mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-06-05T14:00:28.217196+00:00
This commit is contained in:
parent
73d80dceff
commit
936c64b1a5
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2013-10027",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-06-04T14:15:09.397",
|
||||
"lastModified": "2023-06-04T14:15:09.397",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2013-10028",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-06-04T19:15:09.620",
|
||||
"lastModified": "2023-06-04T19:15:09.620",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2014-125105",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-06-05T01:15:45.637",
|
||||
"lastModified": "2023-06-05T01:15:45.637",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Broken Link Checker Plugin up to 1.10.1 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function options_page of the file core/core.php of the component Settings Page. The manipulation of the argument exclusion_list/blc_custom_fields leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.10.2 is able to address this issue. The name of the patch is 90615fe9b0b6f9e6fb254d503c302e53a202e561. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230659."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad en el plugin Broken Link Checker hasta la versi\u00f3n 1.10.1 en WordPress. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n \"options_page\" del archivo \"core/core.php\" del componente \"Settings Page\". La manipulaci\u00f3n del argumento \"exclusion_list/blc_custom_fields\" conduce a Cross-Site Scripting. El ataque puede lanzarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 1.10.2 soluciona este problema. El nombre del parche es 90615fe9b0b6f9e6fb254d503c302e53a202e561. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-230659."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-10111",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-06-04T12:15:09.237",
|
||||
"lastModified": "2023-06-04T12:15:09.237",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-10112",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-06-05T08:15:09.380",
|
||||
"lastModified": "2023-06-05T08:15:09.380",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-0041",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-06-05T01:15:45.810",
|
||||
"lastModified": "2023-06-05T03:15:09.207",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Security Guardium 11.5 could allow a user to take over another user's session due to insufficient session expiration. IBM X-Force ID: 243657."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM Security Guardium v11.5 podr\u00eda permitir a un usuario tomar el control de la sesi\u00f3n de otro usuario debido a una caducidad de sesi\u00f3n insuficiente. IBM X-Force ID: 243657. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0583",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T02:15:09.050",
|
||||
"lastModified": "2023-06-03T02:15:09.050",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0584",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T02:15:09.120",
|
||||
"lastModified": "2023-06-03T02:15:09.120",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0635",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2023-06-05T04:15:09.493",
|
||||
"lastModified": "2023-06-05T04:15:09.493",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0636",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2023-06-05T04:15:10.587",
|
||||
"lastModified": "2023-06-05T04:15:10.587",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1297",
|
||||
"sourceIdentifier": "security@hashicorp.com",
|
||||
"published": "2023-06-02T23:15:09.293",
|
||||
"lastModified": "2023-06-02T23:15:09.293",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-22862",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-06-05T00:15:09.703",
|
||||
"lastModified": "2023-06-05T00:15:09.703",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Aspera Connect 4.2.5 and IBM Aspera Cargo 4.2.5 transmits authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. IBM X-Force ID: 244107."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM Aspera Connect e IBM Aspera Cargo 4.2.5 transmite credenciales de autenticaci\u00f3n, pero utiliza un m\u00e9todo inseguro que es susceptible de ser interceptado y/o recuperado sin autorizaci\u00f3n. IBM X-Force ID: 244107"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2298",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T05:15:09.173",
|
||||
"lastModified": "2023-06-03T05:15:09.173",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2299",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T05:15:09.267",
|
||||
"lastModified": "2023-06-03T05:15:09.267",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2300",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T05:15:09.330",
|
||||
"lastModified": "2023-06-03T05:15:09.330",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-2301",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T05:15:09.397",
|
||||
"lastModified": "2023-06-03T05:15:09.397",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Contact Form Builder by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.9.1. This is due to missing nonce validation on the ls_parse_vcita_callback function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El plugin Contact Form Builder by vcita para WordPress es vulnerable a Cross-Site Request Forgery en versiones hasta la 4.9.1 inclusive. Esto se debe a la falta de validaci\u00f3n nonce en la funci\u00f3n \"ls_parse_vcita_callback\". Esto hace posible que los atacantes no autenticados modifiquen la configuraci\u00f3n del plugin e inyecten JavaScript malicioso a trav\u00e9s de una solicitud falsificada concedida y puedan enga\u00f1ar a un administrador del sitio para realizar una acci\u00f3n como hacer clic en un enlace. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2302",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T05:15:09.460",
