mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2023-05-09T00:00:31.306579+00:00
This commit is contained in:
parent
3cca92ecde
commit
b7b3865a45
55
CVE-2023/CVE-2023-227xx/CVE-2023-22710.json
Normal file
55
CVE-2023/CVE-2023-227xx/CVE-2023-22710.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-22710",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-08T23:15:09.820",
|
||||
"lastModified": "2023-05-08T23:15:09.820",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in chilidevs Return and Warranty Management System for WooCommerce plugin <=\u00a01.2.3 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wc-return-warrranty/wordpress-return-and-warranty-management-system-for-woocommerce-plugin-1-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-228xx/CVE-2023-22813.json
Normal file
55
CVE-2023/CVE-2023-228xx/CVE-2023-22813.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-22813",
|
||||
"sourceIdentifier": "psirt@wdc.com",
|
||||
"published": "2023-05-08T23:15:09.897",
|
||||
"lastModified": "2023-05-08T23:15:09.897",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A device API endpoint was missing access controls on\u00a0Western Digital My Cloud OS 5 Mobile App on Android, iOS, Western Digital My Cloud Home Mobile App on iOS, Android, SanDIsk ibi Mobile App on Android, iOS, Western Digital WD Cloud Mobile App on Android, iOS, Western Digital My Cloud OS 5 Web App, Western Digital My Cloud Home Web App, SanDisk ibi Web App and the Western Digital WD Web App.\u00a0Due to a permissive CORS policy and missing authentication requirement for private IPs, a remote attacker on the same network as the device could obtain device information by convincing a victim user to visit an attacker-controlled server and issue a cross-site request.This issue affects My Cloud OS 5 Mobile App: through 4.21.0; My Cloud Home Mobile App: through 4.21.0; ibi Mobile App: through 4.21.0; WD Cloud Mobile App: through 4.21.0; My Cloud OS 5 Web App: through 4.26.0-6126; My Cloud Home Web App: through 4.26.0-6126; ibi Web App: through 4.26.0-6126; WD Web App: through 4.26.0-6126.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@wdc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@wdc.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.westerndigital.com/support/product-security/wdc-23004-western-digital-my-cloud-os-5-my-cloud-home-sandisk-ibi-and-wd-cloud-mobile-and-web-app-update",
|
||||
"source": "psirt@wdc.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-238xx/CVE-2023-23894.json
Normal file
55
CVE-2023/CVE-2023-238xx/CVE-2023-23894.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-23894",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-08T22:15:09.163",
