mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2023-12-22T15:00:24.651577+00:00
This commit is contained in:
parent
7a6fcf0e8c
commit
00fda99e09
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-8343",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2019-02-15T07:29:00.553",
|
||||
"lastModified": "2019-02-15T13:52:11.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:08.127",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -101,6 +101,10 @@
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-09",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-21528",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:13.803",
|
||||
"lastModified": "2023-08-25T18:05:21.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:08.300",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -77,6 +77,10 @@
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-09",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-41617",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-09-26T19:15:07.263",
|
||||
"lastModified": "2023-11-07T03:38:59.313",
|
||||
"lastModified": "2023-12-22T13:15:08.413",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -282,6 +282,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5586",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssh.com/security.html",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-44370",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-29T20:15:07.250",
|
||||
"lastModified": "2023-06-06T13:41:58.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:08.587",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -78,6 +78,10 @@
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-09",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1729",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-05-15T22:15:10.350",
|
||||
"lastModified": "2023-11-07T04:04:42.940",
|
||||
"lastModified": "2023-12-22T13:15:08.680",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -46,7 +46,7 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
@ -151,6 +151,10 @@
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5ZJ3UBTJBZHNPJQFOSGM5L7WAHHE2GY/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-08",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5412",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20042",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2023-11-01T18:15:08.843",
|
||||
"lastModified": "2023-11-14T15:56:45.287",
|
||||
"lastModified": "2023-12-22T15:00:05.587",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -21,20 +21,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
"impactScore": 4.0
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20169",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2023-08-23T19:15:07.893",
|
||||
"lastModified": "2023-08-31T15:00:30.660",
|
||||
"lastModified": "2023-12-22T14:59:47.780",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,20 +17,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
"impactScore": 4.0
|
||||
},
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28531",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-17T04:15:14.553",
|
||||
"lastModified": "2023-07-21T19:21:51.437",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:08.797",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -105,6 +105,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5586",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2023/03/15/8",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4068",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:11.513",
|
||||
"lastModified": "2023-11-25T11:15:19.940",
|
||||
"lastModified": "2023-12-22T13:15:09.043",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -88,6 +88,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4069",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:11.583",
|
||||
"lastModified": "2023-11-25T11:15:20.020",
|
||||
"lastModified": "2023-12-22T13:15:09.140",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -88,6 +88,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4070",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:11.647",
|
||||
"lastModified": "2023-11-25T11:15:20.090",
|
||||
"lastModified": "2023-12-22T13:15:09.207",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -88,6 +88,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4071",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:11.710",
|
||||
"lastModified": "2023-11-25T11:15:20.153",
|
||||
"lastModified": "2023-12-22T13:15:09.273",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -88,6 +88,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4072",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:11.773",
|
||||
"lastModified": "2023-11-25T11:15:20.220",
|
||||
"lastModified": "2023-12-22T13:15:09.327",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -92,6 +92,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4073",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:11.840",
|
||||
"lastModified": "2023-11-25T11:15:20.290",
|
||||
"lastModified": "2023-12-22T13:15:09.387",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -129,6 +129,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4074",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:11.903",
|
||||
"lastModified": "2023-11-25T11:15:20.420",
|
||||
"lastModified": "2023-12-22T13:15:09.453",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -88,6 +88,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4075",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:11.973",
|
||||
"lastModified": "2023-11-25T11:15:20.500",
|
||||
"lastModified": "2023-12-22T13:15:09.517",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -88,6 +88,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4076",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:12.037",
|
||||
"lastModified": "2023-11-25T11:15:20.693",
|
||||
"lastModified": "2023-12-22T13:15:09.583",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -88,6 +88,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4077",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:12.100",
|
||||
"lastModified": "2023-11-25T11:15:20.787",
|
||||
