From 2943b1f2fef2c1dbfefc2ffd149ae6f97133597d Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 14 Sep 2024 06:03:15 +0000 Subject: [PATCH] Auto-Update: 2024-09-14T06:00:16.925704+00:00 --- CVE-2024/CVE-2024-22xx/CVE-2024-2236.json | 6 +-- CVE-2024/CVE-2024-80xx/CVE-2024-8039.json | 37 +++++++++++++ CVE-2024/CVE-2024-82xx/CVE-2024-8246.json | 60 +++++++++++++++++++++ CVE-2024/CVE-2024-84xx/CVE-2024-8479.json | 64 +++++++++++++++++++++++ CVE-2024/CVE-2024-86xx/CVE-2024-8669.json | 64 +++++++++++++++++++++++ CVE-2024/CVE-2024-87xx/CVE-2024-8724.json | 64 +++++++++++++++++++++++ README.md | 21 ++++---- _state.csv | 17 +++--- 8 files changed, 312 insertions(+), 21 deletions(-) create mode 100644 CVE-2024/CVE-2024-80xx/CVE-2024-8039.json create mode 100644 CVE-2024/CVE-2024-82xx/CVE-2024-8246.json create mode 100644 CVE-2024/CVE-2024-84xx/CVE-2024-8479.json create mode 100644 CVE-2024/CVE-2024-86xx/CVE-2024-8669.json create mode 100644 CVE-2024/CVE-2024-87xx/CVE-2024-8724.json diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2236.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2236.json index 916ba817f86..3f0c624b493 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2236.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2236.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2236", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-06T22:15:57.977", - "lastModified": "2024-04-25T17:15:49.467", + "lastModified": "2024-09-14T04:15:02.903", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,10 +59,6 @@ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245218", "source": "secalert@redhat.com" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268268", - "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8039.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8039.json new file mode 100644 index 00000000000..b18460da2bf --- /dev/null +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8039.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-8039", + "sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea", + "published": "2024-09-14T04:15:04.377", + "lastModified": "2024-09-14T04:15:04.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper permission configurationDomain configuration vulnerability of the mobile application (com.afmobi.boomplayer) can lead to account takeover risks." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://security.tecno.com/SRC/blogdetail/307?lang=en_US", + "source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea" + }, + { + "url": "https://security.tecno.com/SRC/securityUpdates?type=SA", + "source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8246.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8246.json new file mode 100644 index 00000000000..549ed2d4065 --- /dev/null +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8246.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-8246", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-09-14T04:15:04.493", + "lastModified": "2024-09-14T04:15:04.493", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Post Form \u2013 Registration Form \u2013 Profile Form for User Profiles \u2013 Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.8.11. This is due to plugin not properly restricting what users have access to set the default role on registration forms. This makes it possible for authenticated attackers, with contributor-level access and above, to create a registration form with a custom role that allows them to register as administrators." