mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-06-16T22:00:27.376950+00:00
This commit is contained in:
parent
b3bfb62484
commit
3dc542fc78
47
CVE-2023/CVE-2023-251xx/CVE-2023-25187.json
Normal file
47
CVE-2023/CVE-2023-251xx/CVE-2023-25187.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2023-25187",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-16T20:15:09.297",
|
||||
"lastModified": "2023-06-16T20:15:09.297",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered on NOKIA Airscale ASIKA Single RAN devices before 21B. Nokia Single RAN commissioning procedures do not change (factory-time installed) default SSH public/private key values that are specific to a network operator. As a result, the CSP internal BTS network SSH server (disabled by default) continues to apply the default SSH public/private key values. These keys don't give access to BTS, because service user authentication is username/password-based on top of SSH. Nokia factory installed default SSH keys are meant to be changed from operator-specific values during the BTS deployment commissioning phase. However, before the 21B release, BTS commissioning manuals did not provide instructions to change default SSH keys (to BTS operator-specific values). This leads to a possibility for malicious operations staff (inside a CSP network) to attempt MITM exploitation of BTS service user access, during the moments that SSH is enabled for Nokia service personnel to perform troubleshooting activities."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://Nokia.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25187/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-2820",
|
||||
"sourceIdentifier": "security@proofpoint.com",
|
||||
"published": "2023-06-14T22:15:09.273",
|
||||
"lastModified": "2023-06-15T12:39:22.420",
|
||||
"lastModified": "2023-06-16T21:15:09.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An information disclosure vulnerability in the?faye endpoint in Proofpoint Threat Response / Threat Response Auto-Pull (PTR/TRAP) could be used by an attacker on an adjacent network to obtain credentials to integrated services via a man-in-the-middle position or cryptanalysis of the session traffic. An attacker could use these credentials to impersonate PTR/TRAP to these services. All versions prior to 5.10.0 are affected.\u00a0\n"
|
||||
"value": "An information disclosure vulnerability in the faye endpoint in Proofpoint Threat Response / Threat Response Auto-Pull (PTR/TRAP) could be used by an attacker on an adjacent network to obtain credentials to integrated services via a man-in-the-middle position or cryptanalysis of the session traffic. An attacker could use these credentials to impersonate PTR/TRAP to these services. All versions prior to 5.10.0 are affected.\u00a0\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
20
CVE-2023/CVE-2023-309xx/CVE-2023-30903.json
Normal file
20
CVE-2023/CVE-2023-309xx/CVE-2023-30903.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-30903",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-06-16T21:15:09.107",
|
||||
"lastModified": "2023-06-16T21:15:09.107",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HP-UX could be exploited locally to create a Denial of Service (DoS) when any physical interface is configured with IPv6/inet6. "
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbux04474en_us",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-309xx/CVE-2023-30904.json
Normal file
20
CVE-2023/CVE-2023-309xx/CVE-2023-30904.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-30904",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-06-16T21:15:09.157",
|
||||
"lastModified": "2023-06-16T21:15:09.157",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A security vulnerability in HPE Insight Remote Support may result in the local disclosure of privileged LDAP information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbgn04487en_us",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-309xx/CVE-2023-30905.json
Normal file
20
CVE-2023/CVE-2023-309xx/CVE-2023-30905.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-30905",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-06-16T21:15:09.200",
|
||||
"lastModified": "2023-06-16T21:15:09.200",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MC990 X and UV300 RMC component has and inadequate default configuration that could be exploited to obtain enhanced privilege."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04473en_us",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2023/CVE-2023-31xx/CVE-2023-3195.json