|
||||
"lastModified": "2023-05-08T22:15:09.163",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Surbma Surbma | GDPR Proof Cookie Consent & Notice Bar plugin <=\u00a017.5.3 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/surbma-gdpr-proof-google-analytics/wordpress-surbma-gdpr-proof-cookie-consent-notice-bar-plugin-17-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-243xx/CVE-2023-24376.json
Normal file
55
CVE-2023/CVE-2023-243xx/CVE-2023-24376.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-24376",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-08T22:15:09.240",
|
||||
"lastModified": "2023-05-08T22:15:09.240",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability\u00a0in Nico Graff WP Simple Events plugin <=\u00a01.0 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-simple-events/wordpress-wp-simple-events-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
158
README.md
158
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-05-08T21:55:26.327729+00:00
|
||||
2023-05-09T00:00:31.306579+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-05-08T21:15:12.227000+00:00
|
||||
2023-05-08T23:15:09.897000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,163 +29,23 @@ Download and Changelog: [Click](releases/latest)
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
214405
|
||||
214409
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `130`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
* [CVE-2022-22645](CVE-2022/CVE-2022-226xx/CVE-2022-22645.json) (`2023-05-08T20:15:13.900`)
|
||||
* [CVE-2022-22649](CVE-2022/CVE-2022-226xx/CVE-2022-22649.json) (`2023-05-08T20:15:13.943`)
|
||||
* [CVE-2022-26689](CVE-2022/CVE-2022-266xx/CVE-2022-26689.json) (`2023-05-08T20:15:13.997`)
|
||||
* [CVE-2022-26692](CVE-2022/CVE-2022-266xx/CVE-2022-26692.json) (`2023-05-08T20:15:14.050`)
|
||||
* [CVE-2022-26705](CVE-2022/CVE-2022-267xx/CVE-2022-26705.json) (`2023-05-08T20:15:14.097`)
|
||||
* [CVE-2022-26729](CVE-2022/CVE-2022-267xx/CVE-2022-26729.json) (`2023-05-08T20:15:14.147`)
|
||||
* [CVE-2022-26732](CVE-2022/CVE-2022-267xx/CVE-2022-26732.json) (`2023-05-08T20:15:14.187`)
|
||||
* [CVE-2022-26733](CVE-2022/CVE-2022-267xx/CVE-2022-26733.json) (`2023-05-08T20:15:14.233`)
|
||||
* [CVE-2022-26734](CVE-2022/CVE-2022-267xx/CVE-2022-26734.json) (`2023-05-08T20:15:14.280`)
|
||||
* [CVE-2022-26735](CVE-2022/CVE-2022-267xx/CVE-2022-26735.json) (`2023-05-08T20:15:14.330`)
|
||||
* [CVE-2022-32779](CVE-2022/CVE-2022-327xx/CVE-2022-32779.json) (`2023-05-08T20:15:14.383`)
|
||||
* [CVE-2022-32791](CVE-2022/CVE-2022-327xx/CVE-2022-32791.json) (`2023-05-08T20:15:14.427`)
|
||||
