diff --git a/CVE-2021/CVE-2021-404xx/CVE-2021-40452.json b/CVE-2021/CVE-2021-404xx/CVE-2021-40452.json index 5e2160c668a..6f724657944 100644 --- a/CVE-2021/CVE-2021-404xx/CVE-2021-40452.json +++ b/CVE-2021/CVE-2021-404xx/CVE-2021-40452.json @@ -2,12 +2,12 @@ "id": "CVE-2021-40452", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:08.633", - "lastModified": "2022-02-10T07:46:27.400", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:08.107", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40453, CVE-2021-41360." + "value": "HEVC Video Extensions Remote Code Execution Vulnerability" }, { "lang": "es", @@ -17,7 +17,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -35,15 +35,13 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - } - ], - "cvssMetricV30": [ + }, { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", diff --git a/CVE-2021/CVE-2021-404xx/CVE-2021-40453.json b/CVE-2021/CVE-2021-404xx/CVE-2021-40453.json index a9698185333..dc933ec14c7 100644 --- a/CVE-2021/CVE-2021-404xx/CVE-2021-40453.json +++ b/CVE-2021/CVE-2021-404xx/CVE-2021-40453.json @@ -2,12 +2,12 @@ "id": "CVE-2021-40453", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:08.673", - "lastModified": "2022-02-10T07:46:32.940", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:08.333", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40452, CVE-2021-41360." + "value": "HEVC Video Extensions Remote Code Execution Vulnerability" }, { "lang": "es", @@ -17,7 +17,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -35,15 +35,13 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - } - ], - "cvssMetricV30": [ + }, { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", diff --git a/CVE-2021/CVE-2021-413xx/CVE-2021-41333.json b/CVE-2021/CVE-2021-413xx/CVE-2021-41333.json index 044759b1421..24212d1355d 100644 --- a/CVE-2021/CVE-2021-413xx/CVE-2021-41333.json +++ b/CVE-2021/CVE-2021-413xx/CVE-2021-41333.json @@ -2,8 +2,8 @@ "id": "CVE-2021-41333", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:08.717", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:08.517", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -17,7 +17,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -35,15 +35,13 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - } - ], - "cvssMetricV30": [ + }, { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", diff --git a/CVE-2021/CVE-2021-413xx/CVE-2021-41360.json b/CVE-2021/CVE-2021-413xx/CVE-2021-41360.json index f6d4918f092..8a142c0367a 100644 --- a/CVE-2021/CVE-2021-413xx/CVE-2021-41360.json +++ b/CVE-2021/CVE-2021-413xx/CVE-2021-41360.json @@ -2,12 +2,12 @@ "id": "CVE-2021-41360", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:08.753", - "lastModified": "2022-02-10T14:47:17.607", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:08.723", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "HEVC Video Extensions Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-40452, CVE-2021-40453." + "value": "HEVC Video Extensions Remote Code Execution Vulnerability" }, { "lang": "es", @@ -17,7 +17,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -35,15 +35,13 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - } - ], - "cvssMetricV30": [ + }, { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", diff --git a/CVE-2021/CVE-2021-413xx/CVE-2021-41365.json b/CVE-2021/CVE-2021-413xx/CVE-2021-41365.json index 27d92e6893d..7936abacfa3 100644 --- a/CVE-2021/CVE-2021-413xx/CVE-2021-41365.json +++ b/CVE-2021/CVE-2021-413xx/CVE-2021-41365.json @@ -2,12 +2,12 @@ "id": "CVE-2021-41365", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:08.797", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:08.