mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2023-09-19T23:55:25.195838+00:00
This commit is contained in:
parent
c6aaf4d0b3
commit
122d94c705
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-20391",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-01-22T22:15:10.080",
|
||||
"lastModified": "2020-01-23T21:16:27.040",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-19T22:15:09.720",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -184,6 +184,10 @@
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-20392",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-01-22T22:15:10.143",
|
||||
"lastModified": "2020-01-23T21:18:43.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-19T22:15:10.183",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -174,6 +174,10 @@
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-20393",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-01-22T22:15:10.237",
|
||||
"lastModified": "2020-01-23T21:19:00.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-19T22:15:10.290",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -174,6 +174,10 @@
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-20394",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-01-22T22:15:10.330",
|
||||
"lastModified": "2020-01-23T21:29:09.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-19T22:15:10.397",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -184,6 +184,10 @@
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-20395",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-01-22T22:15:10.423",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-19T22:15:10.490",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -172,6 +172,10 @@
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-20396",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-01-22T22:15:10.470",
|
||||
"lastModified": "2021-07-21T11:39:23.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-19T22:15:10.597",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -165,6 +165,10 @@
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-20397",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-01-22T22:15:10.550",
|
||||
"lastModified": "2020-01-23T21:18:09.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-19T22:15:10.693",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -173,6 +173,10 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-20398",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-01-22T22:15:10.627",
|
||||
"lastModified": "2020-01-23T20:13:02.950",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-19T22:15:10.780",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -183,6 +183,10 @@
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00019.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-36440",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-03T16:15:07.287",
|
||||
"lastModified": "2023-09-12T00:15:08.523",
|
||||
"lastModified": "2023-09-19T22:15:10.907",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -79,6 +79,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3HU4PKLUVB5CTMOVQ2GV33TNUNMJCBGD/",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-40302",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-03T12:16:27.423",
|
||||
"lastModified": "2023-09-12T00:15:08.693",
|
||||
"lastModified": "2023-09-19T22:15:11.020",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -72,6 +72,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5495",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-40318",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-03T12:16:27.800",
|
||||
"lastModified": "2023-09-12T00:15:08.787",
|
||||
"lastModified": "2023-09-19T22:15:11.123",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -72,6 +72,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5495",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-43681",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-03T12:16:30.070",
|
||||
"lastModified": "2023-09-12T00:15:08.860",
|
||||
"lastModified": "2023-09-19T22:15:11.200",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -72,6 +72,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5495",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-31490",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-09T16:15:14.757",
|
||||
"lastModified": "2023-09-12T00:15:08.947",
|
||||
"lastModified": "2023-09-19T22:15:11.297",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -73,6 +73,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5495",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-38802",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-29T16:15:09.113",
|
||||
"lastModified": "2023-09-12T00:15:09.043",
|
||||
"lastModified": "2023-09-19T22:15:11.407",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://news.ycombinator.com/item?id=37305800",
|
||||
"source": "cve@mitre.org",
|
||||
|
28
CVE-2023/CVE-2023-409xx/CVE-2023-40931.json
Normal file
28
CVE-2023/CVE-2023-409xx/CVE-2023-40931.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-40931",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-19T23:15:09.153",