* [CVE-2022-32804](CVE-2022/CVE-2022-328xx/CVE-2022-32804.json) (`2023-05-08T20:15:14.473`)
|
||||
* [CVE-2022-32806](CVE-2022/CVE-2022-328xx/CVE-2022-32806.json) (`2023-05-08T20:15:14.517`)
|
||||
* [CVE-2022-32808](CVE-2022/CVE-2022-328xx/CVE-2022-32808.json) (`2023-05-08T20:15:14.563`)
|
||||
* [CVE-2022-32809](CVE-2022/CVE-2022-328xx/CVE-2022-32809.json) (`2023-05-08T20:15:14.613`)
|
||||
* [CVE-2022-32822](CVE-2022/CVE-2022-328xx/CVE-2022-32822.json) (`2023-05-08T20:15:14.660`)
|
||||
* [CVE-2022-32850](CVE-2022/CVE-2022-328xx/CVE-2022-32850.json) (`2023-05-08T20:15:14.707`)
|
||||
* [CVE-2022-32856](CVE-2022/CVE-2022-328xx/CVE-2022-32856.json) (`2023-05-08T20:15:14.753`)
|
||||
* [CVE-2022-32873](CVE-2022/CVE-2022-328xx/CVE-2022-32873.json) (`2023-05-08T20:15:14.803`)
|
||||
* [CVE-2022-32874](CVE-2022/CVE-2022-328xx/CVE-2022-32874.json) (`2023-05-08T20:15:14.850`)
|
||||
* [CVE-2022-32878](CVE-2022/CVE-2022-328xx/CVE-2022-32878.json) (`2023-05-08T20:15:14.897`)
|
||||
* [CVE-2022-32884](CVE-2022/CVE-2022-328xx/CVE-2022-32884.json) (`2023-05-08T20:15:14.950`)
|
||||
* [CVE-2022-32885](CVE-2022/CVE-2022-328xx/CVE-2022-32885.json) (`2023-05-08T20:15:15.003`)
|
||||
* [CVE-2022-32901](CVE-2022/CVE-2022-329xx/CVE-2022-32901.json) (`2023-05-08T20:15:15.053`)
|
||||
* [CVE-2022-32921](CVE-2022/CVE-2022-329xx/CVE-2022-32921.json) (`2023-05-08T20:15:15.103`)
|
||||
* [CVE-2022-32930](CVE-2022/CVE-2022-329xx/CVE-2022-32930.json) (`2023-05-08T20:15:15.150`)
|
||||
* [CVE-2022-42794](CVE-2022/CVE-2022-427xx/CVE-2022-42794.json) (`2023-05-08T20:15:15.213`)
|
||||
* [CVE-2022-42802](CVE-2022/CVE-2022-428xx/CVE-2022-42802.json) (`2023-05-08T20:15:15.257`)
|
||||
* [CVE-2022-42804](CVE-2022/CVE-2022-428xx/CVE-2022-42804.json) (`2023-05-08T20:15:15.303`)
|
||||
* [CVE-2022-42822](CVE-2022/CVE-2022-428xx/CVE-2022-42822.json) (`2023-05-08T20:15:15.353`)
|
||||
* [CVE-2022-42835](CVE-2022/CVE-2022-428xx/CVE-2022-42835.json) (`2023-05-08T20:15:15.400`)
|
||||
* [CVE-2022-42857](CVE-2022/CVE-2022-428xx/CVE-2022-42857.json) (`2023-05-08T20:15:15.450`)
|
||||
* [CVE-2022-46707](CVE-2022/CVE-2022-467xx/CVE-2022-46707.json) (`2023-05-08T20:15:15.563`)
|
||||
* [CVE-2022-46708](CVE-2022/CVE-2022-467xx/CVE-2022-46708.json) (`2023-05-08T20:15:15.617`)
|
||||
* [CVE-2022-46719](CVE-2022/CVE-2022-467xx/CVE-2022-46719.json) (`2023-05-08T20:15:15.727`)
|
||||
* [CVE-2022-46720](CVE-2022/CVE-2022-467xx/CVE-2022-46720.json) (`2023-05-08T20:15:15.787`)
|
||||
* [CVE-2022-46727](CVE-2022/CVE-2022-467xx/CVE-2022-46727.json) (`2023-05-08T20:15:15.840`)
|
||||
* [CVE-2022-46728](CVE-2022/CVE-2022-467xx/CVE-2022-46728.json) (`2023-05-08T20:15:15.887`)
|
||||
* [CVE-2023-1031](CVE-2023/CVE-2023-10xx/CVE-2023-1031.json) (`2023-05-08T20:15:15.943`)
