mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2023-08-18T18:00:34.800973+00:00
This commit is contained in:
parent
78f5e2a53f
commit
fbb6cc9f2e
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0871",
|
||||
"sourceIdentifier": "security@opennms.com",
|
||||
"published": "2023-08-11T17:15:08.980",
|
||||
"lastModified": "2023-08-17T17:15:09.623",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-18T16:21:52.737",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@opennms.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@opennms.com",
|
||||
"type": "Secondary",
|
||||
@ -46,14 +76,82 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opennms:horizon:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "32.0.0",
|
||||
"versionEndExcluding": "32.0.2",
|
||||
"matchCriteriaId": "5E348236-BC02-4334-8F84-AC9F91C3D0AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opennms:horizon:31.0.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB86992A-06FF-4B7D-BFD3-FC04DFC96FBC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2020.0.0",
|
||||
"versionEndExcluding": "2020.1.38",
|
||||
"matchCriteriaId": "E6B9CB53-0A8C-4DB4-85E8-E0F81D6168AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2021.0.0",
|
||||
"versionEndExcluding": "2021.1.30",
|
||||
"matchCriteriaId": "BAB4DC97-9047-4302-90A0-4711AE93D364"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2022.1.0",
|
||||
"versionEndExcluding": "2022.1.9",
|
||||
"matchCriteriaId": "230DB641-455F-4F55-AFB2-1E6D974EE080"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:opennms:meridian:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2023.0.0",
|
||||
"versionEndExcluding": "2023.1.6",
|
||||
"matchCriteriaId": "9822AB30-2205-496D-952D-A0CFF409B72F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.opennms.com/horizon/32/releasenotes/changelog.html",
|
||||
"source": "security@opennms.com"
|
||||
"source": "security@opennms.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/OpenNMS/opennms/pull/6355",
|
||||
"source": "security@opennms.com"
|
||||
"source": "security@opennms.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20217",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2023-08-16T22:15:11.437",
|
||||
"lastModified": "2023-08-17T22:15:09.547",
|
||||
"lastModified": "2023-08-18T17:15:09.630",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -35,6 +35,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/174232/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Read.html",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Aug/19",
|
||||
"source": "ykramarz@cisco.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-20224",
|
||||
"sourceIdentifier": "ykramarz@cisco.com",
|
||||
"published": "2023-08-16T22:15:11.837",
|
||||
"lastModified": "2023-08-17T22:15:09.677",
|
||||
"lastModified": "2023-08-18T17:15:09.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -35,6 +35,10 @@
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/174233/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Privilege-Escalation.html",
|
||||
"source": "ykramarz@cisco.com"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Aug/20",
|
||||
"source": "ykramarz@cisco.com"
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22809",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-01-18T17:15:10.353",
|
||||
"lastModified": "2023-08-17T22:15:09.763",
|
||||
"lastModified": "2023-08-18T17:15:09.867",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -119,6 +119,10 @@
|
||||
"url": "http://packetstormsecurity.com/files/172509/Sudoedit-Extra-Arguments-Privilege-Escalation.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/174234/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Modification.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Aug/21",
|
||||
"source": "cve@mitre.org"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27576",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-08-18T15:15:09.723",
