mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2023-09-06T18:00:25.238708+00:00
This commit is contained in:
parent
dd14720aca
commit
ea5508786b
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-36130",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-12-02T22:15:08.650",
|
||||
"lastModified": "2023-09-06T01:15:12.423",
|
||||
"lastModified": "2023-09-06T16:15:07.610",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -104,6 +104,10 @@
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5490",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-36131",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-12-02T22:15:08.693",
|
||||
"lastModified": "2023-09-06T01:15:12.877",
|
||||
"lastModified": "2023-09-06T16:15:07.743",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -104,6 +104,10 @@
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5490",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-36133",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-12-02T22:15:08.733",
|
||||
"lastModified": "2023-09-06T01:15:12.950",
|
||||
"lastModified": "2023-09-06T16:15:07.817",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -104,6 +104,10 @@
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5490",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-36135",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-12-02T22:15:08.833",
|
||||
"lastModified": "2023-09-06T01:15:13.023",
|
||||
"lastModified": "2023-09-06T16:15:07.887",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -104,6 +104,10 @@
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5490",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-30473",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-05-06T15:15:07.943",
|
||||
"lastModified": "2023-09-06T01:15:13.093",
|
||||
"lastModified": "2023-09-06T16:15:07.967",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -136,6 +136,10 @@
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5490",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-30474",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-06-02T17:15:08.630",
|
||||
"lastModified": "2023-09-06T01:15:13.203",
|
||||
"lastModified": "2023-09-06T16:15:08.053",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -113,6 +113,10 @@
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00003.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5490",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-30475",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-06-04T14:15:07.540",
|
||||
"lastModified": "2023-09-06T01:15:13.293",
|
||||
"lastModified": "2023-09-06T16:15:08.130",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -136,6 +136,10 @@
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5490",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2021/CVE-2021-366xx/CVE-2021-36646.json
Normal file
20
CVE-2021/CVE-2021-366xx/CVE-2021-36646.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2021-36646",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-09-06T17:15:49.873",
|
||||
"lastModified": "2023-09-06T17:15:49.873",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross Site Scrtpting (XSS) vulnerability in KodExplorer 4.45 allows remote attackers to run arbitrary code via /index.php page."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kalcaddle/KodExplorer/issues/482",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34038",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:23.000",
|
||||
"lastModified": "2023-08-30T15:18:57.997",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-06T16:15:08.227",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go"
|
||||
"value": "** DISPUTED ** Etcd v3.5.4 allows remote attackers to cause a denial of service via function PageWriter.write in pagewriter.go. NOTE: the vendor's position is that this is not a vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -77,6 +77,18 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/golang/vulndb/issues/2016#issuecomment-1698677762",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://go-review.googlesource.com/c/vulndb/+/524456",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://go-review.googlesource.com/c/vulndb/+/524456/2/data/excluded/GO-2023-2016.yaml",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47022",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-22T19:16:30.547",
|
||||
"lastModified": "2023-08-28T18:39:41.703",
|
||||
"lastModified": "2023-09-06T17:17:25.753",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,20 +17,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0667",
|
||||
"sourceIdentifier": "cve@takeonme.org",
|
||||
"published": "2023-06-07T03:15:09.117",
|
||||
"lastModified": "2023-06-13T18:51:26.077",
|
||||
"lastModified": "2023-09-06T17:18:57.333",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -21,20 +21,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
43
CVE-2023/CVE-2023-202xx/CVE-2023-20250.json
Normal file
43
CVE-2023/CVE-2023-202xx/CVE-2023-20250.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-20250",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2023-09-06T17:15:50.100",
|
||||
"lastModified": "2023-09-06T17:15:50.100",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device.\r\n\r This vulnerability is due to improper validation of requests that are sent to the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface. A successful exploit could allow the attacker to execute arbitrary code with root privileges on an affected device. To exploit this vulnerability, the attacker must have valid Administrator credentials on the affected device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ykramarz@cisco.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv-stack-SHYv2f5N",
|
||||
"source": "ykramarz@cisco.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-34188",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-23T20:15:09.053",
|
||||
"lastModified": "2023-07-17T18:15:09.837",
|
||||
"lastModified": "2023-09-06T17:15:50.190",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The HTTP server in Mongoose before 7.10 accepts requests containing negative Content-Length headers."
