mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2023-05-10T14:00:24.359526+00:00
This commit is contained in:
parent
535787e3ac
commit
8f21ac0176
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-27856",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T11:15:09.587",
|
||||
"lastModified": "2023-05-10T11:15:09.587",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-32970",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T09:15:09.950",
|
||||
"lastModified": "2023-05-10T09:15:09.950",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-33961",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T10:15:09.490",
|
||||
"lastModified": "2023-05-10T10:15:09.490",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-4008",
|
||||
"sourceIdentifier": "security@octopus.com",
|
||||
"published": "2023-05-10T06:15:09.000",
|
||||
"lastModified": "2023-05-10T06:15:09.000",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2022/CVE-2022-458xx/CVE-2022-45846.json
Normal file
55
CVE-2022/CVE-2022-458xx/CVE-2022-45846.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2022-45846",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T12:15:09.943",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Nickys Image Map Pro for WordPress - Interactive SVG Image Map Builder plugin <\u00a05.6.9 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/image-map-pro-wordpress/wordpress-image-map-pro-premium-plugin-5-5-0-multiple-cross-site-request-forgery-csrf-vulnerabilities?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-46817",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T10:15:10.223",
|
||||
"lastModified": "2023-05-10T10:15:10.223",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-46819",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T10:15:10.437",
|
||||
"lastModified": "2023-05-10T10:15:10.437",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-46861",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T10:15:10.537",
|
||||
"lastModified": "2023-05-10T10:15:10.537",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47137",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T11:15:09.967",
|
||||
"lastModified": "2023-05-10T11:15:09.967",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47423",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T11:15:10.157",
|
||||
"lastModified": "2023-05-10T11:15:10.157",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47436",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T11:15:10.307",
|
||||
"lastModified": "2023-05-10T11:15:10.307",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47441",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T11:15:10.597",
|
||||
"lastModified": "2023-05-10T11:15:10.597",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47587",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T11:15:11.027",
|
||||
"lastModified": "2023-05-10T11:15:11.027",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47590",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T11:15:11.337",
|
||||
"lastModified": "2023-05-10T11:15:11.337",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47600",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T11:15:11.667",
|
||||
"lastModified": "2023-05-10T11:15:11.667",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47606",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T11:15:12.100",
|
||||
"lastModified": "2023-05-10T11:15:12.100",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,23 +2,84 @@
|
||||
"id": "CVE-2022-47876",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-02T20:15:10.537",
|
||||
"lastModified": "2023-05-05T19:15:15.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-10T13:54:33.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The integrator in Jedox GmbH Jedox 2020.2.5 allows remote authenticated users to create Jobs to execute arbitrary code via Groovy-scripts."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jedox:jedox:2020.2.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3CD31D96-EC95-4111-A9A8-504144689CFF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/172155/Jedox-2020.2.5-Groovy-Scripts-Remote-Code-Execution.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://docs.syslifters.com/assets/vulnerability-disclosure/Vulnerability-Disclosure-Jedox-Jedox-04-2023.pdf",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
59
CVE-2023/CVE-2023-17xx/CVE-2023-1732.json
Normal file
59
CVE-2023/CVE-2023-17xx/CVE-2023-1732.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-1732",
|
||||
"sourceIdentifier": "cna@cloudflare.com",
|
||||
"published": "2023-05-10T12:15:10.523",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read()\u00a0returns an error. In rare deployment cases (error thrown by the Read()\u00a0function), this could lead to a predictable shared secret.\n\nThe tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@cloudflare.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@cloudflare.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cloudflare/circl/security/advisories/GHSA-2q89-485c-9j2x",
|
||||
"source": "cna@cloudflare.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22361",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:10.800",
|
||||
"lastModified": "2023-05-10T06:15:10.800",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22441",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:11.160",
|
||||
"lastModified": "2023-05-10T06:15:11.160",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22696",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T09:15:12.717",
|
||||
"lastModified": "2023-05-10T09:15:12.717",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22711",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T08:15:09.767",