|
||||
"lastModified": "2023-08-18T15:15:09.723",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-18T16:39:17.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29387",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-08-18T15:15:09.830",
|
||||
"lastModified": "2023-08-18T15:15:09.830",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-18T16:39:17.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30499",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-08-18T15:15:09.933",
|
||||
"lastModified": "2023-08-18T15:15:09.933",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-18T16:39:17.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32108",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-08-18T15:15:10.033",
|
||||
"lastModified": "2023-08-18T15:15:10.033",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-18T16:39:17.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32109",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-08-18T15:15:10.137",
|
||||
"lastModified": "2023-08-18T15:15:10.137",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-18T16:39:17.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2023/CVE-2023-321xx/CVE-2023-32122.json
Normal file
55
CVE-2023/CVE-2023-321xx/CVE-2023-32122.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-32122",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-08-18T16:15:10.723",
|
||||
"lastModified": "2023-08-18T16:39:17.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Spiffy Plugins Spiffy Calendar plugin <=\u00a04.9.3 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/spiffy-calendar/wordpress-spiffy-calendar-plugin-4-9-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-321xx/CVE-2023-32130.json
Normal file
55
CVE-2023/CVE-2023-321xx/CVE-2023-32130.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-32130",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-08-18T16:15:10.850",
|
||||
"lastModified": "2023-08-18T16:39:17.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Daniel Powney Multi Rating plugin <=\u00a05.0.6 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/multi-rating/wordpress-multi-rating-plugin-5-0-6-cross-site-scripting-xss?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3732",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-08-01T23:15:32.247",
|
||||
"lastModified": "2023-08-12T06:17:51.497",
|
||||
"lastModified": "2023-08-18T17:15:09.997",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,6 +65,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/174223/Chrome-IPCZ-FragmentDescriptors-Missing-Validation.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html",
|
||||
"source": "chrome-cve-admin@google.com",
|
||||
|
@ -2,23 +2,83 @@
|
||||
"id": "CVE-2023-38751",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-08-09T04:15:10.047",
|
||||
"lastModified": "2023-08-09T12:46:53.387",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-18T16:37:43.763",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper authorization vulnerability in Special Interest Group Network for Analysis and Liaison versions 4.4.0 to 4.7.7 allows the authorized API users to view the organization information of the information receiver that is set as \"non-disclosure\" in the information provision operation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jpcert:special_interest_group_network_for_analysis_and_liaison:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0",
|
||||
"versionEndIncluding": "4.7.7",
|
||||
"matchCriteriaId": "E32EF80A-CB45-4C48-8343-9A1E6F850DC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN83334799/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.jpcert.or.jp/press/2023/PR20230807_notice.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,83 @@
|
||||
"id": "CVE-2023-38752",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-08-09T04:15:10.430",
|
||||