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3149760/buddyforms/trunk/includes/admin/form-builder/meta-boxes/metabox-registration.php", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/40760f60-b81a-447b-a2c8-83c7666ce410?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8479.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8479.json new file mode 100644 index 00000000000..914230b15b3 --- /dev/null +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8479.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-8479", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-09-14T04:15:04.733", + "lastModified": "2024-09-14T04:15:04.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The The Simple Spoiler plugin for WordPress is vulnerable to arbitrary shortcode execution in versions 1.2 to 1.3. This is due to the plugin adding the filter add_filter('comment_text', 'do_shortcode'); which will run all shortcodes in comments. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/simple-spoiler/trunk/simple-spoiler.php#L108", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3151179%40simple-spoiler&new=3151179%40simple-spoiler&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ffc76d8-b841-4c26-bbc6-1f96664efe36?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8669.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8669.json new file mode 100644 index 00000000000..191c8b5872b --- /dev/null +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8669.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-8669", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-09-14T04:15:04.963", + "lastModified": "2024-09-14T04:15:04.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Backuply \u2013 Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter passed to the backuply_wp_clone_sql() function in all versions up to, and including, 1.3.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/backuply/trunk/functions.php#L1477", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3151205/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6a061553-c988-4a31-a0a2-7a2608faa33f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8724.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8724.json new file mode 100644 index 00000000000..4a6fbfbaed2 --- /dev/null +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8724.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-8724", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-09-14T04:15:05.210", + "lastModified": "2024-09-14T04:15:05.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Waitlist Woocommerce ( Back in stock notifier ) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.7.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/waitlist-woocommerce/trunk/admin/templates/xoo-wl-import-form.php#L8", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3151186%40waitlist-woocommerce&new=3151186%40waitlist-woocommerce&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c298c87e-cf3c-4b72-bb0e-a01ca2dfe52f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index ab917a3aa33..b1a3ebf3681 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-14T04:00:17.136186+00:00 +2024-09-14T06:00:16.925704+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-14T03:15:08.987000+00:00 +2024-09-14T04:15:05.210000+00:00 ``` ### Last Data Feed Release @@ -33,24 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -262871 +262876 