diff --git a/CVE-2022/CVE-2022-475xx/CVE-2022-47599.json b/CVE-2022/CVE-2022-475xx/CVE-2022-47599.json index 722a8582e4b..684d5230396 100644 --- a/CVE-2022/CVE-2022-475xx/CVE-2022-47599.json +++ b/CVE-2022/CVE-2022-475xx/CVE-2022-47599.json @@ -2,16 +2,40 @@ "id": "CVE-2022-47599", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-20T18:15:11.417", - "lastModified": "2023-12-20T19:52:41.030", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-27T17:16:25.117", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in File Manager by Bit Form Team File Manager \u2013 100% Free & Open Source File Manager Plugin for WordPress | Bit File Manager.This issue affects File Manager \u2013 100% Free & Open Source File Manager Plugin for WordPress | Bit File Manager: from n/a through 5.2.7.\n\n" + }, + { + "lang": "es", + "value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en File Manager by Bit Form Team File Manager \u2013 100% Free & Open Source File Manager complemento para Wordpress | Bit File Manager. Este problema afecta a File Manager \u2013 100% Free & Open Source File Manager complemento para Wordpress | Bit File Manager : desde n/a hasta 5.2.7." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bitapps:file_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.0.0", + "matchCriteriaId": "B0FD0DEF-AA73-4ED1-BAE8-30C1477F1E09" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/file-manager/wordpress-bit-file-manager-100-free-file-manager-for-wordpress-plugin-5-2-7-php-object-injection?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29096.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29096.json index 3fee7c6da7c..72cec1d4aca 100644 --- a/CVE-2023/CVE-2023-290xx/CVE-2023-29096.json +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29096.json @@ -2,16 +2,40 @@ "id": "CVE-2023-29096", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-20T18:15:12.327", - "lastModified": "2023-12-20T19:52:34.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-27T17:32:59.767", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in BestWebSoft Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress.This issue affects Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin For WordPress: from n/a through 1.7.0.\n\n" + }, + { + "lang": "es", + "value": "Neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('Inyecci\u00f3n SQL') en BestWebSoft Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin for WordPress. Este problema afecta a Contact Form to DB by BestWebSoft \u2013 Messages Database Plugin for WordPress: desde n /a hasta 1.7.0." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +70,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bestwebsoft:contact_form_to_db:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.7.0", + "matchCriteriaId": "69E2C5EF-2E30-43B8-A66F-5E0BE1F33658" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/contact-form-to-db/wordpress-contact-form-to-db-by-bestwebsoft-plugin-1-7-0-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3171.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3171.json index 75fa7994ffd..a0c9da0e6d1 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3171.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3171.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3171", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-27T16:15:13.103", - "lastModified": "2023-12-27T16:15:13.103", - "vulnStatus": "Received", + "lastModified": "2023-12-27T18:24:09.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-420xx/CVE-2023-42012.json b/CVE-2023/CVE-2023-420xx/CVE-2023-42012.json index 185a8b8c75d..7454f09bb93 100644 --- a/CVE-2023/CVE-2023-420xx/CVE-2023-42012.json +++ b/CVE-2023/CVE-2023-420xx/CVE-2023-42012.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42012", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-12-20T00:15:08.190", - "lastModified": "2023-12-20T13:50:26.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-27T18:09:34.133", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -40,8 +60,18 @@ }, "weaknesses": [ { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "psirt@us.ibm.