From e89378aa019cbc595440ed153dd2dd78867acd94 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 29 Sep 2023 12:00:28 +0000 Subject: [PATCH] Auto-Update: 2023-09-29T12:00:24.726282+00:00 --- CVE-2018/CVE-2018-11xx/CVE-2018-1160.json | 9 +- CVE-2018/CVE-2018-168xx/CVE-2018-16877.json | 16 ++-- CVE-2018/CVE-2018-168xx/CVE-2018-16878.json | 12 ++- CVE-2018/CVE-2018-79xx/CVE-2018-7998.json | 6 +- CVE-2019/CVE-2019-175xx/CVE-2019-17534.json | 6 +- CVE-2019/CVE-2019-38xx/CVE-2019-3885.json | 6 +- CVE-2019/CVE-2019-69xx/CVE-2019-6976.json | 6 +- CVE-2020/CVE-2020-207xx/CVE-2020-20739.json | 6 +- CVE-2020/CVE-2020-256xx/CVE-2020-25654.json | 16 ++-- CVE-2021/CVE-2021-278xx/CVE-2021-27847.json | 6 +- CVE-2021/CVE-2021-326xx/CVE-2021-32621.json | 6 +- CVE-2022/CVE-2022-01xx/CVE-2022-0194.json | 6 +- CVE-2022/CVE-2022-231xx/CVE-2022-23121.json | 6 +- CVE-2022/CVE-2022-231xx/CVE-2022-23122.json | 6 +- CVE-2022/CVE-2022-231xx/CVE-2022-23123.json | 6 +- CVE-2022/CVE-2022-231xx/CVE-2022-23124.json | 6 +- CVE-2022/CVE-2022-231xx/CVE-2022-23125.json | 6 +- CVE-2022/CVE-2022-436xx/CVE-2022-43634.json | 6 +- CVE-2022/CVE-2022-451xx/CVE-2022-45188.json | 10 ++- CVE-2023/CVE-2023-292xx/CVE-2023-29206.json | 94 +++++++++++++++++++-- CVE-2023/CVE-2023-51xx/CVE-2023-5159.json | 55 ++++++++++++ CVE-2023/CVE-2023-51xx/CVE-2023-5193.json | 55 ++++++++++++ CVE-2023/CVE-2023-51xx/CVE-2023-5194.json | 55 ++++++++++++ CVE-2023/CVE-2023-51xx/CVE-2023-5195.json | 55 ++++++++++++ CVE-2023/CVE-2023-51xx/CVE-2023-5196.json | 55 ++++++++++++ CVE-2023/CVE-2023-52xx/CVE-2023-5257.json | 88 +++++++++++++++++++ README.md | 40 +++++++-- 27 files changed, 563 insertions(+), 81 deletions(-) create mode 100644 CVE-2023/CVE-2023-51xx/CVE-2023-5159.json create mode 100644 CVE-2023/CVE-2023-51xx/CVE-2023-5193.json create mode 100644 CVE-2023/CVE-2023-51xx/CVE-2023-5194.json create mode 100644 CVE-2023/CVE-2023-51xx/CVE-2023-5195.json create mode 100644 CVE-2023/CVE-2023-51xx/CVE-2023-5196.json create mode 100644 CVE-2023/CVE-2023-52xx/CVE-2023-5257.json diff --git a/CVE-2018/CVE-2018-11xx/CVE-2018-1160.json b/CVE-2018/CVE-2018-11xx/CVE-2018-1160.json index 6e8287c0e2b..a3d309de35e 100644 --- a/CVE-2018/CVE-2018-11xx/CVE-2018-1160.json +++ b/CVE-2018/CVE-2018-11xx/CVE-2018-1160.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1160", "sourceIdentifier": "vulnreport@tenable.com", "published": "2018-12-20T21:29:00.477", - "lastModified": "2019-10-09T23:38:11.960", + "lastModified": "2023-09-29T11:15:02.217", "vulnStatus": "Modified", "descriptions": [ { @@ -87,7 +87,6 @@ ], "configurations": [ { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -95,16 +94,15 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:netatalk_project:netatalk:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.1.12", - "matchCriteriaId": "F451C759-610D-49B9-A591-A4478149249C" + "matchCriteriaId": "932BF878-A6E6-42A0-859F-0CD36B714BCF" } ] } ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", @@ -175,7 +173,6 @@ ] }, { - "operator": "AND", "nodes": [ { "operator": "OR", diff --git a/CVE-2018/CVE-2018-168xx/CVE-2018-16877.json b/CVE-2018/CVE-2018-168xx/CVE-2018-16877.json index 9cc3e776858..5b9695f9a5f 100644 --- a/CVE-2018/CVE-2018-168xx/CVE-2018-16877.json +++ b/CVE-2018/CVE-2018-168xx/CVE-2018-16877.json @@ -2,8 +2,8 @@ "id": "CVE-2018-16877", "sourceIdentifier": "secalert@redhat.com", "published": "2019-04-18T18:29:00.297", - "lastModified": "2022-10-07T02:09:01.683", - "vulnStatus": "Analyzed", + "lastModified": "2023-09-29T11:15:41.320", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -87,22 +87,22 @@ }, "weaknesses": [ { - "source": "secalert@redhat.