|
||||
"lastModified": "2023-09-19T23:15:09.153",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability in Nagios XI from version 5.11.0 up to and including 5.11.1 allows authenticated attackers to execute arbitrary SQL commands via the ID parameter in the POST request to /nagiosxi/admin/banner_message-ajaxhelper.php"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://nagios.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://outpost24.com/blog/nagios-xi-vulnerabilities/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.nagios.com/products/security/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-409xx/CVE-2023-40932.json
Normal file
28
CVE-2023/CVE-2023-409xx/CVE-2023-40932.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-40932",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-19T23:15:10.237",
|
||||
"lastModified": "2023-09-19T23:15:10.237",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross-site scripting (XSS) vulnerability in Nagios XI version 5.11.1 and below allows authenticated attackers with access to the custom logo component to inject arbitrary javascript or HTML via the alt-text field. This affects all pages containing the navbar including the login page which means the attacker is able to to steal plaintext credentials."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://nagios.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://outpost24.com/blog/nagios-xi-vulnerabilities/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.nagios.com/products/security/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-409xx/CVE-2023-40933.json
Normal file
28
CVE-2023/CVE-2023-409xx/CVE-2023-40933.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-40933",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-19T23:15:10.533",
|
||||
"lastModified": "2023-09-19T23:15:10.533",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability in Nagios XI v5.11.1 and below allows authenticated attackers with announcement banner configuration privileges to execute arbitrary SQL commands via the ID parameter sent to the update_banner_message() function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://nagios.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://outpost24.com/blog/nagios-xi-vulnerabilities/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.nagios.com/products/security/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-409xx/CVE-2023-40934.json
Normal file
28
CVE-2023/CVE-2023-409xx/CVE-2023-40934.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-40934",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-19T23:15:10.677",
|
||||
"lastModified": "2023-09-19T23:15:10.677",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability in Nagios XI 5.11.1 and below allows authenticated attackers with privileges to manage host escalations in the Core Configuration Manager to execute arbitrary SQL commands via the host escalation notification settings."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://nagios.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://outpost24.com/blog/nagios-xi-vulnerabilities/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.nagios.com/products/security/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-41358",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-29T04:15:16.180",
|
||||
"lastModified": "2023-09-12T00:15:09.387",
|
||||
"lastModified": "2023-09-19T22:15:11.507",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -73,6 +73,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5495",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41360",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-29T04:15:16.957",
|
||||
"lastModified": "2023-08-30T00:44:54.753",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-19T22:15:11.603",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -72,6 +72,10 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41361",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-29T04:15:17.027",
|
||||
"lastModified": "2023-08-30T00:45:03.640",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-19T22:15:11.693",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -76,6 +76,10 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-41909",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-05T07:15:14.877",
|
||||
"lastModified": "2023-09-08T16:49:26.730",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-19T22:15:11.777",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -71,6 +71,10 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00020.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
59
README.md
59
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-09-19T22:00:24.982772+00:00
|
||||
2023-09-19T23:55:25.195838+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-09-19T21:26:49+00:00
|
||||
2023-09-19T23:15:10.677000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,46 +29,41 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
225839
|
||||
225843