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `5` -- [CVE-2022-3459](CVE-2022/CVE-2022-34xx/CVE-2022-3459.json) (`2024-09-14T03:15:02.347`) -- [CVE-2024-8271](CVE-2024/CVE-2024-82xx/CVE-2024-8271.json) (`2024-09-14T03:15:08.730`) -- [CVE-2024-8775](CVE-2024/CVE-2024-87xx/CVE-2024-8775.json) (`2024-09-14T03:15:08.987`) +- [CVE-2024-8039](CVE-2024/CVE-2024-80xx/CVE-2024-8039.json) (`2024-09-14T04:15:04.377`) +- [CVE-2024-8246](CVE-2024/CVE-2024-82xx/CVE-2024-8246.json) (`2024-09-14T04:15:04.493`) +- [CVE-2024-8479](CVE-2024/CVE-2024-84xx/CVE-2024-8479.json) (`2024-09-14T04:15:04.733`) +- [CVE-2024-8669](CVE-2024/CVE-2024-86xx/CVE-2024-8669.json) (`2024-09-14T04:15:04.963`) +- [CVE-2024-8724](CVE-2024/CVE-2024-87xx/CVE-2024-8724.json) (`2024-09-14T04:15:05.210`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `1` -- [CVE-2023-5156](CVE-2023/CVE-2023-51xx/CVE-2023-5156.json) (`2024-09-14T03:15:02.617`) -- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-09-14T03:15:08.143`) +- [CVE-2024-2236](CVE-2024/CVE-2024-22xx/CVE-2024-2236.json) (`2024-09-14T04:15:02.903`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 4a415f03c91..78c185b505a 100644 --- a/_state.csv +++ b/_state.csv @@ -201694,7 +201694,7 @@ CVE-2022-3458,0,0,834446b0b464109915b4b499bcb648e2d2c701525e05ff89129f7d9fe10106 CVE-2022-34580,0,0,3bc493ad0e7a0b4170568437f86af4c3c964701c1bd5abd9bfc45a505c7b51d1,2022-08-04T17:15:01.383000 CVE-2022-34586,0,0,a011579053ff27f86e6a88cc003457abbf5ee9d851589f7bfe3e86ae3f13ca6a,2022-07-26T11:53:37.197000 CVE-2022-34588,0,0,cbb99e45e15a33c631198f107a59981a56fc2f86de13eb744bfca0b900846a6b,2022-07-26T11:53:11.643000 -CVE-2022-3459,1,1,fdfaa1f2f0802788e318c638ef4508044708f0526fd6d2c140a4813b546870c5,2024-09-14T03:15:02.347000 +CVE-2022-3459,0,0,fdfaa1f2f0802788e318c638ef4508044708f0526fd6d2c140a4813b546870c5,2024-09-14T03:15:02.347000 CVE-2022-34590,0,0,c8d44270c11381c2331bf6e1dc899e03a4a3498d1b44f02101242c3cfd3f9af4,2022-07-26T11:52:00.287000 CVE-2022-34592,0,0,a74e2dc297296157bdc0c6e09ba85ba1c5bd50b0c3f22b27833690d3cc3b2da0,2023-08-01T21:15:10.193000 CVE-2022-34593,0,0,b5d1f52496cf0925fd1c45183671a1ec1c74868575dbcc8a48a75bb69d63b20a,2022-08-04T03:06:17.717000 @@ -238240,7 +238240,7 @@ CVE-2023-51556,0,0,acf42d2aaeb30a8daebf4eac2d1231837be1ce96aad80f5e4a67db28fa961 CVE-2023-51557,0,0,b3a5ade703e5c090a16f65ace8367c37780cb7d68dd55f1a1560a9cfdc21be57,2024-05-03T12:48:41.067000 CVE-2023-51558,0,0,86b22ac23f78994f1de34336fa68b28a4a165fb8939338fe9b9f0d23ae3e99de,2024-05-03T12:48:41.067000 CVE-2023-51559,0,0,d63ad902cf8cb899668ee02ff8cc1bb13aa7066d9b0d0a4c9df9041bc9cc0cce,2024-05-03T12:48:41.067000 -CVE-2023-5156,0,1,6fe396d6bc9b51c9b8db26bd9bb3711102eafce86ed40c14eaa952b7cd2dc61c,2024-09-14T03:15:02.617000 +CVE-2023-5156,0,0,6fe396d6bc9b51c9b8db26bd9bb3711102eafce86ed40c14eaa952b7cd2dc61c,2024-09-14T03:15:02.617000 CVE-2023-51560,0,0,a069f88025a379ad5f37716f531b230028c1b7a6ff2d0a31c39268d7bf3c03d8,2024-05-03T12:48:41.067000 CVE-2023-51561,0,0,6c95bac784c1c5207b1802cee51d4b7f04e8b0870845701dd794ca7cffd8d042,2024-05-03T12:48:41.067000 CVE-2023-51562,0,0,0d2032fc20b9283a82066d8337227a6ef8147fa667ae1c70416d055922ceaa50,2024-05-03T12:48:41.067000 @@ -244708,7 +244708,7 @@ CVE-2024-22356,0,0,d7816a9ba601446ddf2f1791b2a20c669256f6d1556e00ed5243ed494ceab CVE-2024-22357,0,0,0bb0c823fb3ba54d21074ab797aca42f7312b217f24630a0cf642d75fe688e72,2024-04-12T12:43:57.400000 CVE-2024-22358,0,0,c07de741e1bd331a637c3117a238b4cd328eb061aeff477aa27560ea4017f135,2024-04-15T13:15:31.997000 CVE-2024-22359,0,0,7527962a22af823da8ade98e556ee19eb46f6b251e797d4d139c988ae5d9426a,2024-04-15T13:15:31.997000 -CVE-2024-2236,0,0,bb2a644225f51160d2d70ae285671d5c5f0eb62471234242a76e7ba857116af7,2024-04-25T17:15:49.467000 +CVE-2024-2236,0,1,e5b6845b6af232ea28836733d1c554f2997af2cc954a6fedfc237cd2b5ae70a2,2024-09-14T04:15:02.903000 