mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2024-02-04T11:00:25.048620+00:00
This commit is contained in:
parent
85a94593c6
commit
6924ed3710
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-3156",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-01-26T21:15:12.987",
|
||||
"lastModified": "2024-01-31T18:15:45.590",
|
||||
"lastModified": "2024-02-04T09:15:08.010",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2022-04-06",
|
||||
"cisaActionDue": "2022-04-27",
|
||||
@ -528,6 +528,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Feb/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2021/01/26/3",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3358",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2022-10-11T15:15:10.233",
|
||||
"lastModified": "2023-11-07T03:51:10.310",
|
||||
"lastModified": "2024-02-04T09:15:08.427",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -81,6 +81,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20221028-0014/",
|
||||
"source": "openssl-security@openssl.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-39046",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-08-31T06:15:07.467",
|
||||
"lastModified": "2024-01-31T18:15:45.807",
|
||||
"lastModified": "2024-02-04T09:15:08.257",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -242,6 +242,10 @@
|
||||
"url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Feb/3",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/01/30/6",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4203",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-02-24T15:15:11.980",
|
||||
"lastModified": "2023-11-07T03:57:10.267",
|
||||
"lastModified": "2024-02-04T09:15:08.533",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -74,6 +74,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssl.org/news/secadv/20230207.txt",
|
||||
"source": "openssl-security@openssl.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4304",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-02-08T20:15:23.887",
|
||||
"lastModified": "2023-11-07T03:57:29.653",
|
||||
"lastModified": "2024-02-04T09:15:08.627",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -137,6 +137,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssl.org/news/secadv/20230207.txt",
|
||||
"source": "openssl-security@openssl.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4450",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-02-08T20:15:23.973",
|
||||
"lastModified": "2023-11-07T03:57:50.597",
|
||||
"lastModified": "2024-02-04T09:15:08.733",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -113,6 +113,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssl.org/news/secadv/20230207.txt",
|
||||
"source": "openssl-security@openssl.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0215",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-02-08T20:15:24.107",
|
||||
"lastModified": "2023-07-19T00:55:16.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-04T09:15:08.847",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -120,6 +120,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230427-0007/",
|
||||
"source": "openssl-security@openssl.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0216",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-02-08T20:15:24.160",
|
||||
"lastModified": "2023-11-07T03:59:51.950",
|
||||
"lastModified": "2024-02-04T09:15:08.947",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,6 +90,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssl.org/news/secadv/20230207.txt",
|
||||
"source": "openssl-security@openssl.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0217",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-02-08T20:15:24.213",
|
||||
"lastModified": "2023-11-07T03:59:52.100",
|
||||
"lastModified": "2024-02-04T09:15:09.040",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -70,6 +70,10 @@
|
||||
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=23985bac83fd50c8e29431009302b5442f985096",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssl.org/news/secadv/20230207.txt",
|
||||