Normal file
48
CVE-2023/CVE-2023-31xx/CVE-2023-3195.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2023-3195",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-06-16T20:15:09.547",
|
||||
"lastModified": "2023-06-16T20:15:09.547",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stack-based buffer overflow issue was found in ImageMagick's coders/tiff.c. This flaw allows an attacker to trick the user into opening a specially crafted malicious tiff file, causing an application to crash, resulting in a denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-3195",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214141",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ImageMagick/ImageMagick/commit/f620340935777b28fa3f7b0ed7ed6bd86946934c",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ImageMagick/ImageMagick6/commit/85a370c79afeb45a97842b0959366af5236e9023",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2023/05/29/1",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-334xx/CVE-2023-33438.json
Normal file
24
CVE-2023/CVE-2023-334xx/CVE-2023-33438.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-33438",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-16T21:15:09.247",
|
||||
"lastModified": "2023-06-16T21:15:09.247",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored Cross-site scripting (XSS) vulnerability in Wolters Kluwer TeamMate+ 35.0.11.0 allows remote attackers to inject arbitrary web script or HTML."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://wolters.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/justas-dee/CVEs/blob/main/CVE-2023-33438/README.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
40
CVE-2023/CVE-2023-344xx/CVE-2023-34474.json
Normal file
40
CVE-2023/CVE-2023-344xx/CVE-2023-34474.json
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
"id": "CVE-2023-34474",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-06-16T20:15:09.370",
|
||||
"lastModified": "2023-06-16T20:15:09.370",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap-based buffer overflow issue was discovered in ImageMagick's ReadTIM2ImageData() function in coders/tim2.c. A local attacker could trick the user in opening specially crafted file, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-34474",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214148",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ImageMagick/ImageMagick/commit/1061db7f80fdc9ef572ac60b55f408f7bab6e1b0",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
40
CVE-2023/CVE-2023-344xx/CVE-2023-34475.json
Normal file
40
CVE-2023/CVE-2023-344xx/CVE-2023-34475.json
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
"id": "CVE-2023-34475",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-06-16T20:15:09.433",
|
||||
"lastModified": "2023-06-16T20:15:09.433",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A heap use after free issue was discovered in ImageMagick's ReplaceXmpValue() function in MagickCore/profile.c. An attacker could trick user to open a specially crafted file to convert, triggering an heap-use-after-free write error, allowing an application to crash, resulting in a denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-34475",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2214149",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ImageMagick/ImageMagick/commit/1061db7f80fdc9ef572ac60b55f408f7bab6e1b0",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-35708",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-16T04:15:14.203",
|
||||
"lastModified": "2023-06-16T14:15:09.110",
|
||||
"lastModified": "2023-06-16T21:15:09.293",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Progress MOVEit Transfer before 2021.0.8 (13.0.8), 2021.1.6 (13.1.6), 2022.0.6 (14.0.6), 2022.1.7 (14.1.7), and 2023.0.3 (15.0.3), a SQL injection vulnerability has been identified in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. An attacker could submit a crafted payload to a MOVEit Transfer application endpoint that could result in modification and disclosure of MOVEit database content. The availability date of fixed versions of the DLL drop-in is earlier than the availability date of fixed versions of the full installer. These are fixed versions of the DLL drop-in: 2020.1.10 (12.1.10), 2021.0.8 (13.0.8), 2021.1.6 (13.1.6), 2022.0.6 (14.0.6), 2022.1.7 (14.1.7), and 2023.0.3 (15.0.3)."
|
||||
