mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-07-26T14:00:26.082115+00:00
This commit is contained in:
parent
6d90c4aab4
commit
04a1aae75b
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-2502",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2023-07-26T06:15:09.760",
|
||||
"lastModified": "2023-07-26T06:15:09.760",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-26T12:53:08.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-4608",
|
||||
"sourceIdentifier": "cybersecurity@hitachienergy.com",
|
||||
"published": "2023-07-26T06:15:10.220",
|
||||
"lastModified": "2023-07-26T06:15:10.220",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-26T12:53:08.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1401",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-07-26T07:15:09.103",
|
||||
"lastModified": "2023-07-26T07:15:09.103",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-26T12:53:08.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20891",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2023-07-26T06:15:10.637",
|
||||
"lastModified": "2023-07-26T06:15:10.637",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-26T12:53:08.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,27 +2,88 @@
|
||||
"id": "CVE-2023-26564",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-12T21:15:09.047",
|
||||
"lastModified": "2023-07-13T08:32:09.673",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-07-26T13:58:32.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Syncfusion EJ2 ASPCore File Provider 3ac357f is vulnerable to Models/PhysicalFileProvider.cs directory traversal. As a result, an unauthenticated attacker can list files within a directory, download any file, or upload any file to any directory accessible by the web server."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:syncfusion:ej2_aspcore_file_provider:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E9E184E-DCFE-49C7-97D5-F62AE009D575"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ej2.syncfusion.com/documentation/file-manager/file-system-provider/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/RupturaInfoSec/CVE-2023-26563-26564-26565/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/SyncfusionExamples/ej2-aspcore-file-provider",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28130",
|
||||
"sourceIdentifier": "cve@checkpoint.com",
|
||||
"published": "2023-07-26T11:15:09.550",
|
||||
"lastModified": "2023-07-26T11:15:09.550",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-26T12:53:08.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32468",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2023-07-26T08:15:10.063",
|
||||
"lastModified": "2023-07-26T08:15:10.063",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-26T12:53:08.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2023/CVE-2023-370xx/CVE-2023-37049.json
Normal file
20
CVE-2023/CVE-2023-370xx/CVE-2023-37049.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-37049",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-26T13:15:10.173",
|
||||
"lastModified": "2023-07-26T13:15:10.173",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "emlog 2.1.9 is vulnerable to Arbitrary file deletion via admin\\template.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Num-Nine/CVE/issues/1",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38433",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-07-26T08:15:10.227",
|
||||
"lastModified": "2023-07-26T08:15:10.227",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-26T12:53:08.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38555",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-07-26T08:15:10.317",
|
||||
"lastModified": "2023-07-26T08:15:10.317",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-26T12:53:08.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38647",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-07-26T08:15:10.410",
|
||||