"lastModified": "2023-08-09T12:46:53.387",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-18T16:35:47.680",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper authorization vulnerability in Special Interest Group Network for Analysis and Liaison versions 4.4.0 to 4.7.7 allows the authorized API users to view the attribute information of the poster that is set as\"non-disclosure\" in the system settings."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jpcert:special_interest_group_network_for_analysis_and_liaison:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0",
|
||||
"versionEndIncluding": "4.7.7",
|
||||
"matchCriteriaId": "E32EF80A-CB45-4C48-8343-9A1E6F850DC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN83334799/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.jpcert.or.jp/press/2023/PR20230807_notice.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39417",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-08-11T13:15:09.870",
|
||||
"lastModified": "2023-08-11T15:18:19.837",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-18T17:58:49.403",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
@ -34,18 +54,112 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "11.0",
|
||||
"versionEndExcluding": "11.21",
|
||||
"matchCriteriaId": "26CC0BE5-F14A-4614-85B3-6DCF9E80FA26"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "12.0",
|
||||
"versionEndExcluding": "12.16",
|
||||
"matchCriteriaId": "2330AEB8-C50A-407C-B066-74274F0C97AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "13.0",
|
||||
"versionEndExcluding": "13.12",
|
||||
"matchCriteriaId": "113134BB-A944-4613-A1BC-576D5965B08A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.9",
|
||||
"matchCriteriaId": "EB3BC449-642E-433D-92F1-53BDD99A33A9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "15.0",
|
||||
"versionEndExcluding": "15.4",
|
||||
"matchCriteriaId": "3263C456-8C2D-4069-AE64-8B55212B45DD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:software_collections:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "749804DA-4B27-492A-9ABA-6BB562A6B3AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-39417",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228111",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.postgresql.org/support/security/CVE-2023-39417",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-39418",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-08-11T13:15:09.963",
|
||||
"lastModified": "2023-08-11T15:18:19.837",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-08-18T17:38:31.230",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
@ -34,22 +54,88 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "15.0",
|
||||
"versionEndExcluding": "15.4",
|
||||
"matchCriteriaId": "3263C456-8C2D-4069-AE64-8B55212B45DD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-39418",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228112",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.postgresql.org/gitweb/?p=postgresql.git;a=commitdiff;h=cb2ae5741f2458a474ed3c31458d242e678ff229",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.postgresql.org/support/security/CVE-2023-39418/",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4412",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-08-18T15:15:10.240",
|
||||
"lastModified": "2023-08-18T15:15:10.240",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-18T16:39:17.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4413",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-08-18T15:15:10.353",
|
||||
"lastModified": "2023-08-18T15:15:10.353",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-08-18T16:39:17.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
88
CVE-2023/CVE-2023-44xx/CVE-2023-4414.json
Normal file
88
CVE-2023/CVE-2023-44xx/CVE-2023-4414.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-4414",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-08-18T16:15:11.070",
|
||||