"value": "In Progress MOVEit Transfer before 2021.0.8 (13.0.8), 2021.1.6 (13.1.6), 2022.0.6 (14.0.6), 2022.1.7 (14.1.7), and 2023.0.3 (15.0.3), a SQL injection vulnerability has been identified in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain unauthorized access to MOVEit Transfer's database. An attacker could submit a crafted payload to a MOVEit Transfer application endpoint that could result in modification and disclosure of MOVEit database content. These are fixed versions of the DLL drop-in: 2020.1.10 (12.1.10), 2021.0.8 (13.0.8), 2021.1.6 (13.1.6), 2022.0.6 (14.0.6), 2022.1.7 (14.1.7), and 2023.0.3 (15.0.3)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
40
CVE-2023/CVE-2023-357xx/CVE-2023-35784.json
Normal file
40
CVE-2023/CVE-2023-357xx/CVE-2023-35784.json
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
"id": "CVE-2023-35784",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-16T20:15:09.493",
|
||||
"lastModified": "2023-06-16T20:15:09.493",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A double free or use after free could occur after SSL_clear in OpenBSD 7.2 before errata 026 and 7.3 before errata 004, and in LibreSSL before 3.6.3 and 3.7.x before 3.7.3. NOTE: OpenSSL is not affected."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.3-relnotes.txt",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.7.3-relnotes.txt",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/026_ssl.patch.sig",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.3/common/004_ssl.patch.sig",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/libressl/openbsd/commit/1d6680b3682f8caba78c627dee60c76da6e20dd7",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/libressl/openbsd/commit/96094ca8757b95298f49d65c813f303bd514b27b",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-357xx/CVE-2023-35788.json
Normal file
28
CVE-2023/CVE-2023-357xx/CVE-2023-35788.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-35788",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-16T21:15:09.340",
|
||||
"lastModified": "2023-06-16T21:15:09.340",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in fl_set_geneve_opt in net/sched/cls_flower.c in the Linux kernel before 6.3.7. It allows an out-of-bounds write in the flower classifier code via TCA_FLOWER_KEY_ENC_OPTS_GENEVE packets. This may result in denial of service or privilege escalation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openwall.com/lists/oss-security/2023/06/07/1",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-357xx/CVE-2023-35789.json
Normal file
24
CVE-2023/CVE-2023-357xx/CVE-2023-35789.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-35789",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-16T21:15:09.383",
|
||||
"lastModified": "2023-06-16T21:15:09.383",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in the C AMQP client library (aka rabbitmq-c) through 0.13.0 for RabbitMQ. Credentials can only be entered on the command line (e.g., for amqp-publish or amqp-consume) and are thus visible to local attackers by listing a process and its arguments."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/alanxz/rabbitmq-c/issues/575",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/alanxz/rabbitmq-c/pull/781",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-357xx/CVE-2023-35790.json
Normal file
24
CVE-2023/CVE-2023-357xx/CVE-2023-35790.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-35790",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-16T21:15:09.420",
|
||||
"lastModified": "2023-06-16T21:15:09.420",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in dec_patch_dictionary.cc in libjxl before 0.8.2. An integer underflow in patch decoding can lead to a denial of service, such as an infinite loop."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/libjxl/libjxl/pull/2551",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/libjxl/libjxl/releases/tag/v0.8.2",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
58
README.md
58
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-06-16T20:00:28.945514+00:00
|
||||
2023-06-16T22:00:27.376950+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-06-16T19:42:38.180000+00:00
|
||||
2023-06-16T21:15:09.420000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,53 +29,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
217955
|
||||
217967
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
Recently added CVEs: `12`
|
||||
|
||||
* [CVE-2023-34645](CVE-2023/CVE-2023-346xx/CVE-2023-34645.json) (`2023-06-16T18:15:09.367`)
|
||||
* [CVE-2023-34659](CVE-2023/CVE-2023-346xx/CVE-2023-34659.json) (`2023-06-16T18:15:09.437`)
|
||||
* [CVE-2023-34660](CVE-2023/CVE-2023-346xx/CVE-2023-34660.json) (`2023-06-16T18:15:09.483`)
