diff --git a/CVE-2022/CVE-2022-456xx/CVE-2022-45611.json b/CVE-2022/CVE-2022-456xx/CVE-2022-45611.json index 7bd3d3d7816..ef0fdd86458 100644 --- a/CVE-2022/CVE-2022-456xx/CVE-2022-45611.json +++ b/CVE-2022/CVE-2022-456xx/CVE-2022-45611.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45611", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:30.167", - "lastModified": "2023-12-18T14:15:07.953", + "lastModified": "2024-01-10T03:15:43.163", "vulnStatus": "Modified", "descriptions": [ { @@ -86,6 +86,10 @@ { "url": "https://www.fresenius.com/sites/default/files/2023-11/Fresenius%20-%20CVE-2022-45611.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://www.fresenius.com/sites/default/files/2023-12/Fresenius%20-%20CVE-2022-45611.pdf", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31446.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31446.json new file mode 100644 index 00000000000..c7ea20248b9 --- /dev/null +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31446.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-31446", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-01-10T03:15:43.263", + "lastModified": "2024-01-10T03:15:43.263", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Dodge-MPTC/CVE-2023-31446-Remote-Code-Execution", + "source": "cve@mitre.org" + }, + { + "url": "https://www.cassianetworks.com", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-447xx/CVE-2023-44796.json b/CVE-2023/CVE-2023-447xx/CVE-2023-44796.json index ea6b3722f71..612bbd53e80 100644 --- a/CVE-2023/CVE-2023-447xx/CVE-2023-44796.json +++ b/CVE-2023/CVE-2023-447xx/CVE-2023-44796.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44796", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-18T00:15:07.133", - "lastModified": "2023-11-25T01:22:25.547", - "vulnStatus": "Analyzed", + "lastModified": "2024-01-10T03:15:43.313", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -76,6 +76,10 @@ "Exploit" ] }, + { + "url": "https://github.com/Hebing123/cve/issues/4", + "source": "cve@mitre.org" + }, { "url": "https://github.com/LimeSurvey/LimeSurvey/pull/3483", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-487xx/CVE-2023-48795.json b/CVE-2023/CVE-2023-487xx/CVE-2023-48795.json index 23ef7cb0c94..8f13b668837 100644 --- a/CVE-2023/CVE-2023-487xx/CVE-2023-48795.json +++ b/CVE-2023/CVE-2023-487xx/CVE-2023-48795.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48795", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-18T16:15:10.897", - "lastModified": "2024-01-09T03:15:07.950", + "lastModified": "2024-01-10T03:15:43.383", "vulnStatus": "Modified", "descriptions": [ { @@ -1560,6 +1560,10 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/", "source": "cve@mitre.org" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/", + "source": "cve@mitre.org" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49990.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49990.json index 8a690bfab4d..dbd3ad34258 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49990.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49990.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49990", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T14:15:07.553", - "lastModified": "2023-12-18T18:29:41.410", - "vulnStatus": "Analyzed", + "lastModified": "2024-01-10T03:15:43.740", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -76,6 +76,10 @@ "Issue Tracking", "Vendor Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z5WW6RKHRWLEMCKCQ6UZCXWC5J7UWMUQ/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49991.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49991.json index 5e368a0a9f1..1faa1652652 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49991.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49991.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49991", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T14:15:07.600", - "lastModified": "2023-12-18T18:29:45.217", - "vulnStatus": "Analyzed", + "lastModified": "2024-01-10T03:15:43.810", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -76,6 +76,10 @@ "Issue Tracking", "Vendor Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z5WW6RKHRWLEMCKCQ6UZCXWC5J7UWMUQ/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49992.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49992.json index a47e78be7ee..7a4ed770991 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49992.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49992.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49992", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T14:15:07.653", - "lastModified": "2023-12-18T18:29:59.233", - "vulnStatus": "Analyzed", + "lastModified": "2024-01-10T03:15:43.870", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -76,6 +76,10 @@ "Issue Tracking", "Vendor Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z5WW6RKHRWLEMCKCQ6UZCXWC5J7UWMUQ/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49993.