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-287" + "value": "NVD-CWE-noinfo" } ] }, { - "source": "nvd@nist.gov", + "source": "secalert@redhat.com", "type": "Secondary", "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-287" } ] } @@ -367,6 +367,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202309-09", + "source": "secalert@redhat.com" + }, { "url": "https://usn.ubuntu.com/3952-1/", "source": "secalert@redhat.com", diff --git a/CVE-2018/CVE-2018-168xx/CVE-2018-16878.json b/CVE-2018/CVE-2018-168xx/CVE-2018-16878.json index 7b8ca02a5fb..f8135616ea6 100644 --- a/CVE-2018/CVE-2018-168xx/CVE-2018-16878.json +++ b/CVE-2018/CVE-2018-168xx/CVE-2018-16878.json @@ -2,8 +2,8 @@ "id": "CVE-2018-16878", "sourceIdentifier": "secalert@redhat.com", "published": "2019-04-18T18:29:00.390", - "lastModified": "2022-10-07T02:09:15.493", - "vulnStatus": "Analyzed", + "lastModified": "2023-09-29T11:15:41.497", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -87,7 +87,7 @@ }, "weaknesses": [ { - "source": "secalert@redhat.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -97,7 +97,7 @@ ] }, { - "source": "nvd@nist.gov", + "source": "secalert@redhat.com", "type": "Secondary", "description": [ { @@ -367,6 +367,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202309-09", + "source": "secalert@redhat.com" + }, { "url": "https://usn.ubuntu.com/3952-1/", "source": "secalert@redhat.com", diff --git a/CVE-2018/CVE-2018-79xx/CVE-2018-7998.json b/CVE-2018/CVE-2018-79xx/CVE-2018-7998.json index dab5de9f809..b77d59f8858 100644 --- a/CVE-2018/CVE-2018-79xx/CVE-2018-7998.json +++ b/CVE-2018/CVE-2018-79xx/CVE-2018-7998.json @@ -2,7 +2,7 @@ "id": "CVE-2018-7998", "sourceIdentifier": "cve@mitre.org", "published": "2018-03-09T19:29:01.070", - "lastModified": "2018-03-27T16:34:41.717", + "lastModified": "2023-09-29T11:18:03.783", "vulnStatus": "Analyzed", "descriptions": [ { @@ -88,9 +88,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:libvips_project:libvips:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:libvips:libvips:*:*:*:*:*:*:*:*", "versionEndExcluding": "8.6.3", - "matchCriteriaId": "B58A0298-8C5D-4550-84BF-22AA1A9107DC" + "matchCriteriaId": "C08516AC-8FCD-4517-95F9-6124D5C676C3" } ] } diff --git a/CVE-2019/CVE-2019-175xx/CVE-2019-17534.json b/CVE-2019/CVE-2019-175xx/CVE-2019-17534.json index ce7f3d29f78..cfc8c04d28a 100644 --- a/CVE-2019/CVE-2019-175xx/CVE-2019-17534.json +++ b/CVE-2019/CVE-2019-175xx/CVE-2019-17534.json @@ -2,7 +2,7 @@ "id": "CVE-2019-17534", "sourceIdentifier": "cve@mitre.org", "published": "2019-10-13T02:15:12.317", - "lastModified": "2019-10-17T16:10:28.807", + "lastModified": "2023-09-29T11:18:03.783", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:libvips_project:libvips:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:libvips:libvips:*:*:*:*:*:*:*:*", "versionEndExcluding": "8.8.2", - "matchCriteriaId": "AB92353C-1E56-4BAA-9898-5FBC3AB81B0F" + "matchCriteriaId": "44FDB8A1-CE91-4B0D-9C42-418089DE0F9A" } ] } diff --git a/CVE-2019/CVE-2019-38xx/CVE-2019-3885.json b/CVE-2019/CVE-2019-38xx/CVE-2019-3885.json index 4d8112c251b..5b06a29aec9 100644 --- a/CVE-2019/CVE-2019-38xx/CVE-2019-3885.json +++ b/CVE-2019/CVE-2019-38xx/CVE-2019-3885.json @@ -2,7 +2,7 @@ "id": "CVE-2019-3885", "sourceIdentifier": "secalert@redhat.com", "published": "2019-04-18T18:29:01.033", - "lastModified": "2019-05-27T18:29:00.903", + "lastModified": "2023-09-29T11:15:41.687", "vulnStatus": "Modified", "descriptions": [ { @@ -211,6 +211,10 @@ "Third Party