Auto-Update: 2023-12-15T23:00:24.458997+00:00

This commit is contained in:
cad-safe-bot 2023-12-15 23:00:28 +00:00
parent 8eb7aca447
commit eb2d3205a2
11 changed files with 579 additions and 52 deletions

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-0248",
"sourceIdentifier": "productsecurity@jci.com",
"published": "2023-12-14T21:15:07.553",
"lastModified": "2023-12-14T22:44:49.057",
"lastModified": "2023-12-15T22:15:07.070",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An attacker with physical access to the Kantech Gen1 ioSmart card reader with firmware version prior to 1.7.2 in certain circumstances can recover the reader's communication memory between the card and reader.\n\n"
"value": "An attacker with physical access to the Kantech Gen1 ioSmart card reader with firmware version prior to 1.07.02 in certain circumstances can recover the reader's communication memory between the card and reader.\n\n"
},
{
"lang": "es",
"value": "Un atacante con acceso f\u00edsico al lector de tarjetas Kantech Gen1 ioSmart con versi\u00f3n de firmware anterior a 1.7.2 en determinadas circunstancias puede recuperar la memoria de comunicaci\u00f3n del lector entre la tarjeta y el lector."
}
],
"metrics": {

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-4020",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-12-15T21:15:08.560",
"lastModified": "2023-12-15T21:15:08.560",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An unvalidated input in a library function responsible for communicating between secure and non-secure memory in Silicon Labs TrustZone implementation allows reading/writing of memory in the secure region of memory from the non-secure region of memory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "product-security@silabs.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.5,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "product-security@silabs.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://community.silabs.com/069Vm0000004b95IAA",
"source": "product-security@silabs.com"
},
{
"url": "https://github.com/SiliconLabs/gecko_sdk/releases",
"source": "product-security@silabs.com"
}
]
}