|
||||
* [CVE-2023-25185](CVE-2023/CVE-2023-251xx/CVE-2023-25185.json) (`2023-06-16T19:15:14.360`)
|
||||
* [CVE-2023-25186](CVE-2023/CVE-2023-251xx/CVE-2023-25186.json) (`2023-06-16T19:15:14.423`)
|
||||
* [CVE-2023-25188](CVE-2023/CVE-2023-251xx/CVE-2023-25188.json) (`2023-06-16T19:15:14.477`)
|
||||
* [CVE-2023-25645](CVE-2023/CVE-2023-256xx/CVE-2023-25645.json) (`2023-06-16T19:15:14.527`)
|
||||
* [CVE-2023-34832](CVE-2023/CVE-2023-348xx/CVE-2023-34832.json) (`2023-06-16T18:15:09.523`)
|
||||
* [CVE-2023-3268](CVE-2023/CVE-2023-32xx/CVE-2023-3268.json) (`2023-06-16T19:15:14.707`)
|
||||
* [CVE-2023-25187](CVE-2023/CVE-2023-251xx/CVE-2023-25187.json) (`2023-06-16T20:15:09.297`)
|
||||
* [CVE-2023-34474](CVE-2023/CVE-2023-344xx/CVE-2023-34474.json) (`2023-06-16T20:15:09.370`)
|
||||
* [CVE-2023-34475](CVE-2023/CVE-2023-344xx/CVE-2023-34475.json) (`2023-06-16T20:15:09.433`)
|
||||
* [CVE-2023-35784](CVE-2023/CVE-2023-357xx/CVE-2023-35784.json) (`2023-06-16T20:15:09.493`)
|
||||
* [CVE-2023-3195](CVE-2023/CVE-2023-31xx/CVE-2023-3195.json) (`2023-06-16T20:15:09.547`)
|
||||
* [CVE-2023-30903](CVE-2023/CVE-2023-309xx/CVE-2023-30903.json) (`2023-06-16T21:15:09.107`)
|
||||
* [CVE-2023-30904](CVE-2023/CVE-2023-309xx/CVE-2023-30904.json) (`2023-06-16T21:15:09.157`)
|
||||
* [CVE-2023-30905](CVE-2023/CVE-2023-309xx/CVE-2023-30905.json) (`2023-06-16T21:15:09.200`)
|
||||
* [CVE-2023-33438](CVE-2023/CVE-2023-334xx/CVE-2023-33438.json) (`2023-06-16T21:15:09.247`)
|
||||
* [CVE-2023-35788](CVE-2023/CVE-2023-357xx/CVE-2023-35788.json) (`2023-06-16T21:15:09.340`)
|
||||
* [CVE-2023-35789](CVE-2023/CVE-2023-357xx/CVE-2023-35789.json) (`2023-06-16T21:15:09.383`)
|
||||
* [CVE-2023-35790](CVE-2023/CVE-2023-357xx/CVE-2023-35790.json) (`2023-06-16T21:15:09.420`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `37`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
* [CVE-2023-30222](CVE-2023/CVE-2023-302xx/CVE-2023-30222.json) (`2023-06-16T18:24:22.883`)
|
||||
* [CVE-2023-30223](CVE-2023/CVE-2023-302xx/CVE-2023-30223.json) (`2023-06-16T18:24:22.883`)
|
||||
* [CVE-2023-30625](CVE-2023/CVE-2023-306xx/CVE-2023-30625.json) (`2023-06-16T18:24:22.883`)
|
||||
* [CVE-2023-34733](CVE-2023/CVE-2023-347xx/CVE-2023-34733.json) (`2023-06-16T18:24:22.883`)
|
||||
* [CVE-2023-27706](CVE-2023/CVE-2023-277xx/CVE-2023-27706.json) (`2023-06-16T18:24:48.480`)
|
||||
* [CVE-2023-35036](CVE-2023/CVE-2023-350xx/CVE-2023-35036.json) (`2023-06-16T18:28:22.187`)
|
||||
* [CVE-2023-1323](CVE-2023/CVE-2023-13xx/CVE-2023-1323.json) (`2023-06-16T18:35:43.427`)
|
||||
* [CVE-2023-35053](CVE-2023/CVE-2023-350xx/CVE-2023-35053.json) (`2023-06-16T18:35:52.327`)
|
||||
* [CVE-2023-35054](CVE-2023/CVE-2023-350xx/CVE-2023-35054.json) (`2023-06-16T18:36:30.947`)
|
||||
* [CVE-2023-32114](CVE-2023/CVE-2023-321xx/CVE-2023-32114.json) (`2023-06-16T18:40:36.677`)
|
||||
* [CVE-2023-2362](CVE-2023/CVE-2023-23xx/CVE-2023-2362.json) (`2023-06-16T18:40:59.710`)
|
||||
* [CVE-2023-2398](CVE-2023/CVE-2023-23xx/CVE-2023-2398.json) (`2023-06-16T18:41:22.047`)
|
||||
* [CVE-2023-2718](CVE-2023/CVE-2023-27xx/CVE-2023-2718.json) (`2023-06-16T18:42:20.787`)
|
||||
* [CVE-2023-26294](CVE-2023/CVE-2023-262xx/CVE-2023-26294.json) (`2023-06-16T18:48:22.633`)
|
||||
* [CVE-2023-2277](CVE-2023/CVE-2023-22xx/CVE-2023-2277.json) (`2023-06-16T19:12:35.143`)
|
||||
* [CVE-2023-2986](CVE-2023/CVE-2023-29xx/CVE-2023-2986.json) (`2023-06-16T19:15:14.577`)
|
||||
* [CVE-2023-2278](CVE-2023/CVE-2023-22xx/CVE-2023-2278.json) (`2023-06-16T19:15:21.090`)
|
||||
* [CVE-2023-28321](CVE-2023/CVE-2023-283xx/CVE-2023-28321.json) (`2023-06-16T19:17:39.220`)
|
||||
* [CVE-2023-2351](CVE-2023/CVE-2023-23xx/CVE-2023-2351.json) (`2023-06-16T19:19:27.133`)
|
||||
* [CVE-2023-28478](CVE-2023/CVE-2023-284xx/CVE-2023-28478.json) (`2023-06-16T19:25:18.040`)
|
||||
* [CVE-2023-33626](CVE-2023/CVE-2023-336xx/CVE-2023-33626.json) (`2023-06-16T19:29:32.267`)
|
||||
* [CVE-2023-35034](CVE-2023/CVE-2023-350xx/CVE-2023-35034.json) (`2023-06-16T19:31:14.683`)
|
||||
* [CVE-2023-33625](CVE-2023/CVE-2023-336xx/CVE-2023-33625.json) (`2023-06-16T19:35:15.300`)
|
||||
* [CVE-2023-26210](CVE-2023/CVE-2023-262xx/CVE-2023-26210.json) (`2023-06-16T19:39:57.193`)
|
||||
* [CVE-2023-26207](CVE-2023/CVE-2023-262xx/CVE-2023-26207.json) (`2023-06-16T19:41:18.567`)
|
||||
* [CVE-2023-2820](CVE-2023/CVE-2023-28xx/CVE-2023-2820.json) (`2023-06-16T21:15:09.043`)
|
||||
* [CVE-2023-35708](CVE-2023/CVE-2023-357xx/CVE-2023-35708.json) (`2023-06-16T21:15:09.293`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user