mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2023-09-15T12:00:24.977451+00:00
This commit is contained in:
parent
8f93eaffa3
commit
337ca16ddd
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2016-5180",
|
||||
"sourceIdentifier": "cve-coordination@google.com",
|
||||
"published": "2016-10-03T15:59:03.270",
|
||||
"lastModified": "2022-08-16T13:17:03.193",
|
||||
"lastModified": "2023-09-15T11:42:43.053",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,118 +84,118 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "61649042-ABA9-490C-BCB4-0F3EAEA3DD24"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1290A1CC-6506-4D8A-A4A6-055A38D57547"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A9520259-8666-48B9-A0A3-A8B2E1358574"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5FB2A771-24BE-4FB5-87E9-25C385848AAA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "886F1EA8-D38C-4045-AB39-4A65B6B6C149"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE64E1CB-185E-481B-BC81-C28D216ED470"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FD3E83F8-E2E3-4D2C-B3E5-31BFE1817ED9"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.2.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "530ACB4D-6981-4B39-857E-CBB07EB0CA4A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6DA56B75-A92A-40DB-9A46-76FA56E498C0"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.3.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3B33501E-65BA-45BB-860D-39FA94D010A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "75BB5E4D-4CD2-4AB4-B583-4DB3D2021FD8"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.3.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9AA3F962-8659-444F-BB08-6CBED2661C82"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85F8F1FC-A444-435D-9D94-73D06E669433"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.3.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "644E7D14-54E1-4F7E-A640-514A88E03D26"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F98575F2-5A2B-4F88-9882-459BB1BE4526"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.4.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E515118-8774-4C7F-8261-305910EF643F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F4E1ACE-25AD-4DAC-9638-B2BE9A9636A4"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.5.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C6C473F9-81E3-4555-8469-63A27DEDEDD4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "618C306F-A085-4368-B85A-01F4BC7A3D25"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.5.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19E695E5-93F5-49FD-AB58-D53169E1AB69"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AE3F31DD-48D2-4398-A3F1-039141BD5FAC"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.5.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B168912-2129-4833-B448-BC7616355885"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44C19926-1EC7-4B9A-A365-BF754F717835"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.5.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "47AD1736-F47B-4A93-9D59-C88BE0D10FA2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C3041B8D-C4EC-4AEE-9109-FB27BF7AB878"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA4D5F27-A8F0-41B4-9832-4F9830F96B26"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0308C3A1-A0BE-460B-8ED0-DFD4B094B50D"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.7.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "340C5CF0-AC09-4C17-9F15-6B0BEAC62629"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "585938B8-8527-4B48-B2A1-A4CAD172F938"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.7.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44895917-6186-477B-9B72-AA7B20B3E3E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D2EE1010-04B7-4E63-A30B-98DA2BDB9D32"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA26B2AA-395B-4D6C-8260-569E54751532"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6DF9A490-AA80-4CD7-A77C-340885C4D552"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.7.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "800D4E24-7E7A-4316-86F1-B8150DAE540C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96A3279F-715E-44DA-92ED-655D30FC81BB"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.7.4:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3710921E-94D4-4D9E-BD45-86E23ECE8C7C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FFC3032A-4D86-4D7F-9364-B0D768AA2E7A"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.7.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8883FA5A-CC60-4275-9C3B-31A7FBD2A073"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "69E739DA-F636-4AE3-BEBE-CC6EDC2E2918"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7BDB0FC-AA36-4C41-B3DC-201F0DE0191A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE42F91E-DF29-4B6F-B9FD-078A2FA13E89"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B38F8E2-7710-4303-A80F-9009619BEC7B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F5618550-F2B3-46F7-9A09-DC1BEB44A4D9"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA1637EF-3393-4770-91AE-89EA53D57830"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B99ECD78-C494-4B46-B03E-8EF22D4C7559"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93FA2559-0DB1-49BE-A6E6-C73408F4AB57"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -298,6 +298,15 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/93243",
|
||||
"source": "cve-coordination@google.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.ubuntu.com/usn/USN-3143-1",
|
||||
"source": "cve-coordination@google.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2017-1000381",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2017-07-07T17:29:00.307",