"source": "openssl-security@openssl.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0286",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-02-08T20:15:24.267",
|
||||
"lastModified": "2023-11-07T04:00:05.973",
|
||||
"lastModified": "2024-02-04T09:15:09.113",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -169,6 +169,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssl.org/news/secadv/20230207.txt",
|
||||
"source": "openssl-security@openssl.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0401",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-02-08T20:15:24.323",
|
||||
"lastModified": "2023-11-07T04:00:24.170",
|
||||
"lastModified": "2024-02-04T09:15:09.223",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -90,6 +90,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.openssl.org/news/secadv/20230207.txt",
|
||||
"source": "openssl-security@openssl.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0464",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-03-22T17:15:13.130",
|
||||
"lastModified": "2023-11-09T13:15:07.340",
|
||||
"lastModified": "2024-02-04T09:15:09.310",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -122,6 +122,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.couchbase.com/alerts/",
|
||||
"source": "openssl-security@openssl.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0465",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-03-28T15:15:06.820",
|
||||
"lastModified": "2023-06-08T19:15:09.407",
|
||||
"lastModified": "2024-02-04T09:15:09.430",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -87,6 +87,13 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a",
|
||||
"source": "openssl-security@openssl.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb",
|
||||
"source": "openssl-security@openssl.org",
|
||||
@ -115,6 +122,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230414-0001/",
|
||||
"source": "openssl-security@openssl.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0466",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-03-28T15:15:06.880",
|
||||
"lastModified": "2023-09-28T18:15:11.707",
|
||||
"lastModified": "2024-02-04T09:15:09.540",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -126,6 +126,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230414-0001/",
|
||||
"source": "openssl-security@openssl.org"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2650",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-05-30T14:15:09.683",
|
||||
"lastModified": "2023-10-27T15:15:13.057",
|
||||
"lastModified": "2024-02-04T09:15:09.643",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -160,6 +160,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230703-0001/",
|
||||
"source": "openssl-security@openssl.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2975",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-07-14T12:15:09.023",
|
||||
"lastModified": "2023-07-27T13:02:02.013",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-04T09:15:09.773",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -123,6 +123,10 @@
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230725-0004/",
|
||||
"source": "openssl-security@openssl.org",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3446",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-07-19T12:15:10.003",
|
||||
"lastModified": "2023-10-03T15:48:00.240",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-04T09:15:09.900",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -159,6 +159,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230803-0011/",
|
||||
"source": "openssl-security@openssl.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3817",
|
||||
"sourceIdentifier": "openssl-security@openssl.org",
|
||||
"published": "2023-07-31T16:15:10.497",
|
||||
"lastModified": "2023-11-06T19:15:09.120",
|
||||
"lastModified": "2024-02-04T09:15:10.030",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -475,6 +475,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-08",
|
||||
"source": "openssl-security@openssl.org"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230818-0014/",
|
||||