View File

@ -2,23 +2,87 @@
"id": "CVE-2023-47321",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-13T14:15:44.200",
"lastModified": "2023-12-13T14:27:29.077",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-15T21:02:46.263",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Silverpeas Core 6.3.1 is vulnerable to Incorrect Access Control via the \"Porlet Deployer\" which allows administrators to deploy .WAR portlets."
},
{
"lang": "es",
"value": "Silverpeas Core 6.3.1 es vulnerable a un control de acceso incorrecto a trav\u00e9s del \"Porlet Deployer\", que permite a los administradores implementar portlets .WAR."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:silverpeas:silverpeas:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3.2",
"matchCriteriaId": "F4C6E996-03CD-4BD3-A74F-A450CA1B0C0B"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://silverpeas.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47321",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,23 +2,87 @@
"id": "CVE-2023-47322",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-13T14:15:44.247",
"lastModified": "2023-12-13T14:27:29.077",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-15T21:08:27.877",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The \"userModify\" feature of Silverpeas Core 6.3.1 is vulnerable to Cross Site Request Forgery (CSRF) leading to privilege escalation. If an administrator goes to a malicious URL while being authenticated to the Silverpeas application, the CSRF with execute making the attacker an administrator user in the application."
},
{
"lang": "es",
"value": "La funci\u00f3n \"userModify\" de Silverpeas Core 6.3.1 es vulnerable a cross-site request forgery (CSRF), lo que conduce a una escalada de privilegios. Si un administrador accede a una URL maliciosa mientras se autentica en la aplicaci\u00f3n Silverpeas, el CSRF se ejecutar\u00e1 y convertir\u00e1 al atacante en un usuario administrador de la aplicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:silverpeas:silverpeas:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3.2",
"matchCriteriaId": "F4C6E996-03CD-4BD3-A74F-A450CA1B0C0B"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://silverpeas.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47322",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,23 +2,87 @@
"id": "CVE-2023-47323",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-13T14:15:44.293",
"lastModified": "2023-12-13T14:27:29.077",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-12-15T21:10:34.490",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The notification/messaging feature of Silverpeas Core 6.3.1 does not enforce access control on the ID parameter. This allows an attacker to read all messages sent between other users; including those sent only to administrators."
},
{
"lang": "es",
"value": "La funci\u00f3n de notificaci\u00f3n/mensajer\u00eda de Silverpeas Core 6.3.1 no impone control de acceso en el par\u00e1metro ID. Esto permite a un atacante leer todos los mensajes enviados entre otros usuarios; incluidos los enviados \u00fanicamente a administradores."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:silverpeas:silverpeas:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.3.2",
"matchCriteriaId": "F4C6E996-03CD-4BD3-A74F-A450CA1B0C0B"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://silverpeas.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/RhinoSecurityLabs/CVEs/tree/master/CVE-2023-47323",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-50264",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-12-15T21:15:08.753",
"lastModified": "2023-12-15T21:15:08.753",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Bazarr manages and downloads subtitles. Prior to 1.3.1, Bazarr contains an arbitrary file read in /system/backup/download/ endpoint in bazarr/app/ui.py does not validate the user-controlled filename variable and uses it in the send_file function, which leads to an arbitrary file read on the system. This issue is fixed in version 1.3.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/morpheus65535/bazarr/commit/17add7fbb3ae1919a40d505470d499d46df9ae6b",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/morpheus65535/bazarr/releases/tag/v1.3.1",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-50265",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-12-15T21:15:08.943",
"lastModified": "2023-12-15T21:15:08.943",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Bazarr manages and downloads subtitles. Prior to 1.3.1, the /api/swaggerui/static endpoint in bazarr/app/ui.py does not validate the user-controlled filename variable and uses it in the send_file function, which leads to an arbitrary file read on the system. This issue is fixed in version 1.3.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/morpheus65535/bazarr/commit/17add7fbb3ae1919a40d505470d499d46df9ae6b",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/morpheus65535/bazarr/releases/tag/v1.3.1",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-50266",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-12-15T21:15:09.147",
"lastModified": "2023-12-15T21:15:09.147",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Bazarr manages and downloads subtitles. In version 1.2.4, the proxy method in bazarr/bazarr/app/ui.py does not validate the user-controlled protocol and url variables and passes them to requests.get() without any sanitization, which leads to a blind server-side request forgery (SSRF). This issue allows for crafting GET requests to internal and external resources on behalf of the server. 1.3.1 contains a partial fix, which limits the vulnerability to HTTP/HTTPS protocols."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/morpheus65535/bazarr/commit/17add7fbb3ae1919a40d505470d499d46df9ae6b",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/morpheus65535/bazarr/releases/tag/v1.3.1",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2023-192_GHSL-2023-194_bazarr/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-50469",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-15T21:15:09.353",
