mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2023-11-01T23:00:23.933054+00:00
This commit is contained in:
parent
dc3c57afe3
commit
b121c219ad
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-41248",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-09-21T16:15:11.277",
|
||||
"lastModified": "2023-10-25T18:17:17.977",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-01T21:08:21.113",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -38,6 +38,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-41249",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2022-09-21T16:15:11.333",
|
||||
"lastModified": "2023-10-25T18:17:18.037",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2023-11-01T21:02:39.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -38,6 +38,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-22099",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2023-10-17T22:15:14.893",
|
||||
"lastModified": "2023-10-23T18:20:27.083",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-11-01T22:15:08.447",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: Only applicable to 7.0.x platform. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H)."
|
||||
"value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. Note: Only applicable to 7.0.x platform. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -21,20 +21,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.5,
|
||||
"impactScore": 5.3
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
|
24
CVE-2023/CVE-2023-392xx/CVE-2023-39281.json
Normal file
24
CVE-2023/CVE-2023-392xx/CVE-2023-39281.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-39281",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-01T22:15:08.547",
|
||||
"lastModified": "2023-11-01T22:15:08.547",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stack buffer overflow vulnerability discovered in AsfSecureBootDxe in Insyde InsydeH2O with kernel 5.0 through 5.5 allows attackers to run arbitrary code execution during the DXE phase."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.insyde.com/security-pledge",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.insyde.com/security-pledge/SA-2023054",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-440xx/CVE-2023-44025.json
Normal file
20
CVE-2023/CVE-2023-440xx/CVE-2023-44025.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-44025",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-01T22:15:08.597",
|
||||
"lastModified": "2023-11-01T22:15:08.597",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL injection vulnerability in addify Addifyfreegifts v.1.0.2 and before allows a remote attacker to execute arbitrary code via a crafted script to the getrulebyid function in the AddifyfreegiftsModel.php component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.friendsofpresta.org/modules/2023/10/31/addifyfreegifts.html",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-452xx/CVE-2023-45201.json
Normal file
59
CVE-2023/CVE-2023-452xx/CVE-2023-45201.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-45201",
|
||||
"sourceIdentifier": "help@fluidattacks.com",
|
||||
"published": "2023-11-01T22:15:08.643",
|
||||
"lastModified": "2023-11-01T22:15:08.643",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities.\u00a0The 'q' parameter of the admin.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "help@fluidattacks.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "help@fluidattacks.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fluidattacks.com/advisories/uchida",
|
||||
"source": "help@fluidattacks.com"
|
||||
},
|
||||
{
|
||||
"url": "https://projectworlds.in/",
|
||||
"source": "help@fluidattacks.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-464xx/CVE-2023-46428.json
Normal file
20
CVE-2023/CVE-2023-464xx/CVE-2023-46428.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-46428",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-01T21:15:08.733",
|
||||
"lastModified": "2023-11-01T21:15:08.733",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability in HadSky v7.12.10 allows attackers to execute arbitrary code via a crafted file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fenglon/CVE/blob/main/analyse.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
47
CVE-2023/CVE-2023-464xx/CVE-2023-46448.json
Normal file
47
CVE-2023/CVE-2023-464xx/CVE-2023-46448.json
Normal file
@ -0,0 +1,47 @@
|
||||
{
|
||||
"id": "CVE-2023-46448",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-01T22:15:08.730",
|
||||
"lastModified": "2023-11-01T22:15:08.730",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Reflected Cross-Site Scripting (XSS) vulnerability in dmpop Mejiro Commit Versions Prior To 3096393 allows attackers to run arbitrary code via crafted string in metadata of uploaded images."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.0xzon.dev/2023-10-15-Mejiro-Reflected-XSS-Via-Remote-File-Inclusion-CVE-2023-46448/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/dmpop/mejiro/commit/309639339f5816408865902befe8c90cb6862537",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-47094",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-01T00:15:09.380",
|
||||
"lastModified": "2023-11-01T12:51:21.720",
|
||||
"lastModified": "2023-11-01T22:15:08.793",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Virtualmin 7.7. A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Account Plans tab of System Settings via the Plan Name field. Whenever the module is accessed, the XSS payload is executed."
|
||||
"value": "A Stored Cross-Site Scripting (XSS) vulnerability in the Account Plans tab of System Settings in Virtualmin 7.7 allows remote attackers to inject arbitrary web script or HTML via the Plan name field while editing Account plan details."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-47095",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-01T00:15:09.423",
|
||||
"lastModified": "2023-11-01T12:51:21.720",
|
||||
"lastModified": "2023-11-01T22:15:08.847",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Virtualmin 7.7. The Custom Fields feature of Edit Virtual Server under System Customization allows XSS."
