mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2023-11-03T05:00:19.731004+00:00
This commit is contained in:
parent
2a2043582a
commit
2ff1297c05
28
CVE-2020/CVE-2020-284xx/CVE-2020-28407.json
Normal file
28
CVE-2020/CVE-2020-284xx/CVE-2020-28407.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2020-28407",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-03T04:15:15.447",
|
||||
"lastModified": "2023-11-03T04:15:15.447",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In swtpm before 0.4.2 and 0.5.x before 0.5.1, a local attacker may be able to overwrite arbitrary files via a symlink attack against a temporary file such as TMP2-00.permall."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1198395",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/stefanberger/swtpm/releases/tag/v0.4.2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/stefanberger/swtpm/releases/tag/v0.5.1",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-34300",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-06-23T17:15:18.460",
|
||||
"lastModified": "2023-09-07T03:15:07.537",
|
||||
"lastModified": "2023-11-03T03:15:07.587",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -102,6 +102,14 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I4YMGAN6AV4H4HPDINUHBKX7XE4T5THF/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JFCXR2EJGIE24DV45AWX6JJM7RQAT5CY/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LQCZL36LTOHWCQ25R5WTRSD5QMM436Q6/",
|
||||
"source": "cve@mitre.org"
|
||||
|
28
CVE-2023/CVE-2023-311xx/CVE-2023-31102.json
Normal file
28
CVE-2023/CVE-2023-311xx/CVE-2023-31102.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-31102",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-03T04:15:20.793",
|
||||
"lastModified": "2023-11-03T04:15:20.793",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "7-Zip through 22.01 on Linux allows an integer underflow and code execution via a crafted 7Z archive."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sourceforge.net/p/sevenzip/discussion/45797/thread/713c8a8269/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.7-zip.org/download.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1165/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-342xx/CVE-2023-34259.json
Normal file
24
CVE-2023/CVE-2023-342xx/CVE-2023-34259.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-34259",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-03T04:15:20.853",
|
||||
"lastModified": "2023-11-03T04:15:20.853",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow /wlmdeu%2f%2e%2e%2f%2e%2e directory traversal to read arbitrary files on the filesystem, even files that require root privileges. NOTE: this issue exists because of an incomplete fix for CVE-2020-23575."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec-consult.com/vulnerability-lab/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2023/Jul/15",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-342xx/CVE-2023-34260.json
Normal file
24
CVE-2023/CVE-2023-342xx/CVE-2023-34260.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-34260",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-03T04:15:20.907",
|
||||
"lastModified": "2023-11-03T04:15:20.907",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow a denial of service (service outage) via /wlmdeu%2f%2e%2e%2f%2e%2e followed by a directory reference such as %2fetc%00index.htm to try to read the /etc directory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec-consult.com/vulnerability-lab/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2023/Jul/15",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-342xx/CVE-2023-34261.json
Normal file
24
CVE-2023/CVE-2023-342xx/CVE-2023-34261.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-34261",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-03T04:15:20.963",
|
||||
"lastModified": "2023-11-03T04:15:20.963",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow identification of valid user accounts via username enumeration because they lead to a \"nicht einloggen\" error rather than a falsch error."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec-consult.com/vulnerability-lab/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2023/Jul/15",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-358xx/CVE-2023-35896.json