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-42310, CVE-2021-42311, CVE-2021-42313, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889." + "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-422xx/CVE-2021-42294.json b/CVE-2021/CVE-2021-422xx/CVE-2021-42294.json index 2a5b1525a03..960241076ea 100644 --- a/CVE-2021/CVE-2021-422xx/CVE-2021-42294.json +++ b/CVE-2021/CVE-2021-422xx/CVE-2021-42294.json @@ -2,12 +2,12 @@ "id": "CVE-2021-42294", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:08.887", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:09.087", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-42309." + "value": "Microsoft SharePoint Server Remote Code Execution Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-423xx/CVE-2021-42309.json b/CVE-2021/CVE-2021-423xx/CVE-2021-42309.json index ce9d8cfff5d..988bf05f50b 100644 --- a/CVE-2021/CVE-2021-423xx/CVE-2021-42309.json +++ b/CVE-2021/CVE-2021-423xx/CVE-2021-42309.json @@ -2,12 +2,12 @@ "id": "CVE-2021-42309", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:08.977", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:09.197", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Microsoft SharePoint Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-42294." + "value": "Microsoft SharePoint Server Remote Code Execution Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-423xx/CVE-2021-42310.json b/CVE-2021/CVE-2021-423xx/CVE-2021-42310.json index c4846c79009..d312edb3d96 100644 --- a/CVE-2021/CVE-2021-423xx/CVE-2021-42310.json +++ b/CVE-2021/CVE-2021-423xx/CVE-2021-42310.json @@ -2,12 +2,12 @@ "id": "CVE-2021-42310", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:09.017", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:09.290", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42311, CVE-2021-42313, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889." + "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-423xx/CVE-2021-42311.json b/CVE-2021/CVE-2021-423xx/CVE-2021-42311.json index 960c03cc060..8e29d5f3874 100644 --- a/CVE-2021/CVE-2021-423xx/CVE-2021-42311.json +++ b/CVE-2021/CVE-2021-423xx/CVE-2021-42311.json @@ -2,12 +2,12 @@ "id": "CVE-2021-42311", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:09.060", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:09.373", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42313, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889." + "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability" }, { "lang": "es", @@ -17,43 +17,43 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, + "baseScore": 10.0, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, - "impactScore": 5.9 + "impactScore": 6.0 }, { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "baseScore": 9.8, + "baseSeverity": "CRITICAL" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 3.9, "impactScore": 5.9 } ], diff --git a/CVE-2021/CVE-2021-423xx/CVE-2021-42313.json b/CVE-2021/CVE-2021-423xx/CVE-2021-42313.json index 0717a5bb083..c375c2b56cd 100644 --- a/CVE-2021/CVE-2021-423xx/CVE-2021-42313.json +++ b/CVE-2021/CVE-2021-423xx/CVE-2021-42313.json @@ -2,12 +2,12 @@ "id": "CVE-2021-42313", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:09.140", - "lastModified": "2021-12-30T19:16:10.490", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:09.590", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42311, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889." + "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability" }, { "lang": "es", @@ -17,43 +17,43 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, + "baseScore": 10.0, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, - "impactScore": 5.9 + "impactScore": 6.0 }, { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "baseScore": 9.8, + "baseSeverity": "CRITICAL" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 3.9, "impactScore": 5.9 } ], diff --git a/CVE-2021/CVE-2021-423xx/CVE-2021-42314.json b/CVE-2021/CVE-2021-423xx/CVE-2021-42314.json index 63b8b3367cb..79f66104e9b 100644 --- a/CVE-2021/CVE-2021-423xx/CVE-2021-42314.json +++ b/CVE-2021/CVE-2021-423xx/CVE-2021-42314.json @@ -2,12 +2,12 @@ "id": "CVE-2021-42314", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:09.187", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:09.797", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42311, CVE-2021-42313, CVE-2021-42315, CVE-2021-43882, CVE-2021-43889." + "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-423xx/CVE-2021-42315.json b/CVE-2021/CVE-2021-423xx/CVE-2021-42315.json index 64bb81043d8..e262498ef6d 100644 --- a/CVE-2021/CVE-2021-423xx/CVE-2021-42315.json +++ b/CVE-2021/CVE-2021-423xx/CVE-2021-42315.json @@ -2,12 +2,12 @@ "id": "CVE-2021-42315", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:09.227", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:09.880", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42311, CVE-2021-42313, CVE-2021-42314, CVE-2021-43882, CVE-2021-43889." + "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-423xx/CVE-2021-42320.json b/CVE-2021/CVE-2021-423xx/CVE-2021-42320.json index 4ac4a9e6456..6ece05917d2 100644 --- a/CVE-2021/CVE-2021-423xx/CVE-2021-42320.json +++ b/CVE-2021/CVE-2021-423xx/CVE-2021-42320.json @@ -2,12 +2,12 @@ "id": "CVE-2021-42320", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:09.273", - "lastModified": "2022-02-10T00:09:50.450", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:09.963", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Microsoft SharePoint Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-43242." + "value": "Microsoft SharePoint Server Spoofing Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-432xx/CVE-2021-43207.json b/CVE-2021/CVE-2021-432xx/CVE-2021-43207.json index 6d2880ae025..aa5438593a1 100644 --- a/CVE-2021/CVE-2021-432xx/CVE-2021-43207.json +++ b/CVE-2021/CVE-2021-432xx/CVE-2021-43207.json @@ -2,12 +2,12 @@ "id": "CVE-2021-43207", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:09.317", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:10.060", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-43226." + "value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-432xx/CVE-2021-43216.json b/CVE-2021/CVE-2021-432xx/CVE-2021-43216.json index e6ee1ce865e..791b3b89da3 100644 --- a/CVE-2021/CVE-2021-432xx/CVE-2021-43216.json +++ b/CVE-2021/CVE-2021-432xx/CVE-2021-43216.json @@ -2,12 +2,12 @@ "id": "CVE-2021-43216", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:09.447", - "lastModified": "2022-05-23T17:42:15.943", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:10.203", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Microsoft Local Security Authority Server (lsasrv) Information Disclosure Vulnerability" + "value": "Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-432xx/CVE-2021-43222.json b/CVE-2021/CVE-2021-432xx/CVE-2021-43222.json index 6d7222eac00..a4fa345cc3a 100644 --- a/CVE-2021/CVE-2021-432xx/CVE-2021-43222.json +++ b/CVE-2021/CVE-2021-432xx/CVE-2021-43222.json @@ -2,12 +2,12 @@ "id": "CVE-2021-43222", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:09.573", - "lastModified": "2022-05-23T17:42:16.127", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:10.343", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Microsoft Message Queuing Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-43236." + "value": "Microsoft Message Queuing Information Disclosure Vulnerability" }, { "lang": "es", @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "NVD-CWE-noinfo" } ] } diff --git a/CVE-2021/CVE-2021-432xx/CVE-2021-43226.json b/CVE-2021/CVE-2021-432xx/CVE-2021-43226.json index 32560c597b1..aa8f05e2248 100644 --- a/CVE-2021/CVE-2021-432xx/CVE-2021-43226.json +++ b/CVE-2021/CVE-2021-432xx/CVE-2021-43226.json @@ -2,12 +2,12 @@ "id": "CVE-2021-43226", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:09.737", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:10.500", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-43207." + "value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-432xx/CVE-2021-43227.json b/CVE-2021/CVE-2021-432xx/CVE-2021-43227.json index 78ee5decf32..7510a90a72b 100644 --- a/CVE-2021/CVE-2021-432xx/CVE-2021-43227.json +++ b/CVE-2021/CVE-2021-432xx/CVE-2021-43227.json @@ -2,12 +2,12 @@ "id": "CVE-2021-43227", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:09.777", - "lastModified": "2022-05-23T17:42:16.407", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:10.610", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Storage Spaces Controller Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-43235." + "value": "Storage Spaces Controller Information Disclosure Vulnerability" }, { "lang": "es", @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "NVD-CWE-noinfo" } ] } diff --git a/CVE-2021/CVE-2021-432xx/CVE-2021-43229.json b/CVE-2021/CVE-2021-432xx/CVE-2021-43229.json index 0d3147f46c5..342daa0fdd2 100644 --- a/CVE-2021/CVE-2021-432xx/CVE-2021-43229.json +++ b/CVE-2021/CVE-2021-432xx/CVE-2021-43229.json @@ -2,12 +2,12 @@ "id": "CVE-2021-43229", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:09.860", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:10.737", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Windows NTFS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-43230, CVE-2021-43231." + "value": "Windows NTFS Elevation of Privilege Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-432xx/CVE-2021-43230.json b/CVE-2021/CVE-2021-432xx/CVE-2021-43230.json index 67dd575d83c..685a5f26825 100644 --- a/CVE-2021/CVE-2021-432xx/CVE-2021-43230.json +++ b/CVE-2021/CVE-2021-432xx/CVE-2021-43230.json @@ -2,12 +2,12 @@ "id": "CVE-2021-43230", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:09.900", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:10.857", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Windows NTFS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-43229, CVE-2021-43231." + "value": "Windows NTFS Elevation of Privilege Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-432xx/CVE-2021-43231.json b/CVE-2021/CVE-2021-432xx/CVE-2021-43231.json index f0d28a498ea..72f4bab2e2b 100644 --- a/CVE-2021/CVE-2021-432xx/CVE-2021-43231.json +++ b/CVE-2021/CVE-2021-432xx/CVE-2021-43231.json @@ -2,12 +2,12 @@ "id": "CVE-2021-43231", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:09.943", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:10.970", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Windows NTFS Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2021-43229, CVE-2021-43230." + "value": "Windows NTFS Elevation of Privilege Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-432xx/CVE-2021-43235.json b/CVE-2021/CVE-2021-432xx/CVE-2021-43235.json index e2ad154241f..b0f5704c464 100644 --- a/CVE-2021/CVE-2021-432xx/CVE-2021-43235.json +++ b/CVE-2021/CVE-2021-432xx/CVE-2021-43235.json @@ -2,12 +2,12 @@ "id": "CVE-2021-43235", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:10.107", - "lastModified": "2022-05-23T17:42:16.867", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:11.143", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Storage Spaces Controller Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-43227." + "value": "Storage Spaces Controller Information Disclosure Vulnerability" }, { "lang": "es", @@ -90,7 +90,7 @@ "description": [ { "lang": "en", - "value": "CWE-668" + "value": "NVD-CWE-noinfo" } ] } diff --git a/CVE-2021/CVE-2021-432xx/CVE-2021-43236.json b/CVE-2021/CVE-2021-432xx/CVE-2021-43236.json index 4e69e9b26bf..e9fc92b3aab 100644 --- a/CVE-2021/CVE-2021-432xx/CVE-2021-43236.json +++ b/CVE-2021/CVE-2021-432xx/CVE-2021-43236.json @@ -2,12 +2,12 @@ "id": "CVE-2021-43236", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:10.147", - "lastModified": "2022-05-23T17:42:16.910", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:11.243", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Microsoft Message Queuing Information Disclosure Vulnerability This CVE ID is unique from CVE-2021-43222." + "value": "Microsoft Message Queuing Information Disclosure Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-432xx/CVE-2021-43242.json b/CVE-2021/CVE-2021-432xx/CVE-2021-43242.json index b48a047834e..10df09be6c4 100644 --- a/CVE-2021/CVE-2021-432xx/CVE-2021-43242.json +++ b/CVE-2021/CVE-2021-432xx/CVE-2021-43242.json @@ -2,12 +2,12 @@ "id": "CVE-2021-43242", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:10.363", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:11.393", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Microsoft SharePoint Server Spoofing Vulnerability This CVE ID is unique from CVE-2021-42320." + "value": "Microsoft SharePoint Server Spoofing Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-438xx/CVE-2021-43876.json b/CVE-2021/CVE-2021-438xx/CVE-2021-43876.json index 6148b4f1228..5675c78320c 100644 --- a/CVE-2021/CVE-2021-438xx/CVE-2021-43876.json +++ b/CVE-2021/CVE-2021-438xx/CVE-2021-43876.json @@ -2,12 +2,12 @@ "id": "CVE-2021-43876", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-29T23:15:12.427", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:11.587", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Microsoft