"lastModified": "2023-08-18T16:39:17.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Beijing Baichuo Smart S85F Management Platform up to 20230807. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /log/decodmail.php. The manipulation of the argument file leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-237517 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/RCEraser/cve/blob/main/S85F.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.237517",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.237517",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-44xx/CVE-2023-4415.json
Normal file
88
CVE-2023/CVE-2023-44xx/CVE-2023-4415.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-4415",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-08-18T16:15:11.163",
|
||||
"lastModified": "2023-08-18T16:39:17.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Ruijie RG-EW1200G 07161417 r483. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/sys/login. The manipulation leads to improper authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-237518 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 7.5
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/blakespire/repoforcve/tree/main/RG-EW1200G-logic",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.237518",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.237518",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
70
README.md
70
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-08-18T16:00:32.175407+00:00
|
||||
2023-08-18T18:00:34.800973+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-08-18T15:54:46.543000+00:00
|
||||
2023-08-18T17:58:49.403000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,59 +29,39 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
222986
|
||||
222990
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `15`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
* [CVE-2023-31218](CVE-2023/CVE-2023-312xx/CVE-2023-31218.json) (`2023-08-18T14:15:22.330`)
|
||||
* [CVE-2023-31232](CVE-2023/CVE-2023-312xx/CVE-2023-31232.json) (`2023-08-18T14:15:22.467`)
|
||||
* [CVE-2023-32103](CVE-2023/CVE-2023-321xx/CVE-2023-32103.json) (`2023-08-18T14:15:22.550`)
|
||||
* [CVE-2023-32105](CVE-2023/CVE-2023-321xx/CVE-2023-32105.json) (`2023-08-18T14:15:22.633`)
|
||||
* [CVE-2023-32106](CVE-2023/CVE-2023-321xx/CVE-2023-32106.json) (`2023-08-18T14:15:22.890`)
|
||||
* [CVE-2023-32107](CVE-2023/CVE-2023-321xx/CVE-2023-32107.json) (`2023-08-18T14:15:23.347`)
|
||||
* [CVE-2023-4410](CVE-2023/CVE-2023-44xx/CVE-2023-4410.json) (`2023-08-18T14:15:34.147`)
|
||||
* [CVE-2023-4411](CVE-2023/CVE-2023-44xx/CVE-2023-4411.json) (`2023-08-18T14:15:35.227`)
|
||||
* [CVE-2023-27576](CVE-2023/CVE-2023-275xx/CVE-2023-27576.json) (`2023-08-18T15:15:09.723`)
|
||||
* [CVE-2023-29387](CVE-2023/CVE-2023-293xx/CVE-2023-29387.json) (`2023-08-18T15:15:09.830`)
|
||||
* [CVE-2023-30499](CVE-2023/CVE-2023-304xx/CVE-2023-30499.json) (`2023-08-18T15:15:09.933`)
|
||||
* [CVE-2023-32108](CVE-2023/CVE-2023-321xx/CVE-2023-32108.json) (`2023-08-18T15:15:10.033`)
|
||||
* [CVE-2023-32109](CVE-2023/CVE-2023-321xx/CVE-2023-32109.json) (`2023-08-18T15:15:10.137`)
|
||||
* [CVE-2023-4412](CVE-2023/CVE-2023-44xx/CVE-2023-4412.json) (`2023-08-18T15:15:10.240`)
|
||||
* [CVE-2023-4413](CVE-2023/CVE-2023-44xx/CVE-2023-4413.json) (`2023-08-18T15:15:10.353`)
|
||||
* [CVE-2023-32122](CVE-2023/CVE-2023-321xx/CVE-2023-32122.json) (`2023-08-18T16:15:10.723`)
|
||||
* [CVE-2023-32130](CVE-2023/CVE-2023-321xx/CVE-2023-32130.json) (`2023-08-18T16:15:10.850`)
|
||||
* [CVE-2023-4414](CVE-2023/CVE-2023-44xx/CVE-2023-4414.json) (`2023-08-18T16:15:11.070`)
|
||||
* [CVE-2023-4415](CVE-2023/CVE-2023-44xx/CVE-2023-4415.json) (`2023-08-18T16:15:11.163`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `46`
|
||||
Recently modified CVEs: `16`
|
||||
|
||||
* [CVE-2023-34455](CVE-2023/CVE-2023-344xx/CVE-2023-34455.json) (`2023-08-18T14:15:23.960`)
|
||||