Normal file
59
CVE-2023/CVE-2023-358xx/CVE-2023-35896.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-35896",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-11-03T03:15:07.720",
|
||||
"lastModified": "2023-11-03T03:15:07.720",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Content Navigator 3.0.13 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 259247."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/259247",
|
||||
"source": "psirt@us.ibm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7065203",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-366xx/CVE-2023-36620.json
Normal file
28
CVE-2023/CVE-2023-366xx/CVE-2023-36620.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-36620",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-03T04:15:21.023",
|
||||
"lastModified": "2023-11-03T04:15:21.023",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the Boomerang Parental Control application before 13.83 for Android. The app is missing the android:allowBackup=\"false\" attribute in the manifest. This allows the user to backup the internal memory of the app to a PC. This gives the user access to the API token that is used to authenticate requests to the API."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec-consult.com/blog/detail/the-hidden-costs-of-parental-control-apps/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2023/Jul/12",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://useboomerang.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-366xx/CVE-2023-36621.json
Normal file
28
CVE-2023/CVE-2023-366xx/CVE-2023-36621.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-36621",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-03T04:15:21.083",
|
||||
"lastModified": "2023-11-03T04:15:21.083",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the Boomerang Parental Control application through 13.83 for Android. The child can use Safe Mode to remove all restrictions temporarily or uninstall the application without the parents noticing."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec-consult.com/blog/detail/the-hidden-costs-of-parental-control-apps/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2023/Jul/12",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://useboomerang.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45803",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-10-17T20:15:10.070",
|
||||
"lastModified": "2023-10-25T17:21:39.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-11-03T03:15:07.807",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -60,22 +60,22 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -135,6 +135,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/",
|
||||
"source": "security-advisories@github.com",
|
||||
|
20
CVE-2023/CVE-2023-469xx/CVE-2023-46954.json
Normal file
20
CVE-2023/CVE-2023-469xx/CVE-2023-46954.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-46954",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-03T03:15:07.920",
|
||||
"lastModified": "2023-11-03T03:15:07.920",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in Relativity ODA LLC RelativityOne v.12.1.537.3 Patch 2 and earlier allows a remote attacker to execute arbitrary code via the name parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jakedmurphy1/CVE-2023-46954",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5472",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-10-25T18:17:43.667",
|
||||
"lastModified": "2023-11-01T19:04:53.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-11-03T03:15:07.963",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -119,6 +119,10 @@
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5TWIUD4VIISLZWEQ4WLWFZT34T3KOXZB/",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDMQG42VVOZ5USSI4NSNT3VJPGBPNSIW/",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
52
README.md
52
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-11-03T03:00:19.927592+00:00
|
||||
2023-11-03T05:00:19.731004+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-11-03T02:55:08.753000+00:00
|
||||
2023-11-03T04:15:21.083000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,49 +29,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
229680
|
||||
229689
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