"lastModified": "2023-12-22T13:15:09.647",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -88,6 +88,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4078",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-03T01:15:12.167",
|
||||
"lastModified": "2023-11-25T11:15:20.857",
|
||||
"lastModified": "2023-12-22T13:15:09.707",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -88,6 +88,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5467",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-47787",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-12-18T16:15:10.097",
|
||||
"lastModified": "2023-12-18T17:24:19.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-12-22T14:32:43.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce WooCommerce Bookings.This issue affects WooCommerce Bookings: from n/a through 2.0.3.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en WooCommerce WooCommerce Bookings. Este problema afecta a WooCommerce Bookings: desde n/a hasta 2.0.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:automattic:woocommerce_bookings:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.0.4",
|
||||
"matchCriteriaId": "47B0C969-F9BB-490A-A421-BC2959DFE43A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woocommerce-bookings/wordpress-woocommerce-bookings-plugin-2-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-47789",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-12-18T16:15:10.313",
|
||||
"lastModified": "2023-12-18T17:24:19.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-12-22T14:31:39.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce Canada Post Shipping Method.This issue affects Canada Post Shipping Method: from n/a through 2.8.3.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en WooCommerce Canada Post Shipping Method. Este problema afecta a Canada Post Shipping Method: desde n/a hasta 2.8.3."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:automattic:canada_post_shipping_method:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.8.4",
|
||||
"matchCriteriaId": "26FA8E82-E87B-4487-8F4A-661973CFF12C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woocommerce-shipping-canada-post/wordpress-woocommerce-canada-post-shipping-plugin-2-8-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4761",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-05T22:15:09.583",
|
||||
"lastModified": "2023-11-25T11:15:20.943",
|
||||
"lastModified": "2023-12-22T13:15:09.790",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -156,6 +156,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5491",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4762",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-05T22:15:09.677",
|
||||
"lastModified": "2023-11-28T01:15:07.410",
|
||||
"lastModified": "2023-12-22T13:15:09.940",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -161,6 +161,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5491",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4763",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-05T22:15:09.777",
|
||||
"lastModified": "2023-11-25T11:15:21.110",
|
||||
"lastModified": "2023-12-22T13:15:10.020",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -120,6 +120,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5491",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-4764",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-09-05T22:15:09.883",
|
||||
"lastModified": "2023-11-25T11:15:21.180",
|
||||
"lastModified": "2023-12-22T13:15:10.100",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -120,6 +120,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5491",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-48795",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-18T16:15:10.897",
|
||||
"lastModified": "2023-12-22T04:15:08.980",
|
||||
"lastModified": "2023-12-22T13:15:08.900",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -268,6 +268,10 @@
|
||||
"url": "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5586",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51384",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-18T19:15:08.720",
|
||||
"lastModified": "2023-12-22T12:15:42.810",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:10.160",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -76,6 +76,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5586",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssh.com/txt/release-9.6",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51385",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-12-18T19:15:08.773",
|
||||
"lastModified": "2023-12-22T12:15:33.360",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T14:15:06.983",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -76,6 +76,14 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5586",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssh.com/txt/release-9.6",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5218",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-10-11T23:15:10.443",
|
||||
"lastModified": "2023-11-25T11:15:21.253",
|
||||
"lastModified": "2023-12-22T13:15:10.290",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -144,6 +144,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5526",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5473",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-10-11T23:15:10.503",
|
||||
"lastModified": "2023-11-25T11:15:21.333",
|
||||
"lastModified": "2023-12-22T13:15:10.370",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -108,6 +108,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5526",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5474",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-10-11T23:15:10.557",
|
||||
"lastModified": "2023-11-25T11:15:21.403",
|
||||
"lastModified": "2023-12-22T13:15:10.457",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -108,6 +108,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5526",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5475",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-10-11T23:15:10.603",
|
||||
"lastModified": "2023-11-25T11:15:21.530",
|
||||
