mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-08-14T02:00:28.192433+00:00
This commit is contained in:
parent
f0572c2986
commit
e387b88147
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-46895",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:10.030",
|
||||
"lastModified": "2023-08-13T13:15:10.030",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-23123",
|
||||
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
|
||||
"published": "2023-03-28T19:15:10.340",
|
||||
"lastModified": "2023-05-17T01:15:09.223",
|
||||
"lastModified": "2023-08-14T01:15:46.987",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -91,6 +91,10 @@
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00018.html",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00016.html",
|
||||
"source": "zdi-disclosures@trendmicro.com"
|
||||
},
|
||||
{
|
||||
"url": "https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html",
|
||||
"source": "zdi-disclosures@trendmicro.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22955",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-11T20:15:14.607",
|
||||
"lastModified": "2023-08-11T20:15:14.607",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22956",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-11T20:15:14.703",
|
||||
"lastModified": "2023-08-11T20:15:14.703",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22957",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-11T20:15:14.787",
|
||||
"lastModified": "2023-08-11T20:15:14.787",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23208",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-13T21:15:09.067",
|
||||
"lastModified": "2023-08-13T21:15:09.067",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3452",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-08-12T03:15:09.330",
|
||||
"lastModified": "2023-08-12T03:15:09.330",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39380",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T12:15:43.647",
|
||||
"lastModified": "2023-08-13T12:15:43.647",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39381",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T12:15:44.950",
|
||||
"lastModified": "2023-08-13T12:15:44.950",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39382",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T12:15:45.167",
|
||||
"lastModified": "2023-08-13T12:15:45.167",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39383",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T12:15:45.327",
|
||||
"lastModified": "2023-08-13T12:15:45.327",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39384",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T12:15:45.513",
|
||||
"lastModified": "2023-08-13T12:15:45.513",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39385",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:10.333",
|
||||
"lastModified": "2023-08-13T13:15:10.333",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39386",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:10.597",
|
||||
"lastModified": "2023-08-13T13:15:10.597",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39387",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:10.807",
|
||||
"lastModified": "2023-08-13T13:15:10.807",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39388",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T12:15:45.667",
|
||||
"lastModified": "2023-08-13T12:15:45.667",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39389",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T12:15:45.877",
|
||||
"lastModified": "2023-08-13T12:15:45.877",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39390",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:11.090",
|
||||
"lastModified": "2023-08-13T13:15:11.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39391",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:11.273",
|
||||
"lastModified": "2023-08-13T13:15:11.273",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39392",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T12:15:46.083",
|
||||
"lastModified": "2023-08-13T12:15:46.083",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39393",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T12:15:46.180",
|
||||
"lastModified": "2023-08-13T12:15:46.180",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39394",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:11.457",
|
||||
"lastModified": "2023-08-13T13:15:11.457",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39395",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:11.770",
|
||||
"lastModified": "2023-08-13T13:15:11.770",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39396",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T12:15:46.247",
|
||||
"lastModified": "2023-08-13T12:15:46.247",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39397",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:11.863",
|
||||
"lastModified": "2023-08-13T13:15:11.863",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39398",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:11.933",
|
||||
"lastModified": "2023-08-13T13:15:11.933",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39399",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:12.157",
|
||||
"lastModified": "2023-08-13T13:15:12.157",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39400",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:12.467",
|
||||
"lastModified": "2023-08-13T13:15:12.467",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39401",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:12.757",
|
||||
"lastModified": "2023-08-13T13:15:12.757",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39402",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:13.020",