Recently added CVEs: `9`
|
||||
|
||||
* [CVE-2017-7252](CVE-2017/CVE-2017-72xx/CVE-2017-7252.json) (`2023-11-03T01:15:07.777`)
|
||||
* [CVE-2023-36022](CVE-2023/CVE-2023-360xx/CVE-2023-36022.json) (`2023-11-03T01:15:07.907`)
|
||||
* [CVE-2023-36029](CVE-2023/CVE-2023-360xx/CVE-2023-36029.json) (`2023-11-03T01:15:07.980`)
|
||||
* [CVE-2023-36034](CVE-2023/CVE-2023-360xx/CVE-2023-36034.json) (`2023-11-03T01:15:08.047`)
|
||||
* [CVE-2023-46176](CVE-2023/CVE-2023-461xx/CVE-2023-46176.json) (`2023-11-03T01:15:08.117`)
|
||||
* [CVE-2020-28407](CVE-2020/CVE-2020-284xx/CVE-2020-28407.json) (`2023-11-03T04:15:15.447`)
|
||||
* [CVE-2023-35896](CVE-2023/CVE-2023-358xx/CVE-2023-35896.json) (`2023-11-03T03:15:07.720`)
|
||||
* [CVE-2023-46954](CVE-2023/CVE-2023-469xx/CVE-2023-46954.json) (`2023-11-03T03:15:07.920`)
|
||||
* [CVE-2023-31102](CVE-2023/CVE-2023-311xx/CVE-2023-31102.json) (`2023-11-03T04:15:20.793`)
|
||||
* [CVE-2023-34259](CVE-2023/CVE-2023-342xx/CVE-2023-34259.json) (`2023-11-03T04:15:20.853`)
|
||||
* [CVE-2023-34260](CVE-2023/CVE-2023-342xx/CVE-2023-34260.json) (`2023-11-03T04:15:20.907`)
|
||||
* [CVE-2023-34261](CVE-2023/CVE-2023-342xx/CVE-2023-34261.json) (`2023-11-03T04:15:20.963`)
|
||||
* [CVE-2023-36620](CVE-2023/CVE-2023-366xx/CVE-2023-36620.json) (`2023-11-03T04:15:21.023`)
|
||||
* [CVE-2023-36621](CVE-2023/CVE-2023-366xx/CVE-2023-36621.json) (`2023-11-03T04:15:21.083`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `63`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
* [CVE-2022-34185](CVE-2022/CVE-2022-341xx/CVE-2022-34185.json) (`2023-11-03T02:53:49.573`)
|
||||
* [CVE-2022-25318](CVE-2022/CVE-2022-253xx/CVE-2022-25318.json) (`2023-11-03T02:54:55.067`)
|
||||
* [CVE-2022-29529](CVE-2022/CVE-2022-295xx/CVE-2022-29529.json) (`2023-11-03T02:55:08.753`)
|
||||
* [CVE-2023-24432](CVE-2023/CVE-2023-244xx/CVE-2023-24432.json) (`2023-11-03T01:43:10.883`)
|
||||
* [CVE-2023-24430](CVE-2023/CVE-2023-244xx/CVE-2023-24430.json) (`2023-11-03T01:45:22.703`)
|
||||
* [CVE-2023-24429](CVE-2023/CVE-2023-244xx/CVE-2023-24429.json) (`2023-11-03T01:49:40.803`)
|
||||
* [CVE-2023-24431](CVE-2023/CVE-2023-244xx/CVE-2023-24431.json) (`2023-11-03T01:50:55.897`)
|
||||
* [CVE-2023-24433](CVE-2023/CVE-2023-244xx/CVE-2023-24433.json) (`2023-11-03T01:51:35.530`)
|
||||
* [CVE-2023-24434](CVE-2023/CVE-2023-244xx/CVE-2023-24434.json) (`2023-11-03T01:52:57.313`)
|
||||
* [CVE-2023-24435](CVE-2023/CVE-2023-244xx/CVE-2023-24435.json) (`2023-11-03T01:53:24.537`)
|
||||
* [CVE-2023-24436](CVE-2023/CVE-2023-244xx/CVE-2023-24436.json) (`2023-11-03T01:55:43.407`)
|
||||
* [CVE-2023-25764](CVE-2023/CVE-2023-257xx/CVE-2023-25764.json) (`2023-11-03T01:57:13.527`)
|
||||
* [CVE-2023-25762](CVE-2023/CVE-2023-257xx/CVE-2023-25762.json) (`2023-11-03T01:58:18.033`)
|
||||
* [CVE-2023-25761](CVE-2023/CVE-2023-257xx/CVE-2023-25761.json) (`2023-11-03T01:59:17.893`)
|
||||
* [CVE-2023-25763](CVE-2023/CVE-2023-257xx/CVE-2023-25763.json) (`2023-11-03T01:59:48.757`)
|
||||
* [CVE-2023-25765](CVE-2023/CVE-2023-257xx/CVE-2023-25765.json) (`2023-11-03T02:00:58.373`)
|
||||
* [CVE-2023-25767](CVE-2023/CVE-2023-257xx/CVE-2023-25767.json) (`2023-11-03T02:02:37.800`)
|
||||
* [CVE-2023-25768](CVE-2023/CVE-2023-257xx/CVE-2023-25768.json) (`2023-11-03T02:04:03.650`)
|
||||
* [CVE-2023-25766](CVE-2023/CVE-2023-257xx/CVE-2023-25766.json) (`2023-11-03T02:06:20.837`)
|
||||
* [CVE-2023-40592](CVE-2023/CVE-2023-405xx/CVE-2023-40592.json) (`2023-11-03T02:12:20.743`)
|
||||
* [CVE-2023-40593](CVE-2023/CVE-2023-405xx/CVE-2023-40593.json) (`2023-11-03T02:13:51.010`)
|
||||
* [CVE-2023-40594](CVE-2023/CVE-2023-405xx/CVE-2023-40594.json) (`2023-11-03T02:16:11.283`)
|
||||
* [CVE-2023-40595](CVE-2023/CVE-2023-405xx/CVE-2023-40595.json) (`2023-11-03T02:21:10.870`)
|
||||
* [CVE-2023-40597](CVE-2023/CVE-2023-405xx/CVE-2023-40597.json) (`2023-11-03T02:22:28.370`)
|
||||
* [CVE-2023-40598](CVE-2023/CVE-2023-405xx/CVE-2023-40598.json) (`2023-11-03T02:23:14.207`)
|
||||
* [CVE-2022-34300](CVE-2022/CVE-2022-343xx/CVE-2022-34300.json) (`2023-11-03T03:15:07.587`)
|
||||
* [CVE-2023-45803](CVE-2023/CVE-2023-458xx/CVE-2023-45803.json) (`2023-11-03T03:15:07.807`)
|
||||
* [CVE-2023-5472](CVE-2023/CVE-2023-54xx/CVE-2023-5472.json) (`2023-11-03T03:15:07.963`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user