CVE-2024-22360,0,0,794526f63f464dad1a4d5860395245506ca742cb67b982581354267152f1e10b,2024-06-10T17:16:19.007000 CVE-2024-22361,0,0,e267f7a58b4385dec5a7f5aef03064380edb1a73a3ecd2124af7f1bc930e0f03,2024-02-16T21:35:31.953000 CVE-2024-22362,0,0,2767965890a6410063670fad313b54e2e770a22b941b7425a3750acfeece9725,2024-08-01T23:15:33.430000 @@ -261339,7 +261339,7 @@ CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036a CVE-2024-6384,0,0,69acc14adf4ad2dfa9acf19196e8d21558fac0b5469b1fd3bf540f24a32ab6da,2024-08-16T14:29:24.947000 CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000 CVE-2024-6386,0,0,9164927dbad6e7427231be8044dd2ccc9162f1a1173b863f2e4642cbddb16648,2024-08-22T12:48:02.790000 -CVE-2024-6387,0,1,33e863f5fbdb5ebd28cdb76db79962b7a834a7793cc2d1eb4023a387b3acaea2,2024-09-14T03:15:08.143000 +CVE-2024-6387,0,0,33e863f5fbdb5ebd28cdb76db79962b7a834a7793cc2d1eb4023a387b3acaea2,2024-09-14T03:15:08.143000 CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000 CVE-2024-6389,0,0,0f5288bc36ccabdeb644a7f1f848b2af478db86c3740cc3462d350146445ead0,2024-09-12T18:14:03.913000 CVE-2024-6390,0,0,a350381d3f247972bbe468db9ec2332b3c135e89cdf36bdf1358f9f5965e67ff,2024-08-05T14:35:08.267000 @@ -262527,6 +262527,7 @@ CVE-2024-8030,0,0,b6f55198da4c8a890918e236b9cb91502d6b60f60aed340690526a7aff836e CVE-2024-8033,0,0,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fcdc,2024-08-27T19:39:04.953000 CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000 CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000 +CVE-2024-8039,1,1,8f2a2fcfd7c417ecae97778cd9132c74092430c0901ca7e28725e71c9490e2ac,2024-09-14T04:15:04.377000 CVE-2024-8041,0,0,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a6898399,2024-09-11T16:54:10.997000 CVE-2024-8042,0,0,fe11fe06852bd8872b8038bbdb1b59f9abf17559f4fd0139db22bc4b00f3a1bd,2024-09-09T18:30:12.050000 CVE-2024-8045,0,0,05d36d75d042c2c9517546223100d3f67299fb6baf521e764ed39ac43e964a74,2024-09-11T16:26:11.920000 @@ -262649,6 +262650,7 @@ CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab149 CVE-2024-8235,0,0,7072b68d002bcf4f9595f61b4137bd3d5b31c93ce76df9863ff0a1c3da8ed948,2024-09-03T12:59:02.453000 CVE-2024-8241,0,0,35ebd2ab4c68ddc81effc80c2cf2eb8cf12caf111e7ab884d603a2c6bde8e766,2024-09-10T12:09:50.377000 CVE-2024-8242,0,0,eabaead787165955228d106aa395c02975627e82992ac6cac37c9a4940da9675,2024-09-13T16:37:22.997000 +CVE-2024-8246,1,1,f0634060b837e4911410fbf282109997688f216bc9da0e6449507685f47dac46,2024-09-14T04:15:04.493000 CVE-2024-8247,0,0,5202f9f70242e6e766f5bf4ee04774da230414090293c913b32ce2eadeefe661,2024-09-06T12:08:04.550000 CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b8c,2024-08-30T16:32:16.917000 CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c205,2024-09-03T14:31:27.243000 @@ -262658,7 +262660,7 @@ CVE-2024-8258,0,0,f89f58eb5f0b3759dea8f0dae08eaa2a66704ca0d9d3594730a9f2f38b881d CVE-2024-8260,0,0,812d2a62f9a14f293d2814006504d857c705848c99804aae9066abfa5d1408ba,2024-09-03T12:59:02.453000 CVE-2024-8268,0,0,ceeeab380c4c185371d3b97780ec883236427fb28d279219c56301bfbb794609,2024-09-10T12:09:50.377000 CVE-2024-8269,0,0,6959df07ba8dca53d305fc4ba2d36f7423abf6d3d4634237c83207cd594aadae,2024-09-13T16:37:22.997000 -CVE-2024-8271,1,1,faec4d17d0baa154f128f00974772adc6c7c3d567e0c31a66664b6f33cd04cdf,2024-09-14T03:15:08.730000 +CVE-2024-8271,0,0,faec4d17d0baa154f128f00974772adc6c7c3d567e0c31a66664b6f33cd04cdf,2024-09-14T03:15:08.730000 CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a376a,2024-09-03T14:28:06.853000 CVE-2024-8276,0,0,3274d76cbc571327fcfea77f70e01de12a7ccc769cbd3850878973b51b7dc40b,2024-09-13T19:19:42.293000 