SharePoint Elevation of Privilege Vulnerability." + "value": "Microsoft SharePoint Elevation of Privilege Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-438xx/CVE-2021-43877.json b/CVE-2021/CVE-2021-438xx/CVE-2021-43877.json index 901116d9575..64517b587a4 100644 --- a/CVE-2021/CVE-2021-438xx/CVE-2021-43877.json +++ b/CVE-2021/CVE-2021-438xx/CVE-2021-43877.json @@ -2,8 +2,8 @@ "id": "CVE-2021-43877", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:10.950", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:11.683", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -17,27 +17,27 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "secure@microsoft.com", "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.8, + "baseScore": 8.8, "baseSeverity": "HIGH" }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 + "exploitabilityScore": 2.0, + "impactScore": 6.0 }, { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", diff --git a/CVE-2021/CVE-2021-438xx/CVE-2021-43882.json b/CVE-2021/CVE-2021-438xx/CVE-2021-43882.json index b39c770c8bb..8ceb3aa4ab7 100644 --- a/CVE-2021/CVE-2021-438xx/CVE-2021-43882.json +++ b/CVE-2021/CVE-2021-438xx/CVE-2021-43882.json @@ -2,12 +2,12 @@ "id": "CVE-2021-43882", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:11.040", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:11.890", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42311, CVE-2021-42313, CVE-2021-42314, CVE-2021-42315, CVE-2021-43889." + "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-438xx/CVE-2021-43889.json b/CVE-2021/CVE-2021-438xx/CVE-2021-43889.json index e289e38029c..10ad5554ca1 100644 --- a/CVE-2021/CVE-2021-438xx/CVE-2021-43889.json +++ b/CVE-2021/CVE-2021-438xx/CVE-2021-43889.json @@ -2,12 +2,12 @@ "id": "CVE-2021-43889", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:11.163", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:12.010", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-41365, CVE-2021-42310, CVE-2021-42311, CVE-2021-42313, CVE-2021-42314, CVE-2021-42315, CVE-2021-43882." + "value": "Microsoft Defender for IoT Remote Code Execution Vulnerability" }, { "lang": "es", diff --git a/CVE-2021/CVE-2021-438xx/CVE-2021-43890.json b/CVE-2021/CVE-2021-438xx/CVE-2021-43890.json index 89d20b390b1..ad7ef7894b4 100644 --- a/CVE-2021/CVE-2021-438xx/CVE-2021-43890.json +++ b/CVE-2021/CVE-2021-438xx/CVE-2021-43890.json @@ -2,8 +2,8 @@ "id": "CVE-2021-43890", "sourceIdentifier": "secure@microsoft.com", "published": "2021-12-15T15:15:11.207", - "lastModified": "2022-07-12T17:42:04.277", - "vulnStatus": "Analyzed", + "lastModified": "2023-12-28T00:15:12.093", + "vulnStatus": "Modified", "cisaExploitAdd": "2021-12-15", "cisaActionDue": "2021-12-29", "cisaRequiredAction": "Apply updates per vendor instructions.", @@ -11,7 +11,7 @@ "descriptions": [ { "lang": "en", - "value": "Windows AppX Installer Spoofing Vulnerability" + "value": "

We have investigated reports of a spoofing vulnerability in AppX installer that affects Microsoft Windows. Microsoft is aware of attacks that attempt to exploit this vulnerability by using specially crafted packages that include the malware family known as Emotet/Trickbot/Bazaloader.

\n

An attacker could craft a malicious attachment to be used in phishing campaigns. The attacker would then have to convince the user to open the specially crafted attachment. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

\n

Please see the Security Updates table for the link to the updated app. Alternatively you can download and install the Installer using the links provided in the FAQ section.

\n

Please see the Mitigations and Workaround sections for important information about steps you can take to protect your system from this vulnerability.

\n

December 27 2023 Update:

\n

In recent months, Microsoft Threat Intelligence has seen an increase in activity from threat actors leveraging social engineering and phishing techniques to target Windows OS users and utilizing the ms-appinstaller URI scheme.

\n

To address this increase in activity, we have updated the App Installer to disable the ms-appinstaller protocol by default and recommend other potential mitigations.