Advisory" ] }, + { + "url": "https://security.gentoo.org/glsa/202309-09", + "source": "secalert@redhat.com" + }, { "url": "https://usn.ubuntu.com/3952-1/", "source": "secalert@redhat.com", diff --git a/CVE-2019/CVE-2019-69xx/CVE-2019-6976.json b/CVE-2019/CVE-2019-69xx/CVE-2019-6976.json index d5f620cffe8..f3ea0410153 100644 --- a/CVE-2019/CVE-2019-69xx/CVE-2019-6976.json +++ b/CVE-2019/CVE-2019-69xx/CVE-2019-6976.json @@ -2,7 +2,7 @@ "id": "CVE-2019-6976", "sourceIdentifier": "cve@mitre.org", "published": "2019-01-26T23:29:00.237", - "lastModified": "2020-08-24T17:37:01.140", + "lastModified": "2023-09-29T11:18:03.783", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:libvips_project:libvips:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:libvips:libvips:*:*:*:*:*:*:*:*", "versionEndExcluding": "8.7.4", - "matchCriteriaId": "110B0195-6A91-4DEE-AD93-ADD9937B5C3B" + "matchCriteriaId": "0C203CDF-BF2B-4B8B-BC30-493C35990B96" } ] } diff --git a/CVE-2020/CVE-2020-207xx/CVE-2020-20739.json b/CVE-2020/CVE-2020-207xx/CVE-2020-20739.json index 73ea877ba66..46760c7abe6 100644 --- a/CVE-2020/CVE-2020-207xx/CVE-2020-20739.json +++ b/CVE-2020/CVE-2020-207xx/CVE-2020-20739.json @@ -2,7 +2,7 @@ "id": "CVE-2020-20739", "sourceIdentifier": "cve@mitre.org", "published": "2020-11-20T19:15:11.710", - "lastModified": "2022-01-01T18:19:25.847", + "lastModified": "2023-09-29T11:18:03.783", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:libvips_project:libvips:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:libvips:libvips:*:*:*:*:*:*:*:*", "versionEndExcluding": "8.8.2", - "matchCriteriaId": "AB92353C-1E56-4BAA-9898-5FBC3AB81B0F" + "matchCriteriaId": "44FDB8A1-CE91-4B0D-9C42-418089DE0F9A" } ] } diff --git a/CVE-2020/CVE-2020-256xx/CVE-2020-25654.json b/CVE-2020/CVE-2020-256xx/CVE-2020-25654.json index 4cfbd108c71..fc841bae5df 100644 --- a/CVE-2020/CVE-2020-256xx/CVE-2020-25654.json +++ b/CVE-2020/CVE-2020-256xx/CVE-2020-25654.json @@ -2,8 +2,8 @@ "id": "CVE-2020-25654", "sourceIdentifier": "secalert@redhat.com", "published": "2020-11-24T20:15:11.790", - "lastModified": "2022-10-21T19:23:13.813", - "vulnStatus": "Analyzed", + "lastModified": "2023-09-29T11:15:41.830", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -65,22 +65,22 @@ }, "weaknesses": [ { - "source": "secalert@redhat.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-284" + "value": "NVD-CWE-Other" } ] }, { - "source": "nvd@nist.gov", + "source": "secalert@redhat.com", "type": "Secondary", "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-284" } ] } @@ -162,6 +162,10 @@ "Mailing List", "Third Party Advisory" ] + }, + { + "url": "https://security.gentoo.org/glsa/202309-09", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-278xx/CVE-2021-27847.json b/CVE-2021/CVE-2021-278xx/CVE-2021-27847.json index 6dfb61ea5b6..b790f4fa59c 100644 --- a/CVE-2021/CVE-2021-278xx/CVE-2021-27847.json +++ b/CVE-2021/CVE-2021-278xx/CVE-2021-27847.json @@ -2,7 +2,7 @@ "id": "CVE-2021-27847", "sourceIdentifier": "cve@mitre.org", "published": "2021-07-15T16:15:09.493", - "lastModified": "2021-07-28T01:28:46.627", + "lastModified": "2023-09-29T11:18:03.783", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,8 +84,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:libvips_project:libvips:8.10.5:*:*:*:*:*:*:*", - "matchCriteriaId": "D0F41426-E181-48B0-A15C-F3981CD4F659" + "criteria": "cpe:2.3:a:libvips:libvips:8.10.5:*:*:*:*:*:*:*", + "matchCriteriaId": "20046851-6B83-4276-938A-5D3499EA3EAF" } ] } diff --git a/CVE-2021/CVE-2021-326xx/CVE-2021-32621.json b/CVE-2021/CVE-2021-326xx/CVE-2021-32621.json index 