* [CVE-2023-35012](CVE-2023/CVE-2023-350xx/CVE-2023-35012.json) (`2023-08-18T14:15:26.743`)
|
||||
* [CVE-2023-38403](CVE-2023/CVE-2023-384xx/CVE-2023-38403.json) (`2023-08-18T14:15:28.227`)
|
||||
* [CVE-2023-38902](CVE-2023/CVE-2023-389xx/CVE-2023-38902.json) (`2023-08-18T14:15:28.480`)
|
||||
* [CVE-2023-3390](CVE-2023/CVE-2023-33xx/CVE-2023-3390.json) (`2023-08-18T14:15:28.593`)
|
||||
* [CVE-2023-3609](CVE-2023/CVE-2023-36xx/CVE-2023-3609.json) (`2023-08-18T14:15:29.803`)
|
||||
* [CVE-2023-3610](CVE-2023/CVE-2023-36xx/CVE-2023-3610.json) (`2023-08-18T14:15:33.450`)
|
||||
* [CVE-2023-3817](CVE-2023/CVE-2023-38xx/CVE-2023-3817.json) (`2023-08-18T14:15:33.647`)
|
||||
* [CVE-2023-3864](CVE-2023/CVE-2023-38xx/CVE-2023-3864.json) (`2023-08-18T14:16:40.163`)
|
||||
* [CVE-2023-3937](CVE-2023/CVE-2023-39xx/CVE-2023-3937.json) (`2023-08-18T14:30:09.183`)
|
||||
* [CVE-2023-29500](CVE-2023/CVE-2023-295xx/CVE-2023-29500.json) (`2023-08-18T14:33:50.697`)
|
||||
* [CVE-2023-32617](CVE-2023/CVE-2023-326xx/CVE-2023-32617.json) (`2023-08-18T15:02:51.067`)
|
||||
* [CVE-2023-3452](CVE-2023/CVE-2023-34xx/CVE-2023-3452.json) (`2023-08-18T15:03:13.747`)
|
||||
* [CVE-2023-28823](CVE-2023/CVE-2023-288xx/CVE-2023-28823.json) (`2023-08-18T15:03:45.797`)
|
||||
* [CVE-2023-31094](CVE-2023/CVE-2023-310xx/CVE-2023-31094.json) (`2023-08-18T15:06:49.560`)
|
||||
* [CVE-2023-31228](CVE-2023/CVE-2023-312xx/CVE-2023-31228.json) (`2023-08-18T15:06:49.560`)
|
||||
* [CVE-2023-4407](CVE-2023/CVE-2023-44xx/CVE-2023-4407.json) (`2023-08-18T15:06:49.560`)
|
||||
* [CVE-2023-4409](CVE-2023/CVE-2023-44xx/CVE-2023-4409.json) (`2023-08-18T15:06:49.560`)
|
||||
* [CVE-2023-28711](CVE-2023/CVE-2023-287xx/CVE-2023-28711.json) (`2023-08-18T15:15:38.937`)
|
||||
* [CVE-2023-28380](CVE-2023/CVE-2023-283xx/CVE-2023-28380.json) (`2023-08-18T15:25:35.353`)
|
||||
* [CVE-2023-28385](CVE-2023/CVE-2023-283xx/CVE-2023-28385.json) (`2023-08-18T15:26:21.167`)
|
||||
* [CVE-2023-24016](CVE-2023/CVE-2023-240xx/CVE-2023-24016.json) (`2023-08-18T15:26:36.683`)
|
||||
* [CVE-2023-40267](CVE-2023/CVE-2023-402xx/CVE-2023-40267.json) (`2023-08-18T15:29:27.313`)
|
||||
* [CVE-2023-28405](CVE-2023/CVE-2023-284xx/CVE-2023-28405.json) (`2023-08-18T15:43:36.957`)
|
||||
* [CVE-2023-36672](CVE-2023/CVE-2023-366xx/CVE-2023-36672.json) (`2023-08-18T15:54:46.543`)
|
||||
* [CVE-2023-0871](CVE-2023/CVE-2023-08xx/CVE-2023-0871.json) (`2023-08-18T16:21:52.737`)
|
||||
* [CVE-2023-38752](CVE-2023/CVE-2023-387xx/CVE-2023-38752.json) (`2023-08-18T16:35:47.680`)
|
||||
* [CVE-2023-38751](CVE-2023/CVE-2023-387xx/CVE-2023-38751.json) (`2023-08-18T16:37:43.763`)
|
||||
* [CVE-2023-27576](CVE-2023/CVE-2023-275xx/CVE-2023-27576.json) (`2023-08-18T16:39:17.773`)
|
||||
* [CVE-2023-29387](CVE-2023/CVE-2023-293xx/CVE-2023-29387.json) (`2023-08-18T16:39:17.773`)
|
||||
* [CVE-2023-30499](CVE-2023/CVE-2023-304xx/CVE-2023-30499.json) (`2023-08-18T16:39:17.773`)
|
||||
* [CVE-2023-32108](CVE-2023/CVE-2023-321xx/CVE-2023-32108.json) (`2023-08-18T16:39:17.773`)
|
||||
* [CVE-2023-32109](CVE-2023/CVE-2023-321xx/CVE-2023-32109.json) (`2023-08-18T16:39:17.773`)
|
||||
* [CVE-2023-4412](CVE-2023/CVE-2023-44xx/CVE-2023-4412.json) (`2023-08-18T16:39:17.773`)
|
||||
* [CVE-2023-4413](CVE-2023/CVE-2023-44xx/CVE-2023-4413.json) (`2023-08-18T16:39:17.773`)
|
||||
* [CVE-2023-20217](CVE-2023/CVE-2023-202xx/CVE-2023-20217.json) (`2023-08-18T17:15:09.630`)
|
||||
* [CVE-2023-20224](CVE-2023/CVE-2023-202xx/CVE-2023-20224.json) (`2023-08-18T17:15:09.787`)
|
||||
* [CVE-2023-22809](CVE-2023/CVE-2023-228xx/CVE-2023-22809.json) (`2023-08-18T17:15:09.867`)
|
||||
* [CVE-2023-3732](CVE-2023/CVE-2023-37xx/CVE-2023-3732.json) (`2023-08-18T17:15:09.997`)
|
||||
* [CVE-2023-39418](CVE-2023/CVE-2023-394xx/CVE-2023-39418.json) (`2023-08-18T17:38:31.230`)
|
||||
* [CVE-2023-39417](CVE-2023/CVE-2023-394xx/CVE-2023-39417.json) (`2023-08-18T17:58:49.403`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user