\n" }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6879.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6879.json new file mode 100644 index 00000000000..ae3508fa01a --- /dev/null +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6879.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-6879", + "sourceIdentifier": "cve-coordination@google.com", + "published": "2023-12-27T23:15:07.530", + "lastModified": "2023-12-27T23:15:07.530", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Increasing the resolution of video frames, while performing a multi-threaded encode, can result in a heap overflow in av1_loop_restoration_dealloc().\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@google.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://aomedia.googlesource.com/aom/+/refs/tags/v3.7.1", + "source": "cve-coordination@google.com" + }, + { + "url": "https://crbug.com/aomedia/3491", + "source": "cve-coordination@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-71xx/CVE-2023-7123.json b/CVE-2023/CVE-2023-71xx/CVE-2023-7123.json new file mode 100644 index 00000000000..487d1767520 --- /dev/null +++ b/CVE-2023/CVE-2023-71xx/CVE-2023-7123.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-7123", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-12-28T00:15:12.310", + "lastModified": "2023-12-28T00:15:12.310", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Medicine Tracking System 1.0. This issue affects some unknown processing of the file /classes/Master.php? f=save_medicine. The manipulation of the argument id/name/description leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249095." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://medium.com/@2839549219ljk/medicine-tracking-system-sql-injection-7b0dde3a82a4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.249095", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.249095", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 1dfb38c3b88..f65296694ca 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-12-27T23:00:24.684700+00:00 +2023-12-28T00:55:25.383317+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-12-27T22:15:16.790000+00:00 +2023-12-28T00:15:12.310000+00:00 ``` ### Last Data Feed Release @@ -29,59 +29,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -234302 +234304 ``` ### CVEs added in the last Commit -Recently added CVEs: `15` - -* [CVE-2023-43955](CVE-2023/CVE-2023-439xx/CVE-2023-43955.json) (`2023-12-27T21:15:08.050`) -* [CVE-2023-46919](CVE-2023/CVE-2023-469xx/CVE-2023-46919.json) (`2023-12-27T21:15:08.103`) -* [CVE-2023-47882](CVE-2023/CVE-2023-478xx/CVE-2023-47882.json) (`2023-12-27T21:15:08.147`) -* [CVE-2023-47883](CVE-2023/CVE-2023-478xx/CVE-2023-47883.json) (`2023-12-27T21:15:08.193`) -* [CVE-2023-51074](CVE-2023/CVE-2023-510xx/CVE-2023-51074.json) (`2023-12-27T21:15:08.253`) -* [CVE-2023-51075](CVE-2023/CVE-2023-510xx/CVE-2023-51075.json