mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2023-10-08T10:00:24.917564+00:00
This commit is contained in:
parent
f18707698f
commit
0522910f62
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-25078",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-01-26T21:15:16.080",
|
||||
"lastModified": "2023-02-02T16:30:57.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-08T09:15:10.143",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -72,6 +72,10 @@
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-08",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-14870",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2019-12-10T23:15:10.457",
|
||||
"lastModified": "2023-02-16T14:15:14.667",
|
||||
"lastModified": "2023-10-08T09:15:10.253",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -285,6 +285,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-06",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20191210-0002/",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-44758",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-26T05:15:10.503",
|
||||
"lastModified": "2023-01-05T02:50:59.290",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-08T09:15:10.480",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -79,6 +79,10 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-06",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2022-3437",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-01-12T15:15:10.083",
|
||||
"lastModified": "2023-09-17T09:15:11.373",
|
||||
"lastModified": "2023-10-08T09:15:10.573",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad de desbordamiento de b\u00fafer en Samba dentro de las rutinas GSSAPI unwrap_des() y unwrap_des3() de Heimdal. Las rutinas de descifrado DES y Triple-DES de la biblioteca GSSAPI de Heimdal permiten un desbordamiento del b\u00fafer de escritura de longitud limitada en la memoria asignada a malloc() cuando se presenta un paquete maliciosamente peque\u00f1o. Este fallo permite a un usuario remoto enviar datos maliciosos especialmente manipulados a la aplicaci\u00f3n, lo que puede provocar un ataque de denegaci\u00f3n de servicio (DoS)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -127,6 +131,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202309-06",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-06",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-3671",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2022-10-26T17:15:10.080",
|
||||
"lastModified": "2022-10-28T01:30:15.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-08T09:15:10.677",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -104,6 +104,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-06",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.212014",
|
||||
"source": "cna@vuldb.com",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2022-41916",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2022-11-15T23:15:27.197",
|
||||
"lastModified": "2023-02-16T14:15:16.590",
|
||||
"lastModified": "2023-10-08T09:15:10.810",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Heimdal is an implementation of ASN.1/DER, PKIX, and Kerberos. Versions prior to 7.7.1 are vulnerable to a denial of service vulnerability in Heimdal's PKI certificate validation library, affecting the KDC (via PKINIT) and kinit (via PKINIT), as well as any third-party applications using Heimdal's libhx509. Users should upgrade to Heimdal 7.7.1 or 7.8. There are no known workarounds for this issue."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Heimdal es una implementaci\u00f3n de ASN.1/DER, PKIX y Kerberos. Las versiones anteriores a la 7.7.1 son vulnerables a una vulnerabilidad de denegaci\u00f3n de servicio en la biblioteca de validaci\u00f3n de certificados PKI de Heimdal, lo que afecta a KDC (a trav\u00e9s de PKINIT) y kinit (a trav\u00e9s de PKINIT), as\u00ed como a cualquier aplicaci\u00f3n de terceros que utilice libhx509 de Heimdal. Los usuarios deben actualizar a Heimdal 7.7.1 o 7.8. No se conocen workarounds para este problema."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -56,7 +60,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -66,7 +70,7 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
@ -130,6 +134,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-06",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
|
||||
"source": "security-advisories@github.com"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2022-42898",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-25T06:15:09.427",
|
||||
"lastModified": "2023-09-17T09:15:11.580",
|
||||
"lastModified": "2023-10-08T09:15:10.937",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \"a similar bug.\""
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El an\u00e1lisis sint\u00e1ctico de PAC en MIT Kerberos 5 (tambi\u00e9n conocido como krb5) antes de 1.19.4 y 1.20.x antes de 1.20.1 tiene desbordamientos de enteros que pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo (en KDC, kadmind, o un servidor de aplicaciones GSS o Kerberos) en plataformas de 32 bits (que tienen un desbordamiento de b\u00fafer resultante), y causar una denegaci\u00f3n de servicio en otras plataformas. Esto ocurre en krb5_pac_parse en lib/krb5/krb/pac.c. Heimdal antes de 7.7.1 tiene \"un bug similar\"."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -151,6 +155,10 @@
