From ea22cf63fb78df89392c568d749a71ba380ebfe7 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 3 Aug 2023 02:00:34 +0000 Subject: [PATCH] Auto-Update: 2023-08-03T02:00:30.847736+00:00 --- CVE-2023/CVE-2023-333xx/CVE-2023-33368.json | 24 ++++++++++ CVE-2023/CVE-2023-333xx/CVE-2023-33369.json | 24 ++++++++++ CVE-2023/CVE-2023-333xx/CVE-2023-33370.json | 24 ++++++++++ CVE-2023/CVE-2023-333xx/CVE-2023-33371.json | 24 ++++++++++ CVE-2023/CVE-2023-346xx/CVE-2023-34644.json | 4 +- CVE-2023/CVE-2023-360xx/CVE-2023-36082.json | 28 ++++++++++++ CVE-2023/CVE-2023-40xx/CVE-2023-4068.json | 24 ++++++++++ CVE-2023/CVE-2023-40xx/CVE-2023-4069.json | 24 ++++++++++ CVE-2023/CVE-2023-40xx/CVE-2023-4070.json | 24 ++++++++++ CVE-2023/CVE-2023-40xx/CVE-2023-4071.json | 24 ++++++++++ CVE-2023/CVE-2023-40xx/CVE-2023-4072.json | 24 ++++++++++ CVE-2023/CVE-2023-40xx/CVE-2023-4073.json | 24 ++++++++++ CVE-2023/CVE-2023-40xx/CVE-2023-4074.json | 24 ++++++++++ CVE-2023/CVE-2023-40xx/CVE-2023-4075.json | 24 ++++++++++ CVE-2023/CVE-2023-40xx/CVE-2023-4076.json | 24 ++++++++++ CVE-2023/CVE-2023-40xx/CVE-2023-4077.json | 24 ++++++++++ CVE-2023/CVE-2023-40xx/CVE-2023-4078.json | 24 ++++++++++ README.md | 49 ++++++++++----------- 18 files changed, 413 insertions(+), 28 deletions(-) create mode 100644 CVE-2023/CVE-2023-333xx/CVE-2023-33368.json create mode 100644 CVE-2023/CVE-2023-333xx/CVE-2023-33369.json create mode 100644 CVE-2023/CVE-2023-333xx/CVE-2023-33370.json create mode 100644 CVE-2023/CVE-2023-333xx/CVE-2023-33371.json create mode 100644 CVE-2023/CVE-2023-360xx/CVE-2023-36082.json create mode 100644 CVE-2023/CVE-2023-40xx/CVE-2023-4068.json create mode 100644 CVE-2023/CVE-2023-40xx/CVE-2023-4069.json create mode 100644 CVE-2023/CVE-2023-40xx/CVE-2023-4070.json create mode 100644 CVE-2023/CVE-2023-40xx/CVE-2023-4071.json create mode 100644 CVE-2023/CVE-2023-40xx/CVE-2023-4072.json create mode 100644 CVE-2023/CVE-2023-40xx/CVE-2023-4073.json create mode 100644 CVE-2023/CVE-2023-40xx/CVE-2023-4074.json create mode 100644 CVE-2023/CVE-2023-40xx/CVE-2023-4075.json create mode 100644 CVE-2023/CVE-2023-40xx/CVE-2023-4076.json create mode 100644 CVE-2023/CVE-2023-40xx/CVE-2023-4077.json create mode 100644 CVE-2023/CVE-2023-40xx/CVE-2023-4078.json diff --git a/CVE-2023/CVE-2023-333xx/CVE-2023-33368.json b/CVE-2023/CVE-2023-333xx/CVE-2023-33368.json new file mode 100644 index 00000000000..c4be3ff39c9 --- /dev/null +++ b/CVE-2023/CVE-2023-333xx/CVE-2023-33368.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-33368", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-03T01:15:10.950", + "lastModified": "2023-08-03T01:15:10.950", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Some API routes exists in Control ID IDSecure 4.7.26.0 and prior, exfiltrating sensitive information and passwords to users accessing these API routes." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://claroty.com/team82/disclosure-dashboard/cve-2023-33368", + "source": "cve@mitre.org" + }, + { + "url": "https://www.controlid.com.br/en/access-control/idsecure/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-333xx/CVE-2023-33369.json b/CVE-2023/CVE-2023-333xx/CVE-2023-33369.json new file mode 100644 index 00000000000..564113977f0 --- /dev/null +++ b/CVE-2023/CVE-2023-333xx/CVE-2023-33369.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-33369", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-03T01:15:11.123", + "lastModified": "2023-08-03T01:15:11.123", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A path traversal vulnerability exists in Control ID IDSecure 4.7.26.0 and prior, allowing attackers to delete arbitrary files on IDSecure filesystem, causing a denial of service." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://claroty.com/team82/disclosure-dashboard/cve-2023-33369", + "source": "cve@mitre.org" + }, + { + "url": "https://www.controlid.com.br/en/access-control/idsecure/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-333xx/CVE-2023-33370.json b/CVE-2023/CVE-2023-333xx/CVE-2023-33370.json new file mode 100644 index 00000000000..53ef321770f --- /dev/null +++ b/CVE-2023/CVE-2023-333xx/CVE-2023-33370.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-33370", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-03T01:15:11.187", + "lastModified": "2023-08-03T01:15:11.187", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An uncaught exception vulnerability exists in Control ID IDSecure 4.7.26.0 and prior, allowing attackers to cause the main web server of IDSecure to fault and crash, causing a denial of service." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://claroty.com/team82/disclosure-dashboard/cve-2023-33370", + "source": "cve@mitre.org" + }, + { + "url": "https://www.controlid.com.br/en/access-control/idsecure/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-333xx/CVE-2023-33371.json b/CVE-2023/CVE-2023-333xx/CVE-2023-33371.json new file mode 100644 index 00000000000..df3dea5cfe4 --- /dev/null +++ b/CVE-2023/CVE-2023-333xx/CVE-2023-33371.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-33371", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-03T01:15:11.260", + "lastModified": "2023-08-03T01:15:11.260", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Control ID IDSecure 4.7.26.0 and prior uses a hardcoded cryptographic key in order to sign and verify JWT session tokens, allowing attackers to sign arbitrary session tokens and bypass authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://claroty.com/team82/disclosure-dashboard/cve-2023-33371", + "source": "cve@mitre.org" + }, + { + "url": "https://www.controlid.com.br/en/access-control/idsecure/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-346xx/CVE-2023-34644.json b/CVE-2023/CVE-2023-346xx/CVE-2023-34644.json index 451003b632b..acaf67bd4f1 100644 --- a/CVE-2023/CVE-2023-346xx/CVE-2023-34644.json +++ b/CVE-2023/CVE-2023-346xx/CVE-2023-34644.json @@ -2,12 +2,12 @@ "id": "CVE-2023-34644", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-31T14:15:10.323", - "lastModified": "2023-08-02T17:15:10.937", + "lastModified": "2023-08-03T01:15:11.347", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "A command injection vulnerability exists in the EWEB management system of Ruijie Networks ReyeeOS. An unauthenticated attacker could gain supreme control of devices through this vulnerability. The affected products in Ruijie Networks including RG-EW series home routers and repeaters prior to EW_3.0(1)B11P219, RG-NBS and RG-S1930 series switches prior to SWITCH_3.0(1)B11P219, RG-EG series business VPN routers prior to EG_3.0(1)B11P219, EAP and RAP series wireless access points prior to AP_3.0(1)B11P219, and NBC series wireless controllers prior to AC_3.0(1)B11P219." + "value": "Remote code execution vulnerability in Ruijie Networks Product: RG-EW series home routers and repeaters EW_3.0(1)B11P204, RG-NBS and RG-S1930 series switches SWITCH_3.0(1)B11P218, RG-EG series business VPN routers EG_3.0(1)B11P216, EAP and RAP series wireless access points AP_3.0(1)B11P218, NBC series wireless controllers AC_3.0(1)B11P86 allows unauthorized remote attackers to gain the highest privileges via crafted POST request to /cgi-bin/luci/api/auth." } ], "metrics": {}, diff --git a/CVE-2023/CVE-2023-360xx/CVE-2023-36082.json b/CVE-2023/CVE-2023-360xx/CVE-2023-36082.json new file mode 100644 index 00000000000..8db56acbb57 --- /dev/null +++ b/CVE-2023/CVE-2023-360xx/CVE-2023-36082.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-36082", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-08-03T01:15:11.437", + "lastModified": "2023-08-03T01:15:11.437", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An isssue in GatesAIr Flexiva FM Transmitter/Exiter Fax 150W allows a remote attacker to gain privileges via the LDAP and SMTP credentials." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://flexiva.com", + "source": "cve@mitre.org" + }, + { + "url": "http://gatesair.com", + "source": "cve@mitre.org" + }, + { + "url": "https://strik3r.gitbook.io/strik3r-blog/security-research/cves-pocs/cve-2023-36082", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4068.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4068.json new file mode 100644 index 00000000000..926baaa9b8a --- /dev/null +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4068.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-4068", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-08-03T01:15:11.513", + "lastModified": "2023-08-03T01:15:11.513", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1466183", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4069.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4069.json new file mode 100644 index 00000000000..3443fc83965 --- /dev/null +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4069.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-4069", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-08-03T01:15:11.583", + "lastModified": "2023-08-03T01:15:11.583", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1465326", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4070.