"lastModified": "2023-12-22T13:15:10.600",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -144,6 +144,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5526",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5476",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-10-11T23:15:10.650",
|
||||
"lastModified": "2023-11-25T11:15:21.620",
|
||||
"lastModified": "2023-12-22T13:15:10.680",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -108,6 +108,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5526",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5477",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-10-11T23:15:10.700",
|
||||
"lastModified": "2023-11-25T11:15:21.697",
|
||||
"lastModified": "2023-12-22T13:15:10.747",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -108,6 +108,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5526",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5478",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-10-11T23:15:10.747",
|
||||
"lastModified": "2023-11-25T11:15:21.760",
|
||||
"lastModified": "2023-12-22T13:15:10.830",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -108,6 +108,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5526",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5479",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-10-11T23:15:10.797",
|
||||
"lastModified": "2023-11-25T11:15:21.953",
|
||||
"lastModified": "2023-12-22T13:15:10.903",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -108,6 +108,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5526",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5480",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-11-01T18:15:09.930",
|
||||
"lastModified": "2023-12-13T21:46:02.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:10.973",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -157,6 +157,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5546",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5481",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-10-11T23:15:10.850",
|
||||
"lastModified": "2023-11-25T11:15:22.240",
|
||||
"lastModified": "2023-12-22T13:15:11.070",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -108,6 +108,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5526",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5482",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-11-01T18:15:09.973",
|
||||
"lastModified": "2023-12-13T21:45:45.527",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:11.130",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -157,6 +157,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5546",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5483",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-10-11T23:15:10.897",
|
||||
"lastModified": "2023-11-25T11:15:22.620",
|
||||
"lastModified": "2023-12-22T13:15:11.210",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -109,6 +109,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5526",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5484",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-10-11T23:15:10.950",
|
||||
"lastModified": "2023-11-25T11:15:22.710",
|
||||
"lastModified": "2023-12-22T13:15:11.330",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -144,6 +144,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5526",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5485",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-10-11T23:15:11.007",
|
||||
"lastModified": "2023-11-25T11:15:22.853",
|
||||
"lastModified": "2023-12-22T13:15:11.477",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -108,6 +108,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5526",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5486",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-10-11T23:15:11.060",
|
||||
"lastModified": "2023-11-25T11:15:22.950",
|
||||
"lastModified": "2023-12-22T13:15:11.593",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -108,6 +108,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5526",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5487",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-10-11T23:15:11.110",
|
||||
"lastModified": "2023-11-25T11:15:23.053",
|
||||
"lastModified": "2023-12-22T13:15:11.650",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -139,6 +139,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5526",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5849",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-11-01T18:15:10.107",
|
||||
"lastModified": "2023-12-13T21:45:35.673",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:11.717",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -157,6 +157,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5546",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5850",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-11-01T18:15:10.160",
|
||||
"lastModified": "2023-12-13T21:39:27.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:11.783",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -158,6 +158,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5546",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5851",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-11-01T18:15:10.207",
|
||||
"lastModified": "2023-12-13T21:39:13.400",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:11.847",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -157,6 +157,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5546",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5852",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-11-01T18:15:10.253",
|
||||
"lastModified": "2023-12-13T21:38:37.770",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:11.923",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -157,6 +157,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5546",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5853",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-11-01T18:15:10.300",
|
||||
"lastModified": "2023-12-13T21:38:26.543",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:12.047",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -157,6 +157,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5546",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5854",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-11-01T18:15:10.343",
