mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-07-21T23:55:25.728838+00:00
This commit is contained in:
parent
92ebcb7b09
commit
61438f5dc1
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-37331",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2023-07-21T21:15:10.143",
|
||||
"lastModified": "2023-07-21T21:15:10.143",
|
||||
"lastModified": "2023-07-21T22:15:10.087",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -50,6 +50,10 @@
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1672",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1672",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-41793",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2023-07-21T21:15:10.237",
|
||||
"lastModified": "2023-07-21T21:15:10.237",
|
||||
"lastModified": "2023-07-21T22:15:10.190",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -50,6 +50,10 @@
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1667",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1667",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-42885",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2023-07-21T21:15:10.327",
|
||||
"lastModified": "2023-07-21T21:15:10.327",
|
||||
"lastModified": "2023-07-21T22:15:10.277",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -50,6 +50,10 @@
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1668",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1668",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-43467",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2023-07-21T21:15:10.413",
|
||||
"lastModified": "2023-07-21T21:15:10.413",
|
||||
"lastModified": "2023-07-21T22:15:10.360",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -50,6 +50,10 @@
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1671",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1671",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-43607",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2023-07-21T21:15:10.497",
|
||||
"lastModified": "2023-07-21T21:15:10.497",
|
||||
"lastModified": "2023-07-21T22:15:10.440",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -50,6 +50,10 @@
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1664",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1664",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-44451",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2023-07-21T21:15:10.577",
|
||||
"lastModified": "2023-07-21T21:15:10.577",
|
||||
"lastModified": "2023-07-21T22:15:10.527",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -50,6 +50,10 @@
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1669",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1669",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46280",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2023-07-21T21:15:10.660",
|
||||
"lastModified": "2023-07-21T21:15:10.660",
|
||||
"lastModified": "2023-07-21T22:15:10.610",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -50,6 +50,10 @@
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1670",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1670",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46289",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2023-07-21T21:15:10.740",
|
||||
"lastModified": "2023-07-21T21:15:10.740",
|
||||
"lastModified": "2023-07-21T22:15:10.697",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -50,6 +50,10 @@
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1665",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1665",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46290",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2023-07-21T21:15:10.830",
|
||||
"lastModified": "2023-07-21T21:15:10.830",
|
||||
"lastModified": "2023-07-21T22:15:10.780",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -50,6 +50,10 @@
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1665",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1665",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46291",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2023-07-21T21:15:10.917",
|
||||
"lastModified": "2023-07-21T21:15:10.917",
|
||||
"lastModified": "2023-07-21T22:15:10.863",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -50,6 +50,10 @@
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1666",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46292",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2023-07-21T21:15:10.993",
|
||||
"lastModified": "2023-07-21T21:15:10.993",
|
||||
"lastModified": "2023-07-21T22:15:10.947",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -50,6 +50,10 @@
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1666",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46293",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2023-07-21T21:15:11.077",
|
||||
"lastModified": "2023-07-21T21:15:11.077",
|
||||
"lastModified": "2023-07-21T22:15:11.030",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -50,6 +50,10 @@
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1666",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46294",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2023-07-21T21:15:11.160",
|
||||
"lastModified": "2023-07-21T21:15:11.160",
|
||||
"lastModified": "2023-07-21T22:15:11.113",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -50,6 +50,10 @@
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1666",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46295",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2023-07-21T21:15:11.240",
|
||||
"lastModified": "2023-07-21T21:15:11.240",
|
||||
"lastModified": "2023-07-21T22:15:11.200",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -50,6 +50,10 @@
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1666",
|
||||
"source": "talos-cna@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1666",
|
||||
"source": "talos-cna@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,81 +2,14 @@
|
||||
"id": "CVE-2023-26934",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-26T19:15:08.857",
|
||||
"lastModified": "2023-05-03T16:47:27.773",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-07-21T22:15:11.477",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue found in XPDF v.4.04 allows an attacker to cause a denial of service via a crafted pdf file in the object.cc parameter."
