mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-11-10T00:55:14.638776+00:00
This commit is contained in:
parent
2adcc67bad
commit
e1875c727c
55
CVE-2018/CVE-2018-88xx/CVE-2018-8863.json
Normal file
55
CVE-2018/CVE-2018-88xx/CVE-2018-8863.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2018-8863",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-11-09T23:15:08.740",
|
||||
"lastModified": "2023-11-09T23:15:08.740",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The HTTP header in Philips EncoreAnywhere contains data an attacker may be able to use to gain sensitive information.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsma-18-137-02",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-310xx/CVE-2023-31086.json
Normal file
32
CVE-2023/CVE-2023-310xx/CVE-2023-31086.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-31086",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-09T23:15:09.000",
|
||||
"lastModified": "2023-11-09T23:15:09.000",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Igor Benic Simple Giveaways \u2013 Grow your business, email lists and traffic with contests plugin <=\u00a02.46.0 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/giveasap/wordpress-simple-giveaways-plugin-2-45-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-310xx/CVE-2023-31088.json
Normal file
32
CVE-2023/CVE-2023-310xx/CVE-2023-31088.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-31088",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-09T23:15:09.067",
|
||||
"lastModified": "2023-11-09T23:15:09.067",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Faraz Quazi Floating Action Button plugin <=\u00a01.2.1 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/floating-action-button/wordpress-floating-action-button-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-310xx/CVE-2023-31093.json
Normal file
32
CVE-2023/CVE-2023-310xx/CVE-2023-31093.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-31093",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-09T23:15:09.167",
|
||||
"lastModified": "2023-11-09T23:15:09.167",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Chronosly Chronosly Events Calendar plugin <=\u00a02.6.2 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/chronosly-events-calendar/wordpress-chronosly-events-calendar-plugin-2-6-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-312xx/CVE-2023-31235.json
Normal file
32
CVE-2023/CVE-2023-312xx/CVE-2023-31235.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-31235",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-09T23:15:09.267",
|
||||
"lastModified": "2023-11-09T23:15:09.267",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Roland Barker, xnau webdesign Participants Database plugin <=\u00a02.4.9 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/participants-database/wordpress-participants-database-plugin-2-4-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-320xx/CVE-2023-32092.json
Normal file
32
CVE-2023/CVE-2023-320xx/CVE-2023-32092.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-32092",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-09T23:15:09.357",
|
||||
"lastModified": "2023-11-09T23:15:09.357",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in PeepSo Community by PeepSo \u2013 Social Network, Membership, Registration, User Profiles plugin <=\u00a06.0.9.0 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/peepso-core/wordpress-community-by-peepso-social-network-membership-registration-user-profiles-plugin-6-0-9-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-320xx/CVE-2023-32093.json
Normal file
32
CVE-2023/CVE-2023-320xx/CVE-2023-32093.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-32093",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-09T23:15:09.447",
|
||||
"lastModified": "2023-11-09T23:15:09.447",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Criss Swaim TPG Redirect plugin <=\u00a01.0.7 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/tpg-redirect/wordpress-tpg-redirect-plugin-1-0-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-321xx/CVE-2023-32125.json
Normal file
32
CVE-2023/CVE-2023-321xx/CVE-2023-32125.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-32125",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-09T23:15:09.540",
|
||||