|
||||
"url": "https://security.gentoo.org/glsa/202309-06",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-06",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-44640",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-12-25T05:15:11.103",
|
||||
"lastModified": "2023-05-16T11:03:18.913",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-08T09:15:11.017",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -103,6 +103,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-06",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230216-0008/",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-45142",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-03-06T23:15:11.233",
|
||||
"lastModified": "2023-03-13T18:02:37.587",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-08T09:15:11.120",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -79,6 +79,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-06",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2023/02/08/1",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21884",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-01-18T00:15:16.353",
|
||||
"lastModified": "2023-01-25T14:24:21.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-08T09:15:11.217",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -72,6 +72,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-07",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21885",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-01-18T00:15:16.417",
|
||||
"lastModified": "2023-01-25T14:24:11.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-08T09:15:11.323",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -72,6 +72,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-07",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21886",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-01-18T00:15:16.487",
|
||||
"lastModified": "2023-01-25T14:24:33.667",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-08T09:15:11.400",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -72,6 +72,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-07",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21889",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-01-18T00:15:16.687",
|
||||
"lastModified": "2023-01-25T14:26:50.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-08T09:15:11.483",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -72,6 +72,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-07",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21898",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-01-18T00:15:17.190",
|
||||
"lastModified": "2023-01-25T14:28:30.310",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-08T09:15:11.560",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -72,6 +72,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-07",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21899",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-01-18T00:15:17.253",
|
||||
"lastModified": "2023-01-25T14:28:40.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-08T09:15:11.637",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -72,6 +72,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-07",
|
||||
"source": "secalert_us@oracle.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2023.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31124",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-05-25T22:15:09.680",
|
||||
"lastModified": "2023-06-20T17:31:01.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-08T09:15:11.727",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -56,7 +56,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -66,7 +66,7 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
@ -144,6 +144,10 @@
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-09",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-31130",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-05-25T22:15:09.760",
|
||||
"lastModified": "2023-06-26T22:15:09.840",
|
||||
"lastModified": "2023-10-08T09:15:11.833",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -149,6 +149,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-09",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5419",
|
||||
"source": "security-advisories@github.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31147",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-05-25T22:15:09.833",
|
||||
"lastModified": "2023-06-02T17:44:21.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-10-08T09:15:11.940",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -56,7 +56,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -66,7 +66,7 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
@ -144,6 +144,10 @@
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-09",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32067",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-05-25T23:15:09.380",
|
||||
"lastModified": "2023-06-26T22:15:09.937",
|
||||
"lastModified": "2023-10-08T09:15:12.030",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -149,6 +149,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-09",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5419",
|
||||