|
||||
"lastModified": "2023-12-13T21:37:20.133",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:12.133",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -157,6 +157,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5546",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5855",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-11-01T18:15:10.387",
|
||||
"lastModified": "2023-12-13T21:37:03.353",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:12.210",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -157,6 +157,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5546",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5856",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-11-01T18:15:10.433",
|
||||
"lastModified": "2023-12-13T21:36:32.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:12.273",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -157,6 +157,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5546",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5857",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-11-01T18:15:10.477",
|
||||
"lastModified": "2023-12-13T21:36:13.590",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:12.350",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -157,6 +157,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5546",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5858",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-11-01T18:15:10.517",
|
||||
"lastModified": "2023-12-13T21:35:54.510",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:12.413",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -157,6 +157,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5546",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5859",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-11-01T18:15:10.563",
|
||||
"lastModified": "2023-12-13T21:35:27.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-22T13:15:12.480",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -157,6 +157,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5546",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5996",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-11-08T20:15:07.637",
|
||||
"lastModified": "2023-11-25T11:15:24.920",
|
||||
"lastModified": "2023-12-22T13:15:12.557",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -141,6 +141,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5551",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5997",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-11-15T18:15:06.873",
|
||||
"lastModified": "2023-11-28T03:15:07.510",
|
||||
"lastModified": "2023-12-22T13:15:12.693",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -100,6 +100,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5556",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6112",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-11-15T18:15:06.933",
|
||||
"lastModified": "2023-11-28T03:15:07.577",
|
||||
"lastModified": "2023-12-22T13:15:12.793",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -120,6 +120,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202311-11",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202312-07",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5556",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-6778",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-12-18T15:15:10.030",
|
||||
"lastModified": "2023-12-18T17:24:19.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-12-22T14:54:34.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository allegroai/clearml-server prior to 1.13.0. This vulnerability affects the ClearML Open Source Server which is not designed to be used as a publicly available service. Security recommendations stress it should be placed behind a company firewall or VPN. This vulnerability only affects users within the same organisation (I.e when a malicious party already has access to the internal network and to a user's ClearML login credentials)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Cross-Site Scripting (XSS) almacenado en el repositorio de GitHub allegroai/clearml-server anterior a 1.13.0. Esta vulnerabilidad afecta al servidor de c\u00f3digo abierto ClearML, que no est\u00e1 dise\u00f1ado para usarse como un servicio disponible p\u00fablicamente. Las recomendaciones de seguridad enfatizan que debe colocarse detr\u00e1s de un firewall o VPN de la empresa. Esta vulnerabilidad solo afecta a los usuarios dentro de la misma organizaci\u00f3n (es decir, cuando una parte malintencionada ya tiene acceso a la red interna y a las credenciales de inicio de sesi\u00f3n de ClearML de un usuario)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
@ -46,14 +70,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:clear:clearml_server:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.13.0",
|
||||
"matchCriteriaId": "885DBA48-94E2-4F63-9E10-5AD4CBABBB48"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/allegroai/clearml-server/commit/4684fd5b74af582c894b67a0a06e865c948b763a",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.com/bounties/5f3fffac-0358-48e6-a500-81bac13e0e2b",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2023/CVE-2023-70xx/CVE-2023-7076.json
Normal file
92
CVE-2023/CVE-2023-70xx/CVE-2023-7076.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2023-7076",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-12-22T14:15:07.093",
|
||||
"lastModified": "2023-12-22T14:15:07.093",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in slawkens MyAAC up to 0.8.13. It has been declared as problematic. This vulnerability affects unknown code of the file system/pages/bugtracker.php. The manipulation of the argument bug[2]['subject']/bug[2]['text']/report['subject'] leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.8.14 is able to address this issue. The name of the patch is 83a91ec540072d319dd338abff45f8d5ebf48190. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-248848."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/otsoft/myaac/commit/83a91ec540072d319dd338abff45f8d5ebf48190",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/slawkens/myaac/releases/tag/v0.8.14",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.248848",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.248848",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