|
||||
* [CVE-2023-1094](CVE-2023/CVE-2023-10xx/CVE-2023-1094.json) (`2023-05-08T20:15:16.007`)
|
||||
* [CVE-2023-21404](CVE-2023/CVE-2023-214xx/CVE-2023-21404.json) (`2023-05-08T21:15:10.727`)
|
||||
* [CVE-2023-23494](CVE-2023/CVE-2023-234xx/CVE-2023-23494.json) (`2023-05-08T20:15:16.063`)
|
||||
* [CVE-2023-23523](CVE-2023/CVE-2023-235xx/CVE-2023-23523.json) (`2023-05-08T20:15:16.117`)
|
||||
* [CVE-2023-23525](CVE-2023/CVE-2023-235xx/CVE-2023-23525.json) (`2023-05-08T20:15:16.170`)
|
||||
* [CVE-2023-23526](CVE-2023/CVE-2023-235xx/CVE-2023-23526.json) (`2023-05-08T20:15:16.220`)
|
||||
* [CVE-2023-23527](CVE-2023/CVE-2023-235xx/CVE-2023-23527.json) (`2023-05-08T20:15:16.277`)
|
||||
* [CVE-2023-23528](CVE-2023/CVE-2023-235xx/CVE-2023-23528.json) (`2023-05-08T20:15:16.343`)
|
||||
* [CVE-2023-23532](CVE-2023/CVE-2023-235xx/CVE-2023-23532.json) (`2023-05-08T20:15:16.403`)
|
||||
* [CVE-2023-23533](CVE-2023/CVE-2023-235xx/CVE-2023-23533.json) (`2023-05-08T20:15:16.457`)
|
||||
* [CVE-2023-23534](CVE-2023/CVE-2023-235xx/CVE-2023-23534.json) (`2023-05-08T20:15:16.507`)
|
||||
* [CVE-2023-23535](CVE-2023/CVE-2023-235xx/CVE-2023-23535.json) (`2023-05-08T20:15:16.567`)
|
||||
* [CVE-2023-23536](CVE-2023/CVE-2023-235xx/CVE-2023-23536.json) (`2023-05-08T20:15:16.630`)
|
||||
* [CVE-2023-23537](CVE-2023/CVE-2023-235xx/CVE-2023-23537.json) (`2023-05-08T20:15:16.687`)
|
||||
* [CVE-2023-23538](CVE-2023/CVE-2023-235xx/CVE-2023-23538.json) (`2023-05-08T20:15:16.747`)
|
||||
* [CVE-2023-23540](CVE-2023/CVE-2023-235xx/CVE-2023-23540.json) (`2023-05-08T20:15:16.797`)
|
||||
* [CVE-2023-23541](CVE-2023/CVE-2023-235xx/CVE-2023-23541.json) (`2023-05-08T20:15:16.860`)
|
||||
* [CVE-2023-23542](CVE-2023/CVE-2023-235xx/CVE-2023-23542.json) (`2023-05-08T20:15:16.923`)
|
||||
* [CVE-2023-23543](CVE-2023/CVE-2023-235xx/CVE-2023-23543.json) (`2023-05-08T20:15:17.003`)
|
||||
* [CVE-2023-24505](CVE-2023/CVE-2023-245xx/CVE-2023-24505.json) (`2023-05-08T21:15:10.797`)
|
||||
* [CVE-2023-24506](CVE-2023/CVE-2023-245xx/CVE-2023-24506.json) (`2023-05-08T21:15:10.867`)
|
||||
* [CVE-2023-24507](CVE-2023/CVE-2023-245xx/CVE-2023-24507.json) (`2023-05-08T21:15:10.937`)
|
||||
* [CVE-2023-2478](CVE-2023/CVE-2023-24xx/CVE-2023-2478.json) (`2023-05-08T21:15:10.997`)
|
||||
* [CVE-2023-2513](CVE-2023/CVE-2023-25xx/CVE-2023-2513.json) (`2023-05-08T21:15:11.077`)
|
||||
* [CVE-2023-2582](CVE-2023/CVE-2023-25xx/CVE-2023-2582.json) (`2023-05-08T21:15:11.150`)
|
||||
* [CVE-2023-27928](CVE-2023/CVE-2023-279xx/CVE-2023-27928.json) (`2023-05-08T20:15:17.063`)
|
||||
* [CVE-2023-27929](CVE-2023/CVE-2023-279xx/CVE-2023-27929.json) (`2023-05-08T20:15:17.130`)
|
||||