"lastModified": "2023-07-26T08:15:10.410",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-26T12:53:08.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38669",
|
||||
"sourceIdentifier": "paddle-security@baidu.com",
|
||||
"published": "2023-07-26T10:15:11.457",
|
||||
"lastModified": "2023-07-26T10:15:11.457",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-26T12:53:08.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38670",
|
||||
"sourceIdentifier": "paddle-security@baidu.com",
|
||||
"published": "2023-07-26T11:15:09.633",
|
||||
"lastModified": "2023-07-26T11:15:09.633",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-26T12:53:08.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-38671",
|
||||
"sourceIdentifier": "paddle-security@baidu.com",
|
||||
"published": "2023-07-26T11:15:09.707",
|
||||
"lastModified": "2023-07-26T11:15:09.707",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-26T12:53:08.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2023/CVE-2023-386xx/CVE-2023-38672.json
Normal file
55
CVE-2023/CVE-2023-386xx/CVE-2023-38672.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-38672",
|
||||
"sourceIdentifier": "paddle-security@baidu.com",
|
||||
"published": "2023-07-26T12:15:09.563",
|
||||
"lastModified": "2023-07-26T12:53:08.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "FPE in paddle.trace in PaddlePaddle before 2.5.0. This flaw can cause a runtime crash and a denial of service.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "paddle-security@baidu.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "paddle-security@baidu.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-369"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-004.md",
|
||||
"source": "paddle-security@baidu.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-386xx/CVE-2023-38673.json
Normal file
55
CVE-2023/CVE-2023-386xx/CVE-2023-38673.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-38673",
|
||||
"sourceIdentifier": "paddle-security@baidu.com",
|
||||
"published": "2023-07-26T12:15:09.640",
|
||||
"lastModified": "2023-07-26T12:53:08.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PaddlePaddle before 2.5.0 has a command injection in fs.py. This resulted in\u00a0the ability to execute arbitrary commands on the operating system.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "paddle-security@baidu.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "paddle-security@baidu.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-005.md",
|
||||
"source": "paddle-security@baidu.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-392xx/CVE-2023-39261.json
Normal file
55
CVE-2023/CVE-2023-392xx/CVE-2023-39261.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-39261",
|
||||
"sourceIdentifier": "security@jetbrains.com",
|
||||
"published": "2023-07-26T13:15:10.233",
|
||||
"lastModified": "2023-07-26T13:15:10.233",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In JetBrains IntelliJ IDEA before 2023.2 plugin for Space was requesting excessive permissions"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@jetbrains.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.2,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.0,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@jetbrains.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-250"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
|
||||
"source": "security@jetbrains.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3946",
|
||||
"sourceIdentifier": "trellixpsirt@trellix.com",
|
||||
"published": "2023-07-26T06:15:11.080",
|
||||
"lastModified": "2023-07-26T06:15:11.080",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-07-26T12:53:08.817",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
47
README.md
47
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-07-26T12:00:27.390467+00:00
|
||||
2023-07-26T14:00:26.082115+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-07-26T11:15:09.707000+00:00
|
||||
2023-07-26T13:58:32.947000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,40 +29,37 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