"source": "security-advisories@github.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-32570",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-10T05:15:12.190",
|
||||
"lastModified": "2023-07-08T03:15:09.343",
|
||||
"lastModified": "2023-10-08T08:15:53.050",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -86,6 +86,10 @@
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LXZ6CUNJFDJLCFOZHY2TIGMCAEITLCRP/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202310-05",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
52
README.md
52
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-10-08T06:00:24.384523+00:00
|
||||
2023-10-08T10:00:24.917564+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-10-08T04:15:57.893000+00:00
|
||||
2023-10-08T09:15:12.030000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -34,38 +34,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `24`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
* [CVE-2023-40631](CVE-2023/CVE-2023-406xx/CVE-2023-40631.json) (`2023-10-08T04:15:55.547`)
|
||||
* [CVE-2023-40632](CVE-2023/CVE-2023-406xx/CVE-2023-40632.json) (`2023-10-08T04:15:56.397`)
|
||||
* [CVE-2023-40633](CVE-2023/CVE-2023-406xx/CVE-2023-40633.json) (`2023-10-08T04:15:56.483`)
|
||||
* [CVE-2023-40634](CVE-2023/CVE-2023-406xx/CVE-2023-40634.json) (`2023-10-08T04:15:56.553`)
|
||||
* [CVE-2023-40635](CVE-2023/CVE-2023-406xx/CVE-2023-40635.json) (`2023-10-08T04:15:56.630`)
|
||||
* [CVE-2023-40636](CVE-2023/CVE-2023-406xx/CVE-2023-40636.json) (`2023-10-08T04:15:56.700`)
|
||||
* [CVE-2023-40637](CVE-2023/CVE-2023-406xx/CVE-2023-40637.json) (`2023-10-08T04:15:56.773`)
|
||||
* [CVE-2023-40638](CVE-2023/CVE-2023-406xx/CVE-2023-40638.json) (`2023-10-08T04:15:56.833`)
|
||||
* [CVE-2023-40639](CVE-2023/CVE-2023-406xx/CVE-2023-40639.json) (`2023-10-08T04:15:56.897`)
|
||||
* [CVE-2023-40640](CVE-2023/CVE-2023-406xx/CVE-2023-40640.json) (`2023-10-08T04:15:56.957`)
|
||||
* [CVE-2023-40641](CVE-2023/CVE-2023-406xx/CVE-2023-40641.json) (`2023-10-08T04:15:57.027`)
|
||||
* [CVE-2023-40642](CVE-2023/CVE-2023-406xx/CVE-2023-40642.json) (`2023-10-08T04:15:57.087`)
|
||||
* [CVE-2023-40643](CVE-2023/CVE-2023-406xx/CVE-2023-40643.json) (`2023-10-08T04:15:57.147`)
|
||||
* [CVE-2023-40644](CVE-2023/CVE-2023-406xx/CVE-2023-40644.json) (`2023-10-08T04:15:57.207`)
|
||||
* [CVE-2023-40645](CVE-2023/CVE-2023-406xx/CVE-2023-40645.json) (`2023-10-08T04:15:57.270`)
|
||||
* [CVE-2023-40646](CVE-2023/CVE-2023-406xx/CVE-2023-40646.json) (`2023-10-08T04:15:57.347`)
|
||||
* [CVE-2023-40647](CVE-2023/CVE-2023-406xx/CVE-2023-40647.json) (`2023-10-08T04:15:57.423`)
|
||||
* [CVE-2023-40648](CVE-2023/CVE-2023-406xx/CVE-2023-40648.json) (`2023-10-08T04:15:57.493`)
|
||||
* [CVE-2023-40649](CVE-2023/CVE-2023-406xx/CVE-2023-40649.json) (`2023-10-08T04:15:57.563`)
|
||||
* [CVE-2023-40650](CVE-2023/CVE-2023-406xx/CVE-2023-40650.json) (`2023-10-08T04:15:57.627`)
|
||||
* [CVE-2023-40651](CVE-2023/CVE-2023-406xx/CVE-2023-40651.json) (`2023-10-08T04:15:57.693`)
|
||||
* [CVE-2023-40652](CVE-2023/CVE-2023-406xx/CVE-2023-40652.json) (`2023-10-08T04:15:57.770`)
|
||||
* [CVE-2023-40653](CVE-2023/CVE-2023-406xx/CVE-2023-40653.json) (`2023-10-08T04:15:57.827`)
|
||||
* [CVE-2023-40654](CVE-2023/CVE-2023-406xx/CVE-2023-40654.json) (`2023-10-08T04:15:57.893`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `20`
|
||||
|
||||
* [CVE-2018-25078](CVE-2018/CVE-2018-250xx/CVE-2018-25078.json) (`2023-10-08T09:15:10.143`)
|
||||
* [CVE-2019-14870](CVE-2019/CVE-2019-148xx/CVE-2019-14870.json) (`2023-10-08T09:15:10.253`)
|
||||
* [CVE-2021-44758](CVE-2021/CVE-2021-447xx/CVE-2021-44758.json) (`2023-10-08T09:15:10.480`)
|
||||
* [CVE-2022-3437](CVE-2022/CVE-2022-34xx/CVE-2022-3437.json) (`2023-10-08T09:15:10.573`)
|
||||
* [CVE-2022-3671](CVE-2022/CVE-2022-36xx/CVE-2022-3671.json) (`2023-10-08T09:15:10.677`)
|
||||
* [CVE-2022-41916](CVE-2022/CVE-2022-419xx/CVE-2022-41916.json) (`2023-10-08T09:15:10.810`)
|
||||
* [CVE-2022-42898](CVE-2022/CVE-2022-428xx/CVE-2022-42898.json) (`2023-10-08T09:15:10.937`)
|
||||
* [CVE-2022-44640](CVE-2022/CVE-2022-446xx/CVE-2022-44640.json) (`2023-10-08T09:15:11.017`)
|
||||
* [CVE-2022-45142](CVE-2022/CVE-2022-451xx/CVE-2022-45142.json) (`2023-10-08T09:15:11.120`)
|
||||
* [CVE-2023-32570](CVE-2023/CVE-2023-325xx/CVE-2023-32570.json) (`2023-10-08T08:15:53.050`)
|
||||
* [CVE-2023-21884](CVE-2023/CVE-2023-218xx/CVE-2023-21884.json) (`2023-10-08T09:15:11.217`)
|
||||
* [CVE-2023-21885](CVE-2023/CVE-2023-218xx/CVE-2023-21885.json) (`2023-10-08T09:15:11.323`)
|
||||
* [CVE-2023-21886](CVE-2023/CVE-2023-218xx/CVE-2023-21886.json) (`2023-10-08T09:15:11.400`)
|
||||
* [CVE-2023-21889](CVE-2023/CVE-2023-218xx/CVE-2023-21889.json) (`2023-10-08T09:15:11.483`)
|
||||
* [CVE-2023-21898](CVE-2023/CVE-2023-218xx/CVE-2023-21898.json) (`2023-10-08T09:15:11.560`)
|
||||
* [CVE-2023-21899](CVE-2023/CVE-2023-218xx/CVE-2023-21899.json) (`2023-10-08T09:15:11.637`)
|
||||
* [CVE-2023-31124](CVE-2023/CVE-2023-311xx/CVE-2023-31124.json) (`2023-10-08T09:15:11.727`)
|
||||
* [CVE-2023-31130](CVE-2023/CVE-2023-311xx/CVE-2023-31130.json) (`2023-10-08T09:15:11.833`)
|
||||
* [CVE-2023-31147](CVE-2023/CVE-2023-311xx/CVE-2023-31147.json) (`2023-10-08T09:15:11.940`)
|
||||
* [CVE-2023-32067](CVE-2023/CVE-2023-320xx/CVE-2023-32067.json) (`2023-10-08T09:15:12.030`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user