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,14 +80,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0.0", + "versionEndIncluding": "7.2.3.7", + "matchCriteriaId": "B06C8A89-2DB4-4A6D-BD31-8B2BA54218A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3.0.0", + "versionEndIncluding": "7.3.2.2", + "matchCriteriaId": "86E324E0-1439-4F6B-8768-96F384630CE7" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/265509", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7096548", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-420xx/CVE-2023-42013.json b/CVE-2023/CVE-2023-420xx/CVE-2023-42013.json index afbdebd31f7..cf4a7979298 100644 --- a/CVE-2023/CVE-2023-420xx/CVE-2023-42013.json +++ b/CVE-2023/CVE-2023-420xx/CVE-2023-42013.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42013", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-12-20T00:15:08.383", - "lastModified": "2023-12-20T13:50:26.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-27T18:18:23.723", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -50,14 +70,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0.0", + "versionEndIncluding": "7.0.5.18", + "matchCriteriaId": "8D9BA852-DB65-4E85-8F40-EAD6897A42C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1.0.0", + "versionEndIncluding": "7.1.2.14", + "matchCriteriaId": "D26A6175-309B-4841-8ED2-CAE52C56660D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0.0", + "versionEndIncluding": "7.2.3.7", + "matchCriteriaId": "B06C8A89-2DB4-4A6D-BD31-8B2BA54218A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3.0.0", + "versionEndIncluding": "7.3.2.2", + "matchCriteriaId": "86E324E0-1439-4F6B-8768-96F384630CE7" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/265510", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7096547", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-420xx/CVE-2023-42015.json b/CVE-2023/CVE-2023-420xx/CVE-2023-42015.json index b54ea3584fc..1a21640752f 100644 --- a/CVE-2023/CVE-2023-420xx/CVE-2023-42015.json +++ b/CVE-2023/CVE-2023-420xx/CVE-2023-42015.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42015", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-12-19T03:15:07.950", - "lastModified": "2023-12-19T13:42:12.823", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-27T18:52:58.957", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -38,14 +58,66 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1.0.0", + "versionEndExcluding": "7.1.2.15", + "matchCriteriaId": "845BBD2F-F115-493B-862B-0B1E57A2CF17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0.0", + "versionEndExcluding": "7.2.3.8", + "matchCriteriaId": "D0831485-4FCF-47B5-9480-F03028E6CC85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3.0.0", + "versionEndExcluding": "7.3.2.3", + "matchCriteriaId": "FFBAF5A7-B9AA-4335-B27B-DD9C109425BE" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/265512", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7096546", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45172.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45172.json index 44ff1ed2ea9..f614a1b9cc7 100644 --- a/CVE-2023/CVE-2023-451xx/CVE-2023-45172.json +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45172.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45172", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-12-19T23:15:07.707", - "lastModified": "2023-12-20T13:50:26.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-27T17:51:23.967", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -40,8 +60,18 @@ }, "weaknesses": [ { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "psirt@us.ibm.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,14 +80,49 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:vios:3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6F61BE89-FBDE-4312-8422-86D1A9F57C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:aix:7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6791504A-A48A-4ED0-94AF-4C8A3B91516F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:aix:7.3:*:*:*:*:*:*:*", + "matchCriteriaId": "35DF3DE0-1AE4-4B25-843F-BC08DBBFDF78" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267970", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7099314", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-46xx/CVE-2023-4641.json b/CVE-2023/CVE-2023-46xx/CVE-2023-4641.json index 31314c17bf6..58572b20e5d 100644 --- a/CVE-2023/CVE-2023-46xx/CVE-2023-4641.json +++ b/CVE-2023/CVE-2023-46xx/CVE-2023-4641.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4641", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-27T16:15:13.363", - "lastModified": "2023-12-27T16:15:13.363", - "vulnStatus": "Received", + "lastModified": "2023-12-27T18:24:09.