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49993.json index c3e0bbd6549..0f3e2416c1b 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49993.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49993.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49993", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T14:15:07.700", - "lastModified": "2023-12-18T18:29:55.640", - "vulnStatus": "Analyzed", + "lastModified": "2024-01-10T03:15:43.933", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -76,6 +76,10 @@ "Issue Tracking", "Vendor Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z5WW6RKHRWLEMCKCQ6UZCXWC5J7UWMUQ/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-499xx/CVE-2023-49994.json b/CVE-2023/CVE-2023-499xx/CVE-2023-49994.json index bac76254e09..a6bbd9120fc 100644 --- a/CVE-2023/CVE-2023-499xx/CVE-2023-49994.json +++ b/CVE-2023/CVE-2023-499xx/CVE-2023-49994.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49994", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-12T14:15:07.750", - "lastModified": "2023-12-14T19:09:14.727", - "vulnStatus": "Analyzed", + "lastModified": "2024-01-10T03:15:43.993", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -76,6 +76,10 @@ "Issue Tracking", "Vendor Advisory" ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z5WW6RKHRWLEMCKCQ6UZCXWC5J7UWMUQ/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51678.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51678.json index b39bc4ac084..d91b0f26deb 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51678.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51678.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51678", "sourceIdentifier": "audit@patchstack.com", "published": "2024-01-05T10:15:12.347", - "lastModified": "2024-01-05T11:54:11.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-10T04:02:59.790", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:doofinder:doofinder:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.0.33", + "matchCriteriaId": "F64B7235-9DAE-46A0-8BE4-20B1A016AB34" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/doofinder-for-woocommerce/wordpress-doofinder-wp-woocommerce-search-plugin-2-0-33-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52124.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52124.json index fec3ce76e03..e3035d21ba0 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52124.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52124.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52124", "sourceIdentifier": "audit@patchstack.com", "published": "2024-01-05T12:15:09.877", - "lastModified": "2024-01-05T18:23:44.497", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-10T03:59:25.760", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:shapedplugin:wp_tabs:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.2.0", + "matchCriteriaId": "8810F941-44FE-40FA-AFD0-F59B91E6737D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-expand-tabs-free/wordpress-wp-tabs-responsive-tabs-plugin-for-wordpress-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52125.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52125.json index 90b7f524726..fde58f94d86 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52125.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52125.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52125", "sourceIdentifier": "audit@patchstack.com", "published": "2024-01-05T12:15:10.750", - "lastModified": "2024-01-05T18:23:44.497", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-10T03:59:11.387", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -50,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:iframe_project:iframe:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.8", + "matchCriteriaId": "C78585A5-2CD3-4436-AD81-8FC595441356" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/iframe/wordpress-iframe-plugin-4-8-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52126.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52126.json index e4eb06fbb48..1e86740782e 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52126.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52126.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52126", "sourceIdentifier": "audit@patchstack.com", "published": "2024-01-05T12:15:11.707", - "lastModified": "2024-01-05T18:23:44.497", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-10T03:58:24.213", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,8 +60,18 @@ }, "weaknesses": [ { - "source": "audit@patchstack.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "audit@patchstack.