64
README.md
64
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-12-22T13:00:25.280449+00:00
|
||||
2023-12-22T15:00:24.651577+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-12-22T12:18:32.690000+00:00
|
||||
2023-12-22T15:00:05.587000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,47 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
234078
|
||||
234079
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
* [CVE-2023-49391](CVE-2023/CVE-2023-493xx/CVE-2023-49391.json) (`2023-12-22T11:15:07.517`)
|
||||
* [CVE-2023-50569](CVE-2023/CVE-2023-505xx/CVE-2023-50569.json) (`2023-12-22T11:15:07.840`)
|
||||
* [CVE-2023-7075](CVE-2023/CVE-2023-70xx/CVE-2023-7075.json) (`2023-12-22T12:15:27.410`)
|
||||
* [CVE-2023-7076](CVE-2023/CVE-2023-70xx/CVE-2023-7076.json) (`2023-12-22T14:15:07.093`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `107`
|
||||
Recently modified CVEs: `59`
|
||||
|
||||
* [CVE-2023-48308](CVE-2023/CVE-2023-483xx/CVE-2023-48308.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-49086](CVE-2023/CVE-2023-490xx/CVE-2023-49086.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-49684](CVE-2023/CVE-2023-496xx/CVE-2023-49684.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-49685](CVE-2023/CVE-2023-496xx/CVE-2023-49685.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-49686](CVE-2023/CVE-2023-496xx/CVE-2023-49686.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-49687](CVE-2023/CVE-2023-496xx/CVE-2023-49687.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-49688](CVE-2023/CVE-2023-496xx/CVE-2023-49688.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-49689](CVE-2023/CVE-2023-496xx/CVE-2023-49689.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-49690](CVE-2023/CVE-2023-496xx/CVE-2023-49690.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-7052](CVE-2023/CVE-2023-70xx/CVE-2023-7052.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-51704](CVE-2023/CVE-2023-517xx/CVE-2023-51704.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-51707](CVE-2023/CVE-2023-517xx/CVE-2023-51707.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-51708](CVE-2023/CVE-2023-517xx/CVE-2023-51708.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-7053](CVE-2023/CVE-2023-70xx/CVE-2023-7053.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-7054](CVE-2023/CVE-2023-70xx/CVE-2023-7054.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-51713](CVE-2023/CVE-2023-517xx/CVE-2023-51713.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-7055](CVE-2023/CVE-2023-70xx/CVE-2023-7055.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-7056](CVE-2023/CVE-2023-70xx/CVE-2023-7056.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-24609](CVE-2023/CVE-2023-246xx/CVE-2023-24609.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-7057](CVE-2023/CVE-2023-70xx/CVE-2023-7057.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-7058](CVE-2023/CVE-2023-70xx/CVE-2023-7058.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-7059](CVE-2023/CVE-2023-70xx/CVE-2023-7059.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-43116](CVE-2023/CVE-2023-431xx/CVE-2023-43116.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-43741](CVE-2023/CVE-2023-437xx/CVE-2023-43741.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-49356](CVE-2023/CVE-2023-493xx/CVE-2023-49356.json) (`2023-12-22T12:18:32.690`)
|
||||
* [CVE-2023-5483](CVE-2023/CVE-2023-54xx/CVE-2023-5483.json) (`2023-12-22T13:15:11.210`)
|
||||
* [CVE-2023-5484](CVE-2023/CVE-2023-54xx/CVE-2023-5484.json) (`2023-12-22T13:15:11.330`)
|
||||
* [CVE-2023-5485](CVE-2023/CVE-2023-54xx/CVE-2023-5485.json) (`2023-12-22T13:15:11.477`)
|
||||
* [CVE-2023-5486](CVE-2023/CVE-2023-54xx/CVE-2023-5486.json) (`2023-12-22T13:15:11.593`)
|
||||
* [CVE-2023-5487](CVE-2023/CVE-2023-54xx/CVE-2023-5487.json) (`2023-12-22T13:15:11.650`)
|
||||
* [CVE-2023-5849](CVE-2023/CVE-2023-58xx/CVE-2023-5849.json) (`2023-12-22T13:15:11.717`)
|
||||
* [CVE-2023-5850](CVE-2023/CVE-2023-58xx/CVE-2023-5850.json) (`2023-12-22T13:15:11.783`)
|
||||
* [CVE-2023-5851](CVE-2023/CVE-2023-58xx/CVE-2023-5851.json) (`2023-12-22T13:15:11.847`)
|
||||
* [CVE-2023-5852](CVE-2023/CVE-2023-58xx/CVE-2023-5852.json) (`2023-12-22T13:15:11.923`)
|
||||
* [CVE-2023-5853](CVE-2023/CVE-2023-58xx/CVE-2023-5853.json) (`2023-12-22T13:15:12.047`)
|
||||
* [CVE-2023-5854](CVE-2023/CVE-2023-58xx/CVE-2023-5854.json) (`2023-12-22T13:15:12.133`)
|
||||
* [CVE-2023-5855](CVE-2023/CVE-2023-58xx/CVE-2023-5855.json) (`2023-12-22T13:15:12.210`)
|
||||
* [CVE-2023-5856](CVE-2023/CVE-2023-58xx/CVE-2023-5856.json) (`2023-12-22T13:15:12.273`)
|
||||
* [CVE-2023-5857](CVE-2023/CVE-2023-58xx/CVE-2023-5857.json) (`2023-12-22T13:15:12.350`)
|
||||
* [CVE-2023-5858](CVE-2023/CVE-2023-58xx/CVE-2023-5858.json) (`2023-12-22T13:15:12.413`)
|
||||
* [CVE-2023-5859](CVE-2023/CVE-2023-58xx/CVE-2023-5859.json) (`2023-12-22T13:15:12.480`)
|
||||
* [CVE-2023-5996](CVE-2023/CVE-2023-59xx/CVE-2023-5996.json) (`2023-12-22T13:15:12.557`)
|
||||
* [CVE-2023-5997](CVE-2023/CVE-2023-59xx/CVE-2023-5997.json) (`2023-12-22T13:15:12.693`)
|
||||
* [CVE-2023-6112](CVE-2023/CVE-2023-61xx/CVE-2023-6112.json) (`2023-12-22T13:15:12.793`)
|
||||
* [CVE-2023-51385](CVE-2023/CVE-2023-513xx/CVE-2023-51385.json) (`2023-12-22T14:15:06.983`)
|
||||
* [CVE-2023-47789](CVE-2023/CVE-2023-477xx/CVE-2023-47789.json) (`2023-12-22T14:31:39.947`)
|
||||
* [CVE-2023-47787](CVE-2023/CVE-2023-477xx/CVE-2023-47787.json) (`2023-12-22T14:32:43.010`)
|
||||
* [CVE-2023-6778](CVE-2023/CVE-2023-67xx/CVE-2023-6778.json) (`2023-12-22T14:54:34.047`)
|
||||
* [CVE-2023-20169](CVE-2023/CVE-2023-201xx/CVE-2023-20169.json) (`2023-12-22T14:59:47.780`)
|
||||
* [CVE-2023-20042](CVE-2023/CVE-2023-200xx/CVE-2023-20042.json) (`2023-12-22T15:00:05.587`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user