CVE-2024-8277,0,0,927cb844bbeb99202846ea688baa5f560a39fb495f1767a0a934290c2ae10e58,2024-09-11T16:26:11.920000 @@ -262769,6 +262771,7 @@ CVE-2024-8471,0,0,d4cac4daadf018326a13905f788e8fc27e503497a3cff6ab0ea980773a6f76 CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918cef,2024-09-06T11:44:34.543000 CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000 CVE-2024-8478,0,0,e333806b3f124cdccad931974c458d04f248d7fe56143afacc5e05746f5f352e,2024-09-10T12:09:50.377000 +CVE-2024-8479,1,1,5c812f3018d4ea30d0c31e629c501c2141087315132048a0077bbd0ac30929b6,2024-09-14T04:15:04.733000 CVE-2024-8480,0,0,6f63c0c2b913be669f1e72f74bb0555ea9046fdf00f5eabae51a6bc6bb95358b,2024-09-06T12:08:04.550000 CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000 CVE-2024-8504,0,0,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000 @@ -262835,6 +262838,7 @@ CVE-2024-8656,0,0,fc862011d1e771531d08fceed2dec553d3fda9d67ee9f88d486fa676eb49a8 CVE-2024-8663,0,0,95df1e4ddd212aa242aadc3c7cf5dbe906cc5735393ec0be59f396093ac78f31,2024-09-13T14:06:04.777000 CVE-2024-8664,0,0,2555823c9f06fc746960b11f9d47a03631001b4434e03f9cf5f8083f2818653d,2024-09-13T14:06:04.777000 CVE-2024-8665,0,0,09ab15f5f9bd70753d6f594bff7ff364c9764fb90e308cd08c47d778b9a8291f,2024-09-13T14:06:04.777000 +CVE-2024-8669,1,1,48602ca81adf826b8998af599afbec3560f42367d0a900c043afc8b95bc6b524,2024-09-14T04:15:04.963000 CVE-2024-8686,0,0,ede88dcdbc0e792bd803e1f16895e5a739a1631453b49ef7e6a4fb82c32bd0dd,2024-09-12T12:35:54.013000 CVE-2024-8687,0,0,113cfff3abfee2dabf4872656a1085a998928e6c5f0a4785deb63af7b2621db8,2024-09-12T12:35:54.013000 CVE-2024-8688,0,0,622feee60e16c8839b74efa94c0181d710fda4c1e7dbcb6de36b0dc3a1f1b61b,2024-09-12T12:35:54.013000 @@ -262854,6 +262858,7 @@ CVE-2024-8709,0,0,c4b78e9440da9a95da6880cb2eb594efc3dc26da0951b28cab597493ad1bb0 CVE-2024-8710,0,0,4c5169ef585cdb335030b939d5748b4dbbc0a0ee6166dc565231ca1259e5b90c,2024-09-13T16:25:47.510000 CVE-2024-8711,0,0,0a0fc486d277b8c36cfb49b6365925dae98dcfc88dd0e7309623a05e1f41ecb4,2024-09-13T16:18:15.670000 CVE-2024-8714,0,0,14a80f672ac1addf2d6af312a3f9385aa51382477b48f1d6f20d0d47ee2ed76e,2024-09-13T16:37:22.997000 +CVE-2024-8724,1,1,760294304489112d275229c5edb430cdf6b365f53fb3979cc18477b428e2dd71,2024-09-14T04:15:05.210000 CVE-2024-8730,0,0,07c237b22c1734957bdddd9f125f75ca033621d7b6a879c80b743a6b915122b0,2024-09-13T16:37:22.997000 CVE-2024-8731,0,0,50a7afa44defac1c6ff0a2deb04f044634f339c2f1ca60bcd4a80d6dbf3437d5,2024-09-13T16:37:22.997000 CVE-2024-8732,0,0,df7c83cce42f420b4b7d2e75a581be77048b76765bdf0b0cc3e2fff5e9adac06,2024-09-13T16:37:22.997000 @@ -262866,7 +262871,7 @@ CVE-2024-8750,0,0,418fabeb18e7b297a31252c3e8fef09ccda76bf14212f7478abfd99c5bae6a CVE-2024-8751,0,0,dd4f77422f5dc981129a2e765da3e243ee86648b85be15172cd0c4e6601f992a,2024-09-13T14:06:04.777000 CVE-2024-8754,0,0,dcef29ecbc812aa49fbf1b13b0eb401b8ca812115ed5357160273332851b27b7,2024-09-12T18:14:03.913000 CVE-2024-8762,0,0,3365b2a60700d4c241af4290619684dfef583475bffb6fbc1a1478d60b8c3c6d,2024-09-13T14:06:04.777000 -CVE-2024-8775,1,1,9c7a2c7607df17819648d9553bf2e2c7ee01c28f4d5223eb962d1525c112062b,2024-09-14T03:15:08.987000 +CVE-2024-8775,0,0,9c7a2c7607df17819648d9553bf2e2c7ee01c28f4d5223eb962d1525c112062b,2024-09-14T03:15:08.987000 CVE-2024-8782,0,0,501c3b3a165d141bbc3bb94c461ca06a9bef3c326910611a1048598228ce7cef,2024-09-13T18:15:07.920000 CVE-2024-8783,0,0,3a34098c67c08db9d3236f30ec7f0369a15c553a22b6b91542612c74c80835bf,2024-09-13T19:15:18.120000 CVE-2024-8784,0,0,b8f4f74d0f03db496bcb727221454329f3d27fa057332e76fa82e85a162fa5a3,2024-09-13T19:15:18.430000