mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-12-13T05:00:23.783027+00:00
This commit is contained in:
parent
2b7f7051cc
commit
207e978398
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42883",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-12-12T01:15:11.330",
|
||||
"lastModified": "2023-12-13T01:15:08.247",
|
||||
"lastModified": "2023-12-13T03:15:47.387",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,14 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/12",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/13",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/6",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42884",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-12-12T01:15:11.380",
|
||||
"lastModified": "2023-12-13T01:15:08.303",
|
||||
"lastModified": "2023-12-13T03:15:47.467",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -20,6 +20,10 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/10",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/12",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42890",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-12-12T01:15:11.480",
|
||||
"lastModified": "2023-12-13T01:15:08.417",
|
||||
"lastModified": "2023-12-13T03:15:47.530",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,14 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/12",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/13",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/6",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42898",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-12-12T01:15:11.680",
|
||||
"lastModified": "2023-12-13T01:15:08.650",
|
||||
"lastModified": "2023-12-13T03:15:47.587",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,14 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/12",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/13",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42899",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-12-12T01:15:11.733",
|
||||
"lastModified": "2023-12-13T01:15:08.710",
|
||||
"lastModified": "2023-12-13T03:15:47.640",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -24,6 +24,14 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/11",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/12",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/13",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42914",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-12-12T01:15:12.413",
|
||||
"lastModified": "2023-12-13T01:15:09.470",
|
||||
"lastModified": "2023-12-13T03:15:47.710",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -24,6 +24,14 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/11",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/12",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/13",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42916",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-11-30T23:15:07.223",
|
||||
"lastModified": "2023-12-13T01:15:09.577",
|
||||
"lastModified": "2023-12-13T03:15:47.770",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2023-12-04",
|
||||
"cisaActionDue": "2023-12-25",
|
||||
@ -92,6 +92,14 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/12",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/13",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/3",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42917",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-11-30T23:15:07.280",
|
||||
"lastModified": "2023-12-13T01:15:09.673",
|
||||
"lastModified": "2023-12-13T03:15:47.857",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2023-12-04",
|
||||
"cisaActionDue": "2023-12-25",
|
||||
@ -92,6 +92,14 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/12",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/13",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/3",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42919",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-12-12T01:15:12.473",
|
||||
"lastModified": "2023-12-13T01:15:09.787",
|
||||
"lastModified": "2023-12-13T03:15:47.923",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -24,6 +24,10 @@
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/11",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/13",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
|
||||
"source": "product-security@apple.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-42927",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-12-12T01:15:12.730",
|
||||
"lastModified": "2023-12-13T01:15:10.207",
|
||||
"lastModified": "2023-12-13T03:15:47.990",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,10 @@
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/13",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/7",
|
||||
"source": "product-security@apple.com"
|
||||
|
55
CVE-2023/CVE-2023-458xx/CVE-2023-45801.json
Normal file
55
CVE-2023/CVE-2023-458xx/CVE-2023-45801.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-45801",
|
||||
"sourceIdentifier": "vuln@krcert.or.kr",
|
||||