4f6800e62c5..3b2a6efdf3d 100644 --- a/CVE-2021/CVE-2021-326xx/CVE-2021-32621.json +++ b/CVE-2021/CVE-2021-326xx/CVE-2021-32621.json @@ -2,7 +2,7 @@ "id": "CVE-2021-32621", "sourceIdentifier": "security-advisories@github.com", "published": "2021-05-28T21:15:08.980", - "lastModified": "2021-09-07T22:02:43.543", + "lastModified": "2023-09-29T11:39:46.370", "vulnStatus": "Analyzed", "descriptions": [ { @@ -123,8 +123,8 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:xwiki:xwiki:3.0:milestone_3:*:*:*:*:*:*", - "matchCriteriaId": "82944B21-44EB-4133-BF47-0A51876E8F3B" + "criteria": "cpe:2.3:a:xwiki:xwiki:3.0:milestone3:*:*:*:*:*:*", + "matchCriteriaId": "A45A230D-909F-42D3-836D-95660805B094" }, { "vulnerable": true, diff --git a/CVE-2022/CVE-2022-01xx/CVE-2022-0194.json b/CVE-2022/CVE-2022-01xx/CVE-2022-0194.json index 02c0c5108a6..65b0af61aa2 100644 --- a/CVE-2022/CVE-2022-01xx/CVE-2022-0194.json +++ b/CVE-2022/CVE-2022-01xx/CVE-2022-0194.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0194", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-28T19:15:09.877", - "lastModified": "2023-09-21T05:15:10.610", + "lastModified": "2023-09-29T11:15:02.217", "vulnStatus": "Modified", "descriptions": [ { @@ -77,9 +77,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:netatalk_project:netatalk:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.1.13", - "matchCriteriaId": "F33D3A34-9F9E-4AF7-B373-48BC079D8D8B" + "matchCriteriaId": "24D5049D-2145-4D39-BFAC-6D810026956D" } ] } diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23121.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23121.json index ddad9fba059..f54b3be6f55 100644 --- a/CVE-2022/CVE-2022-231xx/CVE-2022-23121.json +++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23121.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23121", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-28T19:15:10.203", - "lastModified": "2023-09-21T05:15:11.227", + "lastModified": "2023-09-29T11:15:02.217", "vulnStatus": "Modified", "descriptions": [ { @@ -77,9 +77,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:netatalk_project:netatalk:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.1.13", - "matchCriteriaId": "F33D3A34-9F9E-4AF7-B373-48BC079D8D8B" + "matchCriteriaId": "24D5049D-2145-4D39-BFAC-6D810026956D" } ] } diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23122.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23122.json index 91d132a595b..ac98ef9a23e 100644 --- a/CVE-2022/CVE-2022-231xx/CVE-2022-23122.json +++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23122.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23122", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-28T19:15:10.283", - "lastModified": "2023-09-21T05:15:11.477", + "lastModified": "2023-09-29T11:15:02.217", "vulnStatus": "Modified", "descriptions": [ { @@ -77,9 +77,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:netatalk_project:netatalk:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.1.13", - "matchCriteriaId": "F33D3A34-9F9E-4AF7-B373-48BC079D8D8B" + "matchCriteriaId": "24D5049D-2145-4D39-BFAC-6D810026956D" } ] } diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23123.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23123.json index 8d8155e8bb4..1f40b7e7c72 100644 --- a/CVE-2022/CVE-2022-231xx/CVE-2022-23123.json +++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23123.