) (`2023-12-27T21:15:08.300`) -* [CVE-2023-51079](CVE-2023/CVE-2023-510xx/CVE-2023-51079.json) (`2023-12-27T21:15:08.350`) -* [CVE-2023-51080](CVE-2023/CVE-2023-510xx/CVE-2023-51080.json) (`2023-12-27T21:15:08.397`) -* [CVE-2023-51084](CVE-2023/CVE-2023-510xx/CVE-2023-51084.json) (`2023-12-27T21:15:08.450`) -* [CVE-2023-43481](CVE-2023/CVE-2023-434xx/CVE-2023-43481.json) (`2023-12-27T21:15:07.990`) -* [CVE-2023-46918](CVE-2023/CVE-2023-469xx/CVE-2023-46918.json) (`2023-12-27T22:15:16.597`) -* [CVE-2023-49000](CVE-2023/CVE-2023-490xx/CVE-2023-49000.json) (`2023-12-27T22:15:16.653`) -* [CVE-2023-49001](CVE-2023/CVE-2023-490xx/CVE-2023-49001.json) (`2023-12-27T22:15:16.700`) -* [CVE-2023-49002](CVE-2023/CVE-2023-490xx/CVE-2023-49002.json) (`2023-12-27T22:15:16.750`) -* [CVE-2023-49003](CVE-2023/CVE-2023-490xx/CVE-2023-49003.json) (`2023-12-27T22:15:16.790`) +Recently added CVEs: `2` + +* [CVE-2023-6879](CVE-2023/CVE-2023-68xx/CVE-2023-6879.json) (`2023-12-27T23:15:07.530`) +* [CVE-2023-7123](CVE-2023/CVE-2023-71xx/CVE-2023-7123.json) (`2023-12-28T00:15:12.310`) ### CVEs modified in the last Commit -Recently modified CVEs: `42` - -* [CVE-2023-51011](CVE-2023/CVE-2023-510xx/CVE-2023-51011.json) (`2023-12-27T21:10:33.847`) -* [CVE-2023-51027](CVE-2023/CVE-2023-510xx/CVE-2023-51027.json) (`2023-12-27T21:10:41.763`) -* [CVE-2023-51026](CVE-2023/CVE-2023-510xx/CVE-2023-51026.json) (`2023-12-27T21:10:48.950`) -* [CVE-2023-51025](CVE-2023/CVE-2023-510xx/CVE-2023-51025.json) (`2023-12-27T21:10:57.747`) -* [CVE-2023-51024](CVE-2023/CVE-2023-510xx/CVE-2023-51024.json) (`2023-12-27T21:11:05.060`) -* [CVE-2023-51023](CVE-2023/CVE-2023-510xx/CVE-2023-51023.json) (`2023-12-27T21:11:11.397`) -* [CVE-2023-7021](CVE-2023/CVE-2023-70xx/CVE-2023-7021.json) (`2023-12-27T21:11:16.050`) -* [CVE-2023-7020](CVE-2023/CVE-2023-70xx/CVE-2023-7020.json) (`2023-12-27T21:11:34.267`) -* [CVE-2023-50827](CVE-2023/CVE-2023-508xx/CVE-2023-50827.json) (`2023-12-27T21:25:18.757`) -* [CVE-2023-50826](CVE-2023/CVE-2023-508xx/CVE-2023-50826.json) (`2023-12-27T21:25:38.740`) -* [CVE-2023-50377](CVE-2023/CVE-2023-503xx/CVE-2023-50377.json) (`2023-12-27T21:34:56.883`) -* [CVE-2023-45117](CVE-2023/CVE-2023-451xx/CVE-2023-45117.json) (`2023-12-27T21:36:01.277`) -* [CVE-2023-45116](CVE-2023/CVE-2023-451xx/CVE-2023-45116.json) (`2023-12-27T21:36:11.097`) -* [CVE-2023-45115](CVE-2023/CVE-2023-451xx/CVE-2023-45115.json) (`2023-12-27T21:36:32.453`) -* [CVE-2023-52077](CVE-2023/CVE-2023-520xx/CVE-2023-52077.json) (`2023-12-27T21:37:15.710`) -* [CVE-2023-40038](CVE-2023/CVE-2023-400xx/CVE-2023-40038.json) (`2023-12-27T21:37:15.710`) -* [CVE-2023-52075](CVE-2023/CVE-2023-520xx/CVE-2023-52075.json) (`2023-12-27T21:37:15.710`) -* [CVE-2023-45119](CVE-2023/CVE-2023-451xx/CVE-2023-45119.json) (`2023-12-27T21:37:56.367`) -* [CVE-2023-45118](CVE-2023/CVE-2023-451xx/CVE-2023-45118.json) (`2023-12-27T21:38:08.260`) -* [CVE-2023-51