* [CVE-2023-27931](CVE-2023/CVE-2023-279xx/CVE-2023-27931.json) (`2023-05-08T20:15:17.197`)
|
||||
* [CVE-2023-27932](CVE-2023/CVE-2023-279xx/CVE-2023-27932.json) (`2023-05-08T20:15:17.247`)
|
||||
* [CVE-2023-27933](CVE-2023/CVE-2023-279xx/CVE-2023-27933.json) (`2023-05-08T20:15:17.310`)
|
||||
* [CVE-2023-27934](CVE-2023/CVE-2023-279xx/CVE-2023-27934.json) (`2023-05-08T20:15:17.367`)
|
||||
* [CVE-2023-27935](CVE-2023/CVE-2023-279xx/CVE-2023-27935.json) (`2023-05-08T20:15:17.423`)
|
||||
* [CVE-2023-27936](CVE-2023/CVE-2023-279xx/CVE-2023-27936.json) (`2023-05-08T20:15:17.493`)
|
||||
* [CVE-2023-27937](CVE-2023/CVE-2023-279xx/CVE-2023-27937.json) (`2023-05-08T20:15:17.550`)
|
||||
* [CVE-2023-27938](CVE-2023/CVE-2023-279xx/CVE-2023-27938.json) (`2023-05-08T20:15:17.610`)
|
||||
* [CVE-2023-27941](CVE-2023/CVE-2023-279xx/CVE-2023-27941.json) (`2023-05-08T20:15:17.670`)
|
||||
* [CVE-2023-27942](CVE-2023/CVE-2023-279xx/CVE-2023-27942.json) (`2023-05-08T20:15:17.733`)
|
||||
* [CVE-2023-27943](CVE-2023/CVE-2023-279xx/CVE-2023-27943.json) (`2023-05-08T20:15:17.790`)
|
||||
* [CVE-2023-27944](CVE-2023/CVE-2023-279xx/CVE-2023-27944.json) (`2023-05-08T20:15:17.857`)
|
||||
* [CVE-2023-27945](CVE-2023/CVE-2023-279xx/CVE-2023-27945.json) (`2023-05-08T20:15:17.930`)
|
||||
* [CVE-2023-27946](CVE-2023/CVE-2023-279xx/CVE-2023-27946.json) (`2023-05-08T20:15:17.990`)
|
||||
* [CVE-2023-27949](CVE-2023/CVE-2023-279xx/CVE-2023-27949.json) (`2023-05-08T20:15:18.043`)
|
||||
* [CVE-2023-27951](CVE-2023/CVE-2023-279xx/CVE-2023-27951.json) (`2023-05-08T20:15:18.100`)
|
||||
* [CVE-2023-27952](CVE-2023/CVE-2023-279xx/CVE-2023-27952.json) (`2023-05-08T20:15:18.157`)
|
||||
* [CVE-2023-27953](CVE-2023/CVE-2023-279xx/CVE-2023-27953.json) (`2023-05-08T20:15:18.207`)
|
||||
* [CVE-2023-27954](CVE-2023/CVE-2023-279xx/CVE-2023-27954.json) (`2023-05-08T20:15:18.267`)
|
||||
* [CVE-2023-27955](CVE-2023/CVE-2023-279xx/CVE-2023-27955.json) (`2023-05-08T20:15:18.317`)
|
||||
* [CVE-2023-27956](CVE-2023/CVE-2023-279xx/CVE-2023-27956.json) (`2023-05-08T20:15:18.383`)
|
||||
* [CVE-2023-27957](CVE-2023/CVE-2023-279xx/CVE-2023-27957.json) (`2023-05-08T20:15:18.433`)
|
||||
* [CVE-2023-27958](CVE-2023/CVE-2023-279xx/CVE-2023-27958.json) (`2023-05-08T20:15:18.493`)
|
||||
* [CVE-2023-27959](CVE-2023/CVE-2023-279xx/CVE-2023-27959.json) (`2023-05-08T20:15:18.547`)
|
||||
* [CVE-2023-27960](CVE-2023/CVE-2023-279xx/CVE-2023-27960.json) (`2023-05-08T20:15:18.603`)
|
||||
* [CVE-2023-27961](CVE-2023/CVE-2023-279xx/CVE-2023-27961.json) (`2023-05-08T20:15:18.663`)
|
||||
* [CVE-2023-27962](CVE-2023/CVE-2023-279xx/CVE-2023-27962.json) (`2023-05-08T20:15:18.717`)
|
||||
* [CVE-2023-27963](CVE-2023/CVE-2023-279xx/CVE-2023-27963.json) (`2023-05-08T20:15:18.773`)