"lastModified": "2023-11-09T23:15:09.540",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Daniel Powney Multi Rating plugin <=\u00a05.0.6 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/multi-rating/wordpress-multi-rating-plugin-5-0-6-cross-site-request-forgery-csrf?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-325xx/CVE-2023-32500.json
Normal file
32
CVE-2023/CVE-2023-325xx/CVE-2023-32500.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-32500",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-09T23:15:09.633",
|
||||
"lastModified": "2023-11-09T23:15:09.633",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in xtemos WoodMart - Multipurpose WooCommerce Theme <=\u00a07.1.1 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/woodmart/wordpress-woodmart-theme-7-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-325xx/CVE-2023-32501.json
Normal file
32
CVE-2023/CVE-2023-325xx/CVE-2023-32501.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-32501",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-09T23:15:09.733",
|
||||
"lastModified": "2023-11-09T23:15:09.733",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in E4J s.R.L. VikBooking Hotel Booking Engine & PMS plugin <=\u00a01.6.1 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/vikbooking/wordpress-vikbooking-hotel-booking-engine-pms-plugin-1-6-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-325xx/CVE-2023-32502.json
Normal file
32
CVE-2023/CVE-2023-325xx/CVE-2023-32502.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-32502",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-09T23:15:09.823",
|
||||
"lastModified": "2023-11-09T23:15:09.823",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Sybre Waaijer Pro Mime Types \u2013 Manage file media types plugin <=\u00a01.0.7 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/pro-mime-types/wordpress-pro-mime-types-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-360xx/CVE-2023-36014.json
Normal file
43
CVE-2023/CVE-2023-360xx/CVE-2023-36014.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-36014",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-11-10T00:15:08.640",
|
||||
"lastModified": "2023-11-10T00:15:08.640",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36014",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-360xx/CVE-2023-36024.json
Normal file
43
CVE-2023/CVE-2023-360xx/CVE-2023-36024.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-36024",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-11-10T00:15:08.840",
|
||||
"lastModified": "2023-11-10T00:15:08.840",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36024",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-36034",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-11-03T01:15:08.047",
|
||||
"lastModified": "2023-11-03T13:22:51.977",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-11-10T00:15:09.017",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -21,20 +21,20 @@
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.6,
|
||||
"baseSeverity": "MEDIUM"
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.7
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
|
62
README.md
62
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-11-09T23:00:18.752024+00:00
|
||||
2023-11-10T00:55:14.638776+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-11-09T22:18:24.930000+00:00
|
||||
2023-11-10T00:15:09.017000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,57 +29,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
230293
|
||||
230306
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `17`
|
||||
Recently added CVEs: `13`
|
||||
|
||||
* [CVE-2023-32594](CVE-2023/CVE-2023-325xx/CVE-2023-32594.json) (`2023-11-09T21:15:24.090`)
|
||||
* [CVE-2023-32602](CVE-2023/CVE-2023-326xx/CVE-2023-32602.json) (`2023-11-09T21:15:24.180`)
|
||||
* [CVE-2023-32739](CVE-2023/CVE-2023-327xx/CVE-2023-32739.json) (`2023-11-09T21:15:24.270`)
|
||||
* [CVE-2023-32744](CVE-2023/CVE-2023-327xx/CVE-2023-32744.json) (`2023-11-09T21:15:24.370`)
|
||||
* [CVE-2023-32745](CVE-2023/CVE-2023-327xx/CVE-2023-32745.json) (`2023-11-09T21:15:24.463`)
|
||||
* [CVE-2023-32794](CVE-2023/CVE-2023-327xx/CVE-2023-32794.json) (`2023-11-09T21:15:24.553`)
|
||||
* [CVE-2023-34024](CVE-2023/CVE-2023-340xx/CVE-2023-34024.json) (`2023-11-09T21:15:24.647`)
|
||||
* [CVE-2023-34025](CVE-2023/CVE-2023-340xx/CVE-2023-34025.json) (`2023-11-09T21:15:24.740`)
|
||||
* [CVE-2023-34031](CVE-2023/CVE-2023-340xx/CVE-2023-34031.json) (`2023-11-09T21:15:24.827`)