221050
|
||||
221054
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
|
||||
* [CVE-2023-38669](CVE-2023/CVE-2023-386xx/CVE-2023-38669.json) (`2023-07-26T10:15:11.457`)
|
||||
* [CVE-2023-28130](CVE-2023/CVE-2023-281xx/CVE-2023-28130.json) (`2023-07-26T11:15:09.550`)
|
||||
* [CVE-2023-38670](CVE-2023/CVE-2023-386xx/CVE-2023-38670.json) (`2023-07-26T11:15:09.633`)
|
||||
* [CVE-2023-38671](CVE-2023/CVE-2023-386xx/CVE-2023-38671.json) (`2023-07-26T11:15:09.707`)
|
||||
* [CVE-2023-38672](CVE-2023/CVE-2023-386xx/CVE-2023-38672.json) (`2023-07-26T12:15:09.563`)
|
||||
* [CVE-2023-38673](CVE-2023/CVE-2023-386xx/CVE-2023-38673.json) (`2023-07-26T12:15:09.640`)
|
||||
* [CVE-2023-37049](CVE-2023/CVE-2023-370xx/CVE-2023-37049.json) (`2023-07-26T13:15:10.173`)
|
||||
* [CVE-2023-39261](CVE-2023/CVE-2023-392xx/CVE-2023-39261.json) (`2023-07-26T13:15:10.233`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `17`
|
||||
Recently modified CVEs: `14`
|
||||
|
||||
* [CVE-2023-1547](CVE-2023/CVE-2023-15xx/CVE-2023-1547.json) (`2023-07-26T10:15:09.940`)
|
||||
* [CVE-2023-1803](CVE-2023/CVE-2023-18xx/CVE-2023-1803.json) (`2023-07-26T10:15:10.057`)
|
||||
* [CVE-2023-1833](CVE-2023/CVE-2023-18xx/CVE-2023-1833.json) (`2023-07-26T10:15:10.173`)
|
||||
* [CVE-2023-2703](CVE-2023/CVE-2023-27xx/CVE-2023-2703.json) (`2023-07-26T10:15:10.277`)
|
||||
* [CVE-2023-2712](CVE-2023/CVE-2023-27xx/CVE-2023-2712.json) (`2023-07-26T10:15:10.397`)
|
||||
* [CVE-2023-2713](CVE-2023/CVE-2023-27xx/CVE-2023-2713.json) (`2023-07-26T10:15:10.510`)
|
||||
* [CVE-2023-2851](CVE-2023/CVE-2023-28xx/CVE-2023-2851.json) (`2023-07-26T10:15:10.630`)
|
||||
* [CVE-2023-2882](CVE-2023/CVE-2023-28xx/CVE-2023-2882.json) (`2023-07-26T10:15:10.750`)
|
||||
* [CVE-2023-2884](CVE-2023/CVE-2023-28xx/CVE-2023-2884.json) (`2023-07-26T10:15:10.860`)
|
||||
* [CVE-2023-2885](CVE-2023/CVE-2023-28xx/CVE-2023-2885.json) (`2023-07-26T10:15:10.963`)
|
||||
* [CVE-2023-2886](CVE-2023/CVE-2023-28xx/CVE-2023-2886.json) (`2023-07-26T10:15:11.063`)
|
||||
* [CVE-2023-2887](CVE-2023/CVE-2023-28xx/CVE-2023-2887.json) (`2023-07-26T10:15:11.163`)
|
||||
* [CVE-2023-2958](CVE-2023/CVE-2023-29xx/CVE-2023-2958.json) (`2023-07-26T10:15:11.257`)
|
||||
* [CVE-2023-35069](CVE-2023/CVE-2023-350xx/CVE-2023-35069.json) (`2023-07-26T10:15:11.360`)
|
||||
* [CVE-2023-3048](CVE-2023/CVE-2023-30xx/CVE-2023-3048.json) (`2023-07-26T10:15:11.547`)
|
||||
* [CVE-2023-3049](CVE-2023/CVE-2023-30xx/CVE-2023-3049.json) (`2023-07-26T10:15:11.660`)
|
||||
* [CVE-2023-3319](CVE-2023/CVE-2023-33xx/CVE-2023-3319.json) (`2023-07-26T10:15:11.750`)
|
||||
* [CVE-2022-2502](CVE-2022/CVE-2022-25xx/CVE-2022-2502.json) (`2023-07-26T12:53:08.817`)
|
||||
* [CVE-2022-4608](CVE-2022/CVE-2022-46xx/CVE-2022-4608.json) (`2023-07-26T12:53:08.817`)
|
||||
* [CVE-2023-20891](CVE-2023/CVE-2023-208xx/CVE-2023-20891.json) (`2023-07-26T12:53:08.817`)
|
||||
* [CVE-2023-3946](CVE-2023/CVE-2023-39xx/CVE-2023-3946.json) (`2023-07-26T12:53:08.817`)
|
||||
* [CVE-2023-1401](CVE-2023/CVE-2023-14xx/CVE-2023-1401.json) (`2023-07-26T12:53:08.817`)
|
||||
* [CVE-2023-32468](CVE-2023/CVE-2023-324xx/CVE-2023-32468.json) (`2023-07-26T12:53:08.817`)
|
||||
* [CVE-2023-38433](CVE-2023/CVE-2023-384xx/CVE-2023-38433.json) (`2023-07-26T12:53:08.817`)
|
||||
* [CVE-2023-38555](CVE-2023/CVE-2023-385xx/CVE-2023-38555.json) (`2023-07-26T12:53:08.817`)
|
||||
* [CVE-2023-38647](CVE-2023/CVE-2023-386xx/CVE-2023-38647.json) (`2023-07-26T12:53:08.817`)
|
||||
* [CVE-2023-38669](CVE-2023/CVE-2023-386xx/CVE-2023-38669.json) (`2023-07-26T12:53:08.817`)
|
||||
* [CVE-2023-28130](CVE-2023/CVE-2023-281xx/CVE-2023-28130.json) (`2023-07-26T12:53:08.817`)
|
||||
* [CVE-2023-38670](CVE-2023/CVE-2023-386xx/CVE-2023-38670.json) (`2023-07-26T12:53:08.817`)
|
||||
* [CVE-2023-38671](CVE-2023/CVE-2023-386xx/CVE-2023-38671.json) (`2023-07-26T12:53:08.817`)
|
||||
* [CVE-2023-26564](CVE-2023/CVE-2023-265xx/CVE-2023-26564.json) (`2023-07-26T13:58:32.947`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user