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sumanbhattarai:send_users_email:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.4.3", + "matchCriteriaId": "1D1AFC1E-12EC-4544-989D-35C73E941884" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/send-users-email/wordpress-send-users-email-plugin-1-4-3-sensitive-data-exposure-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52148.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52148.json index ded3ad2d802..1d16f307ef1 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52148.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52148.json @@ -2,16 +2,40 @@ "id": "CVE-2023-52148", "sourceIdentifier": "audit@patchstack.com", "published": "2024-01-05T11:15:11.250", - "lastModified": "2024-01-05T11:54:15.830", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-10T04:02:08.553", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in wp.Insider, wpaffiliatemgr Affiliates Manager.This issue affects Affiliates Manager: from n/a through 2.9.30.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado en wp.Insider, wpaffiliatemgr Affiliates Manager. Este problema afecta a Affiliates Manager: desde n/a hasta 2.9.30." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -36,8 +60,18 @@ }, "weaknesses": [ { - "source": "audit@patchstack.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "audit@patchstack.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpaffiliatemanager:affiliates_manager:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.9.30", + "matchCriteriaId": "CCE93DD5-965D-4F4E-A5F3-A942556C2724" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/affiliates-manager/wordpress-affiliates-manager-plugin-2-9-30-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52151.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52151.json index e899f6e1758..552b2c9a958 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52151.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52151.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52151", "sourceIdentifier": "audit@patchstack.com", "published": "2024-01-05T11:15:11.817", - "lastModified": "2024-01-05T11:54:15.830", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-10T03:59:57.907", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,8 +60,18 @@ }, "weaknesses": [ { - "source": "audit@patchstack.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "audit@patchstack.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,10 +80,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:uncannyowl:uncanny_automator:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "5.1.0.2", + "matchCriteriaId": "AED58D0F-44B1-452A-8D8A-D511E96420ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/uncanny-automator/wordpress-uncanny-automator-plugin-5-1-0-2-sensitive-data-exposure-via-log-file-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6004.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6004.json index 75be3cd8c6c..5a7a5a1ea55 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6004.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6004.json @@ -2,12 +2,16 @@ "id": "CVE-2023-6004", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-03T17:15:11.623", - "lastModified": "2024-01-03T17:26:57.957", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-01-10T03:15:44.120", + "vulnStatus": "Undergoing Analysis", "descriptions": [ { "lang": "en", "value": "A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una falla en libssh. Al utilizar la funci\u00f3n ProxyCommand o ProxyJump, los usuarios pueden explotar la sintaxis del hostname no verificada en el cliente. Este problema puede permitir que un atacante inyecte c\u00f3digo malicioso en el comando de las funciones mencionadas a trav\u00e9s del par\u00e1metro de hostname." } ], "metrics": { @@ -55,6 +59,10 @@ "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2251110", "source": "secalert@redhat.com" }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/", + "source": "secalert@redhat.com" + }, { "url": "https://www.libssh.org/security/advisories/CVE-2023-6004.txt", "source": "secalert@redhat.com" diff --git a/CVE-2023/CVE-2023-69xx/CVE-2023-6918.json b/CVE-2023/CVE-2023-69xx/CVE-2023-6918.json index d291d62091f..603a1a76973 100644 --- a/CVE-2023/CVE-2023-69xx/CVE-2023-6918.json +++ b/CVE-2023/CVE-2023-69xx/CVE-2023-6918.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6918", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-19T00:15:08.460", - "lastModified": "2024-01-04T20:21:35.297", - "vulnStatus": "Analyzed", + "lastModified": "2024-01-10T03:15:44.220", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -192,6 +192,10 @@ "Third Party Advisory" ] }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/", + "source": "secalert@redhat.com" + }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0361.