|
||||
"lastModified": "2023-06-03T05:15:09.460",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-2303",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T05:15:09.527",
|
||||
"lastModified": "2023-06-03T05:15:09.527",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.6.4. This is due to missing nonce validation in the vcita-callback.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El plugin Contact Form y el Calls To Action by vcita para WordPress es vulnerable a Cross-Site Request Forgery en versiones hasta la 2.6.4 inclusive. Esto se debe a la falta de validaci\u00f3n nonce en el archivo \"vcita-callback.php\". Esto hace posible que los atacantes no autenticados modifiquen la configuraci\u00f3n del plugin e inyecten JavaScript malicioso a trav\u00e9s de una solicitud falsificada concedida y puedan enga\u00f1ar a un administrador del sitio para realizar una acci\u00f3n como hacer clic en un enlace. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2404",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T05:15:09.593",
|
||||
"lastModified": "2023-06-03T05:15:09.593",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2405",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T05:15:09.653",
|
||||
"lastModified": "2023-06-03T05:15:09.653",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-2406",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T05:15:09.717",
|
||||
"lastModified": "2023-06-03T05:15:09.717",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Event Registration Calendar By vcita plugin, versions up to and including 3.9.1, and Online Payments \u2013 Get Paid with PayPal, Square & Stripe plugin, for WordPress are vulnerable to Stored Cross-Site Scripting via the 'email' parameter in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with the edit_posts capability, such as contributors and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El plugin Event Registration Calendar By vcita, versiones hasta la 3.9.1 inlcusive, y el plugin Online Payments \u2013 Get Paid with PayPal, Square & Stripe, para WordPress son vulnerables a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro \"email\" en versiones hasta la 1.3.1 inclusive, debido a un insuficiente saneamiento de entrada y escape de salida. Esto hace posible que atacantes autenticados con la capacidad \"edit_posts\", como los contribuidores y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2407",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T05:15:09.780",
|
||||
"lastModified": "2023-06-03T05:15:09.780",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2415",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T05:15:09.843",
|
||||
"lastModified": "2023-06-03T05:15:09.843",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2416",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T05:15:09.903",
|
||||
"lastModified": "2023-06-03T05:15:09.903",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-27285",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-06-05T00:15:09.920",
|
||||
"lastModified": "2023-06-05T00:15:09.920",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Aspera Connect 4.2.5 and IBM Aspera Cargo 4.2.5 is vulnerable to a buffer overflow, caused by improper bounds checking. An attacker could overflow a buffer and execute arbitrary code on the system. IBM X-Force ID: 248625."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM Aspera Connect v4.2.5 e IBM Aspera Cargo v4.2.5 son vulnerables a un desbordamiento de b\u00fafer, causado por una comprobaci\u00f3n de l\u00edmites incorrecta. Un atacante podr\u00eda desbordar un b\u00fafer y ejecutar c\u00f3digo arbitrario en el sistema. IBM X-Force ID: 248625. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-27861",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-06-05T01:15:45.890",
|
||||
"lastModified": "2023-06-05T01:15:45.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Maximo Application Suite - Manage Component 8.8.0 and 8.9.0 transmits sensitive information in cleartext that could be intercepted by an attacker using man in the middle techniques. IBM X-Force ID: 249208."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM Maximo Application Suite - Manage Component v8.8.0 y v8.9.0 transmite informaci\u00f3n confidencial en texto claro que podr\u00eda ser interceptada por un atacante mediante t\u00e9cnicas de \"man in the middle\". IBM X-Force ID: 249208. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
55
CVE-2023/CVE-2023-279xx/CVE-2023-27989.json
Normal file
55
CVE-2023/CVE-2023-279xx/CVE-2023-27989.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-27989",
|
||||
"sourceIdentifier": "security@zyxel.com.tw",
|
||||
"published": "2023-06-05T12:15:09.360",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow vulnerability in the CGI program of the Zyxel NR7101 firmware versions prior to V1.00(ABUV.8)C0 could allow a remote authenticated attacker to cause denial of service (DoS) conditions by sending a crafted HTTP request to a vulnerable device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@zyxel.com.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@zyxel.com.tw",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-buffer-overflow-vulnerability-in-4g-lte-and-5g-nr-outdoor-routers",
|
||||
"source": "security@zyxel.com.tw"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2781",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T00:15:09.353",
|
||||
"lastModified": "2023-06-03T00:15:09.353",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2816",
|
||||
"sourceIdentifier": "security@hashicorp.com",
|
||||
"published": "2023-06-02T23:15:09.503",
|
||||
"lastModified": "2023-06-02T23:15:09.503",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3044",
|
||||
"sourceIdentifier": "xpdf@xpdfreader.com",
|
||||
