mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2024-09-14T06:00:16.925704+00:00
This commit is contained in:
parent
bd90921333
commit
2943b1f2fe
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-2236",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-06T22:15:57.977",
|
||||
"lastModified": "2024-04-25T17:15:49.467",
|
||||
"lastModified": "2024-09-14T04:15:02.903",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,10 +59,6 @@
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245218",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268268",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-80xx/CVE-2024-8039.json
Normal file
37
CVE-2024/CVE-2024-80xx/CVE-2024-8039.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-8039",
|
||||
"sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",
|
||||
"published": "2024-09-14T04:15:04.377",
|
||||
"lastModified": "2024-09-14T04:15:04.377",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper permission configurationDomain configuration vulnerability of the mobile application (com.afmobi.boomplayer) can lead to account takeover risks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.tecno.com/SRC/blogdetail/307?lang=en_US",
|
||||
"source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea"
|
||||
},
|
||||
{
|
||||
"url": "https://security.tecno.com/SRC/securityUpdates?type=SA",
|
||||
"source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2024/CVE-2024-82xx/CVE-2024-8246.json
Normal file
60
CVE-2024/CVE-2024-82xx/CVE-2024-8246.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2024-8246",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-14T04:15:04.493",
|
||||
"lastModified": "2024-09-14T04:15:04.493",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Post Form \u2013 Registration Form \u2013 Profile Form for User Profiles \u2013 Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.8.11. This is due to plugin not properly restricting what users have access to set the default role on registration forms. This makes it possible for authenticated attackers, with contributor-level access and above, to create a registration form with a custom role that allows them to register as administrators."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3149760/buddyforms/trunk/includes/admin/form-builder/meta-boxes/metabox-registration.php",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/40760f60-b81a-447b-a2c8-83c7666ce410?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-84xx/CVE-2024-8479.json
Normal file
64
CVE-2024/CVE-2024-84xx/CVE-2024-8479.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-8479",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-14T04:15:04.733",
|
||||
"lastModified": "2024-09-14T04:15:04.733",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The The Simple Spoiler plugin for WordPress is vulnerable to arbitrary shortcode execution in versions 1.2 to 1.3. This is due to the plugin adding the filter add_filter('comment_text', 'do_shortcode'); which will run all shortcodes in comments. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/simple-spoiler/trunk/simple-spoiler.php#L108",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3151179%40simple-spoiler&new=3151179%40simple-spoiler&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ffc76d8-b841-4c26-bbc6-1f96664efe36?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-86xx/CVE-2024-8669.json
Normal file
64
CVE-2024/CVE-2024-86xx/CVE-2024-8669.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-8669",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-14T04:15:04.963",
|
||||
"lastModified": "2024-09-14T04:15:04.963",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Backuply \u2013 Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter passed to the backuply_wp_clone_sql() function in all versions up to, and including, 1.3.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/backuply/trunk/functions.php#L1477",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3151205/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6a061553-c988-4a31-a0a2-7a2608faa33f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2024/CVE-2024-87xx/CVE-2024-8724.json
Normal file
64
CVE-2024/CVE-2024-87xx/CVE-2024-8724.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2024-8724",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-09-14T04:15:05.210",
|
||||