|
||||
"lastModified": "2023-05-10T08:15:09.767",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23578",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:11.430",
|
||||
"lastModified": "2023-05-10T06:15:11.430",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23701",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T08:15:10.980",
|
||||
"lastModified": "2023-05-10T08:15:10.980",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23786",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T08:15:11.087",
|
||||
"lastModified": "2023-05-10T08:15:11.087",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23788",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T08:15:11.163",
|
||||
"lastModified": "2023-05-10T08:15:11.163",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23789",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T08:15:11.230",
|
||||
"lastModified": "2023-05-10T08:15:11.230",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23794",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T09:15:12.997",
|
||||
"lastModified": "2023-05-10T09:15:12.997",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23812",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T08:15:11.310",
|
||||
"lastModified": "2023-05-10T08:15:11.310",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23873",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T09:15:13.217",
|
||||
"lastModified": "2023-05-10T09:15:13.217",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23901",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:11.727",
|
||||
"lastModified": "2023-05-10T06:15:11.727",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23906",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:12.007",
|
||||
"lastModified": "2023-05-10T06:15:12.007",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24392",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T08:15:11.390",
|
||||
"lastModified": "2023-05-10T08:15:11.390",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24406",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T09:15:13.417",
|
||||
"lastModified": "2023-05-10T09:15:13.417",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24418",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T08:15:11.470",
|
||||
"lastModified": "2023-05-10T08:15:11.470",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24586",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:12.310",
|
||||
"lastModified": "2023-05-10T06:15:12.310",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25070",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:12.497",
|
||||
"lastModified": "2023-05-10T06:15:12.497",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25072",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:13.030",
|
||||
"lastModified": "2023-05-10T06:15:13.030",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25184",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:13.427",
|
||||
"lastModified": "2023-05-10T06:15:13.427",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
File diff suppressed because it is too large
Load Diff
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26126",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2023-05-10T05:15:08.860",
|
||||
"lastModified": "2023-05-10T05:15:08.860",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2614",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-10T06:15:15.007",
|
||||
"lastModified": "2023-05-10T06:15:15.007",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2615",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-10T06:15:16.380",
|
||||
"lastModified": "2023-05-10T06:15:16.380",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2616",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-10T05:15:11.877",
|
||||
"lastModified": "2023-05-10T05:15:11.877",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2617",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-10T06:15:16.853",
|
||||
"lastModified": "2023-05-10T06:15:16.853",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2618",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-10T06:15:17.577",
|
||||
"lastModified": "2023-05-10T06:15:17.577",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2619",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-10T06:15:17.990",
|
||||
"lastModified": "2023-05-10T06:15:17.990",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27385",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:13.680",
|
||||
"lastModified": "2023-05-10T06:15:13.680",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27419",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T09:15:13.653",
|
||||
"lastModified": "2023-05-10T09:15:13.653",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27455",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T09:15:13.923",
|
||||
"lastModified": "2023-05-10T09:15:13.923",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27510",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:13.807",
|
||||
"lastModified": "2023-05-10T06:15:13.807",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27527",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:13.953",
|
||||
"lastModified": "2023-05-10T06:15:13.953",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27888",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:14.077",
|
||||
"lastModified": "2023-05-10T06:15:14.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27889",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:14.280",
|
||||
"lastModified": "2023-05-10T06:15:14.280",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27918",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:14.547",