"source": "openssl-security@openssl.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-5371",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-10-04T17:15:10.437",
|
||||
"lastModified": "2023-10-10T13:13:05.367",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-04T10:15:08.080",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -116,6 +116,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-09",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wireshark.org/security/wnpa-sec-2023-27.html",
|
||||
"source": "cve@gitlab.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6174",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-11-16T12:15:07.240",
|
||||
"lastModified": "2023-11-28T17:27:06.313",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-04T10:15:08.337",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -122,6 +122,10 @@
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202402-09",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5559",
|
||||
"source": "cve@gitlab.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6246",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-31T14:15:48.420",
|
||||
"lastModified": "2024-02-02T04:15:08.713",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2024-02-04T10:15:08.490",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -123,6 +123,14 @@
|
||||
"url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Feb/3",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Feb/5",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-6246",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6779",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-31T14:15:48.700",
|
||||
"lastModified": "2024-02-02T04:15:08.813",
|
||||
"lastModified": "2024-02-04T09:15:10.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,10 @@
|
||||
"url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Feb/3",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-6779",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6780",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-01-31T14:15:48.917",
|
||||
"lastModified": "2024-02-02T04:15:08.907",
|
||||
"lastModified": "2024-02-04T09:15:10.487",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,6 +55,10 @@
|
||||
"url": "http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Feb/3",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-6780",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-23222",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-01-23T01:15:11.500",
|
||||
"lastModified": "2024-01-30T14:32:15.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-04T10:15:08.623",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2024-01-23",
|
||||
"cisaActionDue": "2024-02-13",
|
||||
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
||||
@ -128,6 +128,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Feb/6",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2024/Jan/27",
|
||||
"source": "product-security@apple.com",
|
||||
|
55
README.md
55
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-02-04T09:00:25.052527+00:00
|
||||
2024-02-04T11:00:25.048620+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-02-04T08:15:13.520000+00:00
|
||||
2024-02-04T10:15:08.623000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -40,33 +40,32 @@ Recently added CVEs: `0`
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `39`
|
||||
Recently modified CVEs: `24`
|
||||
|
||||
* [CVE-2022-26361](CVE-2022/CVE-2022-263xx/CVE-2022-26361.json) (`2024-02-04T08:15:10.587`)
|
||||
* [CVE-2022-27672](CVE-2022/CVE-2022-276xx/CVE-2022-27672.json) (`2024-02-04T08:15:10.667`)
|
||||
* [CVE-2022-29900](CVE-2022/CVE-2022-299xx/CVE-2022-29900.json) (`2024-02-04T08:15:10.917`)
|
||||
* [CVE-2022-29901](CVE-2022/CVE-2022-299xx/CVE-2022-29901.json) (`2024-02-04T08:15:11.163`)
|
||||
* [CVE-2022-33746](CVE-2022/CVE-2022-337xx/CVE-2022-33746.json) (`2024-02-04T08:15:11.510`)
|
||||
* [CVE-2022-33747](CVE-2022/CVE-2022-337xx/CVE-2022-33747.json) (`2024-02-04T08:15:11.717`)
|
||||
* [CVE-2022-33748](CVE-2022/CVE-2022-337xx/CVE-2022-33748.json) (`2024-02-04T08:15:11.800`)
|
