.exports' function.\r\r**Note:**\r\rTo execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "report@snyk.io", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://github.com/dsilva2401/n158/blob/master/src/cli/initProject.js%23L8", + "source": "report@snyk.io" + }, + { + "url": "https://security.snyk.io/vuln/SNYK-JS-N158-3183746", + "source": "report@snyk.io" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26128.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26128.json new file mode 100644 index 00000000000..d829cbae2b6 --- /dev/null +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26128.json @@ -0,0 +1,47 @@ +{ + "id": "CVE-2023-26128", + "sourceIdentifier": "report@snyk.io", + "published": "2023-05-27T05:15:09.860", + "lastModified": "2023-05-27T05:15:09.860", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "All versions of the package keep-module-latest are vulnerable to Command Injection due to missing input sanitization or other checks and sandboxes being employed to the installModule function.\r\r**Note:**\r\rTo execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "report@snyk.io", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://github.com/liujunyang/keep-module-latest/blob/master/index.js%23L50", + "source": "report@snyk.io" + }, + { + "url": "https://security.snyk.io/vuln/SNYK-JS-KEEPMODULELATEST-3157165", + "source": "report@snyk.io" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26129.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26129.json new file mode 100644 index 00000000000..27a312bae53 --- /dev/null +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26129.json @@ -0,0 +1,43 @@ +{ + "id": "CVE-2023-26129", + "sourceIdentifier": "report@snyk.io", + "published": "2023-05-27T05:15:09.917", + "lastModified": "2023-05-27T05:15:09.917", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "All versions of the package bwm-ng are vulnerable to Command Injection due to improper input sanitization in the 'check' function in the bwm-ng.js file. \r\r**Note:**\r\rTo execute the code snippet and potentially exploit the vulnerability, the attacker needs to have the ability to run Node.js code within the target environment. This typically requires some level of access to the system or application hosting the Node.js environment." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "report@snyk.io", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://security.snyk.io/vuln/SNYK-JS-BWMNG-3175876", + "source": "report@snyk.io" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2837.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2837.json index 79fb16058c3..11d79df9c5c 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2837.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2837.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2837", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-22T18:15:09.163", - "lastModified": "2023-05-26T03:35:19.260", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:24.960", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -102,6 +102,10 @@ "Patch", "Third Party Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2838.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2838.json index 2998d5e7e34..85dd7a14759 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2838.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2838.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2838", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-22T18:15:09.293", - "lastModified": "2023-05-26T02:15:24.247", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:25.057", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Exploit", "Patch" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2839.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2839.json index 809cc41fbf9..64912c125b3 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2839.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2839.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2839", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-22T18:15:09.360", - "lastModified": "2023-05-26T02:16:18.100", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:25.153", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Exploit", "Patch" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2840.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2840.json index d0ba7bcf8d8..e0edbbd21cc 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2840.