|
||||
"lastModified": "2023-08-13T13:15:13.020",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39403",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:13.197",
|
||||
"lastModified": "2023-08-13T13:15:13.197",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39404",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:13.267",
|
||||
"lastModified": "2023-08-13T13:15:13.267",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39405",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T12:15:46.467",
|
||||
"lastModified": "2023-08-13T12:15:46.467",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39406",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-08-13T13:15:13.560",
|
||||
"lastModified": "2023-08-13T13:15:13.560",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:52.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
24
CVE-2023/CVE-2023-402xx/CVE-2023-40274.json
Normal file
24
CVE-2023/CVE-2023-402xx/CVE-2023-40274.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-40274",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-14T01:15:47.307",
|
||||
"lastModified": "2023-08-14T01:15:47.307",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in zola 0.13.0 through 0.17.2. The custom implementation of a web server, available via the \"zola serve\" command, allows directory traversal. The handle_request function, used by the server to process HTTP requests, does not account for sequences of special path control characters (../) in the URL when serving a file, which allows one to escape the webroot of the server and read arbitrary files from the filesystem."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/getzola/zola/issues/2257",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/getzola/zola/pull/2258",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4265",
|
||||
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
|
||||
"published": "2023-08-12T23:15:08.567",
|
||||
"lastModified": "2023-08-12T23:15:08.567",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4293",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-08-12T08:15:09.240",
|
||||
"lastModified": "2023-08-12T08:15:09.240",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-14T00:36:59.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
38
README.md
38
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-08-13T22:00:29.126548+00:00
|
||||
2023-08-14T02:00:28.192433+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-08-13T21:15:09.067000+00:00
|
||||
2023-08-14T01:15:47.307000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -23,27 +23,51 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
|
||||
|
||||
```plain
|
||||
2023-08-13T00:00:13.581200+00:00
|
||||
2023-08-14T00:00:13.604970+00:00
|
||||
```
|
||||
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
222535
|
||||
222536
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
|
||||
* [CVE-2023-23208](CVE-2023/CVE-2023-232xx/CVE-2023-23208.json) (`2023-08-13T21:15:09.067`)
|
||||
* [CVE-2023-40274](CVE-2023/CVE-2023-402xx/CVE-2023-40274.json) (`2023-08-14T01:15:47.307`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `36`
|
||||
|
||||
* [CVE-2020-13654](CVE-2020/CVE-2020-136xx/CVE-2020-13654.json) (`2023-08-13T21:15:08.360`)
|
||||
* [CVE-2023-39397](CVE-2023/CVE-2023-393xx/CVE-2023-39397.json) (`2023-08-14T00:36:52.173`)
|
||||
* [CVE-2023-39398](CVE-2023/CVE-2023-393xx/CVE-2023-39398.json) (`2023-08-14T00:36:52.173`)
|
||||
* [CVE-2023-39399](CVE-2023/CVE-2023-393xx/CVE-2023-39399.json) (`2023-08-14T00:36:52.173`)
|
||||
* [CVE-2023-39400](CVE-2023/CVE-2023-394xx/CVE-2023-39400.json) (`2023-08-14T00:36:52.173`)
|
||||
* [CVE-2023-39401](CVE-2023/CVE-2023-394xx/CVE-2023-39401.json) (`2023-08-14T00:36:52.173`)
|
||||
* [CVE-2023-39402](CVE-2023/CVE-2023-394xx/CVE-2023-39402.json) (`2023-08-14T00:36:52.173`)
|
||||
* [CVE-2023-39403](CVE-2023/CVE-2023-394xx/CVE-2023-39403.json) (`2023-08-14T00:36:52.173`)
|
||||
* [CVE-2023-39404](CVE-2023/CVE-2023-394xx/CVE-2023-39404.json) (`2023-08-14T00:36:52.173`)
|
||||
* [CVE-2023-39406](CVE-2023/CVE-2023-394xx/CVE-2023-39406.json) (`2023-08-14T00:36:52.173`)
|
||||
* [CVE-2023-23208](CVE-2023/CVE-2023-232xx/CVE-2023-23208.json) (`2023-08-14T00:36:52.173`)
|
||||
* [CVE-2023-22955](CVE-2023/CVE-2023-229xx/CVE-2023-22955.json) (`2023-08-14T00:36:59.677`)
|
||||
* [CVE-2023-22956](CVE-2023/CVE-2023-229xx/CVE-2023-22956.json) (`2023-08-14T00:36:59.677`)
|
||||
* [CVE-2023-22957](CVE-2023/CVE-2023-229xx/CVE-2023-22957.json) (`2023-08-14T00:36:59.677`)
|
||||
* [CVE-2023-3452](CVE-2023/CVE-2023-34xx/CVE-2023-3452.json) (`2023-08-14T00:36:59.677`)
|
||||
* [CVE-2023-4293](CVE-2023/CVE-2023-42xx/CVE-2023-4293.json) (`2023-08-14T00:36:59.677`)
|
||||
* [CVE-2023-4265](CVE-2023/CVE-2023-42xx/CVE-2023-4265.json) (`2023-08-14T00:36:59.677`)
|
||||
* [CVE-2023-39380](CVE-2023/CVE-2023-393xx/CVE-2023-39380.json) (`2023-08-14T00:36:59.677`)
|
||||
* [CVE-2023-39381](CVE-2023/CVE-2023-393xx/CVE-2023-39381.json) (`2023-08-14T00:36:59.677`)
|
||||
* [CVE-2023-39382](CVE-2023/CVE-2023-393xx/CVE-2023-39382.json) (`2023-08-14T00:36:59.677`)
|
||||
* [CVE-2023-39383](CVE-2023/CVE-2023-393xx/CVE-2023-39383.json) (`2023-08-14T00:36:59.677`)
|
||||
* [CVE-2023-39384](CVE-2023/CVE-2023-393xx/CVE-2023-39384.json) (`2023-08-14T00:36:59.677`)
|
||||
* [CVE-2023-39388](CVE-2023/CVE-2023-393xx/CVE-2023-39388.json) (`2023-08-14T00:36:59.677`)
|
||||
* [CVE-2023-39389](CVE-2023/CVE-2023-393xx/CVE-2023-39389.json) (`2023-08-14T00:36:59.677`)
|
||||
* [CVE-2023-39392](CVE-2023/CVE-2023-393xx/CVE-2023-39392.json) (`2023-08-14T00:36:59.677`)
|
||||
* [CVE-2023-39393](CVE-2023/CVE-2023-393xx/CVE-2023-39393.json) (`2023-08-14T00:36:59.677`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user