|
||||
"value": "The HTTP server in Mongoose before 7.10 accepts requests containing negative Content-Length headers. By sending a single attack payload over TCP, an attacker can cause an infinite loop in which the server continuously reparses that payload, and does not respond to any other requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-39615",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-29T17:15:12.527",
|
||||
"lastModified": "2023-08-31T20:15:34.983",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-09-06T17:15:50.447",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Xmlsoft Libxml2 v2.11.0 was discovered to contain a global buffer overflow via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file."
|
||||
"value": "** DISPUTED ** Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor's position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
32
CVE-2023/CVE-2023-44xx/CVE-2023-4498.json
Normal file
32
CVE-2023/CVE-2023-44xx/CVE-2023-4498.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-4498",
|
||||
"sourceIdentifier": "cret@cert.org",
|
||||
"published": "2023-09-06T17:15:50.687",
|
||||
"lastModified": "2023-09-06T17:15:50.687",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda N300 Wireless N VDSL2 Modem Router allows unauthenticated access to pages that in turn should be accessible to authenticated users only"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cret@cert.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-305"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://kb.cert.org/vuls/id/304455",
|
||||
"source": "cret@cert.org"
|
||||
}
|
||||
]
|
||||
}
|
70
README.md
70
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-09-06T16:00:25.169876+00:00
|
||||
2023-09-06T18:00:25.238708+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-09-06T15:52:55.787000+00:00
|
||||
2023-09-06T17:18:57.333000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,64 +29,34 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
224387
|
||||
224390
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `20`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
* [CVE-2021-21088](CVE-2021/CVE-2021-210xx/CVE-2021-21088.json) (`2023-09-06T14:15:08.053`)
|
||||
* [CVE-2021-28644](CVE-2021/CVE-2021-286xx/CVE-2021-28644.json) (`2023-09-06T14:15:08.390`)
|
||||
* [CVE-2021-35980](CVE-2021/CVE-2021-359xx/CVE-2021-35980.json) (`2023-09-06T14:15:08.593`)
|
||||
* [CVE-2021-36021](CVE-2021/CVE-2021-360xx/CVE-2021-36021.json) (`2023-09-06T14:15:08.767`)
|
||||
* [CVE-2021-36023](CVE-2021/CVE-2021-360xx/CVE-2021-36023.json) (`2023-09-06T14:15:08.950`)
|
||||
* [CVE-2021-36036](CVE-2021/CVE-2021-360xx/CVE-2021-36036.json) (`2023-09-06T14:15:09.110`)