|
||||
"value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2019-9587. Reason: This record is a reservation duplicate of CVE-2019-9587. Notes: All CVE users should reference CVE-2019-9587 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/object_copy",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,81 +2,14 @@
|
||||
"id": "CVE-2023-26935",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-26T19:15:08.893",
|
||||
"lastModified": "2023-05-03T16:46:40.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-07-21T22:15:11.677",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via SharedFile::readBlock at /xpdf/Stream.cc."
|
||||
"value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2019-9587. Reason: This record is a reservation duplicate of CVE-2019-9587. Notes: All CVE users should reference CVE-2019-9587 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/huanglei3/xpdf_heapoverflow",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,81 +2,14 @@
|
||||
"id": "CVE-2023-26936",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-26T19:15:08.930",
|
||||
"lastModified": "2023-05-03T16:46:25.367",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-07-21T22:15:12.027",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via gmalloc in gmem.cc"
|
||||
"value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2019-9587. Reason: This record is a reservation duplicate of CVE-2019-9587. Notes: All CVE users should reference CVE-2019-9587 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/gmem_copyString",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,81 +2,14 @@
|
||||
"id": "CVE-2023-26937",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-26T19:15:08.963",
|
||||
"lastModified": "2023-05-03T16:45:53.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-07-21T22:15:12.273",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via GString::resize located in goo/GString.cc"
|
||||
"value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2019-9587. Reason: This record is a reservation duplicate of CVE-2019-9587. Notes: All CVE users should reference CVE-2019-9587 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/huanglei3/xpdf_Stack-backtracking/blob/main/Stack_backtracking_gstring",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,81 +2,14 @@
|
||||
"id": "CVE-2023-26938",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-26T19:15:09.000",
|
||||
"lastModified": "2023-05-03T16:45:10.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-07-21T22:15:12.477",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service viaSharedFile::readBlock located in goo/gfile.cc."
|
||||
"value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2019-9587. Reason: This record is a reservation duplicate of CVE-2019-9587. Notes: All CVE users should reference CVE-2019-9587 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/huanglei3/10e2a9bd07a109995b20ade306612a34",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/huanglei3/xpdf_heapoverflow/edit/main/Stack_backtracking_readblock",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,105 +2,14 @@
|
||||
"id": "CVE-2023-27655",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-23T14:15:15.490",
|
||||
"lastModified": "2023-03-27T15:37:08.893",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-07-21T22:15:12.697",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "xpdf v4.04 was discovered to contain a stack overflow in the component pdftotext."
|
||||
"value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2019-9587. Reason: This record is a reservation duplicate of CVE-2019-9587. Notes: All CVE users should reference CVE-2019-9587 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.xpdfreader.com/download.html",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://xpdf.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://forum.xpdfreader.com/viewtopic.php?t=42398",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/keepinggg/poc/blob/main/poc_of_xpdf/id2",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/keepinggg/poc/tree/main/poc_of_xpdf",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,74 +2,14 @@
|
||||
"id": "CVE-2023-31554",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-10T16:15:12.263",
|
||||
"lastModified": "2023-05-17T17:56:30.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-07-21T22:15:12.933",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "xpdf pdfimages v4.04 was discovered to contain a stack overflow in the component Catalog::readPageLabelTree2(Object*). This vulnerability allows attackers to cause a Denial of Service (DoS)."
|
||||
"value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-2663. Reason: This record is a reservation duplicate of CVE-2023-2663. Notes: All CVE users should reference CVE-2023-2663 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:glyphandcog:pdfimages:4.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "30F81024-7899-4E48-9D12-AFF61E1A75B0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forum.xpdfreader.com/viewtopic.php?t=42421",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,75 +2,14 @@
|
||||
"id": "CVE-2023-31557",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-10T16:15:12.427",
|
||||
"lastModified": "2023-05-17T18:00:51.400",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-07-21T22:15:13.167",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "xpdf pdfimages v4.04 was discovered to contain a stack overflow in the component Catalog::readEmbeddedFileTree(Object*). This vulnerability allows attackers to cause a Denial of Service (DoS)."