|
||||
* [CVE-2023-4379](CVE-2023/CVE-2023-43xx/CVE-2023-4379.json) (`2023-11-09T21:15:24.930`)
|
||||
* [CVE-2023-5954](CVE-2023/CVE-2023-59xx/CVE-2023-5954.json) (`2023-11-09T21:15:25.143`)
|
||||
* [CVE-2023-29975](CVE-2023/CVE-2023-299xx/CVE-2023-29975.json) (`2023-11-09T22:15:10.583`)
|
||||
* [CVE-2023-32512](CVE-2023/CVE-2023-325xx/CVE-2023-32512.json) (`2023-11-09T22:15:10.633`)
|
||||
* [CVE-2023-32579](CVE-2023/CVE-2023-325xx/CVE-2023-32579.json) (`2023-11-09T22:15:10.730`)
|
||||
* [CVE-2023-32587](CVE-2023/CVE-2023-325xx/CVE-2023-32587.json) (`2023-11-09T22:15:10.817`)
|
||||
* [CVE-2023-32592](CVE-2023/CVE-2023-325xx/CVE-2023-32592.json) (`2023-11-09T22:15:10.900`)
|
||||
* [CVE-2023-5543](CVE-2023/CVE-2023-55xx/CVE-2023-5543.json) (`2023-11-09T22:15:11.000`)
|
||||
* [CVE-2018-8863](CVE-2018/CVE-2018-88xx/CVE-2018-8863.json) (`2023-11-09T23:15:08.740`)
|
||||
* [CVE-2023-31086](CVE-2023/CVE-2023-310xx/CVE-2023-31086.json) (`2023-11-09T23:15:09.000`)
|
||||
* [CVE-2023-31088](CVE-2023/CVE-2023-310xx/CVE-2023-31088.json) (`2023-11-09T23:15:09.067`)
|
||||
* [CVE-2023-31093](CVE-2023/CVE-2023-310xx/CVE-2023-31093.json) (`2023-11-09T23:15:09.167`)
|
||||
* [CVE-2023-31235](CVE-2023/CVE-2023-312xx/CVE-2023-31235.json) (`2023-11-09T23:15:09.267`)
|
||||
* [CVE-2023-32092](CVE-2023/CVE-2023-320xx/CVE-2023-32092.json) (`2023-11-09T23:15:09.357`)
|
||||
* [CVE-2023-32093](CVE-2023/CVE-2023-320xx/CVE-2023-32093.json) (`2023-11-09T23:15:09.447`)
|
||||
* [CVE-2023-32125](CVE-2023/CVE-2023-321xx/CVE-2023-32125.json) (`2023-11-09T23:15:09.540`)
|
||||
* [CVE-2023-32500](CVE-2023/CVE-2023-325xx/CVE-2023-32500.json) (`2023-11-09T23:15:09.633`)
|
||||
* [CVE-2023-32501](CVE-2023/CVE-2023-325xx/CVE-2023-32501.json) (`2023-11-09T23:15:09.733`)
|
||||
* [CVE-2023-32502](CVE-2023/CVE-2023-325xx/CVE-2023-32502.json) (`2023-11-09T23:15:09.823`)
|
||||
* [CVE-2023-36014](CVE-2023/CVE-2023-360xx/CVE-2023-36014.json) (`2023-11-10T00:15:08.640`)
|
||||
* [CVE-2023-36024](CVE-2023/CVE-2023-360xx/CVE-2023-36024.json) (`2023-11-10T00:15:08.840`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `21`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
* [CVE-2020-28407](CVE-2020/CVE-2020-284xx/CVE-2020-28407.json) (`2023-11-09T21:42:24.177`)
|
||||
* [CVE-2022-41076](CVE-2022/CVE-2022-410xx/CVE-2022-41076.json) (`2023-11-09T22:15:09.223`)
|
||||
* [CVE-2022-41089](CVE-2022/CVE-2022-410xx/CVE-2022-41089.json) (`2023-11-09T22:15:09.370`)
|
||||
* [CVE-2022-41115](CVE-2022/CVE-2022-411xx/CVE-2022-41115.json) (`2023-11-09T22:15:09.610`)
|
||||
* [CVE-2022-41121](CVE-2022/CVE-2022-411xx/CVE-2022-41121.json) (`2023-11-09T22:15:09.700`)
|
||||
* [CVE-2022-44689](CVE-2022/CVE-2022-446xx/CVE-2022-44689.json) (`2023-11-09T22:15:10.077`)
|
||||
* [CVE-2022-44702](CVE-2022/CVE-2022-447xx/CVE-2022-44702.json) (`2023-11-09T22:15:10.273`)
|
||||
* [CVE-2022-44704](CVE-2022/CVE-2022-447xx/CVE-2022-44704.json) (`2023-11-09T22:15:10.347`)
|
||||
* [CVE-2022-44708](CVE-2022/CVE-2022-447xx/CVE-2022-44708.json) (`2023-11-09T22:15:10.447`)
|
||||
* [CVE-2023-5924](CVE-2023/CVE-2023-59xx/CVE-2023-5924.json) (`2023-11-09T21:07:52.570`)
|
||||
* [CVE-2023-1720](CVE-2023/CVE-2023-17xx/CVE-2023-1720.json) (`2023-11-09T21:12:21.233`)
|
||||
* [CVE-2023-5923](CVE-2023/CVE-2023-59xx/CVE-2023-5923.json) (`2023-11-09T21:14:25.430`)
|
||||
* [CVE-2023-46725](CVE-2023/CVE-2023-467xx/CVE-2023-46725.json) (`2023-11-09T21:16:04.827`)
|
||||
* [CVE-2023-31579](CVE-2023/CVE-2023-315xx/CVE-2023-31579.json) (`2023-11-09T21:17:52.387`)
|
||||
* [CVE-2023-46954](CVE-2023/CVE-2023-469xx/CVE-2023-46954.json) (`2023-11-09T21:38:55.393`)
|
||||
* [CVE-2023-36621](CVE-2023/CVE-2023-366xx/CVE-2023-36621.json) (`2023-11-09T21:55:49.257`)
|
||||
* [CVE-2023-41343](CVE-2023/CVE-2023-413xx/CVE-2023-41343.json) (`2023-11-09T21:59:36.353`)
|
||||
* [CVE-2023-44271](CVE-2023/CVE-2023-442xx/CVE-2023-44271.json) (`2023-11-09T22:01:30.133`)
|
||||
* [CVE-2023-43982](CVE-2023/CVE-2023-439xx/CVE-2023-43982.json) (`2023-11-09T22:07:27.420`)
|
||||
* [CVE-2023-41914](CVE-2023/CVE-2023-419xx/CVE-2023-41914.json) (`2023-11-09T22:11:29.870`)
|
||||
* [CVE-2023-45360](CVE-2023/CVE-2023-453xx/CVE-2023-45360.json) (`2023-11-09T22:18:24.930`)
|
||||
* [CVE-2023-36034](CVE-2023/CVE-2023-360xx/CVE-2023-36034.json) (`2023-11-10T00:15:09.017`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user