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4070.json new file mode 100644 index 00000000000..e5bae7ed9ba --- /dev/null +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4070.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-4070", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-08-03T01:15:11.647", + "lastModified": "2023-08-03T01:15:11.647", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Type Confusion in V8 in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1462951", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4071.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4071.json new file mode 100644 index 00000000000..b91707d8e80 --- /dev/null +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4071.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-4071", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-08-03T01:15:11.710", + "lastModified": "2023-08-03T01:15:11.710", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Heap buffer overflow in Visuals in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1458819", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4072.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4072.json new file mode 100644 index 00000000000..fcde4008a1a --- /dev/null +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4072.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-4072", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-08-03T01:15:11.773", + "lastModified": "2023-08-03T01:15:11.773", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Out of bounds read and write in WebGL in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1464038", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4073.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4073.json new file mode 100644 index 00000000000..f34add84cfd --- /dev/null +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4073.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-4073", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-08-03T01:15:11.840", + "lastModified": "2023-08-03T01:15:11.840", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1456243", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4074.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4074.json new file mode 100644 index 00000000000..7faf06702ab --- /dev/null +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4074.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-4074", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-08-03T01:15:11.903", + "lastModified": "2023-08-03T01:15:11.903", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Blink Task Scheduling in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1464113", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4075.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4075.json new file mode 100644 index 00000000000..f18820d6c33 --- /dev/null +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4075.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-4075", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-08-03T01:15:11.973", + "lastModified": "2023-08-03T01:15:11.973", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in Cast in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1457757", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4076.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4076.json new file mode 100644 index 00000000000..f624e4ff161 --- /dev/null +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4076.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-4076", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-08-03T01:15:12.037", + "lastModified": "2023-08-03T01:15:12.037", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Use after free in WebRTC in Google Chrome prior to 115.0.5790.170 allowed a remote attacker to potentially exploit heap corruption via a crafted WebRTC session. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1459124", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4077.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4077.json new file mode 100644 index 00000000000..2f894105648 --- /dev/null +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4077.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-4077", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-08-03T01:15:12.100", + "lastModified": "2023-08-03T01:15:12.100", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Insufficient data validation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1451146", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4078.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4078.json new file mode 100644 index 00000000000..4c4d17e426c --- /dev/null +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4078.