|
||||
"value": "** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-2664. Reason: This record is a reservation duplicate of CVE-2023-2664. Notes: All CVE users should reference CVE-2023-2664 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xpdfreader:xpdf:4.04:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDB8219E-FA52-45B5-A332-CE34400630BC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forum.xpdfreader.com/viewtopic.php?t=42422&sid=acb8ed31bbd74223e3c4d0fb2552c748",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
80
README.md
80
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-07-21T22:00:27.983362+00:00
|
||||
2023-07-21T23:55:25.728838+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-07-21T21:15:11.973000+00:00
|
||||
2023-07-21T22:15:13.167000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -34,64 +34,36 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `28`
|
||||
Recently added CVEs: `0`
|
||||
|
||||
* [CVE-2022-42885](CVE-2022/CVE-2022-428xx/CVE-2022-42885.json) (`2023-07-21T21:15:10.327`)
|
||||
* [CVE-2022-43467](CVE-2022/CVE-2022-434xx/CVE-2022-43467.json) (`2023-07-21T21:15:10.413`)
|
||||
* [CVE-2022-43607](CVE-2022/CVE-2022-436xx/CVE-2022-43607.json) (`2023-07-21T21:15:10.497`)
|
||||
* [CVE-2022-44451](CVE-2022/CVE-2022-444xx/CVE-2022-44451.json) (`2023-07-21T21:15:10.577`)
|
||||
* [CVE-2022-46280](CVE-2022/CVE-2022-462xx/CVE-2022-46280.json) (`2023-07-21T21:15:10.660`)
|
||||
* [CVE-2022-46289](CVE-2022/CVE-2022-462xx/CVE-2022-46289.json) (`2023-07-21T21:15:10.740`)
|
||||
* [CVE-2022-46290](CVE-2022/CVE-2022-462xx/CVE-2022-46290.json) (`2023-07-21T21:15:10.830`)
|
||||
* [CVE-2022-46291](CVE-2022/CVE-2022-462xx/CVE-2022-46291.json) (`2023-07-21T21:15:10.917`)
|
||||
* [CVE-2022-46292](CVE-2022/CVE-2022-462xx/CVE-2022-46292.json) (`2023-07-21T21:15:10.993`)
|
||||
* [CVE-2022-46293](CVE-2022/CVE-2022-462xx/CVE-2022-46293.json) (`2023-07-21T21:15:11.077`)
|
||||
* [CVE-2022-46294](CVE-2022/CVE-2022-462xx/CVE-2022-46294.json) (`2023-07-21T21:15:11.160`)
|
||||
* [CVE-2022-46295](CVE-2022/CVE-2022-462xx/CVE-2022-46295.json) (`2023-07-21T21:15:11.240`)
|
||||
* [CVE-2023-36339](CVE-2023/CVE-2023-363xx/CVE-2023-36339.json) (`2023-07-21T20:15:15.887`)
|
||||
* [CVE-2023-37903](CVE-2023/CVE-2023-379xx/CVE-2023-37903.json) (`2023-07-21T20:15:16.057`)
|
||||
* [CVE-2023-37905](CVE-2023/CVE-2023-379xx/CVE-2023-37905.json) (`2023-07-21T20:15:16.297`)
|
||||
* [CVE-2023-3603](CVE-2023/CVE-2023-36xx/CVE-2023-3603.json) (`2023-07-21T20:15:16.587`)
|
||||
* [CVE-2023-35077](CVE-2023/CVE-2023-350xx/CVE-2023-35077.json) (`2023-07-21T21:15:11.337`)
|
||||
* [CVE-2023-37915](CVE-2023/CVE-2023-379xx/CVE-2023-37915.json) (`2023-07-21T21:15:11.400`)