|
||||
* [CVE-2021-36060](CVE-2021/CVE-2021-360xx/CVE-2021-36060.json) (`2023-09-06T14:15:09.283`)
|
||||
* [CVE-2021-39859](CVE-2021/CVE-2021-398xx/CVE-2021-39859.json) (`2023-09-06T14:15:09.477`)
|
||||
* [CVE-2023-32672](CVE-2023/CVE-2023-326xx/CVE-2023-32672.json) (`2023-09-06T14:15:10.297`)
|
||||
* [CVE-2023-37941](CVE-2023/CVE-2023-379xx/CVE-2023-37941.json) (`2023-09-06T14:15:10.483`)
|
||||
* [CVE-2023-39265](CVE-2023/CVE-2023-392xx/CVE-2023-39265.json) (`2023-09-06T14:15:10.687`)
|
||||
* [CVE-2023-3777](CVE-2023/CVE-2023-37xx/CVE-2023-3777.json) (`2023-09-06T14:15:10.860`)
|
||||
* [CVE-2023-4015](CVE-2023/CVE-2023-40xx/CVE-2023-4015.json) (`2023-09-06T14:15:11.093`)
|
||||
* [CVE-2023-4206](CVE-2023/CVE-2023-42xx/CVE-2023-4206.json) (`2023-09-06T14:15:11.280`)
|
||||
* [CVE-2023-4207](CVE-2023/CVE-2023-42xx/CVE-2023-4207.json) (`2023-09-06T14:15:11.453`)
|
||||
* [CVE-2023-4208](CVE-2023/CVE-2023-42xx/CVE-2023-4208.json) (`2023-09-06T14:15:11.627`)
|
||||
* [CVE-2023-4244](CVE-2023/CVE-2023-42xx/CVE-2023-4244.json) (`2023-09-06T14:15:11.877`)
|
||||
* [CVE-2023-4621](CVE-2023/CVE-2023-46xx/CVE-2023-4621.json) (`2023-09-06T14:15:12.033`)
|
||||
* [CVE-2023-4622](CVE-2023/CVE-2023-46xx/CVE-2023-4622.json) (`2023-09-06T14:15:12.193`)
|
||||
* [CVE-2023-4623](CVE-2023/CVE-2023-46xx/CVE-2023-4623.json) (`2023-09-06T14:15:12.357`)
|
||||
* [CVE-2021-36646](CVE-2021/CVE-2021-366xx/CVE-2021-36646.json) (`2023-09-06T17:15:49.873`)
|
||||
* [CVE-2023-20250](CVE-2023/CVE-2023-202xx/CVE-2023-20250.json) (`2023-09-06T17:15:50.100`)
|
||||
* [CVE-2023-4498](CVE-2023/CVE-2023-44xx/CVE-2023-4498.json) (`2023-09-06T17:15:50.687`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `28`
|
||||
Recently modified CVEs: `12`
|
||||
|
||||
* [CVE-2022-45451](CVE-2022/CVE-2022-454xx/CVE-2022-45451.json) (`2023-09-06T15:52:55.787`)
|
||||
* [CVE-2023-36811](CVE-2023/CVE-2023-368xx/CVE-2023-36811.json) (`2023-09-06T14:23:51.630`)
|
||||
* [CVE-2023-41738](CVE-2023/CVE-2023-417xx/CVE-2023-41738.json) (`2023-09-06T14:34:02.057`)
|
||||
* [CVE-2023-40182](CVE-2023/CVE-2023-401xx/CVE-2023-40182.json) (`2023-09-06T14:56:27.160`)
|
||||
* [CVE-2023-41739](CVE-2023/CVE-2023-417xx/CVE-2023-41739.json) (`2023-09-06T14:59:20.667`)
|
||||
* [CVE-2023-1114](CVE-2023/CVE-2023-11xx/CVE-2023-1114.json) (`2023-09-06T15:15:16.077`)
|
||||
* [CVE-2023-1863](CVE-2023/CVE-2023-18xx/CVE-2023-1863.json) (`2023-09-06T15:15:16.230`)
|
||||
* [CVE-2023-41930](CVE-2023/CVE-2023-419xx/CVE-2023-41930.json) (`2023-09-06T15:15:16.380`)
|
||||
* [CVE-2023-41931](CVE-2023/CVE-2023-419xx/CVE-2023-41931.json) (`2023-09-06T15:15:16.447`)
|
||||
* [CVE-2023-41932](CVE-2023/CVE-2023-419xx/CVE-2023-41932.json) (`2023-09-06T15:15:16.507`)