|
||||
"value": "A Stored Cross-Site Scripting (XSS) vulnerability in the Custom fields of Edit Virtual Server under System Customization in Virtualmin 7.7 allows remote attackers to inject arbitrary web script or HTML via the Batch Label field while details of Virtual Server."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-47096",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-01T00:15:09.467",
|
||||
"lastModified": "2023-11-01T12:51:21.720",
|
||||
"lastModified": "2023-11-01T22:15:08.897",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Virtualmin 7.7. The Cloudmin Services Client under System Settings allows XSS."
|
||||
"value": "A Reflected Cross-Site Scripting (XSS) vulnerability in the Cloudmin Services Client under System Setting in Virtualmin 7.7 allows remote attackers to inject arbitrary web script or HTML via the Cloudmin services master field."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-47097",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-01T00:15:09.507",
|
||||
"lastModified": "2023-11-01T12:51:21.720",
|
||||
"lastModified": "2023-11-01T22:15:08.943",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Virtualmin 7.7. The Server Templates feature under System Settings allows XSS."
|
||||
"value": "A Stored Cross-Site Scripting (XSS) vulnerability in the Server Template under System Setting in Virtualmin 7.7 allows remote attackers to inject arbitrary web script or HTML via the Template name field while creating server templates."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-47098",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-01T00:15:09.547",
|
||||
"lastModified": "2023-11-01T12:51:21.720",
|
||||
"lastModified": "2023-11-01T22:15:08.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Virtualmin 7.7. A Stored Cross-Site Scripting (XSS) vulnerability exists in the Create Extra Administrator tab via the \"Real name or description\" field."
|
||||
"value": "A Stored Cross-Site Scripting (XSS) vulnerability in the Manage Extra Admins under Administration Options in Virtualmin 7.7 allows remote attackers to inject arbitrary web script or HTML via the real name or description field."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-47099",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-01T00:15:09.583",
|
||||
"lastModified": "2023-11-01T12:51:21.720",
|
||||
"lastModified": "2023-11-01T22:15:09.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Virtualmin 7.7. The Create Virtual Server functionality allows XSS attacks against anyone who accesses the Virtual Server Summary tab."
|
||||
"value": "A Stored Cross-Site Scripting (XSS) vulnerability in the Create Virtual Server in Virtualmin 7.7 allows remote attackers to inject arbitrary web script or HTML via Description field while creating the Virtual server."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
52
README.md
52
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-11-01T21:00:18.437221+00:00
|
||||
2023-11-01T23:00:23.933054+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-11-01T20:58:58.857000+00:00
|
||||
2023-11-01T22:15:09.053000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,49 +29,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
229551
|
||||
229556
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
|
||||
* [CVE-2023-46482](CVE-2023/CVE-2023-464xx/CVE-2023-46482.json) (`2023-11-01T19:15:45.393`)
|
||||
* [CVE-2023-1192](CVE-2023/CVE-2023-11xx/CVE-2023-1192.json) (`2023-11-01T20:15:08.597`)
|
||||
* [CVE-2023-1193](CVE-2023/CVE-2023-11xx/CVE-2023-1193.json) (`2023-11-01T20:15:08.663`)
|
||||
* [CVE-2023-3397](CVE-2023/CVE-2023-33xx/CVE-2023-3397.json) (`2023-11-01T20:15:08.737`)
|
||||
* [CVE-2023-46724](CVE-2023/CVE-2023-467xx/CVE-2023-46724.json) (`2023-11-01T20:15:08.800`)
|
||||
* [CVE-2023-46428](CVE-2023/CVE-2023-464xx/CVE-2023-46428.json) (`2023-11-01T21:15:08.733`)