|
||||
* [CVE-2023-37916](CVE-2023/CVE-2023-379xx/CVE-2023-37916.json) (`2023-07-21T21:15:11.487`)
|
||||
* [CVE-2023-37917](CVE-2023/CVE-2023-379xx/CVE-2023-37917.json) (`2023-07-21T21:15:11.570`)
|
||||
* [CVE-2023-37918](CVE-2023/CVE-2023-379xx/CVE-2023-37918.json) (`2023-07-21T21:15:11.657`)
|
||||
* [CVE-2023-3609](CVE-2023/CVE-2023-36xx/CVE-2023-3609.json) (`2023-07-21T21:15:11.743`)
|
||||
* [CVE-2023-3610](CVE-2023/CVE-2023-36xx/CVE-2023-3610.json) (`2023-07-21T21:15:11.820`)
|
||||
* [CVE-2023-3611](CVE-2023/CVE-2023-36xx/CVE-2023-3611.json) (`2023-07-21T21:15:11.897`)
|
||||
* [CVE-2023-3776](CVE-2023/CVE-2023-37xx/CVE-2023-3776.json) (`2023-07-21T21:15:11.973`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `48`
|
||||
Recently modified CVEs: `22`
|
||||
|
||||
* [CVE-2022-35915](CVE-2022/CVE-2022-359xx/CVE-2022-35915.json) (`2023-07-21T20:48:55.340`)
|
||||
* [CVE-2022-35921](CVE-2022/CVE-2022-359xx/CVE-2022-35921.json) (`2023-07-21T20:49:00.297`)
|
||||
* [CVE-2022-35922](CVE-2022/CVE-2022-359xx/CVE-2022-35922.json) (`2023-07-21T20:49:03.533`)
|
||||
* [CVE-2022-35923](CVE-2022/CVE-2022-359xx/CVE-2022-35923.json) (`2023-07-21T20:49:08.377`)
|
||||
* [CVE-2022-35925](CVE-2022/CVE-2022-359xx/CVE-2022-35925.json) (`2023-07-21T20:49:11.747`)
|
||||
* [CVE-2022-34858](CVE-2022/CVE-2022-348xx/CVE-2022-34858.json) (`2023-07-21T20:52:35.387`)
|
||||
* [CVE-2022-36034](CVE-2022/CVE-2022-360xx/CVE-2022-36034.json) (`2023-07-21T20:52:39.343`)
|
||||
* [CVE-2022-36055](CVE-2022/CVE-2022-360xx/CVE-2022-36055.json) (`2023-07-21T20:52:45.190`)
|
||||
* [CVE-2022-36064](CVE-2022/CVE-2022-360xx/CVE-2022-36064.json) (`2023-07-21T20:52:48.920`)
|
||||
* [CVE-2022-36065](CVE-2022/CVE-2022-360xx/CVE-2022-36065.json) (`2023-07-21T20:52:53.347`)
|
||||
* [CVE-2022-36072](CVE-2022/CVE-2022-360xx/CVE-2022-36072.json) (`2023-07-21T21:00:36.520`)
|
||||
* [CVE-2022-36074](CVE-2022/CVE-2022-360xx/CVE-2022-36074.json) (`2023-07-21T21:01:21.577`)
|
||||
* [CVE-2022-35238](CVE-2022/CVE-2022-352xx/CVE-2022-35238.json) (`2023-07-21T21:01:27.210`)
|
||||
* [CVE-2022-35249](CVE-2022/CVE-2022-352xx/CVE-2022-35249.json) (`2023-07-21T21:02:12.633`)
|
||||
* [CVE-2022-3496](CVE-2022/CVE-2022-34xx/CVE-2022-3496.json) (`2023-07-21T21:02:42.540`)
|
||||
* [CVE-2022-3564](CVE-2022/CVE-2022-35xx/CVE-2022-3564.json) (`2023-07-21T21:03:17.817`)
|
||||
* [CVE-2022-3565](CVE-2022/CVE-2022-35xx/CVE-2022-3565.json) (`2023-07-21T21:04:25.487`)
|
||||
* [CVE-2022-3517](CVE-2022/CVE-2022-35xx/CVE-2022-3517.json) (`2023-07-21T21:04:31.790`)
|
||||
* [CVE-2022-3569](CVE-2022/CVE-2022-35xx/CVE-2022-3569.json) (`2023-07-21T21:04:44.847`)
|
||||
* [CVE-2022-3582](CVE-2022/CVE-2022-35xx/CVE-2022-3582.json) (`2023-07-21T21:04:56.290`)