|
||||
* [CVE-2023-41933](CVE-2023/CVE-2023-419xx/CVE-2023-41933.json) (`2023-09-06T15:15:16.583`)
|
||||
* [CVE-2023-41934](CVE-2023/CVE-2023-419xx/CVE-2023-41934.json) (`2023-09-06T15:15:16.770`)
|
||||
* [CVE-2023-41935](CVE-2023/CVE-2023-419xx/CVE-2023-41935.json) (`2023-09-06T15:15:17.883`)
|
||||
* [CVE-2023-41936](CVE-2023/CVE-2023-419xx/CVE-2023-41936.json) (`2023-09-06T15:15:18.673`)
|
||||
* [CVE-2023-41937](CVE-2023/CVE-2023-419xx/CVE-2023-41937.json) (`2023-09-06T15:15:19.627`)
|
||||
* [CVE-2023-41938](CVE-2023/CVE-2023-419xx/CVE-2023-41938.json) (`2023-09-06T15:15:21.187`)
|
||||
* [CVE-2023-41939](CVE-2023/CVE-2023-419xx/CVE-2023-41939.json) (`2023-09-06T15:15:21.257`)
|
||||
* [CVE-2023-41940](CVE-2023/CVE-2023-419xx/CVE-2023-41940.json) (`2023-09-06T15:15:21.327`)
|
||||
* [CVE-2023-41941](CVE-2023/CVE-2023-419xx/CVE-2023-41941.json) (`2023-09-06T15:15:21.383`)
|
||||
* [CVE-2023-41942](CVE-2023/CVE-2023-419xx/CVE-2023-41942.json) (`2023-09-06T15:15:21.443`)
|
||||
* [CVE-2023-41943](CVE-2023/CVE-2023-419xx/CVE-2023-41943.json) (`2023-09-06T15:15:21.503`)
|
||||
* [CVE-2023-41944](CVE-2023/CVE-2023-419xx/CVE-2023-41944.json) (`2023-09-06T15:15:21.570`)
|
||||
* [CVE-2023-41945](CVE-2023/CVE-2023-419xx/CVE-2023-41945.json) (`2023-09-06T15:15:21.640`)
|
||||
* [CVE-2023-41946](CVE-2023/CVE-2023-419xx/CVE-2023-41946.json) (`2023-09-06T15:15:21.697`)
|
||||
* [CVE-2023-41947](CVE-2023/CVE-2023-419xx/CVE-2023-41947.json) (`2023-09-06T15:15:21.753`)
|
||||
* [CVE-2020-36130](CVE-2020/CVE-2020-361xx/CVE-2020-36130.json) (`2023-09-06T16:15:07.610`)
|
||||
* [CVE-2020-36131](CVE-2020/CVE-2020-361xx/CVE-2020-36131.json) (`2023-09-06T16:15:07.743`)
|
||||
* [CVE-2020-36133](CVE-2020/CVE-2020-361xx/CVE-2020-36133.json) (`2023-09-06T16:15:07.817`)
|
||||
* [CVE-2020-36135](CVE-2020/CVE-2020-361xx/CVE-2020-36135.json) (`2023-09-06T16:15:07.887`)
|
||||
* [CVE-2021-30473](CVE-2021/CVE-2021-304xx/CVE-2021-30473.json) (`2023-09-06T16:15:07.967`)
|
||||
* [CVE-2021-30474](CVE-2021/CVE-2021-304xx/CVE-2021-30474.json) (`2023-09-06T16:15:08.053`)
|
||||
* [CVE-2021-30475](CVE-2021/CVE-2021-304xx/CVE-2021-30475.json) (`2023-09-06T16:15:08.130`)
|
||||
* [CVE-2022-34038](CVE-2022/CVE-2022-340xx/CVE-2022-34038.json) (`2023-09-06T16:15:08.227`)
|
||||
* [CVE-2022-47022](CVE-2022/CVE-2022-470xx/CVE-2022-47022.json) (`2023-09-06T17:17:25.753`)
|
||||
* [CVE-2023-34188](CVE-2023/CVE-2023-341xx/CVE-2023-34188.json) (`2023-09-06T17:15:50.190`)
|
||||
* [CVE-2023-39615](CVE-2023/CVE-2023-396xx/CVE-2023-39615.json) (`2023-09-06T17:15:50.447`)
|
||||
* [CVE-2023-0667](CVE-2023/CVE-2023-06xx/CVE-2023-0667.json) (`2023-09-06T17:18:57.333`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user