|
||||
"lastModified": "2023-05-10T06:15:14.547",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27919",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-10T06:15:14.753",
|
||||
"lastModified": "2023-05-10T06:15:14.753",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28092",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-05-01T15:15:09.357",
|
||||
"lastModified": "2023-05-01T20:07:26.670",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-10T13:51:15.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
@ -34,10 +54,81 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:hp:integrated_lights-out_firmware:1.05:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "669BABDD-65EC-44AB-833C-AFF4224EB356"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:hp:integrated_lights-out:6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F211ABF9-9617-43CF-9DC5-E46CB0518B7E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:hp:proliant_rl300_firmware:1.12:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0CCE84C1-7EF8-4460-8417-A1A769933E41"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:hp:proliant_rl300:gen_11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4E35165C-B5B8-47E2-829C-AE0187F3BBE2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04472en_us",
|
||||
"source": "security-alert@hpe.com"
|
||||
"source": "security-alert@hpe.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28932",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T08:15:11.553",
|
||||
"lastModified": "2023-05-10T08:15:11.553",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29101",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T09:15:14.147",
|
||||
"lastModified": "2023-05-10T09:15:14.147",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30746",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T09:15:14.360",
|
||||
"lastModified": "2023-05-10T09:15:14.360",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30777",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-10T06:15:18.520",
|
||||
"lastModified": "2023-05-10T06:15:18.520",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32568",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-10T05:15:11.990",
|
||||
"lastModified": "2023-05-10T05:15:11.990",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32569",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-10T05:15:12.103",
|
||||
"lastModified": "2023-05-10T05:15:12.103",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32570",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-10T05:15:12.190",
|
||||
"lastModified": "2023-05-10T05:15:12.190",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32573",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-10T06:15:19.070",
|
||||
"lastModified": "2023-05-10T06:15:19.070",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-10T13:06:16.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
89
README.md
89
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-05-10T12:00:23.821662+00:00
|
||||
2023-05-10T14:00:24.359526+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-05-10T11:15:12.100000+00:00
|
||||
2023-05-10T13:54:33.687000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,32 +29,85 @@ Download and Changelog: [Click](releases/latest)
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
214722
|
||||
214724
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `13`
|
||||
Recently added CVEs: `2`
|
||||
|
||||
* [CVE-2022-27856](CVE-2022/CVE-2022-278xx/CVE-2022-27856.json) (`2023-05-10T11:15:09.587`)
|
||||
* [CVE-2022-33961](CVE-2022/CVE-2022-339xx/CVE-2022-33961.json) (`2023-05-10T10:15:09.490`)
|
||||
* [CVE-2022-46817](CVE-2022/CVE-2022-468xx/CVE-2022-46817.json) (`2023-05-10T10:15:10.223`)
|
||||
* [CVE-2022-46819](CVE-2022/CVE-2022-468xx/CVE-2022-46819.json) (`2023-05-10T10:15:10.437`)
|
||||
* [CVE-2022-46861](CVE-2022/CVE-2022-468xx/CVE-2022-46861.json) (`2023-05-10T10:15:10.537`)
|
||||
* [CVE-2022-47137](CVE-2022/CVE-2022-471xx/CVE-2022-47137.json) (`2023-05-10T11:15:09.967`)
|
||||
* [CVE-2022-47423](CVE-2022/CVE-2022-474xx/CVE-2022-47423.json) (`2023-05-10T11:15:10.157`)
|
||||
* [CVE-2022-47436](CVE-2022/CVE-2022-474xx/CVE-2022-47436.json) (`2023-05-10T11:15:10.307`)
|
||||
* [CVE-2022-47441](CVE-2022/CVE-2022-474xx/CVE-2022-47441.json) (`2023-05-10T11:15:10.597`)
|
||||
* [CVE-2022-47587](CVE-2022/CVE-2022-475xx/CVE-2022-47587.json) (`2023-05-10T11:15:11.027`)
|
||||
* [CVE-2022-47590](CVE-2022/CVE-2022-475xx/CVE-2022-47590.json) (`2023-05-10T11:15:11.337`)
|
||||
* [CVE-2022-47600](CVE-2022/CVE-2022-476xx/CVE-2022-47600.json) (`2023-05-10T11:15:11.667`)
|
||||
* [CVE-2022-47606](CVE-2022/CVE-2022-476xx/CVE-2022-47606.json) (`2023-05-10T11:15:12.100`)
|
||||
* [CVE-2022-45846](CVE-2022/CVE-2022-458xx/CVE-2022-45846.json) (`2023-05-10T12:15:09.943`)
|
||||
* [CVE-2023-1732](CVE-2023/CVE-2023-17xx/CVE-2023-1732.json) (`2023-05-10T12:15:10.523`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `64`
|
||||
|
||||