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0361.json new file mode 100644 index 00000000000..127027714f2 --- /dev/null +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0361.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0361", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-10T03:15:44.330", + "lastModified": "2024-01-10T03:15:44.330", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in PHPGurukul Hospital Management System 1.0. Affected is an unknown function of the file admin/contact.php. The manipulation of the argument mobnum leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-250128." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.2 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 5.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/laoquanshi/PHPGurukul-Hospital-Management-System/blob/main/PHPGurukul%20Hospital%20Management%20System%20SQL7.docx", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.250128", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.250128", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0362.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0362.json new file mode 100644 index 00000000000..182ab34d203 --- /dev/null +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0362.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0362", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-10T03:15:44.540", + "lastModified": "2024-01-10T03:15:44.540", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in PHPGurukul Hospital Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/change-password.php. The manipulation of the argument cpass leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-250129 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.2 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 5.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/laoquanshi/PHPGurukul-Hospital-Management-System/blob/main/PHPGurukul%20Hospital%20Management%20System%20SQL8.docx", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.250129", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.250129", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0363.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0363.json new file mode 100644 index 00000000000..3fb52562635 --- /dev/null +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0363.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0363", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-10T03:15:44.743", + "lastModified": "2024-01-10T03:15:44.743", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Hospital Management System 1.0. Affected by this issue is some unknown functionality of the file admin/patient-search.php. The manipulation of the argument searchdata leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-250130 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.2 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 5.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/laoquanshi/PHPGurukul-Hospital-Management-System/blob/main/PHPGurukul%20Hospital%20Management%20System%20SQL10.docx", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.250130", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.250130", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0364.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0364.json new file mode 100644 index 00000000000..5f0d5902538 --- /dev/null +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0364.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-0364", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-01-10T03:15:44.947", + "lastModified": "2024-01-10T03:15:44.947", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in PHPGurukul Hospital Management System 1.0. This affects an unknown part of the file admin/query-details.php. The manipulation of the argument adminremark leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-250131." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.2 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 5.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/laoquanshi/PHPGurukul-Hospital-Management-System/blob/main/PHPGurukul%20Hospital%20Management%20System%20SQL11.docx", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.250131", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.250131", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 3f365121bd1..0a2c35f90e2 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-01-10T03:00:26.843138+00:00 +2024-01-10T05:00:24.730871+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-01-10T02:15:46.873000+00:00 +2024-01-10T04:02:59.790000+00:00 ``` ### Last Data Feed Release @@ -29,49 +29,40 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -235366 +235371 ``` ### CVEs added in the last