||||
* [CVE-2022-33749](CVE-2022/CVE-2022-337xx/CVE-2022-33749.json) (`2024-02-04T08:15:11.900`)
|
||||
* [CVE-2022-42309](CVE-2022/CVE-2022-423xx/CVE-2022-42309.json) (`2024-02-04T08:15:11.987`)
|
||||
* [CVE-2022-42310](CVE-2022/CVE-2022-423xx/CVE-2022-42310.json) (`2024-02-04T08:15:12.090`)
|
||||
* [CVE-2022-42319](CVE-2022/CVE-2022-423xx/CVE-2022-42319.json) (`2024-02-04T08:15:12.187`)
|
||||
* [CVE-2022-42320](CVE-2022/CVE-2022-423xx/CVE-2022-42320.json) (`2024-02-04T08:15:12.300`)
|
||||
* [CVE-2022-42321](CVE-2022/CVE-2022-423xx/CVE-2022-42321.json) (`2024-02-04T08:15:12.390`)
|
||||
* [CVE-2022-42322](CVE-2022/CVE-2022-423xx/CVE-2022-42322.json) (`2024-02-04T08:15:12.477`)
|
||||
* [CVE-2022-42323](CVE-2022/CVE-2022-423xx/CVE-2022-42323.json) (`2024-02-04T08:15:12.560`)
|
||||
* [CVE-2022-42324](CVE-2022/CVE-2022-423xx/CVE-2022-42324.json) (`2024-02-04T08:15:12.647`)
|
||||
* [CVE-2022-42325](CVE-2022/CVE-2022-423xx/CVE-2022-42325.json) (`2024-02-04T08:15:12.767`)
|
||||
* [CVE-2022-42326](CVE-2022/CVE-2022-423xx/CVE-2022-42326.json) (`2024-02-04T08:15:12.877`)
|
||||
* [CVE-2022-42327](CVE-2022/CVE-2022-423xx/CVE-2022-42327.json) (`2024-02-04T08:15:12.970`)
|
||||
* [CVE-2022-42330](CVE-2022/CVE-2022-423xx/CVE-2022-42330.json) (`2024-02-04T08:15:13.050`)
|
||||
* [CVE-2022-42331](CVE-2022/CVE-2022-423xx/CVE-2022-42331.json) (`2024-02-04T08:15:13.147`)
|
||||
* [CVE-2022-42332](CVE-2022/CVE-2022-423xx/CVE-2022-42332.json) (`2024-02-04T08:15:13.257`)
|
||||
* [CVE-2022-42333](CVE-2022/CVE-2022-423xx/CVE-2022-42333.json) (`2024-02-04T08:15:13.357`)
|
||||
* [CVE-2022-42334](CVE-2022/CVE-2022-423xx/CVE-2022-42334.json) (`2024-02-04T08:15:13.440`)
|
||||
* [CVE-2022-42335](CVE-2022/CVE-2022-423xx/CVE-2022-42335.json) (`2024-02-04T08:15:13.520`)
|
||||
* [CVE-2021-3156](CVE-2021/CVE-2021-31xx/CVE-2021-3156.json) (`2024-02-04T09:15:08.010`)
|
||||
* [CVE-2022-39046](CVE-2022/CVE-2022-390xx/CVE-2022-39046.json) (`2024-02-04T09:15:08.257`)
|
||||
* [CVE-2022-3358](CVE-2022/CVE-2022-33xx/CVE-2022-3358.json) (`2024-02-04T09:15:08.427`)
|
||||
* [CVE-2022-4203](CVE-2022/CVE-2022-42xx/CVE-2022-4203.json) (`2024-02-04T09:15:08.533`)
|
||||
* [CVE-2022-4304](CVE-2022/CVE-2022-43xx/CVE-2022-4304.json) (`2024-02-04T09:15:08.627`)
|
||||
* [CVE-2022-4450](CVE-2022/CVE-2022-44xx/CVE-2022-4450.json) (`2024-02-04T09:15:08.733`)
|
||||
* [CVE-2023-0215](CVE-2023/CVE-2023-02xx/CVE-2023-0215.json) (`2024-02-04T09:15:08.847`)
|
||||
* [CVE-2023-0216](CVE-2023/CVE-2023-02xx/CVE-2023-0216.json) (`2024-02-04T09:15:08.947`)
|
||||
* [CVE-2023-0217](CVE-2023/CVE-2023-02xx/CVE-2023-0217.json) (`2024-02-04T09:15:09.040`)
|
||||
* [CVE-2023-0286](CVE-2023/CVE-2023-02xx/CVE-2023-0286.json) (`2024-02-04T09:15:09.113`)
|
||||
* [CVE-2023-0401](CVE-2023/CVE-2023-04xx/CVE-2023-0401.json) (`2024-02-04T09:15:09.223`)
|
||||
* [CVE-2023-0464](CVE-2023/CVE-2023-04xx/CVE-2023-0464.json) (`2024-02-04T09:15:09.310`)
|
||||
* [CVE-2023-0465](CVE-2023/CVE-2023-04xx/CVE-2023-0465.json) (`2024-02-04T09:15:09.430`)
|
||||
* [CVE-2023-0466](CVE-2023/CVE-2023-04xx/CVE-2023-0466.json) (`2024-02-04T09:15:09.540`)
|
||||
* [CVE-2023-2650](CVE-2023/CVE-2023-26xx/CVE-2023-2650.json) (`2024-02-04T09:15:09.643`)
|
||||
* [CVE-2023-2975](CVE-2023/CVE-2023-29xx/CVE-2023-2975.json) (`2024-02-04T09:15:09.773`)
|
||||
* [CVE-2023-3446](CVE-2023/CVE-2023-34xx/CVE-2023-3446.json) (`2024-02-04T09:15:09.900`)
|
||||
* [CVE-2023-3817](CVE-2023/CVE-2023-38xx/CVE-2023-3817.json) (`2024-02-04T09:15:10.030`)
|
||||
* [CVE-2023-6779](CVE-2023/CVE-2023-67xx/CVE-2023-6779.json) (`2024-02-04T09:15:10.377`)
|
||||
* [CVE-2023-6780](CVE-2023/CVE-2023-67xx/CVE-2023-6780.json) (`2024-02-04T09:15:10.487`)
|
||||
* [CVE-2023-5371](CVE-2023/CVE-2023-53xx/CVE-2023-5371.json) (`2024-02-04T10:15:08.080`)
|
||||
* [CVE-2023-6174](CVE-2023/CVE-2023-61xx/CVE-2023-6174.json) (`2024-02-04T10:15:08.337`)
|
||||
* [CVE-2023-6246](CVE-2023/CVE-2023-62xx/CVE-2023-6246.json) (`2024-02-04T10:15:08.490`)
|
||||
* [CVE-2024-23222](CVE-2024/CVE-2024-232xx/CVE-2024-23222.json) (`2024-02-04T10:15:08.623`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user