|
||||
* [CVE-2023-39281](CVE-2023/CVE-2023-392xx/CVE-2023-39281.json) (`2023-11-01T22:15:08.547`)
|
||||
* [CVE-2023-44025](CVE-2023/CVE-2023-440xx/CVE-2023-44025.json) (`2023-11-01T22:15:08.597`)
|
||||
* [CVE-2023-45201](CVE-2023/CVE-2023-452xx/CVE-2023-45201.json) (`2023-11-01T22:15:08.643`)
|
||||
* [CVE-2023-46448](CVE-2023/CVE-2023-464xx/CVE-2023-46448.json) (`2023-11-01T22:15:08.730`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `79`
|
||||
Recently modified CVEs: `9`
|
||||
|
||||
* [CVE-2022-41254](CVE-2022/CVE-2022-412xx/CVE-2022-41254.json) (`2023-11-01T20:58:52.380`)
|
||||
* [CVE-2022-41255](CVE-2022/CVE-2022-412xx/CVE-2022-41255.json) (`2023-11-01T20:58:58.857`)
|
||||
* [CVE-2023-4692](CVE-2023/CVE-2023-46xx/CVE-2023-4692.json) (`2023-11-01T19:03:42.027`)
|
||||
* [CVE-2023-46660](CVE-2023/CVE-2023-466xx/CVE-2023-46660.json) (`2023-11-01T19:04:04.637`)
|
||||
* [CVE-2023-46659](CVE-2023/CVE-2023-466xx/CVE-2023-46659.json) (`2023-11-01T19:04:21.493`)
|
||||
* [CVE-2023-5472](CVE-2023/CVE-2023-54xx/CVE-2023-5472.json) (`2023-11-01T19:04:53.977`)
|
||||
* [CVE-2023-46152](CVE-2023/CVE-2023-461xx/CVE-2023-46152.json) (`2023-11-01T19:10:56.083`)
|
||||
* [CVE-2023-5723](CVE-2023/CVE-2023-57xx/CVE-2023-5723.json) (`2023-11-01T19:14:35.080`)
|
||||
* [CVE-2023-46347](CVE-2023/CVE-2023-463xx/CVE-2023-46347.json) (`2023-11-01T19:18:47.667`)
|
||||
* [CVE-2023-5722](CVE-2023/CVE-2023-57xx/CVE-2023-5722.json) (`2023-11-01T19:24:13.513`)
|
||||
* [CVE-2023-5721](CVE-2023/CVE-2023-57xx/CVE-2023-5721.json) (`2023-11-01T19:24:31.713`)
|
||||
* [CVE-2023-5731](CVE-2023/CVE-2023-57xx/CVE-2023-5731.json) (`2023-11-01T19:27:41.383`)
|
||||
* [CVE-2023-5732](CVE-2023/CVE-2023-57xx/CVE-2023-5732.json) (`2023-11-01T19:28:03.360`)
|
||||
* [CVE-2023-5729](CVE-2023/CVE-2023-57xx/CVE-2023-5729.json) (`2023-11-01T19:53:53.417`)
|
||||
* [CVE-2023-5730](CVE-2023/CVE-2023-57xx/CVE-2023-5730.json) (`2023-11-01T19:54:34.180`)
|
||||
* [CVE-2023-46369](CVE-2023/CVE-2023-463xx/CVE-2023-46369.json) (`2023-11-01T20:03:48.360`)
|
||||
* [CVE-2023-46370](CVE-2023/CVE-2023-463xx/CVE-2023-46370.json) (`2023-11-01T20:05:45.640`)
|
||||
* [CVE-2023-46371](CVE-2023/CVE-2023-463xx/CVE-2023-46371.json) (`2023-11-01T20:08:56.603`)
|
||||
* [CVE-2023-46373](CVE-2023/CVE-2023-463xx/CVE-2023-46373.json) (`2023-11-01T20:09:41.260`)
|
||||
* [CVE-2023-46518](CVE-2023/CVE-2023-465xx/CVE-2023-46518.json) (`2023-11-01T20:15:22.357`)
|
||||
* [CVE-2023-46540](CVE-2023/CVE-2023-465xx/CVE-2023-46540.json) (`2023-11-01T20:18:44.327`)
|
||||
* [CVE-2023-5758](CVE-2023/CVE-2023-57xx/CVE-2023-5758.json) (`2023-11-01T20:21:27.567`)
|
||||
* [CVE-2023-46544](CVE-2023/CVE-2023-465xx/CVE-2023-46544.json) (`2023-11-01T20:28:38.340`)
|
||||
* [CVE-2023-46543](CVE-2023/CVE-2023-465xx/CVE-2023-46543.json) (`2023-11-01T20:35:20.917`)
|
||||
* [CVE-2023-5568](CVE-2023/CVE-2023-55xx/CVE-2023-5568.json) (`2023-11-01T20:44:27.143`)
|
||||
* [CVE-2022-41249](CVE-2022/CVE-2022-412xx/CVE-2022-41249.json) (`2023-11-01T21:02:39.747`)
|
||||
* [CVE-2022-41248](CVE-2022/CVE-2022-412xx/CVE-2022-41248.json) (`2023-11-01T21:08:21.113`)
|
||||
* [CVE-2023-22099](CVE-2023/CVE-2023-220xx/CVE-2023-22099.json) (`2023-11-01T22:15:08.447`)
|
||||
* [CVE-2023-47094](CVE-2023/CVE-2023-470xx/CVE-2023-47094.json) (`2023-11-01T22:15:08.793`)
|
||||
* [CVE-2023-47095](CVE-2023/CVE-2023-470xx/CVE-2023-47095.json) (`2023-11-01T22:15:08.847`)
|
||||
* [CVE-2023-47096](CVE-2023/CVE-2023-470xx/CVE-2023-47096.json) (`2023-11-01T22:15:08.897`)
|
||||
* [CVE-2023-47097](CVE-2023/CVE-2023-470xx/CVE-2023-47097.json) (`2023-11-01T22:15:08.943`)
|
||||
* [CVE-2023-47098](CVE-2023/CVE-2023-470xx/CVE-2023-47098.json) (`2023-11-01T22:15:08.997`)
|
||||
* [CVE-2023-47099](CVE-2023/CVE-2023-470xx/CVE-2023-47099.json) (`2023-11-01T22:15:09.053`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user