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `2`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
* [CVE-2023-2995](CVE-2023/CVE-2023-29xx/CVE-2023-2995.json) (`2023-09-19T20:15:09.120`)
|
||||
* [CVE-2023-4376](CVE-2023/CVE-2023-43xx/CVE-2023-4376.json) (`2023-09-19T20:15:09.380`)
|
||||
* [CVE-2023-40931](CVE-2023/CVE-2023-409xx/CVE-2023-40931.json) (`2023-09-19T23:15:09.153`)
|
||||
* [CVE-2023-40932](CVE-2023/CVE-2023-409xx/CVE-2023-40932.json) (`2023-09-19T23:15:10.237`)
|
||||
* [CVE-2023-40933](CVE-2023/CVE-2023-409xx/CVE-2023-40933.json) (`2023-09-19T23:15:10.533`)
|
||||
* [CVE-2023-40934](CVE-2023/CVE-2023-409xx/CVE-2023-40934.json) (`2023-09-19T23:15:10.677`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `25`
|
||||
Recently modified CVEs: `18`
|
||||
|
||||
* [CVE-2020-36766](CVE-2020/CVE-2020-367xx/CVE-2020-36766.json) (`2023-09-19T21:23:38.407`)
|
||||
* [CVE-2022-28357](CVE-2022/CVE-2022-283xx/CVE-2022-28357.json) (`2023-09-19T21:26:22.240`)
|
||||
* [CVE-2023-4972](CVE-2023/CVE-2023-49xx/CVE-2023-4972.json) (`2023-09-19T20:00:25.687`)
|
||||
* [CVE-2023-32665](CVE-2023/CVE-2023-326xx/CVE-2023-32665.json) (`2023-09-19T20:06:11.567`)
|
||||
* [CVE-2023-4893](CVE-2023/CVE-2023-48xx/CVE-2023-4893.json) (`2023-09-19T20:27:47.997`)
|
||||
* [CVE-2023-3711](CVE-2023/CVE-2023-37xx/CVE-2023-3711.json) (`2023-09-19T20:35:35.727`)
|
||||
* [CVE-2023-26142](CVE-2023/CVE-2023-261xx/CVE-2023-26142.json) (`2023-09-19T20:36:09.690`)
|
||||
* [CVE-2023-3710](CVE-2023/CVE-2023-37xx/CVE-2023-3710.json) (`2023-09-19T20:42:18.100`)
|
||||
* [CVE-2023-40868](CVE-2023/CVE-2023-408xx/CVE-2023-40868.json) (`2023-09-19T20:44:25.837`)
|
||||
* [CVE-2023-4501](CVE-2023/CVE-2023-45xx/CVE-2023-4501.json) (`2023-09-19T20:53:36.317`)
|
||||
* [CVE-2023-20243](CVE-2023/CVE-2023-202xx/CVE-2023-20243.json) (`2023-09-19T21:02:44.640`)
|
||||
* [CVE-2023-41834](CVE-2023/CVE-2023-418xx/CVE-2023-41834.json) (`2023-09-19T21:15:25.203`)
|
||||
* [CVE-2023-5031](CVE-2023/CVE-2023-50xx/CVE-2023-5031.json) (`2023-09-19T21:22:47.907`)
|
||||
* [CVE-2023-41349](CVE-2023/CVE-2023-413xx/CVE-2023-41349.json) (`2023-09-19T21:23:04.903`)
|
||||
* [CVE-2023-34999](CVE-2023/CVE-2023-349xx/CVE-2023-34999.json) (`2023-09-19T21:23:55.247`)
|
||||
* [CVE-2023-42359](CVE-2023/CVE-2023-423xx/CVE-2023-42359.json) (`2023-09-19T21:24:04.917`)
|
||||
* [CVE-2023-33831](CVE-2023/CVE-2023-338xx/CVE-2023-33831.json) (`2023-09-19T21:24:14.833`)
|
||||
* [CVE-2023-39040](CVE-2023/CVE-2023-390xx/CVE-2023-39040.json) (`2023-09-19T21:24:29.890`)
|
||||
* [CVE-2023-39039](CVE-2023/CVE-2023-390xx/CVE-2023-39039.json) (`2023-09-19T21:24:37.420`)
|
||||
* [CVE-2023-37611](CVE-2023/CVE-2023-376xx/CVE-2023-37611.json) (`2023-09-19T21:24:44.943`)
|
||||
* [CVE-2023-39049](CVE-2023/CVE-2023-390xx/CVE-2023-39049.json) (`2023-09-19T21:24:54.373`)
|
||||
* [CVE-2023-39056](CVE-2023/CVE-2023-390xx/CVE-2023-39056.json) (`2023-09-19T21:25:03.967`)
|
||||
* [CVE-2023-40788](CVE-2023/CVE-2023-407xx/CVE-2023-40788.json) (`2023-09-19T21:25:17.007`)
|
||||
* [CVE-2023-41599](CVE-2023/CVE-2023-415xx/CVE-2023-41599.json) (`2023-09-19T21:26:38.307`)
|
||||
* [CVE-2023-5060](CVE-2023/CVE-2023-50xx/CVE-2023-5060.json) (`2023-09-19T21:26:49.000`)
|
||||
* [CVE-2019-20391](CVE-2019/CVE-2019-203xx/CVE-2019-20391.json) (`2023-09-19T22:15:09.720`)
|
||||
* [CVE-2019-20392](CVE-2019/CVE-2019-203xx/CVE-2019-20392.json) (`2023-09-19T22:15:10.183`)
|
||||
* [CVE-2019-20393](CVE-2019/CVE-2019-203xx/CVE-2019-20393.json) (`2023-09-19T22:15:10.290`)
|
||||
* [CVE-2019-20394](CVE-2019/CVE-2019-203xx/CVE-2019-20394.json) (`2023-09-19T22:15:10.397`)
|
||||
* [CVE-2019-20395](CVE-2019/CVE-2019-203xx/CVE-2019-20395.json) (`2023-09-19T22:15:10.490`)
|
||||
* [CVE-2019-20396](CVE-2019/CVE-2019-203xx/CVE-2019-20396.json) (`2023-09-19T22:15:10.597`)
|
||||
* [CVE-2019-20397](CVE-2019/CVE-2019-203xx/CVE-2019-20397.json) (`2023-09-19T22:15:10.693`)
|
||||
* [CVE-2019-20398](CVE-2019/CVE-2019-203xx/CVE-2019-20398.json) (`2023-09-19T22:15:10.780`)
|
||||
* [CVE-2022-36440](CVE-2022/CVE-2022-364xx/CVE-2022-36440.json) (`2023-09-19T22:15:10.907`)
|
||||
* [CVE-2022-40302](CVE-2022/CVE-2022-403xx/CVE-2022-40302.json) (`2023-09-19T22:15:11.020`)
|
||||
* [CVE-2022-40318](CVE-2022/CVE-2022-403xx/CVE-2022-40318.json) (`2023-09-19T22:15:11.123`)
|
||||
* [CVE-2022-43681](CVE-2022/CVE-2022-436xx/CVE-2022-43681.json) (`2023-09-19T22:15:11.200`)
|
||||
* [CVE-2023-31490](CVE-2023/CVE-2023-314xx/CVE-2023-31490.json) (`2023-09-19T22:15:11.297`)
|
||||
* [CVE-2023-38802](CVE-2023/CVE-2023-388xx/CVE-2023-38802.json) (`2023-09-19T22:15:11.407`)
|
||||
* [CVE-2023-41358](CVE-2023/CVE-2023-413xx/CVE-2023-41358.json) (`2023-09-19T22:15:11.507`)
|
||||
* [CVE-2023-41360](CVE-2023/CVE-2023-413xx/CVE-2023-41360.json) (`2023-09-19T22:15:11.603`)
|
||||
* [CVE-2023-41361](CVE-2023/CVE-2023-413xx/CVE-2023-41361.json) (`2023-09-19T22:15:11.693`)
|
||||
* [CVE-2023-41909](CVE-2023/CVE-2023-419xx/CVE-2023-41909.json) (`2023-09-19T22:15:11.777`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user