"published": "2023-06-02T23:15:09.580",
|
||||
"lastModified": "2023-06-02T23:15:09.580",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3051",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T00:15:09.437",
|
||||
"lastModified": "2023-06-03T00:15:09.437",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3052",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T00:15:09.503",
|
||||
"lastModified": "2023-06-03T00:15:09.503",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3053",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T00:15:09.570",
|
||||
"lastModified": "2023-06-03T00:15:09.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3055",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-03T00:15:09.637",
|
||||
"lastModified": "2023-06-03T00:15:09.637",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3064",
|
||||
"sourceIdentifier": "vulnerability@ncsc.ch",
|
||||
"published": "2023-06-05T09:15:09.413",
|
||||
"lastModified": "2023-06-05T09:15:09.413",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3065",
|
||||
"sourceIdentifier": "vulnerability@ncsc.ch",
|
||||
"published": "2023-06-05T09:15:09.530",
|
||||
"lastModified": "2023-06-05T09:15:09.530",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3066",
|
||||
"sourceIdentifier": "vulnerability@ncsc.ch",
|
||||
"published": "2023-06-05T09:15:09.593",
|
||||
"lastModified": "2023-06-05T09:15:09.593",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3083",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-06-03T08:15:08.853",
|
||||
"lastModified": "2023-06-03T08:15:08.853",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3084",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-06-03T11:15:20.737",
|
||||
"lastModified": "2023-06-03T11:15:20.737",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-3085",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-06-03T11:15:21.443",
|
||||
"lastModified": "2023-06-03T11:15:21.443",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, has been found in X-WRT luci up to 22.10_b202303061504. This issue affects the function run_action of the file modules/luci-base/ucode/dispatcher.uc of the component 404 Error Template Handler. The manipulation of the argument request_path leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 22.10_b202303121313 is able to address this issue. The name of the patch is 24d7da2416b9ab246825c33c213fe939a89b369c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230663."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha encontrado una vulnerabilidad, clasificada como problem\u00e1tica, en X-WRT luci hasta la versi\u00f3n 22.10_b202303061504. Este problema afecta a la funci\u00f3n \"run_action\" del archivo \"modules/luci-base/ucode/dispatcher.uc\" del componente \"404 Error Template Handler\". La manipulaci\u00f3n del argumento \"request_path\" conduce a Cross-Site Scripting. El ataque puede iniciarse de forma remota. La actualizaci\u00f3n a la versi\u00f3n 22.10_b202303121313 soluciona este problema. El nombre del parche es 24d7da2416b9ab246825c33c213fe939a89b369c. Se recomienda actualizar el componente afectado. El identificador asociado de esta vulnerabilidad es VDB-230663."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3086",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-06-03T12:15:09.317",
|
||||
"lastModified": "2023-06-03T12:15:09.317",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3091",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-06-04T00:15:09.553",
|
||||
"lastModified": "2023-06-04T00:15:09.553",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3094",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-06-04T09:15:09.730",
|
||||
"lastModified": "2023-06-04T09:15:09.730",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3095",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-06-04T11:15:09.167",
|
||||
"lastModified": "2023-06-04T11:15:09.167",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3096",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-06-05T06:15:09.227",
|
||||
"lastModified": "2023-06-05T06:15:09.227",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3097",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-06-05T06:15:09.463",
|
||||
"lastModified": "2023-06-05T06:15:09.463",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3098",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-06-05T07:15:09.420",
|
||||
"lastModified": "2023-06-05T07:15:09.420",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3099",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-06-05T07:15:11.143",
|
||||
"lastModified": "2023-06-05T07:15:11.143",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3100",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-06-05T08:15:09.667",
|
||||
"lastModified": "2023-06-05T08:15:09.667",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32217",
|
||||
"sourceIdentifier": "psirt@sailpoint.com",
|
||||
"published": "2023-06-05T04:15:10.927",
|
||||
"lastModified": "2023-06-05T04:15:10.927",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-32334",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-06-05T01:15:45.960",
|
||||
"lastModified": "2023-06-05T01:15:45.960",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM Maximo Asset Management 7.6.1.2, 7.6.1.3 and IBM Maximo Application Suite 8.8.0 stores sensitive information in URL parameters. This may lead to information disclosure if unauthorized parties have access to the URLs via server logs, referrer header or browser history. IBM X-Force ID: 255074."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "IBM Maximo Asset Management v7.6.1.2, v7.6.1.3 e IBM Maximo Application Suite v8.8.0 almacenan informaci\u00f3n confidencial en par\u00e1metros de URL. Esto puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n si partes no autorizadas tienen acceso a las URL a trav\u00e9s de los registros del servidor, el encabezado de referencia o el historial del navegador. IBM X-Force ID: 255074. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32582",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-06-03T12:15:09.233",