048](CVE-2023/CVE-2023-510xx/CVE-2023-51048.json) (`2023-12-27T21:38:45.147`) -* [CVE-2023-51049](CVE-2023/CVE-2023-510xx/CVE-2023-51049.json) (`2023-12-27T21:39:12.257`) -* [CVE-2023-51050](CVE-2023/CVE-2023-510xx/CVE-2023-51050.json) (`2023-12-27T21:39:22.713`) -* [CVE-2023-4042](CVE-2023/CVE-2023-40xx/CVE-2023-4042.json) (`2023-12-27T22:04:29.077`) -* [CVE-2023-34966](CVE-2023/CVE-2023-349xx/CVE-2023-34966.json) (`2023-12-27T22:06:19.453`) -* [CVE-2023-34967](CVE-2023/CVE-2023-349xx/CVE-2023-34967.json) (`2023-12-27T22:06:24.227`) +Recently modified CVEs: `29` + +* [CVE-2021-41365](CVE-2021/CVE-2021-413xx/CVE-2021-41365.json) (`2023-12-28T00:15:08.970`) +* [CVE-2021-42294](CVE-2021/CVE-2021-422xx/CVE-2021-42294.json) (`2023-12-28T00:15:09.087`) +* [CVE-2021-42309](CVE-2021/CVE-2021-423xx/CVE-2021-42309.json) (`2023-12-28T00:15:09.197`) +* [CVE-2021-42310](CVE-2021/CVE-2021-423xx/CVE-2021-42310.json) (`2023-12-28T00:15:09.290`) +* [CVE-2021-42311](CVE-2021/CVE-2021-423xx/CVE-2021-42311.json) (`2023-12-28T00:15:09.373`) +* [CVE-2021-42313](CVE-2021/CVE-2021-423xx/CVE-2021-42313.json) (`2023-12-28T00:15:09.590`) +* [CVE-2021-42314](CVE-2021/CVE-2021-423xx/CVE-2021-42314.json) (`2023-12-28T00:15:09.797`) +* [CVE-2021-42315](CVE-2021/CVE-2021-423xx/CVE-2021-42315.json) (`2023-12-28T00:15:09.880`) +* [CVE-2021-42320](CVE-2021/CVE-2021-423xx/CVE-2021-42320.json) (`2023-12-28T00:15:09.963`) +* [CVE-2021-43207](CVE-2021/CVE-2021-432xx/CVE-2021-43207.json) (`2023-12-28T00:15:10.060`) +* [CVE-2021-43216](CVE-2021/CVE-2021-432xx/CVE-2021-43216.json) (`2023-12-28T00:15:10.203`) +* [CVE-2021-43222](CVE-2021/CVE-2021-432xx/CVE-2021-43222.json) (`2023-12-28T00:15:10.343`) +* [CVE-2021-43226](CVE-2021/CVE-2021-432xx/CVE-2021-43226.json) (`2023-12-28T00:15:10.500`) +* [CVE-2021-43227](CVE-2021/CVE-2021-432xx/CVE-2021-43227.json) (`2023-12-28T00:15:10.610`) +* [CVE-2021-43229](CVE-2021/CVE-2021-432xx/CVE-2021-43229.json) (`2023-12-28T00:15:10.737`) +* [CVE-2021-43230](CVE-2021/CVE-2021-432xx/CVE-2021-43230.json) (`2023-12-28T00:15:10.857`) +* [CVE-2021-43231](CVE-2021/CVE-2021-432xx/CVE-2021-43231.json) (`2023-12-28T00:15:10.970`) +* [CVE-2021-43235](CVE-2021/CVE-2021-432xx/CVE-2021-43235.json) (`2023-12-28T00:15:11.143`) +* [CVE-2021-43236](CVE-2021/CVE-2021-432xx/CVE-2021-43236.json) (`2023-12-28T00:15:11.243`) +* [CVE-2021-43242](CVE-2021/CVE-2021-432xx/CVE-2021-43242.json) (`2023-12-28T00:15:11.393`) +* [CVE-2021-43876](CVE-2021/CVE-2021-438xx/CVE-2021-43876.json) (`2023-12-28T00:15:11.587`) +* [CVE-2021-43877](CVE-2021/CVE-2021-438xx/CVE-2021-43877.json) (`2023-12-28T00:15:11.683`) +* [CVE-2021-43882](CVE-2021/CVE-2021-438xx/CVE-2021-43882.json) (`2023-12-28T00:15:11.890`) +* [CVE-2021-43889](CVE-2021/CVE-2021-438xx/CVE-2021-43889.json) (`2023-12-28T00:15:12.010`) +* [CVE-2021-43890](CVE-2021/CVE-2021-438xx/CVE-2021-43890.json) (`2023-12-28T00:15:12.093`) ## Download and Usage