|
||||
* [CVE-2022-3585](CVE-2022/CVE-2022-35xx/CVE-2022-3585.json) (`2023-07-21T21:05:17.697`)
|
||||
* [CVE-2022-3489](CVE-2022/CVE-2022-34xx/CVE-2022-3489.json) (`2023-07-21T21:05:21.977`)
|
||||
* [CVE-2022-3538](CVE-2022/CVE-2022-35xx/CVE-2022-3538.json) (`2023-07-21T21:05:28.230`)
|
||||
* [CVE-2022-34885](CVE-2022/CVE-2022-348xx/CVE-2022-34885.json) (`2023-07-21T21:05:31.803`)
|
||||
* [CVE-2023-21719](CVE-2023/CVE-2023-217xx/CVE-2023-21719.json) (`2023-07-21T20:15:14.243`)
|
||||
* [CVE-2022-37331](CVE-2022/CVE-2022-373xx/CVE-2022-37331.json) (`2023-07-21T22:15:10.087`)
|
||||
* [CVE-2022-41793](CVE-2022/CVE-2022-417xx/CVE-2022-41793.json) (`2023-07-21T22:15:10.190`)
|
||||
* [CVE-2022-42885](CVE-2022/CVE-2022-428xx/CVE-2022-42885.json) (`2023-07-21T22:15:10.277`)
|
||||
* [CVE-2022-43467](CVE-2022/CVE-2022-434xx/CVE-2022-43467.json) (`2023-07-21T22:15:10.360`)
|
||||
* [CVE-2022-43607](CVE-2022/CVE-2022-436xx/CVE-2022-43607.json) (`2023-07-21T22:15:10.440`)
|
||||
* [CVE-2022-44451](CVE-2022/CVE-2022-444xx/CVE-2022-44451.json) (`2023-07-21T22:15:10.527`)
|
||||
* [CVE-2022-46280](CVE-2022/CVE-2022-462xx/CVE-2022-46280.json) (`2023-07-21T22:15:10.610`)
|
||||
* [CVE-2022-46289](CVE-2022/CVE-2022-462xx/CVE-2022-46289.json) (`2023-07-21T22:15:10.697`)
|
||||
* [CVE-2022-46290](CVE-2022/CVE-2022-462xx/CVE-2022-46290.json) (`2023-07-21T22:15:10.780`)
|
||||
* [CVE-2022-46291](CVE-2022/CVE-2022-462xx/CVE-2022-46291.json) (`2023-07-21T22:15:10.863`)
|
||||
* [CVE-2022-46292](CVE-2022/CVE-2022-462xx/CVE-2022-46292.json) (`2023-07-21T22:15:10.947`)
|
||||
* [CVE-2022-46293](CVE-2022/CVE-2022-462xx/CVE-2022-46293.json) (`2023-07-21T22:15:11.030`)
|
||||
* [CVE-2022-46294](CVE-2022/CVE-2022-462xx/CVE-2022-46294.json) (`2023-07-21T22:15:11.113`)
|
||||
* [CVE-2022-46295](CVE-2022/CVE-2022-462xx/CVE-2022-46295.json) (`2023-07-21T22:15:11.200`)
|
||||
* [CVE-2023-26934](CVE-2023/CVE-2023-269xx/CVE-2023-26934.json) (`2023-07-21T22:15:11.477`)
|
||||
* [CVE-2023-26935](CVE-2023/CVE-2023-269xx/CVE-2023-26935.json) (`2023-07-21T22:15:11.677`)
|
||||
* [CVE-2023-26936](CVE-2023/CVE-2023-269xx/CVE-2023-26936.json) (`2023-07-21T22:15:12.027`)
|
||||
* [CVE-2023-26937](CVE-2023/CVE-2023-269xx/CVE-2023-26937.json) (`2023-07-21T22:15:12.273`)
|
||||
* [CVE-2023-26938](CVE-2023/CVE-2023-269xx/CVE-2023-26938.json) (`2023-07-21T22:15:12.477`)
|
||||
* [CVE-2023-27655](CVE-2023/CVE-2023-276xx/CVE-2023-27655.json) (`2023-07-21T22:15:12.697`)
|
||||
* [CVE-2023-31554](CVE-2023/CVE-2023-315xx/CVE-2023-31554.json) (`2023-07-21T22:15:12.933`)
|
||||
* [CVE-2023-31557](CVE-2023/CVE-2023-315xx/CVE-2023-31557.json) (`2023-07-21T22:15:13.167`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user