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23123", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-28T19:15:10.340", - "lastModified": "2023-09-21T05:15:11.657", + "lastModified": "2023-09-29T11:15:02.217", "vulnStatus": "Modified", "descriptions": [ { @@ -77,9 +77,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:netatalk_project:netatalk:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.1.13", - "matchCriteriaId": "F33D3A34-9F9E-4AF7-B373-48BC079D8D8B" + "matchCriteriaId": "24D5049D-2145-4D39-BFAC-6D810026956D" } ] } diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23124.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23124.json index e68558d8dde..fb4c2985c7a 100644 --- a/CVE-2022/CVE-2022-231xx/CVE-2022-23124.json +++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23124.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23124", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-28T19:15:10.407", - "lastModified": "2023-09-21T05:15:12.133", + "lastModified": "2023-09-29T11:15:02.217", "vulnStatus": "Modified", "descriptions": [ { @@ -77,9 +77,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:netatalk_project:netatalk:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.1.13", - "matchCriteriaId": "F33D3A34-9F9E-4AF7-B373-48BC079D8D8B" + "matchCriteriaId": "24D5049D-2145-4D39-BFAC-6D810026956D" } ] } diff --git a/CVE-2022/CVE-2022-231xx/CVE-2022-23125.json b/CVE-2022/CVE-2022-231xx/CVE-2022-23125.json index d15c0aba2c5..3cb1f7b1eae 100644 --- a/CVE-2022/CVE-2022-231xx/CVE-2022-23125.json +++ b/CVE-2022/CVE-2022-231xx/CVE-2022-23125.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23125", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-28T19:15:10.507", - "lastModified": "2023-09-21T05:15:12.473", + "lastModified": "2023-09-29T11:15:02.217", "vulnStatus": "Modified", "descriptions": [ { @@ -77,9 +77,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:netatalk_project:netatalk:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.1.13", - "matchCriteriaId": "F33D3A34-9F9E-4AF7-B373-48BC079D8D8B" + "matchCriteriaId": "24D5049D-2145-4D39-BFAC-6D810026956D" } ] } diff --git a/CVE-2022/CVE-2022-436xx/CVE-2022-43634.json b/CVE-2022/CVE-2022-436xx/CVE-2022-43634.json index 4ff0224deac..9631f348bd7 100644 --- a/CVE-2022/CVE-2022-436xx/CVE-2022-43634.json +++ b/CVE-2022/CVE-2022-436xx/CVE-2022-43634.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43634", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:20.273", - "lastModified": "2023-09-21T05:15:12.860", + "lastModified": "2023-09-29T11:15:02.217", "vulnStatus": "Modified", "descriptions": [ { @@ -77,8 +77,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:netatalk_project:netatalk:3.1.13:*:*:*:*:*:*:*", - "matchCriteriaId": "49353553-08A2-488D-83D8-BCF52B050972" + "criteria": "cpe:2.3:a:netatalk:netatalk:3.1.13:*:*:*:*:*:*:*", + "matchCriteriaId": "867EF831-7528-413A-9101-8E04E25B6E1D" } ] } diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45188.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45188.json index 9d0638d907c..6045f9ff6c5 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45188.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45188.json @@ -2,12 +2,16 @@ "id": "CVE-2022-45188", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-12T05:15:12.907", - "lastModified": "2023-09-21T05:15:13.260", + "lastModified": "2023-09-29T11:15:02.217", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Netatalk through 3.1.13 has an afp_getappl heap-based buffer overflow resulting in code execution via a crafted .appl file. This provides remote root access on some platforms such as FreeBSD (used for TrueNAS)." + }, + { + "lang": "es", + "value": "Netatalk hasta 3.1.13 tiene un Desbordamiento del