|
||||
"lastModified": "2022-08-16T13:01:59.460",
|
||||
"lastModified": "2023-09-15T11:42:43.053",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,23 +84,28 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "69E739DA-F636-4AE3-BEBE-CC6EDC2E2918"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D7BDB0FC-AA36-4C41-B3DC-201F0DE0191A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE42F91E-DF29-4B6F-B9FD-078A2FA13E89"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5B38F8E2-7710-4303-A80F-9009619BEC7B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F5618550-F2B3-46F7-9A09-DC1BEB44A4D9"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AA1637EF-3393-4770-91AE-89EA53D57830"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B99ECD78-C494-4B46-B03E-8EF22D4C7559"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.10.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "93FA2559-0DB1-49BE-A6E6-C73408F4AB57"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B92EADF5-3500-4F37-808E-41DC48DE8D68"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
@ -111,11 +116,6 @@
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.11.0:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "476034B6-69BF-4130-8139-D5DDC1EB0028"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "754802ED-54D6-44D5-AB44-C37EBE4B74E2"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-14354",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2021-05-13T14:15:17.503",
|
||||
"lastModified": "2022-04-26T16:05:04.770",
|
||||
"lastModified": "2023-09-15T11:42:43.053",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -102,8 +102,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:c-ares_project:c-ares:1.16.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "097AC553-C44C-4A6F-AAEA-3C778958A3CF"
|
||||
"criteria": "cpe:2.3:a:c-ares:c-ares:1.16.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "59640538-D3DC-457C-B042-5D2B8F445A46"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
51
CVE-2023/CVE-2023-49xx/CVE-2023-4959.json
Normal file
51
CVE-2023/CVE-2023-49xx/CVE-2023-4959.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2023-4959",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-09-15T10:15:07.697",
|
||||
"lastModified": "2023-09-15T10:15:07.697",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in Quay. Cross-site request forgery (CSRF) attacks force a user to perform unwanted actions in an application. During the pentest, it was detected that the config-editor page is vulnerable to CSRF. The config-editor page is used to configure the Quay instance. By coercing the victim\u2019s browser into sending an attacker-controlled request from another domain, it is possible to reconfigure the Quay instance (including adding users with admin privileges)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una falla en Quay. Los ataques de Cross-site request forgery (CSRF) obligan al usuario a realizar acciones no deseadas en una aplicaci\u00f3n. Durante la prueba de penetraci\u00f3n, se detect\u00f3 que la p\u00e1gina del editor de configuraci\u00f3n es vulnerable a CSRF. La p\u00e1gina del editor de configuraci\u00f3n se utiliza para configurar la instancia de Quay. Al forzar al navegador de la v\u00edctima a enviar una solicitud controlada por el atacante desde otro dominio, es posible reconfigurar la instancia de Quay (incluido agregar usuarios con privilegios de administrador)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-4959",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238908",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
25
README.md
25
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-09-15T10:00:25.192627+00:00
|
||||
2023-09-15T12:00:24.977451+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-09-15T09:15:08.607000+00:00
|
||||
2023-09-15T11:42:43.053000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,30 +29,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
225663
|
||||
225664
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `10`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
* [CVE-2023-4231](CVE-2023/CVE-2023-42xx/CVE-2023-4231.json) (`2023-09-15T08:15:07.867`)
|
||||
* [CVE-2023-4670](CVE-2023/CVE-2023-46xx/CVE-2023-4670.json) (`2023-09-15T08:15:08.063`)
|
||||
* [CVE-2023-4831](CVE-2023/CVE-2023-48xx/CVE-2023-4831.json) (`2023-09-15T08:15:08.147`)
|
||||
* [CVE-2023-4661](CVE-2023/CVE-2023-46xx/CVE-2023-4661.json) (`2023-09-15T09:15:07.907`)
|
||||
* [CVE-2023-4662](CVE-2023/CVE-2023-46xx/CVE-2023-4662.json) (`2023-09-15T09:15:08.040`)
|
||||
* [CVE-2023-4663](CVE-2023/CVE-2023-46xx/CVE-2023-4663.json) (`2023-09-15T09:15:08.133`)
|
||||
* [CVE-2023-4664](CVE-2023/CVE-2023-46xx/CVE-2023-4664.json) (`2023-09-15T09:15:08.230`)
|
||||
* [CVE-2023-4665](CVE-2023/CVE-2023-46xx/CVE-2023-4665.json) (`2023-09-15T09:15:08.330`)
|
||||
* [CVE-2023-4833](CVE-2023/CVE-2023-48xx/CVE-2023-4833.json) (`2023-09-15T09:15:08.423`)
|
||||
* [CVE-2023-4835](CVE-2023/CVE-2023-48xx/CVE-2023-4835.json) (`2023-09-15T09:15:08.607`)
|
||||
* [CVE-2023-4959](CVE-2023/CVE-2023-49xx/CVE-2023-4959.json) (`2023-09-15T10:15:07.697`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
* [CVE-2020-22217](CVE-2020/CVE-2020-222xx/CVE-2020-22217.json) (`2023-09-15T09:15:07.617`)
|
||||
* [CVE-2016-5180](CVE-2016/CVE-2016-51xx/CVE-2016-5180.json) (`2023-09-15T11:42:43.053`)
|
||||
* [CVE-2017-1000381](CVE-2017/CVE-2017-10003xx/CVE-2017-1000381.json) (`2023-09-15T11:42:43.053`)
|
||||
* [CVE-2020-14354](CVE-2020/CVE-2020-143xx/CVE-2020-14354.json) (`2023-09-15T11:42:43.053`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user