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2840.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2840", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-22T18:15:09.423", - "lastModified": "2023-05-26T02:13:45.670", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-27T04:15:25.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Exploit", "Patch" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5411", + "source": "security@huntr.dev" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32686.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32686.json new file mode 100644 index 00000000000..9278351df78 --- /dev/null +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32686.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-32686", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-05-27T04:15:25.347", + "lastModified": "2023-05-27T04:15:25.347", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Kiwi TCMS is an open source test management system for both manual and automated testing. Kiwi TCMS allows users to upload attachments to test plans, test cases, etc. Earlier versions of Kiwi TCMS had introduced upload validators in order to prevent potentially dangerous files from being uploaded. The upload validation checks were not robust enough which left the possibility of an attacker to circumvent them and upload a potentially dangerous file. Exploiting this flaw, a combination of files could be uploaded so that they work together to circumvent the existing Content-Security-Policy and allow execution of arbitrary JavaScript in the browser. This issue has been patched in version 12.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + }, + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kiwitcms/Kiwi/security/advisories/GHSA-x7c2-7wvg-jpx7", + "source": "security-advisories@github.com" + }, + { + "url": "https://kiwitcms.org/blog/kiwi-tcms-team/2023/05/22/kiwi-tcms-123/", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32688.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32688.json new file mode 100644 index 00000000000..b8cc3442884 --- /dev/null +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32688.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-32688", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-05-27T04:15:25.480", + "lastModified": "2023-05-27T04:15:25.480", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "parse-server-push-adapter is the official Push Notification adapter for Parse Server. The Parse Server Push Adapter can crash Parse Server due to an invalid push notification payload. This issue has been patched in version 4.1.3.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/parse-community/parse-server-push-adapter/pull/217", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/parse-community/parse-server-push-adapter/releases/tag/4.1.3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/parse-community/parse-server-push-adapter/security/advisories/GHSA-mxhg-rvwx-x993", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33184.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33184.json new file mode 100644 index 00000000000..c78905b27cb --- /dev/null +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33184.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-33184", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-05-27T05:15:09.980", + "lastModified": "2023-05-27T05:15:09.980", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Nextcloud Mail is a mail app in Nextcloud. A blind SSRF attack allowed to send GET requests to services running in the same web server. It is recommended that the Mail app is update to version 3.02, 2.2.5 or 1.15.3.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/nextcloud/mail/pull/8275", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-8gph-9895-w564", + "source": "security-advisories@github.com" + }, + { + "url": "https://hackerone.com/reports/1913095", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33188.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33188.json new file mode 100644 index 00000000000..94067a8c312 --- /dev/null +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33188.