|
||||
"lastModified": "2023-06-03T12:15:09.233",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:03.327",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33143",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-06-03T01:15:36.693",
|
||||
"lastModified": "2023-06-03T01:15:36.693",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:03:17.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33187",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-05-26T21:15:20.693",
|
||||
"lastModified": "2023-05-28T02:28:04.970",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-05T13:50:24.813",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -46,14 +76,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:highlight:highlight:*:*:*:*:*:node.js:*:*",
|
||||
"versionEndExcluding": "6.0.0",
|
||||
"matchCriteriaId": "98A60E3C-555D-4105-91BD-5E3FBAFE4465"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/highlight/highlight/security/advisories/GHSA-9qpj-qq2r-5mcc",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rrweb-io/rrweb/pull/1184",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-34407",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-05T02:15:09.407",
|
||||
"lastModified": "2023-06-05T02:15:09.407",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OfflinePlayerService.exe in Harbinger Offline Player 4.0.6.0.2 allows directory traversal as LocalSystem via ..\\ in a URL."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El archivo ejecutable \"OfflinePlayerService.exe\" en Harbinger Offline Player v4.0.6.0.2 permite el salto de directorios como LocalSystem a trav\u00e9s de ..\\ en una URL. "
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-34408",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-05T02:15:09.537",
|
||||
"lastModified": "2023-06-05T02:15:09.537",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DokuWiki before 2023-04-04a allows XSS via RSS titles."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "DokuWiki antes de la fecha 04-04-2023 permite ataques de Cross-Site Scripting (XSS) a trav\u00e9s de t\u00edtulos RSS. "
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-34410",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-05T03:15:09.390",
|
||||
"lastModified": "2023-06-05T03:15:09.390",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-34411",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-05T04:15:11.153",
|
||||
"lastModified": "2023-06-05T04:15:11.153",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
37
README.md
37
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-06-05T12:00:28.900504+00:00
|
||||
2023-06-05T14:00:28.217196+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-06-05T11:15:09.357000+00:00
|
||||
2023-06-05T13:50:24.813000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,20 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
216844
|
||||
216845
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `1`
|
||||
|
||||
* [CVE-2023-27989](CVE-2023/CVE-2023-279xx/CVE-2023-27989.json) (`2023-06-05T12:15:09.360`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `57`
|
||||
|
||||
* [CVE-2022-45853](CVE-2022/CVE-2022-458xx/CVE-2022-45853.json) (`2023-06-05T11:15:09.357`)
|
||||
* [CVE-2023-32582](CVE-2023/CVE-2023-325xx/CVE-2023-32582.json) (`2023-06-05T13:03:03.327`)
|
||||
* [CVE-2023-3086](CVE-2023/CVE-2023-30xx/CVE-2023-3086.json) (`2023-06-05T13:03:03.327`)
|
||||
* [CVE-2023-3091](CVE-2023/CVE-2023-30xx/CVE-2023-3091.json) (`2023-06-05T13:03:03.327`)
|
||||
* [CVE-2023-3094](CVE-2023/CVE-2023-30xx/CVE-2023-3094.json) (`2023-06-05T13:03:03.327`)
|
||||
* [CVE-2023-3095](CVE-2023/CVE-2023-30xx/CVE-2023-3095.json) (`2023-06-05T13:03:03.327`)
|
||||
* [CVE-2023-22862](CVE-2023/CVE-2023-228xx/CVE-2023-22862.json) (`2023-06-05T13:03:03.327`)
|
||||
* [CVE-2023-27285](CVE-2023/CVE-2023-272xx/CVE-2023-27285.json) (`2023-06-05T13:03:03.327`)
|
||||
* [CVE-2023-1297](CVE-2023/CVE-2023-12xx/CVE-2023-1297.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-2816](CVE-2023/CVE-2023-28xx/CVE-2023-2816.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-3044](CVE-2023/CVE-2023-30xx/CVE-2023-3044.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-2781](CVE-2023/CVE-2023-27xx/CVE-2023-2781.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-3051](CVE-2023/CVE-2023-30xx/CVE-2023-3051.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-3052](CVE-2023/CVE-2023-30xx/CVE-2023-3052.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-3053](CVE-2023/CVE-2023-30xx/CVE-2023-3053.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-3055](CVE-2023/CVE-2023-30xx/CVE-2023-3055.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-33143](CVE-2023/CVE-2023-331xx/CVE-2023-33143.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-0583](CVE-2023/CVE-2023-05xx/CVE-2023-0583.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-0584](CVE-2023/CVE-2023-05xx/CVE-2023-0584.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-2298](CVE-2023/CVE-2023-22xx/CVE-2023-2298.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-2299](CVE-2023/CVE-2023-22xx/CVE-2023-2299.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-2300](CVE-2023/CVE-2023-23xx/CVE-2023-2300.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-2301](CVE-2023/CVE-2023-23xx/CVE-2023-2301.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-2302](CVE-2023/CVE-2023-23xx/CVE-2023-2302.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-2303](CVE-2023/CVE-2023-23xx/CVE-2023-2303.json) (`2023-06-05T13:03:17.903`)
|
||||
* [CVE-2023-33187](CVE-2023/CVE-2023-331xx/CVE-2023-33187.json) (`2023-06-05T13:50:24.813`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user