B\u00fafer en afp_getappl que genera la ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de un archivo .appl manipulado. Esto proporciona acceso ra\u00edz remoto en algunas plataformas como FreeBSD (utilizado para TrueNAS)." } ], "metrics": { @@ -55,9 +59,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:netatalk_project:netatalk:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:netatalk:netatalk:*:*:*:*:*:*:*:*", "versionEndIncluding": "3.1.13", - "matchCriteriaId": "6F34F8D9-7FCD-4A50-A8C1-958EFF8D8C16" + "matchCriteriaId": "A29B1686-B026-44F9-AB3F-E335CBE3A387" } ] } diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29206.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29206.json index c195b5b7932..32556aae521 100644 --- a/CVE-2023/CVE-2023-292xx/CVE-2023-29206.json +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29206.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29206", "sourceIdentifier": "security-advisories@github.com", "published": "2023-04-15T16:15:07.270", - "lastModified": "2023-04-17T13:12:43.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-29T11:39:46.370", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,26 +66,86 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartExcluding": "3.0", + "versionEndIncluding": "14.8", + "matchCriteriaId": "7C491502-CE8F-4A01-8896-2461BBDC3434" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "B80CC851-2324-437A-B4A5-06A5EB2FE180" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:3.0:milestone_2:*:*:*:*:*:*", + "matchCriteriaId": "F5F1C457-1591-4025-BD49-BABB9BA9762F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:3.0:milestone3:*:*:*:*:*:*", + "matchCriteriaId": "A45A230D-909F-42D3-836D-95660805B094" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:3.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "6400CA62-5250-4BA5-A94B-7D529CDBE38E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/xwiki/xwiki-platform/commit/fe65bc35d5672dd2505b7ac4ec42aec57d500fbb", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-cmvg-w72j-7phx", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-19514", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-19583", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-9119", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5159.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5159.json new file mode 100644 index 00000000000..1361df449ef --- /dev/null +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5159.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-5159", + "sourceIdentifier": "responsibledisclosure@mattermost.com", + "published": "2023-09-29T10:15:10.530", + "lastModified": "2023-09-29T10:15:10.530", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Mattermost fails to properly verify the permissions when managing/updating a bot allowing a\u00a0User Manager role with user edit permissions to manage/update bots.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://mattermost.com/security-updates", + "source": "responsibledisclosure@mattermost.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5193.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5193.json new file mode 100644 index 00000000000..e92dc570be2 --- /dev/null +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5193.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-5193", + "sourceIdentifier": "responsibledisclosure@mattermost.com", + "published": "2023-09-29T10:15:10.687", + "lastModified": "2023-09-29T10:15:10.687", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Mattermost fails to properly check permissions when retrieving a post allowing for\u00a0a System Role with the permission to manage channels to read the posts of a DM conversation.