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47146.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47146.json index af08ef48222..d23a27a3f50 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47146.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47146.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47146", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-12-19T22:15:07.863", - "lastModified": "2023-12-20T13:50:26.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-27T17:50:55.147", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -40,8 +60,18 @@ }, "weaknesses": [ { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "psirt@us.ibm.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,14 +80,74 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:*", + "matchCriteriaId": "DACA17CC-8B71-4E71-B075-BFFB65AD989C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "BA60FDE5-8C40-4C7A-97CF-BA2A64BF307D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "AB518E06-00BA-48F3-8AEC-6E1E97CAA2CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "289027A2-178C-45DE-A86F-1207F23D13B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "5047AECF-879B-427A-ACF7-ECB10965E1B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "CD448AB8-E3CC-41A1-9D32-B1B35C68FA5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "9F4014E8-42E2-4B76-B2DA-8B50929A4AB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "BD0A459A-C74A-4E18-83B3-4C29D47D2C2B" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270372", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://https://www.ibm.com/support/pages/node/7099297", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47161.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47161.json index 16ccced6a96..3cc6d339368 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47161.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47161.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47161", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-12-20T00:15:08.670", - "lastModified": "2023-12-20T13:50:26.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-12-27T18:41:28.277", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -16,6 +16,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -50,14 +70,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0.0", + "versionEndIncluding": "7.0.5.18", + "matchCriteriaId": "8D9BA852-DB65-4E85-8F40-EAD6897A42C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1.0.0", + "versionEndIncluding": "7.1.2.14", + "matchCriteriaId": "D26A6175-309B-4841-8ED2-CAE52C56660D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0.0", + "versionEndIncluding": "7.2.3.7", + "matchCriteriaId": "B06C8A89-2DB4-4A6D-BD31-8B2BA54218A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3.0.0", + "versionEndIncluding": "7.3.2.2", + "matchCriteriaId": "86E324E0-1439-4F6B-8768-96F384630CE7" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270799", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7096552", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-480xx/CVE-2023-48003.json b/CVE-2023/CVE-2023-480xx/CVE-2023-48003.json index 6fe9984bd42..1acdf2f6fc2 100644 --- a/CVE-2023/CVE-2023-480xx/CVE-2023-48003.json +++ b/CVE-2023/CVE-2023-480xx/CVE-2023-48003.json @@ -2,12 +2,16 @@ "id": "CVE-2023-48003", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-26T22:15:13.907", - "lastModified": "2023-12-26T22:15:13.907", - "vulnStatus": "Received", + "lastModified": "2023-12-27T18:24:09.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "An open redirect through HTML injection in user messages in Asp.Net Zero before 12.3.0 allows remote attackers to redirect targeted victims to any URL via the ' 500,000 users with each having at least 2 saved sessions). If an attacker creates two or more user sessions and then open the \"consents\" tab of the admin User Interface, the UI attempts to load a huge number of offline client sessions leading to excessive memory and CPU consumption which could potentially crash the entire system." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de consumo de memoria sin restricciones en Keycloak. Se puede activar en entornos que tienen millones de tokens fuera de l\u00ednea (> 500.000 usuarios, cada uno con al menos 2 sesiones guardadas). Si un atacante crea dos o m\u00e1s sesiones de usuario y luego abre la pesta\u00f1a \"consentimientos\" de la interfaz de usuario del administrador, la interfaz de usuario intenta cargar una gran cantidad de sesiones de clientes fuera de l\u00ednea, lo que genera un consumo excesivo de memoria y CPU, lo que potencialmente podr\u00eda bloquear todo el sistema." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -35,6 +59,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -46,38 +80,228 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.0.0", + "matchCriteriaId": "DD663F41-3B6D-4AF0-9ABA-1F3BF292C632" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:single_sign-on:7.6:*:*:*:*:*:*:*", + "matchCriteriaId": "2DEC61BC-E699-456E-99B6-C049F2A5F23F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*", + "matchCriteriaId": "341E6313-20D5-44CB-9719-B20585DC5AD6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "EA983F8C-3A06-450A-AEFF-9429DE9A3454" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*", + "matchCriteriaId": "40449571-22F8-44FA-B57B-B43F71AB25E2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*", + "matchCriteriaId": "30E2CF79-2D56-48AB-952E-5DDAFE471073" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "54E24055-813B-4E6D-94B7-FAD5F78B8537" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_linuxone:4.9:*:*:*:*:*:*:*", + "matchCriteriaId": "8C519B1A-1CD6-426C-9339-F28E4FEF581B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_linuxone:4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "91EE3858-A648-44B4-B282-8F808D88D3B9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/errata/RHSA-2023:7854", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2023:7855", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2023:7856", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2023:7857", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2023:7858", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6563", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253308", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/keycloak/keycloak/issues/13340", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7116.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7116.json index e1e33a58ebe..2b0623bbaac 100644 --- a/CVE-2023/CVE-2023-71xx/CVE-2023-7116.json +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7116.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7116", "sourceIdentifier": "cna@vuldb.com", "published": "2023-12-27T16:15:13.580", - "lastModified": "2023-12-27T16:15:13.580", - "vulnStatus": "Received", + "lastModified": "2023-12-27T18:24:09.770", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index f4404a2db63..733da11a4c4 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-27T17:00:24.984657+00:00 +2023-12-27T19:00:24.767863+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-27T16:49:50.117000+00:00 +2023-12-27T18:59:12.027000+00:00 ``` ### Last Data Feed Release @@ -29,48 +29,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -234278 +234284 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `6` -* [CVE-2023-6190](CVE-2023/CVE-2023-61xx/CVE-2023-6190.json) (`2023-12-27T15:15:45.900`) -* [CVE-2023-3171](CVE-2023/CVE-2023-31xx/CVE-2023-3171.json) (`2023-12-27T16:15:13.103`) -* [CVE-2023-4641](CVE-2023/CVE-2023-46xx/CVE-2023-4641.json) (`2023-12-27T16:15:13.363`) -* [CVE-2023-7116](CVE-2023/CVE-2023-71xx/CVE-2023-7116.json) (`2023-12-27T16:15:13.580`) +* [CVE-2023-50255](CVE-2023/CVE-2023-502xx/CVE-2023-50255.json) (`2023-12-27T17:15:07.847`) +* [CVE-2023-51443](CVE-2023/CVE-2023-514xx/CVE-2023-51443.json) (`2023-12-27T17:15:08.093`) +* [CVE-2023-51664](CVE-2023/CVE-2023-516xx/CVE-2023-51664.json) (`2023-12-27T17:15:08.340`) +* [CVE-2023-51665](CVE-2023/CVE-2023-516xx/CVE-2023-51665.json) (`2023-12-27T18:15:23.267`) +* [CVE-2023-51697](CVE-2023/CVE-2023-516xx/CVE-2023-51697.json) (`2023-12-27T18:15:23.487`) +* [CVE-2023-51700](CVE-2023/CVE-2023-517xx/CVE-2023-51700.json) (`2023-12-27T18:15:23.700`) ### CVEs modified in the last Commit -Recently modified CVEs: `33` +Recently modified CVEs: `27` -* [CVE-2014-3639](CVE-2014/CVE-2014-36xx/CVE-2014-3639.json) (`2023-12-27T16:36:58.353`) -* [CVE-2014-3636](CVE-2014/CVE-2014-36xx/CVE-2014-3636.json) (`2023-12-27T16:36:58.353`) -* [CVE-2014-7824](CVE-2014/CVE-2014-78xx/CVE-2014-7824.json) (`2023-12-27T16:36:58.353`) -* [CVE-2015-1197](CVE-2015/CVE-2015-11xx/CVE-2015-1197.json) (`2023-12-27T15:15:43.853`) -* [CVE-2015-0245](CVE-2015/CVE-2015-02xx/CVE-2015-0245.json) (`2023-12-27T16:36:58.353`) -* [CVE-2018-8088](CVE-2018/CVE-2018-80xx/CVE-2018-8088.json) (`2023-12-27T15:15:44.463`) -* [CVE-2019-10158](CVE-2019/CVE-2019-101xx/CVE-2019-10158.json) (`2023-12-27T15:15:44.750`) -* [CVE-2019-3773](CVE-2019/CVE-2019-37xx/CVE-2019-3773.json) (`2023-12-27T15:15:44.890`) -* [CVE-2020-35512](CVE-2020/CVE-2020-355xx/CVE-2020-35512.json) (`2023-12-27T16:36:58.353`) -* [CVE-2022-42010](CVE-2022/CVE-2022-420xx/CVE-2022-42010.json) (`2023-12-27T16:49:29.303`) -* [CVE-2022-42012](CVE-2022/CVE-2022-420xx/CVE-2022-42012.json) (`2023-12-27T16:49:43.400`) -* [CVE-2022-42011](CVE-2022/CVE-2022-420xx/CVE-2022-42011.json) (`2023-12-27T16:49:50.117`) -* [CVE-2023-28491](CVE-2023/CVE-2023-284xx/CVE-2023-28491.json) (`2023-12-27T15:04:11.497`) -* [CVE-2023-28788](CVE-2023/CVE-2023-287xx/CVE-2023-28788.json) (`2023-12-27T15:04:40.417`) -* [CVE-2023-26525](CVE-2023/CVE-2023-265xx/CVE-2023-26525.json) (`2023-12-27T15:05:36.660`) -* [CVE-2023-48231](CVE-2023/CVE-2023-482xx/CVE-2023-48231.json) (`2023-12-27T15:15:45.050`) -* [CVE-2023-48232](CVE-2023/CVE-2023-482xx/CVE-2023-48232.json) (`2023-12-27T15:15:45.190`) -* [CVE-2023-48233](CVE-2023/CVE-2023-482xx/CVE-2023-48233.json) (`2023-12-27T15:15:45.297`) -* [CVE-2023-48234](CVE-2023/CVE-2023-482xx/CVE-2023-48234.json) (`2023-12-27T15:15:45.393`) -* [CVE-2023-48235](CVE-2023/CVE-2023-482xx/CVE-2023-48235.json) (`2023-12-27T15:15:45.493`) -* [CVE-2023-48236](CVE-2023/CVE-2023-482xx/CVE-2023-48236.json) (`2023-12-27T15:15:45.593`) -* [CVE-2023-48237](CVE-2023/CVE-2023-482xx/CVE-2023-48237.json) (`2023-12-27T15:15:45.693`) -* [CVE-2023-5954](CVE-2023/CVE-2023-59xx/CVE-2023-5954.json) (`2023-12-27T15:15:45.790`) -* [CVE-2023-34969](CVE-2023/CVE-2023-349xx/CVE-2023-34969.json) (`2023-12-27T16:36:58.353`) -* [CVE-2023-29432](CVE-2023/CVE-2023-294xx/CVE-2023-29432.json) (`2023-12-27T16:45:43.877`) +* [CVE-2023-49166](CVE-2023/CVE-2023-491xx/CVE-2023-49166.json) (`2023-12-27T17:04:38.483`) +* [CVE-2023-49269](CVE-2023/CVE-2023-492xx/CVE-2023-49269.json) (`2023-12-27T17:17:44.617`) +* [CVE-2023-29096](CVE-2023/CVE-2023-290xx/CVE-2023-29096.json) (`2023-12-27T17:32:59.767`) +* [CVE-2023-47146](CVE-2023/CVE-2023-471xx/CVE-2023-47146.json) (`2023-12-27T17:50:55.147`) +* [CVE-2023-45172](CVE-2023/CVE-2023-451xx/CVE-2023-45172.json) (`2023-12-27T17:51:23.967`) +* [CVE-2023-42012](CVE-2023/CVE-2023-420xx/CVE-2023-42012.json) (`2023-12-27T18:09:34.133`) +* [CVE-2023-42013](CVE-2023/CVE-2023-420xx/CVE-2023-42013.json) (`2023-12-27T18:18:23.723`) +* [CVE-2023-48003](CVE-2023/CVE-2023-480xx/CVE-2023-48003.json) (`2023-12-27T18:24:09.770`) +* [CVE-2023-49438](CVE-2023/CVE-2023-494xx/CVE-2023-49438.json) (`2023-12-27T18:24:09.770`) +* [CVE-2023-52096](CVE-2023/CVE-2023-520xx/CVE-2023-52096.json) (`2023-12-27T18:24:09.770`) +* [CVE-2023-6190](CVE-2023/CVE-2023-61xx/CVE-2023-6190.json) (`2023-12-27T18:24:09.770`) +* [CVE-2023-3171](CVE-2023/CVE-2023-31xx/CVE-2023-3171.json) (`2023-12-27T18:24:09.770`) +* [CVE-2023-4641](CVE-2023/CVE-2023-46xx/CVE-2023-4641.json) (`2023-12-27T18:24:09.770`) +* [CVE-2023-7116](CVE-2023/CVE-2023-71xx/CVE-2023-7116.json) (`2023-12-27T18:24:09.770`) +* [CVE-2023-48050](CVE-2023/CVE-2023-480xx/CVE-2023-48050.json) (`2023-12-27T18:36:33.847`) +* [CVE-2023-50715](CVE-2023/CVE-2023-507xx/CVE-2023-50715.json) (`2023-12-27T18:39:30.170`) +* [CVE-2023-49786](CVE-2023/CVE-2023-497xx/CVE-2023-49786.json) (`2023-12-27T18:40:36.307`) +* [CVE-2023-47161](CVE-2023/CVE-2023-471xx/CVE-2023-47161.json) (`2023-12-27T18:41:28.277`) +* [CVE-2023-51459](CVE-2023/CVE-2023-514xx/CVE-2023-51459.json) (`2023-12-27T18:43:46.757`) +* [CVE-2023-51460](CVE-2023/CVE-2023-514xx/CVE-2023-51460.json) (`2023-12-27T18:44:08.557`) +* [CVE-2023-5629](CVE-2023/CVE-2023-56xx/CVE-2023-5629.json) (`2023-12-27T18:45:15.347`) +* [CVE-2023-5630](CVE-2023/CVE-2023-56xx/CVE-2023-5630.json) (`2023-12-27T18:45:36.387`) +* [CVE-2023-6563](CVE-2023/CVE-2023-65xx/CVE-2023-6563.json) (`2023-12-27T18:49:44.490`) +* [CVE-2023-42015](CVE-2023/CVE-2023-420xx/CVE-2023-42015.json) (`2023-12-27T18:52:58.957`) +* [CVE-2023-50979](CVE-2023/CVE-2023-509xx/CVE-2023-50979.json) (`2023-12-27T18:59:12.027`) ## Download and Usage