|
||||
* [CVE-2023-27965](CVE-2023/CVE-2023-279xx/CVE-2023-27965.json) (`2023-05-08T20:15:18.833`)
|
||||
* [CVE-2023-27966](CVE-2023/CVE-2023-279xx/CVE-2023-27966.json) (`2023-05-08T20:15:18.890`)
|
||||
* [CVE-2023-27967](CVE-2023/CVE-2023-279xx/CVE-2023-27967.json) (`2023-05-08T20:15:18.937`)
|
||||
* [CVE-2023-27968](CVE-2023/CVE-2023-279xx/CVE-2023-27968.json) (`2023-05-08T20:15:19.000`)
|
||||
* [CVE-2023-27969](CVE-2023/CVE-2023-279xx/CVE-2023-27969.json) (`2023-05-08T20:15:19.053`)
|
||||
* [CVE-2023-27970](CVE-2023/CVE-2023-279xx/CVE-2023-27970.json) (`2023-05-08T20:15:19.110`)
|
||||
* [CVE-2023-28178](CVE-2023/CVE-2023-281xx/CVE-2023-28178.json) (`2023-05-08T20:15:19.163`)
|
||||
* [CVE-2023-28180](CVE-2023/CVE-2023-281xx/CVE-2023-28180.json) (`2023-05-08T20:15:19.220`)
|
||||
* [CVE-2023-28181](CVE-2023/CVE-2023-281xx/CVE-2023-28181.json) (`2023-05-08T20:15:19.273`)
|
||||
* [CVE-2023-28182](CVE-2023/CVE-2023-281xx/CVE-2023-28182.json) (`2023-05-08T20:15:19.330`)
|
||||
* [CVE-2023-28189](CVE-2023/CVE-2023-281xx/CVE-2023-28189.json) (`2023-05-08T20:15:19.417`)
|
||||
* [CVE-2023-28190](CVE-2023/CVE-2023-281xx/CVE-2023-28190.json) (`2023-05-08T20:15:19.493`)
|
||||
* [CVE-2023-28192](CVE-2023/CVE-2023-281xx/CVE-2023-28192.json) (`2023-05-08T20:15:19.577`)
|
||||
* [CVE-2023-28194](CVE-2023/CVE-2023-281xx/CVE-2023-28194.json) (`2023-05-08T20:15:19.633`)
|
||||
* [CVE-2023-28200](CVE-2023/CVE-2023-282xx/CVE-2023-28200.json) (`2023-05-08T20:15:19.687`)
|
||||
* [CVE-2023-28201](CVE-2023/CVE-2023-282xx/CVE-2023-28201.json) (`2023-05-08T20:15:19.747`)
|
||||
* [CVE-2023-30334](CVE-2023/CVE-2023-303xx/CVE-2023-30334.json) (`2023-05-08T21:15:11.207`)
|
||||
* [CVE-2023-30787](CVE-2023/CVE-2023-307xx/CVE-2023-30787.json) (`2023-05-08T20:15:20.030`)
|
||||
* [CVE-2023-30788](CVE-2023/CVE-2023-307xx/CVE-2023-30788.json) (`2023-05-08T20:15:20.087`)
|
||||
* [CVE-2023-30789](CVE-2023/CVE-2023-307xx/CVE-2023-30789.json) (`2023-05-08T20:15:20.150`)
|
||||
* [CVE-2023-30790](CVE-2023/CVE-2023-307xx/CVE-2023-30790.json) (`2023-05-08T20:15:20.207`)
|
||||
* [CVE-2023-31123](CVE-2023/CVE-2023-311xx/CVE-2023-31123.json) (`2023-05-08T21:15:11.263`)
|
||||
* [CVE-2023-31125](CVE-2023/CVE-2023-311xx/CVE-2023-31125.json) (`2023-05-08T21:15:11.347`)
|
||||
* [CVE-2023-31127](CVE-2023/CVE-2023-311xx/CVE-2023-31127.json) (`2023-05-08T21:15:11.427`)
|
||||
* [CVE-2023-31129](CVE-2023/CVE-2023-311xx/CVE-2023-31129.json) (`2023-05-08T21:15:11.513`)
|
||||
* [CVE-2023-31133](CVE-2023/CVE-2023-311xx/CVE-2023-31133.json) (`2023-05-08T21:15:11.600`)
|
||||
* [CVE-2023-31140](CVE-2023/CVE-2023-311xx/CVE-2023-31140.json) (`2023-05-08T21:15:11.693`)
|
||||