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-4078", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2023-08-03T01:15:12.167", + "lastModified": "2023-08-03T01:15:12.167", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Inappropriate implementation in Extensions in Google Chrome prior to 115.0.5790.170 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: Medium)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://crbug.com/1461895", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 0ea897bb306..2f9a38f2d98 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-08-02T23:55:26.309396+00:00 +2023-08-03T02:00:30.847736+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-08-02T23:15:10.547000+00:00 +2023-08-03T01:15:12.167000+00:00 ``` ### Last Data Feed Release @@ -23,45 +23,42 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2023-08-02T00:00:13.564856+00:00 +2023-08-03T00:00:13.561418+00:00 ``` ### Total Number of included CVEs ```plain -221485 +221501 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `16` -* [CVE-2023-1437](CVE-2023/CVE-2023-14xx/CVE-2023-1437.json) (`2023-08-02T23:15:10.153`) -* [CVE-2023-1935](CVE-2023/CVE-2023-19xx/CVE-2023-1935.json) (`2023-08-02T23:15:10.293`) -* [CVE-2023-39113](CVE-2023/CVE-2023-391xx/CVE-2023-39113.json) (`2023-08-02T23:15:10.413`) -* [CVE-2023-39114](CVE-2023/CVE-2023-391xx/CVE-2023-39114.json) (`2023-08-02T23:15:10.483`) -* [CVE-2023-3329](CVE-2023/CVE-2023-33xx/CVE-2023-3329.json) (`2023-08-02T23:15:10.547`) +* [CVE-2023-33368](CVE-2023/CVE-2023-333xx/CVE-2023-33368.json) (`2023-08-03T01:15:10.950`) +* [CVE-2023-33369](CVE-2023/CVE-2023-333xx/CVE-2023-33369.json) (`2023-08-03T01:15:11.123`) +* [CVE-2023-33370](CVE-2023/CVE-2023-333xx/CVE-2023-33370.json) (`2023-08-03T01:15:11.187`) +* [CVE-2023-33371](CVE-2023/CVE-2023-333xx/CVE-2023-33371.json) (`2023-08-03T01:15:11.260`) +* [CVE-2023-36082](CVE-2023/CVE-2023-360xx/CVE-2023-36082.json) (`2023-08-03T01:15:11.437`) +* [CVE-2023-4068](CVE-2023/CVE-2023-40xx/CVE-2023-4068.json) (`2023-08-03T01:15:11.513`) +* [CVE-2023-4069](CVE-2023/CVE-2023-40xx/CVE-2023-4069.json) (`2023-08-03T01:15:11.583`) +* [CVE-2023-4070](CVE-2023/CVE-2023-40xx/CVE-2023-4070.json) (`2023-08-03T01:15:11.647`) +* [CVE-2023-4071](CVE-2023/CVE-2023-40xx/CVE-2023-4071.json) (`2023-08-03T01:15:11.710`) +* [CVE-2023-4072](CVE-2023/CVE-2023-40xx/CVE-2023-4072.json) (`2023-08-03T01:15:11.773`) +* [CVE-2023-4073](CVE-2023/CVE-2023-40xx/CVE-2023-4073.json) (`2023-08-03T01:15:11.840`) +* [CVE-2023-4074](CVE-2023/CVE-2023-40xx/CVE-2023-4074.json) (`2023-08-03T01:15:11.903`) +* [CVE-2023-4075](CVE-2023/CVE-2023-40xx/CVE-2023-4075.json) (`2023-08-03T01:15:11.973`) +* [CVE-2023-4076](CVE-2023/CVE-2023-40xx/CVE-2023-4076.json) (`2023-08-03T01:15:12.037`) +* [CVE-2023-4077](CVE-2023/CVE-2023-40xx/CVE-2023-4077.json) (`2023-08-03T01:15:12.100`) +* [CVE-2023-4078](CVE-2023/CVE-2023-40xx/CVE-2023-4078.json) (`2023-08-03T01:15:12.167`) ### CVEs modified in the last Commit -Recently modified CVEs: `15` +Recently modified CVEs: `1` -* [CVE-2023-3957](CVE-2023/CVE-2023-39xx/CVE-2023-3957.json) (`2023-08-02T22:00:38.467`) -* [CVE-2023-3956](CVE-2023/CVE-2023-39xx/CVE-2023-3956.json) (`2023-08-02T22:01:03.057`) -* [CVE-2023-32450](CVE-2023/CVE-2023-324xx/CVE-2023-32450.json) (`2023-08-02T22:13:42.063`) -* [CVE-2023-38611](CVE-2023/CVE-2023-386xx/CVE-2023-38611.json) (`2023-08-02T22:14:39.553`) -* [CVE-2023-38608](CVE-2023/CVE-2023-386xx/CVE-2023-38608.json) (`2023-08-02T22:25:39.927`) -* [CVE-2023-38602](CVE-2023/CVE-2023-386xx/CVE-2023-38602.json) (`2023-08-02T22:26:42.387`) -* [CVE-2023-38603](CVE-2023/CVE-2023-386xx/CVE-2023-38603.json) (`2023-08-02T22:26:52.433`) -* [CVE-2023-38600](CVE-2023/CVE-2023-386xx/CVE-2023-38600.json) (`2023-08-02T22:30:00.703`) -* [CVE-2023-38595](CVE-2023/CVE-2023-385xx/CVE-2023-38595.json) (`2023-08-02T22:30:17.557`) -* [CVE-2023-38593](CVE-2023/CVE-2023-385xx/CVE-2023-38593.json) (`2023-08-02T22:30:34.427`) -* [CVE-2023-29407](CVE-2023/CVE-2023-294xx/CVE-2023-29407.json) (`2023-08-02T22:30:59.227`) -* [CVE-2023-29408](CVE-2023/CVE-2023-294xx/CVE-2023-29408.json) (`2023-08-02T22:30:59.227`) -* [CVE-2023-29409](CVE-2023/CVE-2023-294xx/CVE-2023-29409.json) (`2023-08-02T22:30:59.227`) -* [CVE-2023-36081](CVE-2023/CVE-2023-360xx/CVE-2023-36081.json) (`2023-08-02T22:30:59.227`) -* [CVE-2023-3978](CVE-2023/CVE-2023-39xx/CVE-2023-3978.json) (`2023-08-02T22:30:59.227`) +* [CVE-2023-34644](CVE-2023/CVE-2023-346xx/CVE-2023-34644.json) (`2023-08-03T01:15:11.347`) ## Download and Usage