* [CVE-2022-27856](CVE-2022/CVE-2022-278xx/CVE-2022-27856.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2022-32970](CVE-2022/CVE-2022-329xx/CVE-2022-32970.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2022-33961](CVE-2022/CVE-2022-339xx/CVE-2022-33961.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2022-4008](CVE-2022/CVE-2022-40xx/CVE-2022-4008.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2022-46817](CVE-2022/CVE-2022-468xx/CVE-2022-46817.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2022-46819](CVE-2022/CVE-2022-468xx/CVE-2022-46819.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2022-46861](CVE-2022/CVE-2022-468xx/CVE-2022-46861.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2022-47137](CVE-2022/CVE-2022-471xx/CVE-2022-47137.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2022-47423](CVE-2022/CVE-2022-474xx/CVE-2022-47423.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2022-47436](CVE-2022/CVE-2022-474xx/CVE-2022-47436.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2022-47441](CVE-2022/CVE-2022-474xx/CVE-2022-47441.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2022-47587](CVE-2022/CVE-2022-475xx/CVE-2022-47587.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2022-47590](CVE-2022/CVE-2022-475xx/CVE-2022-47590.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2022-47600](CVE-2022/CVE-2022-476xx/CVE-2022-47600.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2022-47606](CVE-2022/CVE-2022-476xx/CVE-2022-47606.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2022-47876](CVE-2022/CVE-2022-478xx/CVE-2022-47876.json) (`2023-05-10T13:54:33.687`)
|
||||
* [CVE-2023-0683](CVE-2023/CVE-2023-06xx/CVE-2023-0683.json) (`2023-05-10T13:24:14.720`)
|
||||
* [CVE-2023-22361](CVE-2023/CVE-2023-223xx/CVE-2023-22361.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-22441](CVE-2023/CVE-2023-224xx/CVE-2023-22441.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-22696](CVE-2023/CVE-2023-226xx/CVE-2023-22696.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-22711](CVE-2023/CVE-2023-227xx/CVE-2023-22711.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-23578](CVE-2023/CVE-2023-235xx/CVE-2023-23578.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-23701](CVE-2023/CVE-2023-237xx/CVE-2023-23701.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-23786](CVE-2023/CVE-2023-237xx/CVE-2023-23786.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-23788](CVE-2023/CVE-2023-237xx/CVE-2023-23788.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-23789](CVE-2023/CVE-2023-237xx/CVE-2023-23789.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-23794](CVE-2023/CVE-2023-237xx/CVE-2023-23794.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-23812](CVE-2023/CVE-2023-238xx/CVE-2023-23812.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-23873](CVE-2023/CVE-2023-238xx/CVE-2023-23873.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-23901](CVE-2023/CVE-2023-239xx/CVE-2023-23901.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-23906](CVE-2023/CVE-2023-239xx/CVE-2023-23906.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-24392](CVE-2023/CVE-2023-243xx/CVE-2023-24392.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-24406](CVE-2023/CVE-2023-244xx/CVE-2023-24406.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-24418](CVE-2023/CVE-2023-244xx/CVE-2023-24418.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-24586](CVE-2023/CVE-2023-245xx/CVE-2023-24586.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-25070](CVE-2023/CVE-2023-250xx/CVE-2023-25070.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-25072](CVE-2023/CVE-2023-250xx/CVE-2023-25072.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-25184](CVE-2023/CVE-2023-251xx/CVE-2023-25184.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-25492](CVE-2023/CVE-2023-254xx/CVE-2023-25492.json) (`2023-05-10T13:37:50.410`)
|
||||
* [CVE-2023-26126](CVE-2023/CVE-2023-261xx/CVE-2023-26126.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-2614](CVE-2023/CVE-2023-26xx/CVE-2023-2614.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-2615](CVE-2023/CVE-2023-26xx/CVE-2023-2615.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-2616](CVE-2023/CVE-2023-26xx/CVE-2023-2616.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-2617](CVE-2023/CVE-2023-26xx/CVE-2023-2617.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-2618](CVE-2023/CVE-2023-26xx/CVE-2023-2618.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-2619](CVE-2023/CVE-2023-26xx/CVE-2023-2619.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-27385](CVE-2023/CVE-2023-273xx/CVE-2023-27385.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-27419](CVE-2023/CVE-2023-274xx/CVE-2023-27419.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-27455](CVE-2023/CVE-2023-274xx/CVE-2023-27455.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-27510](CVE-2023/CVE-2023-275xx/CVE-2023-27510.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-27527](CVE-2023/CVE-2023-275xx/CVE-2023-27527.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-27888](CVE-2023/CVE-2023-278xx/CVE-2023-27888.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-27889](CVE-2023/CVE-2023-278xx/CVE-2023-27889.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-27918](CVE-2023/CVE-2023-279xx/CVE-2023-27918.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-27919](CVE-2023/CVE-2023-279xx/CVE-2023-27919.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-28092](CVE-2023/CVE-2023-280xx/CVE-2023-28092.json) (`2023-05-10T13:51:15.777`)
|
||||
* [CVE-2023-28932](CVE-2023/CVE-2023-289xx/CVE-2023-28932.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-29101](CVE-2023/CVE-2023-291xx/CVE-2023-29101.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-30746](CVE-2023/CVE-2023-307xx/CVE-2023-30746.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-30777](CVE-2023/CVE-2023-307xx/CVE-2023-30777.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-32568](CVE-2023/CVE-2023-325xx/CVE-2023-32568.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-32569](CVE-2023/CVE-2023-325xx/CVE-2023-32569.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-32570](CVE-2023/CVE-2023-325xx/CVE-2023-32570.json) (`2023-05-10T13:06:16.563`)
|
||||
* [CVE-2023-32573](CVE-2023/CVE-2023-325xx/CVE-2023-32573.json) (`2023-05-10T13:06:16.563`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user