"published": "2023-12-13T03:15:48.037",
|
||||
"lastModified": "2023-12-13T03:15:48.037",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Authentication vulnerability in Nadatel DVR allows Information Elicitation.This issue affects DVR: from 3.0.0 before 9.9.0.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "vuln@krcert.or.kr",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "vuln@krcert.or.kr",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.nadatel.com/",
|
||||
"source": "vuln@krcert.or.kr"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-49287",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-12-04T06:15:07.173",
|
||||
"lastModified": "2023-12-07T17:44:42.283",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-13T03:15:48.270",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -112,6 +112,10 @@
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/14",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2023/12/04/1",
|
||||
"source": "security-advisories@github.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5379",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-12-12T22:15:22.410",
|
||||
"lastModified": "2023-12-13T01:50:36.127",
|
||||
"lastModified": "2023-12-13T04:15:06.867",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -47,6 +47,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2023:4509",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-5379",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-6185",
|
||||
"sourceIdentifier": "security@documentfoundation.org",
|
||||
"published": "2023-12-11T12:15:07.037",
|
||||
"lastModified": "2023-12-12T02:15:09.190",
|
||||
"lastModified": "2023-12-13T03:15:48.383",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins.\n\nIn affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Vulnerabilidad de validaci\u00f3n de entrada incorrecta en la integraci\u00f3n GStreamer de The Document Foundation LibreOffice permite a un atacante ejecutar complementos GStreamer arbitrarios. En las versiones afectadas, el nombre de archivo del v\u00eddeo incrustado no se escapa lo suficiente cuando se pasa a GStreamer, lo que permite a un atacante ejecutar complementos arbitrarios de gstreamer dependiendo de qu\u00e9 complementos est\u00e9n instalados en el sistema de destino."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -35,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/",
|
||||
"source": "security@documentfoundation.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5574",
|
||||
"source": "security@documentfoundation.org"
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-6186",
|
||||
"sourceIdentifier": "security@documentfoundation.org",
|
||||
"published": "2023-12-11T12:15:07.713",
|
||||
"lastModified": "2023-12-12T02:15:09.270",
|
||||
"lastModified": "2023-12-13T03:15:48.470",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient macro permission validation of The Document Foundation LibreOffice allows an attacker to execute built-in macros without warning.\n\nIn affected versions LibreOffice supports hyperlinks with macro or similar built-in command targets that can be executed when activated without warning the user.\n\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La validaci\u00f3n insuficiente de permisos en las macros de The Document Foundation LibreOffice permite a un atacante ejecutar macros integradas sin previo aviso. En las versiones afectadas, LibreOffice admite hiperv\u00ednculos con macros o destinos de comandos integrados similares que se pueden ejecutar cuando se activan sin advertir al usuario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -35,6 +39,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/",
|
||||
"source": "security@documentfoundation.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5574",
|
||||
"source": "security@documentfoundation.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6269",
|
||||
"sourceIdentifier": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||
"published": "2023-12-05T08:15:08.020",
|
||||
"lastModified": "2023-12-11T15:31:20.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-13T03:15:48.543",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -114,6 +114,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Dec/16",
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf"
|
||||
},
|
||||
{
|
||||
"url": "https://networks.unify.com/security/advisories/OBSO-2310-01.pdf",
|
||||
"source": "551230f0-3615-47bd-b7cc-93e92e730bbf",
|
||||
|
62
README.md
62
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-12-13T03:00:19.419670+00:00
|
||||
2023-12-13T05:00:23.783027+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-12-13T02:16:14.417000+00:00
|
||||
2023-12-13T04:15:06.867000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,55 +29,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
232937
|
||||
232938
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `11`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
* [CVE-2023-42483](CVE-2023/CVE-2023-424xx/CVE-2023-42483.json) (`2023-12-13T01:15:07.870`)
|
||||