* [CVE-2023-31141](CVE-2023/CVE-2023-311xx/CVE-2023-31141.json) (`2023-05-08T21:15:11.783`)
|
||||
* [CVE-2023-31178](CVE-2023/CVE-2023-311xx/CVE-2023-31178.json) (`2023-05-08T21:15:11.873`)
|
||||
* [CVE-2023-31179](CVE-2023/CVE-2023-311xx/CVE-2023-31179.json) (`2023-05-08T21:15:11.937`)
|
||||
* [CVE-2023-31180](CVE-2023/CVE-2023-311xx/CVE-2023-31180.json) (`2023-05-08T21:15:12.013`)
|
||||
* [CVE-2023-31181](CVE-2023/CVE-2023-311xx/CVE-2023-31181.json) (`2023-05-08T21:15:12.080`)
|
||||
* [CVE-2023-31182](CVE-2023/CVE-2023-311xx/CVE-2023-31182.json) (`2023-05-08T21:15:12.150`)
|
||||
* [CVE-2023-31183](CVE-2023/CVE-2023-311xx/CVE-2023-31183.json) (`2023-05-08T21:15:12.227`)
|
||||
* [CVE-2023-32233](CVE-2023/CVE-2023-322xx/CVE-2023-32233.json) (`2023-05-08T20:15:20.267`)
|
||||
* [CVE-2023-22710](CVE-2023/CVE-2023-227xx/CVE-2023-22710.json) (`2023-05-08T23:15:09.820`)
|
||||
* [CVE-2023-22813](CVE-2023/CVE-2023-228xx/CVE-2023-22813.json) (`2023-05-08T23:15:09.897`)
|
||||
* [CVE-2023-23894](CVE-2023/CVE-2023-238xx/CVE-2023-23894.json) (`2023-05-08T22:15:09.163`)
|
||||
* [CVE-2023-24376](CVE-2023/CVE-2023-243xx/CVE-2023-24376.json) (`2023-05-08T22:15:09.240`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `14`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
* [CVE-2022-46703](CVE-2022/CVE-2022-467xx/CVE-2022-46703.json) (`2023-05-08T20:15:15.497`)
|
||||
* [CVE-2022-46709](CVE-2022/CVE-2022-467xx/CVE-2022-46709.json) (`2023-05-08T20:15:15.663`)
|
||||
* [CVE-2023-22614](CVE-2023/CVE-2023-226xx/CVE-2023-22614.json) (`2023-05-08T20:15:48.637`)
|
||||
* [CVE-2023-2349](CVE-2023/CVE-2023-23xx/CVE-2023-2349.json) (`2023-05-08T20:21:45.167`)
|
||||
* [CVE-2023-2350](CVE-2023/CVE-2023-23xx/CVE-2023-2350.json) (`2023-05-08T20:21:55.863`)
|
||||
* [CVE-2023-26021](CVE-2023/CVE-2023-260xx/CVE-2023-26021.json) (`2023-05-08T20:38:54.350`)
|
||||
* [CVE-2023-26022](CVE-2023/CVE-2023-260xx/CVE-2023-26022.json) (`2023-05-08T20:41:20.463`)
|
||||
* [CVE-2023-26065](CVE-2023/CVE-2023-260xx/CVE-2023-26065.json) (`2023-05-08T20:11:03.627`)
|
||||
* [CVE-2023-26066](CVE-2023/CVE-2023-260xx/CVE-2023-26066.json) (`2023-05-08T20:11:54.087`)
|
||||
* [CVE-2023-26067](CVE-2023/CVE-2023-260xx/CVE-2023-26067.json) (`2023-05-08T20:13:53.287`)
|
||||
* [CVE-2023-26068](CVE-2023/CVE-2023-260xx/CVE-2023-26068.json) (`2023-05-08T20:13:40.727`)
|
||||
* [CVE-2023-28205](CVE-2023/CVE-2023-282xx/CVE-2023-28205.json) (`2023-05-08T20:15:19.807`)
|
||||
* [CVE-2023-28206](CVE-2023/CVE-2023-282xx/CVE-2023-28206.json) (`2023-05-08T20:15:19.900`)
|
||||
* [CVE-2023-29950](CVE-2023/CVE-2023-299xx/CVE-2023-29950.json) (`2023-05-08T20:22:58.703`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user