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://mattermost.com/security-updates", + "source": "responsibledisclosure@mattermost.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5194.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5194.json new file mode 100644 index 00000000000..4e3a021a427 --- /dev/null +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5194.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-5194", + "sourceIdentifier": "responsibledisclosure@mattermost.com", + "published": "2023-09-29T10:15:10.757", + "lastModified": "2023-09-29T10:15:10.757", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Mattermost fails to properly validate permissions when demoting and deactivating a user allowing for a\u00a0system/user manager to demote / deactivate another manager\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://mattermost.com/security-updates", + "source": "responsibledisclosure@mattermost.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5195.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5195.json new file mode 100644 index 00000000000..87b9166a12e --- /dev/null +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5195.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-5195", + "sourceIdentifier": "responsibledisclosure@mattermost.com", + "published": "2023-09-29T10:15:10.823", + "lastModified": "2023-09-29T10:15:10.823", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Mattermost fails to properly validate the permissions when soft deleting a team allowing a team member to soft delete other teams that they are not part of\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://mattermost.com/security-updates", + "source": "responsibledisclosure@mattermost.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5196.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5196.json new file mode 100644 index 00000000000..ea2516d1164 --- /dev/null +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5196.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-5196", + "sourceIdentifier": "responsibledisclosure@mattermost.com", + "published": "2023-09-29T10:15:10.890", + "lastModified": "2023-09-29T10:15:10.890", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Mattermost fails to enforce character limits in all possible notification props allowing an attacker to\u00a0send a really long value for a notification_prop resulting in the server consuming an abnormal quantity of computing resources and possibly becoming temporarily unavailable for its users. \n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://mattermost.com/security-updates", + "source": "responsibledisclosure@mattermost.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5257.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5257.json new file mode 100644 index 00000000000..5b02f67b090 --- /dev/null +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5257.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-5257", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-09-29T11:15:41.977", + "lastModified": "2023-09-29T11:15:41.977", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in WhiteHSBG JNDIExploit 1.4 on Windows. It has been rated as problematic. Affected by this issue is the function handleFileRequest of the file src/main/java/com/feihong/ldap/HTTPServer.java. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used. VDB-240866 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL", + "baseScore": 2.7 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 5.1, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/WhiteHSBG/JNDIExploit/issues/10", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.240866", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.240866", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 65e8c620f34..2d55699cd13 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-09-29T10:00:24.166515+00:00 +2023-09-29T12:00:24.726282+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-09-29T09:15:10.180000+00:00 +2023-09-29T11:39:46.370000+00:00 ``` ### Last Data Feed Release @@ -29,23 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -226579 +226585 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `6` -* [CVE-2023-32477](CVE-2023/CVE-2023-324xx/CVE-2023-32477.json) (`2023-09-29T08:15:09.437`) -* [CVE-2023-3922](CVE-2023/CVE-2023-39xx/CVE-2023-3922.json) (`2023-09-29T08:15:09.537`) -* [CVE-2023-5198](CVE-2023/CVE-2023-51xx/CVE-2023-5198.json) (`2023-09-29T08:15:09.610`) -* [CVE-2023-3413](CVE-2023/CVE-2023-34xx/CVE-2023-3413.json) (`2023-09-29T09:15:10.180`) +* [CVE-2023-5159](CVE-2023/CVE-2023-51xx/CVE-2023-5159.json) (`2023-09-29T10:15:10.530`) +* [CVE-2023-5193](CVE-2023/CVE-2023-51xx/CVE-2023-5193.json) (`2023-09-29T10:15:10.687`) +* [CVE-2023-5194](CVE-2023/CVE-2023-51xx/CVE-2023-5194.json) (`2023-09-29T10:15:10.757`) +* [CVE-2023-5195](CVE-2023/CVE-2023-51xx/CVE-2023-5195.json) (`2023-09-29T10:15:10.823`) +* [CVE-2023-5196](CVE-2023/CVE-2023-51xx/CVE-2023-5196.json) (`2023-09-29T10:15:10.890`) +* [CVE-2023-5257](CVE-2023/CVE-2023-52xx/CVE-2023-5257.json) (`2023-09-29T11:15:41.977`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `20` +* [CVE-2018-1160](CVE-2018/CVE-2018-11xx/CVE-2018-1160.json) (`2023-09-29T11:15:02.217`) +* [CVE-2018-16877](CVE-2018/CVE-2018-168xx/CVE-2018-16877.json) (`2023-09-29T11:15:41.320`) +* [CVE-2018-16878](CVE-2018/CVE-2018-168xx/CVE-2018-16878.json) (`2023-09-29T11:15:41.497`) +* [CVE-2018-7998](CVE-2018/CVE-2018-79xx/CVE-2018-7998.json) (`2023-09-29T11:18:03.783`) +* [CVE-2019-3885](CVE-2019/CVE-2019-38xx/CVE-2019-3885.json) (`2023-09-29T11:15:41.687`) +* [CVE-2019-6976](CVE-2019/CVE-2019-69xx/CVE-2019-6976.json) (`2023-09-29T11:18:03.783`) +* [CVE-2019-17534](CVE-2019/CVE-2019-175xx/CVE-2019-17534.json) (`2023-09-29T11:18:03.783`) +* [CVE-2020-25654](CVE-2020/CVE-2020-256xx/CVE-2020-25654.json) (`2023-09-29T11:15:41.830`) +* [CVE-2020-20739](CVE-2020/CVE-2020-207xx/CVE-2020-20739.json) (`2023-09-29T11:18:03.783`) +* [CVE-2021-27847](CVE-2021/CVE-2021-278xx/CVE-2021-27847.json) (`2023-09-29T11:18:03.783`) +* [CVE-2021-32621](CVE-2021/CVE-2021-326xx/CVE-2021-32621.json) (`2023-09-29T11:39:46.370`) +* [CVE-2022-45188](CVE-2022/CVE-2022-451xx/CVE-2022-45188.json) (`2023-09-29T11:15:02.217`) +* [CVE-2022-0194](CVE-2022/CVE-2022-01xx/CVE-2022-0194.json) (`2023-09-29T11:15:02.217`) +* [CVE-2022-23121](CVE-2022/CVE-2022-231xx/CVE-2022-23121.json) (`2023-09-29T11:15:02.217`) +* [CVE-2022-23122](CVE-2022/CVE-2022-231xx/CVE-2022-23122.json) (`2023-09-29T11:15:02.217`) +* [CVE-2022-23123](CVE-2022/CVE-2022-231xx/CVE-2022-23123.json) (`2023-09-29T11:15:02.217`) +* [CVE-2022-23124](CVE-2022/CVE-2022-231xx/CVE-2022-23124.json) (`2023-09-29T11:15:02.217`) +* [CVE-2022-23125](CVE-2022/CVE-2022-231xx/CVE-2022-23125.json) (`2023-09-29T11:15:02.217`) +* [CVE-2022-43634](CVE-2022/CVE-2022-436xx/CVE-2022-43634.json) (`2023-09-29T11:15:02.217`) +* [CVE-2023-29206](CVE-2023/CVE-2023-292xx/CVE-2023-29206.json) (`2023-09-29T11:39:46.370`) ## Download and Usage