* [CVE-2023-43122](CVE-2023/CVE-2023-431xx/CVE-2023-43122.json) (`2023-12-13T01:15:10.350`)
|
||||
* [CVE-2023-45864](CVE-2023/CVE-2023-458xx/CVE-2023-45864.json) (`2023-12-13T01:15:10.677`)
|
||||
* [CVE-2023-45800](CVE-2023/CVE-2023-458xx/CVE-2023-45800.json) (`2023-12-13T02:15:07.323`)
|
||||
* [CVE-2023-47573](CVE-2023/CVE-2023-475xx/CVE-2023-47573.json) (`2023-12-13T02:15:07.553`)
|
||||
* [CVE-2023-47574](CVE-2023/CVE-2023-475xx/CVE-2023-47574.json) (`2023-12-13T02:15:07.600`)
|
||||
* [CVE-2023-47575](CVE-2023/CVE-2023-475xx/CVE-2023-47575.json) (`2023-12-13T02:15:07.643`)
|
||||
* [CVE-2023-47576](CVE-2023/CVE-2023-475xx/CVE-2023-47576.json) (`2023-12-13T02:15:07.693`)
|
||||
* [CVE-2023-47577](CVE-2023/CVE-2023-475xx/CVE-2023-47577.json) (`2023-12-13T02:15:07.753`)
|
||||
* [CVE-2023-47578](CVE-2023/CVE-2023-475xx/CVE-2023-47578.json) (`2023-12-13T02:15:07.800`)
|
||||
* [CVE-2023-47579](CVE-2023/CVE-2023-475xx/CVE-2023-47579.json) (`2023-12-13T02:15:07.850`)
|
||||
* [CVE-2023-45801](CVE-2023/CVE-2023-458xx/CVE-2023-45801.json) (`2023-12-13T03:15:48.037`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `58`
|
||||
Recently modified CVEs: `15`
|
||||
|
||||
* [CVE-2023-42917](CVE-2023/CVE-2023-429xx/CVE-2023-42917.json) (`2023-12-13T01:15:09.673`)
|
||||
* [CVE-2023-42919](CVE-2023/CVE-2023-429xx/CVE-2023-42919.json) (`2023-12-13T01:15:09.787`)
|
||||
* [CVE-2023-42922](CVE-2023/CVE-2023-429xx/CVE-2023-42922.json) (`2023-12-13T01:15:09.910`)
|
||||
* [CVE-2023-42923](CVE-2023/CVE-2023-429xx/CVE-2023-42923.json) (`2023-12-13T01:15:10.010`)
|
||||
* [CVE-2023-42924](CVE-2023/CVE-2023-429xx/CVE-2023-42924.json) (`2023-12-13T01:15:10.077`)
|
||||
* [CVE-2023-42926](CVE-2023/CVE-2023-429xx/CVE-2023-42926.json) (`2023-12-13T01:15:10.140`)
|
||||
* [CVE-2023-42927](CVE-2023/CVE-2023-429xx/CVE-2023-42927.json) (`2023-12-13T01:15:10.207`)
|
||||
* [CVE-2023-42932](CVE-2023/CVE-2023-429xx/CVE-2023-42932.json) (`2023-12-13T01:15:10.277`)
|
||||
* [CVE-2023-45866](CVE-2023/CVE-2023-458xx/CVE-2023-45866.json) (`2023-12-13T01:15:11.003`)
|
||||
* [CVE-2023-5344](CVE-2023/CVE-2023-53xx/CVE-2023-5344.json) (`2023-12-13T01:15:11.123`)
|
||||
* [CVE-2023-48225](CVE-2023/CVE-2023-482xx/CVE-2023-48225.json) (`2023-12-13T01:50:36.127`)
|
||||
* [CVE-2023-50251](CVE-2023/CVE-2023-502xx/CVE-2023-50251.json) (`2023-12-13T01:50:36.127`)
|
||||
* [CVE-2023-50252](CVE-2023/CVE-2023-502xx/CVE-2023-50252.json) (`2023-12-13T01:50:36.127`)
|
||||
* [CVE-2023-5379](CVE-2023/CVE-2023-53xx/CVE-2023-5379.json) (`2023-12-13T01:50:36.127`)
|
||||
* [CVE-2023-5764](CVE-2023/CVE-2023-57xx/CVE-2023-5764.json) (`2023-12-13T01:50:36.127`)
|
||||
* [CVE-2023-6710](CVE-2023/CVE-2023-67xx/CVE-2023-6710.json) (`2023-12-13T01:50:36.127`)
|
||||
* [CVE-2023-3517](CVE-2023/CVE-2023-35xx/CVE-2023-3517.json) (`2023-12-13T01:50:36.127`)
|
||||
* [CVE-2023-50263](CVE-2023/CVE-2023-502xx/CVE-2023-50263.json) (`2023-12-13T01:50:36.127`)
|
||||
* [CVE-2023-6753](CVE-2023/CVE-2023-67xx/CVE-2023-6753.json) (`2023-12-13T01:50:36.127`)
|
||||
* [CVE-2023-6653](CVE-2023/CVE-2023-66xx/CVE-2023-6653.json) (`2023-12-13T02:14:50.063`)
|
||||
* [CVE-2023-6652](CVE-2023/CVE-2023-66xx/CVE-2023-6652.json) (`2023-12-13T02:15:11.147`)
|
||||
* [CVE-2023-6651](CVE-2023/CVE-2023-66xx/CVE-2023-6651.json) (`2023-12-13T02:15:23.383`)
|
||||
* [CVE-2023-6650](CVE-2023/CVE-2023-66xx/CVE-2023-6650.json) (`2023-12-13T02:15:42.593`)
|
||||
* [CVE-2023-6649](CVE-2023/CVE-2023-66xx/CVE-2023-6649.json) (`2023-12-13T02:15:56.150`)
|
||||
* [CVE-2023-6648](CVE-2023/CVE-2023-66xx/CVE-2023-6648.json) (`2023-12-13T02:16:14.417`)
|
||||
* [CVE-2023-42883](CVE-2023/CVE-2023-428xx/CVE-2023-42883.json) (`2023-12-13T03:15:47.387`)
|
||||
* [CVE-2023-42884](CVE-2023/CVE-2023-428xx/CVE-2023-42884.json) (`2023-12-13T03:15:47.467`)
|
||||
* [CVE-2023-42890](CVE-2023/CVE-2023-428xx/CVE-2023-42890.json) (`2023-12-13T03:15:47.530`)
|
||||
* [CVE-2023-42898](CVE-2023/CVE-2023-428xx/CVE-2023-42898.json) (`2023-12-13T03:15:47.587`)
|
||||
* [CVE-2023-42899](CVE-2023/CVE-2023-428xx/CVE-2023-42899.json) (`2023-12-13T03:15:47.640`)
|
||||
* [CVE-2023-42914](CVE-2023/CVE-2023-429xx/CVE-2023-42914.json) (`2023-12-13T03:15:47.710`)
|
||||
* [CVE-2023-42916](CVE-2023/CVE-2023-429xx/CVE-2023-42916.json) (`2023-12-13T03:15:47.770`)
|
||||
* [CVE-2023-42917](CVE-2023/CVE-2023-429xx/CVE-2023-42917.json) (`2023-12-13T03:15:47.857`)
|
||||
* [CVE-2023-42919](CVE-2023/CVE-2023-429xx/CVE-2023-42919.json) (`2023-12-13T03:15:47.923`)
|
||||
* [CVE-2023-42927](CVE-2023/CVE-2023-429xx/CVE-2023-42927.json) (`2023-12-13T03:15:47.990`)
|
||||
* [CVE-2023-49287](CVE-2023/CVE-2023-492xx/CVE-2023-49287.json) (`2023-12-13T03:15:48.270`)
|
||||
* [CVE-2023-6185](CVE-2023/CVE-2023-61xx/CVE-2023-6185.json) (`2023-12-13T03:15:48.383`)
|
||||
* [CVE-2023-6186](CVE-2023/CVE-2023-61xx/CVE-2023-6186.json) (`2023-12-13T03:15:48.470`)
|
||||
* [CVE-2023-6269](CVE-2023/CVE-2023-62xx/CVE-2023-6269.json) (`2023-12-13T03:15:48.543`)
|
||||
* [CVE-2023-5379](CVE-2023/CVE-2023-53xx/CVE-2023-5379.json) (`2023-12-13T04:15:06.867`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user