"lastModified": "2023-12-15T21:15:09.353",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Shenzhen Libituo Technology Co., Ltd LBT-T300-T310 v2.2.2.6 was discovered to contain a buffer overflow via the ApCliEncrypType parameter at /apply.cgi."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/forever-more-cjy/overflow/blob/main/LBT-T310%20Buffer%20overflow.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,83 @@
{
"id": "CVE-2023-50728",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-12-15T22:15:07.160",
"lastModified": "2023-12-15T22:15:07.160",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "octokit/webhooks is a GitHub webhook events toolset for Node.js. Starting in 9.26.0 and prior to 9.26.3, 10.9.2, 11.1.2, and 12.0.4, there is a problem caused by an issue with error handling in the @octokit/webhooks library because the error can be undefined in some cases. The resulting request was found to cause an uncaught exception that ends the nodejs process. The bug is fixed in octokit/webhooks.js 9.26.3, 10.9.2, 11.1.2, and 12.0.4, app.js 14.02, octokit.js 3.1.2, and Protobot 12.3.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"references": [
{
"url": "https://github.com/octokit/app.js/releases/tag/v14.0.2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/octokit/octokit.js/releases/tag/v3.1.2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/octokit/webhooks.js/releases/tag/v10.9.2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/octokit/webhooks.js/releases/tag/v11.1.2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/octokit/webhooks.js/releases/tag/v12.0.4",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/octokit/webhooks.js/releases/tag/v9.26.3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/octokit/webhooks.js/security/advisories/GHSA-pwfr-8pq7-x9qv",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/probot/probot/releases/tag/v12.3.3",
"source": "security-advisories@github.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-12-15T21:00:25.285447+00:00
2023-12-15T23:00:24.458997+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-12-15T20:51:18.320000+00:00
2023-12-15T22:15:07.160000+00:00
```
### Last Data Feed Release
@ -29,49 +29,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
233517
233523
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `6`
* [CVE-2023-50719](CVE-2023/CVE-2023-507xx/CVE-2023-50719.json) (`2023-12-15T19:15:09.247`)
* [CVE-2023-50720](CVE-2023/CVE-2023-507xx/CVE-2023-50720.json) (`2023-12-15T19:15:09.463`)
* [CVE-2023-50721](CVE-2023/CVE-2023-507xx/CVE-2023-50721.json) (`2023-12-15T19:15:09.667`)
* [CVE-2023-50722](CVE-2023/CVE-2023-507xx/CVE-2023-50722.json) (`2023-12-15T19:15:09.870`)
* [CVE-2023-50723](CVE-2023/CVE-2023-507xx/CVE-2023-50723.json) (`2023-12-15T19:15:10.073`)
* [CVE-2023-4020](CVE-2023/CVE-2023-40xx/CVE-2023-4020.json) (`2023-12-15T21:15:08.560`)
* [CVE-2023-50264](CVE-2023/CVE-2023-502xx/CVE-2023-50264.json) (`2023-12-15T21:15:08.753`)
* [CVE-2023-50265](CVE-2023/CVE-2023-502xx/CVE-2023-50265.json) (`2023-12-15T21:15:08.943`)
* [CVE-2023-50266](CVE-2023/CVE-2023-502xx/CVE-2023-50266.json) (`2023-12-15T21:15:09.147`)
* [CVE-2023-50469](CVE-2023/CVE-2023-504xx/CVE-2023-50469.json) (`2023-12-15T21:15:09.353`)
* [CVE-2023-50728](CVE-2023/CVE-2023-507xx/CVE-2023-50728.json) (`2023-12-15T22:15:07.160`)
### CVEs modified in the last Commit
Recently modified CVEs: `43`
Recently modified CVEs: `4`
* [CVE-2023-35621](CVE-2023/CVE-2023-356xx/CVE-2023-35621.json) (`2023-12-15T19:44:04.057`)
* [CVE-2023-36719](CVE-2023/CVE-2023-367xx/CVE-2023-36719.json) (`2023-12-15T19:47:17.103`)
* [CVE-2023-36705](CVE-2023/CVE-2023-367xx/CVE-2023-36705.json) (`2023-12-15T19:47:45.657`)
* [CVE-2023-36428](CVE-2023/CVE-2023-364xx/CVE-2023-36428.json) (`2023-12-15T19:48:20.413`)
* [CVE-2023-36427](CVE-2023/CVE-2023-364xx/CVE-2023-36427.json) (`2023-12-15T19:50:36.810`)
* [CVE-2023-36425](CVE-2023/CVE-2023-364xx/CVE-2023-36425.json) (`2023-12-15T19:52:02.540`)
* [CVE-2023-36424](CVE-2023/CVE-2023-364xx/CVE-2023-36424.json) (`2023-12-15T19:55:29.947`)
* [CVE-2023-36408](CVE-2023/CVE-2023-364xx/CVE-2023-36408.json) (`2023-12-15T19:57:47.510`)
* [CVE-2023-36407](CVE-2023/CVE-2023-364xx/CVE-2023-36407.json) (`2023-12-15T19:57:59.780`)
* [CVE-2023-36406](CVE-2023/CVE-2023-364xx/CVE-2023-36406.json) (`2023-12-15T19:58:20.153`)
* [CVE-2023-36405](CVE-2023/CVE-2023-364xx/CVE-2023-36405.json) (`2023-12-15T19:58:39.633`)
* [CVE-2023-36404](CVE-2023/CVE-2023-364xx/CVE-2023-36404.json) (`2023-12-15T19:58:53.727`)
* [CVE-2023-36403](CVE-2023/CVE-2023-364xx/CVE-2023-36403.json) (`2023-12-15T19:59:05.223`)
* [CVE-2023-48782](CVE-2023/CVE-2023-487xx/CVE-2023-48782.json) (`2023-12-15T20:01:55.773`)
* [CVE-2023-48791](CVE-2023/CVE-2023-487xx/CVE-2023-48791.json) (`2023-12-15T20:09:24.010`)
* [CVE-2023-6345](CVE-2023/CVE-2023-63xx/CVE-2023-6345.json) (`2023-12-15T20:09:40.917`)
* [CVE-2023-50089](CVE-2023/CVE-2023-500xx/CVE-2023-50089.json) (`2023-12-15T20:09:58.393`)
* [CVE-2023-50917](CVE-2023/CVE-2023-509xx/CVE-2023-50917.json) (`2023-12-15T20:09:58.393`)
* [CVE-2023-50918](CVE-2023/CVE-2023-509xx/CVE-2023-50918.json) (`2023-12-15T20:09:58.393`)
* [CVE-2023-49297](CVE-2023/CVE-2023-492xx/CVE-2023-49297.json) (`2023-12-15T20:15:07.570`)
* [CVE-2023-6380](CVE-2023/CVE-2023-63xx/CVE-2023-6380.json) (`2023-12-15T20:22:40.343`)
* [CVE-2023-6379](CVE-2023/CVE-2023-63xx/CVE-2023-6379.json) (`2023-12-15T20:33:49.850`)
* [CVE-2023-6723](CVE-2023/CVE-2023-67xx/CVE-2023-6723.json) (`2023-12-15T20:37:10.720`)
* [CVE-2023-6755](CVE-2023/CVE-2023-67xx/CVE-2023-6755.json) (`2023-12-15T20:48:01.920`)
* [CVE-2023-47320](CVE-2023/CVE-2023-473xx/CVE-2023-47320.json) (`2023-12-15T20:51:18.320`)
* [CVE-2023-47321](CVE-2023/CVE-2023-473xx/CVE-2023-47321.json) (`2023-12-15T21:02:46.263`)
* [CVE-2023-47322](CVE-2023/CVE-2023-473xx/CVE-2023-47322.json) (`2023-12-15T21:08:27.877`)
* [CVE-2023-47323](CVE-2023/CVE-2023-473xx/CVE-2023-47323.json) (`2023-12-15T21:10:34.490`)
* [CVE-2023-0248](CVE-2023/CVE-2023-02xx/CVE-2023-0248.json) (`2023-12-15T22:15:07.070`)
## Download and Usage