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-33188", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-05-27T04:15:25.577", + "lastModified": "2023-05-27T04:15:25.577", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Omni-notes is an open source note-taking application for Android. The Omni-notes Android app had an insufficient path validation vulnerability when displaying the details of a note received through an externally-provided intent. The paths of the note's attachments were not properly validated, allowing malicious or compromised applications in the same device to force Omni-notes to copy files from its internal storage to its external storage directory, where they would have become accessible to any component with permission to read the external storage. Updating to the newest version (6.2.7) of Omni-notes Android fixes this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-441" + }, + { + "lang": "en", + "value": "CWE-610" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/federicoiosue/Omni-Notes/security/advisories/GHSA-g38r-4cf6-3v32", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33192.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33192.json new file mode 100644 index 00000000000..1188d88efe5 --- /dev/null +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33192.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-33192", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-05-27T04:15:25.673", + "lastModified": "2023-05-27T04:15:25.673", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "ntpd-rs is an NTP implementation written in Rust. ntpd-rs does not validate the length of NTS cookies in received NTP packets to the server. An attacker can crash the server by sending a specially crafted NTP packet containing a cookie shorter than what the server expects. The server also crashes when it is not configured to handle NTS packets. The issue was caused by improper slice indexing. The indexing operations were replaced by safer alternatives that do not crash the ntpd-rs server process but instead properly handle the error condition. A patch was released in version 0.3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-130" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/pendulum-project/ntpd-rs/pull/752", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/pendulum-project/ntpd-rs/security/advisories/GHSA-qwhm-h7v3-mrjx", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33195.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33195.json new file mode 100644 index 00000000000..95a5bde648a --- /dev/null +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33195.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-33195", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-05-27T04:15:25.767", + "lastModified": "2023-05-27T04:15:25.767", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Craft is a CMS for creating custom digital experiences on the web. A malformed RSS feed can deliver an XSS payload. This issue was patched in version 4.4.6.\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/craftcms/cms/commit/b77cb3023bed4f4a37c11294c4d319ff9f598e1f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/craftcms/cms/security/advisories/GHSA-qpgm-gjgf-8c2x", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 04c6ffbc180..6ce5bac3ab2 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-27T04:00:24.407727+00:00 +2023-05-27T06:00:25.014571+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-27T03:42:43.693000+00:00 +2023-05-27T05:15:09.980000+00:00 ``` ### Last Data Feed Release @@ -29,44 +29,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -216141 +216150 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `9` +* [CVE-2023-32686](CVE-2023/CVE-2023-326xx/CVE-2023-32686.json) (`2023-05-27T04:15:25.347`) +* [CVE-2023-32688](CVE-2023/CVE-2023-326xx/CVE-2023-32688.json) (`2023-05-27T04:15:25.480`) +* [CVE-2023-33188](CVE-2023/CVE-2023-331xx/CVE-2023-33188.json) (`2023-05-27T04:15:25.577`) +* [CVE-2023-33192](CVE-2023/CVE-2023-331xx/CVE-2023-33192.json) (`2023-05-27T04:15:25.673`) +* [CVE-2023-33195](CVE-2023/CVE-2023-331xx/CVE-2023-33195.json) (`2023-05-27T04:15:25.767`) +* [CVE-2023-26127](CVE-2023/CVE-2023-261xx/CVE-2023-26127.json) (`2023-05-27T05:15:09.300`) +* [CVE-2023-26128](CVE-2023/CVE-2023-261xx/CVE-2023-26128.json) (`2023-05-27T05:15:09.860`) +* [CVE-2023-26129](CVE-2023/CVE-2023-261xx/CVE-2023-26129.json) (`2023-05-27T05:15:09.917`) +* [CVE-2023-33184](CVE-2023/CVE-2023-331xx/CVE-2023-33184.json) (`2023-05-27T05:15:09.980`) ### CVEs modified in the last Commit -Recently modified CVEs: `30` +Recently modified CVEs: `108` -* [CVE-2023-31101](CVE-2023/CVE-2023-311xx/CVE-2023-31101.json) (`2023-05-27T02:26:38.467`) -* [CVE-2023-31062](CVE-2023/CVE-2023-310xx/CVE-2023-31062.json) (`2023-05-27T02:33:35.133`) -* [CVE-2023-31064](CVE-2023/CVE-2023-310xx/CVE-2023-31064.json) (`2023-05-27T02:44:54.597`) -* [CVE-2023-24329](CVE-2023/CVE-2023-243xx/CVE-2023-24329.json) (`2023-05-27T03:15:34.627`) -* [CVE-2023-32681](CVE-2023/CVE-2023-326xx/CVE-2023-32681.json) (`2023-05-27T03:15:34.727`) -* [CVE-2023-31065](CVE-2023/CVE-2023-310xx/CVE-2023-31065.json) (`2023-05-27T03:21:33.713`) -* [CVE-2023-31066](CVE-2023/CVE-2023-310xx/CVE-2023-31066.json) (`2023-05-27T03:24:41.447`) -* [CVE-2023-2587](CVE-2023/CVE-2023-25xx/CVE-2023-2587.json) (`2023-05-27T03:31:37.057`) -* [CVE-2023-31708](CVE-2023/CVE-2023-317xx/CVE-2023-31708.json) (`2023-05-27T03:39:56.307`) -* [CVE-2023-33785](CVE-2023/CVE-2023-337xx/CVE-2023-33785.json) (`2023-05-27T03:40:16.407`) -* [CVE-2023-33786](CVE-2023/CVE-2023-337xx/CVE-2023-33786.json) (`2023-05-27T03:41:10.783`) -* [CVE-2023-33787](CVE-2023/CVE-2023-337xx/CVE-2023-33787.json) (`2023-05-27T03:41:18.673`) -* [CVE-2023-33800](CVE-2023/CVE-2023-338xx/CVE-2023-33800.json) (`2023-05-27T03:41:22.007`) -* [CVE-2023-33799](CVE-2023/CVE-2023-337xx/CVE-2023-33799.json) (`2023-05-27T03:41:24.217`) -* [CVE-2023-33798](CVE-2023/CVE-2023-337xx/CVE-2023-33798.json) (`2023-05-27T03:41:30.023`) -* [CVE-2023-33797](CVE-2023/CVE-2023-337xx/CVE-2023-33797.json) (`2023-05-27T03:41:35.667`) -* [CVE-2023-33796](CVE-2023/CVE-2023-337xx/CVE-2023-33796.json) (`2023-05-27T03:42:05.720`) -* [CVE-2023-33795](CVE-2023/CVE-2023-337xx/CVE-2023-33795.json) (`2023-05-27T03:42:13.380`) -* [CVE-2023-33794](CVE-2023/CVE-2023-337xx/CVE-2023-33794.json) (`2023-05-27T03:42:30.167`) -* [CVE-2023-33793](CVE-2023/CVE-2023-337xx/CVE-2023-33793.json) (`2023-05-27T03:42:32.437`) -* [CVE-2023-33792](CVE-2023/CVE-2023-337xx/CVE-2023-33792.json) (`2023-05-27T03:42:34.913`) -* [CVE-2023-33791](CVE-2023/CVE-2023-337xx/CVE-2023-33791.json) (`2023-05-27T03:42:37.457`) -* [CVE-2023-33790](CVE-2023/CVE-2023-337xx/CVE-2023-33790.json) (`2023-05-27T03:42:39.840`) -* [CVE-2023-33789](CVE-2023/CVE-2023-337xx/CVE-2023-33789.json) (`2023-05-27T03:42:41.827`) -* [CVE-2023-33788](CVE-2023/CVE-2023-337xx/CVE-2023-33788.json) (`2023-05-27T03:42:43.693`) +* [CVE-2022-47095](CVE-2022/CVE-2022-470xx/CVE-2022-47095.json) (`2023-05-27T04:15:22.810`) +* [CVE-2022-47657](CVE-2022/CVE-2022-476xx/CVE-2022-47657.json) (`2023-05-27T04:15:22.883`) +* [CVE-2022-47659](CVE-2022/CVE-2022-476xx/CVE-2022-47659.json) (`2023-05-27T04:15:22.950`) +* [CVE-2022-47660](CVE-2022/CVE-2022-476xx/CVE-2022-47660.json) (`2023-05-27T04:15:23.023`) +* [CVE-2022-47661](CVE-2022/CVE-2022-476xx/CVE-2022-47661.json) (`2023-05-27T04:15:23.093`) +* [CVE-2022-47662](CVE-2022/CVE-2022-476xx/CVE-2022-47662.json) (`2023-05-27T04:15:23.167`) +* [CVE-2022-47663](CVE-2022/CVE-2022-476xx/CVE-2022-47663.json) (`2023-05-27T04:15:23.247`) +* [CVE-2022-4202](CVE-2022/CVE-2022-42xx/CVE-2022-4202.json) (`2023-05-27T04:15:23.443`) +* [CVE-2023-0770](CVE-2023/CVE-2023-07xx/CVE-2023-0770.json) (`2023-05-27T04:15:23.577`) +* [CVE-2023-0818](CVE-2023/CVE-2023-08xx/CVE-2023-0818.json) (`2023-05-27T04:15:23.697`) +* [CVE-2023-0819](CVE-2023/CVE-2023-08xx/CVE-2023-0819.json) (`2023-05-27T04:15:23.807`) +* [CVE-2023-0866](CVE-2023/CVE-2023-08xx/CVE-2023-0866.json) (`2023-05-27T04:15:23.910`) +* [CVE-2023-1448](CVE-2023/CVE-2023-14xx/CVE-2023-1448.json) (`2023-05-27T04:15:24.037`) +* [CVE-2023-1449](CVE-2023/CVE-2023-14xx/CVE-2023-1449.json) (`2023-05-27T04:15:24.177`) +* [CVE-2023-1452](CVE-2023/CVE-2023-14xx/CVE-2023-1452.json) (`2023-05-27T04:15:24.287`) +* [CVE-2023-1654](CVE-2023/CVE-2023-16xx/CVE-2023-1654.json) (`2023-05-27T04:15:24.377`) +* [CVE-2023-1729](CVE-2023/CVE-2023-17xx/CVE-2023-1729.json) (`2023-05-27T04:15:24.490`) +* [CVE-2023-23143](CVE-2023/CVE-2023-231xx/CVE-2023-23143.json) (`2023-05-27T04:15:24.607`) +* [CVE-2023-23144](CVE-2023/CVE-2023-231xx/CVE-2023-23144.json) (`2023-05-27T04:15:24.687`) +* [CVE-2023-23145](CVE-2023/CVE-2023-231xx/CVE-2023-23145.json) (`2023-05-27T04:15:24.763`) +* [CVE-2023-25076](CVE-2023/CVE-2023-250xx/CVE-2023-25076.json) (`2023-05-27T04:15:24.837`) +* [CVE-2023-2837](CVE-2023/CVE-2023-28xx/CVE-2023-2837.json) (`2023-05-27T04:15:24.960`) +* [CVE-2023-2838](CVE-2023/CVE-2023-28xx/CVE-2023-2838.json) (`2023-05-27T04:15:25.057`) +* [CVE-2023-2839](CVE-2023/CVE-2023-28xx/CVE-2023-2839.json) (`2023-05-27T04:15:25.153`) +* [CVE-2023-2840](CVE-2023/CVE-2023-28xx/CVE-2023-2840.json) (`2023-05-27T04:15:25.250`) ## Download and Usage