Commit Recently added CVEs: `5` -* [CVE-2024-0356](CVE-2024/CVE-2024-03xx/CVE-2024-0356.json) (`2024-01-10T01:15:43.233`) -* [CVE-2024-0357](CVE-2024/CVE-2024-03xx/CVE-2024-0357.json) (`2024-01-10T01:15:43.460`) -* [CVE-2024-0358](CVE-2024/CVE-2024-03xx/CVE-2024-0358.json) (`2024-01-10T01:15:43.663`) -* [CVE-2024-0359](CVE-2024/CVE-2024-03xx/CVE-2024-0359.json) (`2024-01-10T02:15:46.637`) -* [CVE-2024-0360](CVE-2024/CVE-2024-03xx/CVE-2024-0360.json) (`2024-01-10T02:15:46.873`) +* [CVE-2023-31446](CVE-2023/CVE-2023-314xx/CVE-2023-31446.json) (`2024-01-10T03:15:43.263`) +* [CVE-2024-0361](CVE-2024/CVE-2024-03xx/CVE-2024-0361.json) (`2024-01-10T03:15:44.330`) +* [CVE-2024-0362](CVE-2024/CVE-2024-03xx/CVE-2024-0362.json) (`2024-01-10T03:15:44.540`) +* [CVE-2024-0363](CVE-2024/CVE-2024-03xx/CVE-2024-0363.json) (`2024-01-10T03:15:44.743`) +* [CVE-2024-0364](CVE-2024/CVE-2024-03xx/CVE-2024-0364.json) (`2024-01-10T03:15:44.947`) ### CVEs modified in the last Commit -Recently modified CVEs: `66` +Recently modified CVEs: `16` -* [CVE-2023-37294](CVE-2023/CVE-2023-372xx/CVE-2023-37294.json) (`2024-01-10T01:21:28.543`) -* [CVE-2023-37295](CVE-2023/CVE-2023-372xx/CVE-2023-37295.json) (`2024-01-10T01:21:28.543`) -* [CVE-2023-37296](CVE-2023/CVE-2023-372xx/CVE-2023-37296.json) (`2024-01-10T01:21:28.543`) -* [CVE-2023-37297](CVE-2023/CVE-2023-372xx/CVE-2023-37297.json) (`2024-01-10T01:21:28.543`) -* [CVE-2023-3043](CVE-2023/CVE-2023-30xx/CVE-2023-3043.json) (`2024-01-10T01:21:28.543`) -* [CVE-2023-47992](CVE-2023/CVE-2023-479xx/CVE-2023-47992.json) (`2024-01-10T01:21:28.543`) -* [CVE-2023-47993](CVE-2023/CVE-2023-479xx/CVE-2023-47993.json) (`2024-01-10T01:21:28.543`) -* [CVE-2023-47994](CVE-2023/CVE-2023-479xx/CVE-2023-47994.json) (`2024-01-10T01:21:28.543`) -* [CVE-2023-47995](CVE-2023/CVE-2023-479xx/CVE-2023-47995.json) (`2024-01-10T01:21:28.543`) -* [CVE-2023-47996](CVE-2023/CVE-2023-479xx/CVE-2023-47996.json) (`2024-01-10T01:21:28.543`) -* [CVE-2023-47997](CVE-2023/CVE-2023-479xx/CVE-2023-47997.json) (`2024-01-10T01:21:28.543`) -* [CVE-2024-0342](CVE-2024/CVE-2024-03xx/CVE-2024-0342.json) (`2024-01-10T01:21:28.543`) -* [CVE-2024-0343](CVE-2024/CVE-2024-03xx/CVE-2024-0343.json) (`2024-01-10T01:21:28.543`) -* [CVE-2024-21664](CVE-2024/CVE-2024-216xx/CVE-2024-21664.json) (`2024-01-10T01:21:28.543`) -* [CVE-2024-0344](CVE-2024/CVE-2024-03xx/CVE-2024-0344.json) (`2024-01-10T01:21:28.543`) -* [CVE-2024-0345](CVE-2024/CVE-2024-03xx/CVE-2024-0345.json) (`2024-01-10T01:21:28.543`) -* [CVE-2024-0346](CVE-2024/CVE-2024-03xx/CVE-2024-0346.json) (`2024-01-10T01:21:28.543`) -* [CVE-2024-0347](CVE-2024/CVE-2024-03xx/CVE-2024-0347.json) (`2024-01-10T01:21:28.543`) -* [CVE-2024-0348](CVE-2024/CVE-2024-03xx/CVE-2024-0348.json) (`2024-01-10T01:21:28.543`) -* [CVE-2024-0349](CVE-2024/CVE-2024-03xx/CVE-2024-0349.json) (`2024-01-10T01:21:28.543`) -* [CVE-2024-0350](CVE-2024/CVE-2024-03xx/CVE-2024-0350.json) (`2024-01-10T01:21:28.543`) -* [CVE-2024-0351](CVE-2024/CVE-2024-03xx/CVE-2024-0351.json) (`2024-01-10T01:21:28.543`) -* [CVE-2024-0352](CVE-2024/CVE-2024-03xx/CVE-2024-0352.json) (`2024-01-10T01:21:28.543`) -* [CVE-2024-0354](CVE-2024/CVE-2024-03xx/CVE-2024-0354.json) (`2024-01-10T01:21:28.543`) -* [CVE-2024-0355](CVE-2024/CVE-2024-03xx/CVE-2024-0355.json) (`2024-01-10T01:21:28.543`) +* [CVE-2022-45611](CVE-2022/CVE-2022-456xx/CVE-2022-45611.json) (`2024-01-10T03:15:43.163`) +* [CVE-2023-44796](CVE-2023/CVE-2023-447xx/CVE-2023-44796.json) (`2024-01-10T03:15:43.313`) +* [CVE-2023-48795](CVE-2023/CVE-2023-487xx/CVE-2023-48795.json) (`2024-01-10T03:15:43.383`) +* [CVE-2023-49990](CVE-2023/CVE-2023-499xx/CVE-2023-49990.json) (`2024-01-10T03:15:43.740`) +* [CVE-2023-49991](CVE-2023/CVE-2023-499xx/CVE-2023-49991.json) (`2024-01-10T03:15:43.810`) +* [CVE-2023-49992](CVE-2023/CVE-2023-499xx/CVE-2023-49992.json) (`2024-01-10T03:15:43.870`) +* [CVE-2023-49993](CVE-2023/CVE-2023-499xx/CVE-2023-49993.json) (`2024-01-10T03:15:43.933`) +* [CVE-2023-49994](CVE-2023/CVE-2023-499xx/CVE-2023-49994.json) (`2024-01-10T03:15:43.993`) +* [CVE-2023-6004](CVE-2023/CVE-2023-60xx/CVE-2023-6004.json) (`2024-01-10T03:15:44.120`) +* [CVE-2023-6918](CVE-2023/CVE-2023-69xx/CVE-2023-6918.json) (`2024-01-10T03:15:44.220`) +* [CVE-2023-52126](CVE-2023/CVE-2023-521xx/CVE-2023-52126.json) (`2024-01-10T03:58:24.213`) +* [CVE-2023-52125](CVE-2023/CVE-2023-521xx/CVE-2023-52125.json) (`2024-01-10T03:59:11.387`) +* [CVE-2023-52124](CVE-2023/CVE-2023-521xx/CVE-2023-52124.json) (`2024-01-10T03:59:25.760`) +* [CVE-2023-52151](CVE-2023/CVE-2023-521xx/CVE-2023-52151.json) (`2024-01-10T03:59:57.907`) +* [CVE-2023-52148](CVE-2023/CVE-2023-521xx/CVE-2023-52148.json) (`2024-01-10T04:02:08.553`) +* [CVE-2023-51678](CVE-2023/CVE-2023-516xx/CVE-2023-51678.json) (`2024-01-10T04:02:59.790`) ## Download and Usage