"lastModified": "2024-09-14T04:15:05.210",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Waitlist Woocommerce ( Back in stock notifier ) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.7.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/waitlist-woocommerce/trunk/admin/templates/xoo-wl-import-form.php#L8",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3151186%40waitlist-woocommerce&new=3151186%40waitlist-woocommerce&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c298c87e-cf3c-4b72-bb0e-a01ca2dfe52f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
21
README.md
21
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-09-14T04:00:17.136186+00:00
|
||||
2024-09-14T06:00:16.925704+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-09-14T03:15:08.987000+00:00
|
||||
2024-09-14T04:15:05.210000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,24 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
262871
|
||||
262876
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2022-3459](CVE-2022/CVE-2022-34xx/CVE-2022-3459.json) (`2024-09-14T03:15:02.347`)
|
||||
- [CVE-2024-8271](CVE-2024/CVE-2024-82xx/CVE-2024-8271.json) (`2024-09-14T03:15:08.730`)
|
||||
- [CVE-2024-8775](CVE-2024/CVE-2024-87xx/CVE-2024-8775.json) (`2024-09-14T03:15:08.987`)
|
||||
- [CVE-2024-8039](CVE-2024/CVE-2024-80xx/CVE-2024-8039.json) (`2024-09-14T04:15:04.377`)
|
||||
- [CVE-2024-8246](CVE-2024/CVE-2024-82xx/CVE-2024-8246.json) (`2024-09-14T04:15:04.493`)
|
||||
- [CVE-2024-8479](CVE-2024/CVE-2024-84xx/CVE-2024-8479.json) (`2024-09-14T04:15:04.733`)
|
||||
- [CVE-2024-8669](CVE-2024/CVE-2024-86xx/CVE-2024-8669.json) (`2024-09-14T04:15:04.963`)
|
||||
- [CVE-2024-8724](CVE-2024/CVE-2024-87xx/CVE-2024-8724.json) (`2024-09-14T04:15:05.210`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `1`
|
||||
|
||||
- [CVE-2023-5156](CVE-2023/CVE-2023-51xx/CVE-2023-5156.json) (`2024-09-14T03:15:02.617`)
|
||||
- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-09-14T03:15:08.143`)
|
||||
- [CVE-2024-2236](CVE-2024/CVE-2024-22xx/CVE-2024-2236.json) (`2024-09-14T04:15:02.903`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
17
_state.csv
17
_state.csv
@ -201694,7 +201694,7 @@ CVE-2022-3458,0,0,834446b0b464109915b4b499bcb648e2d2c701525e05ff89129f7d9fe10106
|
||||
CVE-2022-34580,0,0,3bc493ad0e7a0b4170568437f86af4c3c964701c1bd5abd9bfc45a505c7b51d1,2022-08-04T17:15:01.383000
|
||||
CVE-2022-34586,0,0,a011579053ff27f86e6a88cc003457abbf5ee9d851589f7bfe3e86ae3f13ca6a,2022-07-26T11:53:37.197000
|
||||
CVE-2022-34588,0,0,cbb99e45e15a33c631198f107a59981a56fc2f86de13eb744bfca0b900846a6b,2022-07-26T11:53:11.643000
|
||||
CVE-2022-3459,1,1,fdfaa1f2f0802788e318c638ef4508044708f0526fd6d2c140a4813b546870c5,2024-09-14T03:15:02.347000
|
||||
CVE-2022-3459,0,0,fdfaa1f2f0802788e318c638ef4508044708f0526fd6d2c140a4813b546870c5,2024-09-14T03:15:02.347000
|
||||
CVE-2022-34590,0,0,c8d44270c11381c2331bf6e1dc899e03a4a3498d1b44f02101242c3cfd3f9af4,2022-07-26T11:52:00.287000
|
||||
CVE-2022-34592,0,0,a74e2dc297296157bdc0c6e09ba85ba1c5bd50b0c3f22b27833690d3cc3b2da0,2023-08-01T21:15:10.193000
|
||||
CVE-2022-34593,0,0,b5d1f52496cf0925fd1c45183671a1ec1c74868575dbcc8a48a75bb69d63b20a,2022-08-04T03:06:17.717000
|
||||
@ -238240,7 +238240,7 @@ CVE-2023-51556,0,0,acf42d2aaeb30a8daebf4eac2d1231837be1ce96aad80f5e4a67db28fa961
|
||||
CVE-2023-51557,0,0,b3a5ade703e5c090a16f65ace8367c37780cb7d68dd55f1a1560a9cfdc21be57,2024-05-03T12:48:41.067000
|
||||
CVE-2023-51558,0,0,86b22ac23f78994f1de34336fa68b28a4a165fb8939338fe9b9f0d23ae3e99de,2024-05-03T12:48:41.067000
|
||||
CVE-2023-51559,0,0,d63ad902cf8cb899668ee02ff8cc1bb13aa7066d9b0d0a4c9df9041bc9cc0cce,2024-05-03T12:48:41.067000
|
||||
CVE-2023-5156,0,1,6fe396d6bc9b51c9b8db26bd9bb3711102eafce86ed40c14eaa952b7cd2dc61c,2024-09-14T03:15:02.617000
|
||||
CVE-2023-5156,0,0,6fe396d6bc9b51c9b8db26bd9bb3711102eafce86ed40c14eaa952b7cd2dc61c,2024-09-14T03:15:02.617000
|
||||
CVE-2023-51560,0,0,a069f88025a379ad5f37716f531b230028c1b7a6ff2d0a31c39268d7bf3c03d8,2024-05-03T12:48:41.067000
|
||||
CVE-2023-51561,0,0,6c95bac784c1c5207b1802cee51d4b7f04e8b0870845701dd794ca7cffd8d042,2024-05-03T12:48:41.067000
|
||||
CVE-2023-51562,0,0,0d2032fc20b9283a82066d8337227a6ef8147fa667ae1c70416d055922ceaa50,2024-05-03T12:48:41.067000
|
||||
@ -244708,7 +244708,7 @@ CVE-2024-22356,0,0,d7816a9ba601446ddf2f1791b2a20c669256f6d1556e00ed5243ed494ceab
|
||||
CVE-2024-22357,0,0,0bb0c823fb3ba54d21074ab797aca42f7312b217f24630a0cf642d75fe688e72,2024-04-12T12:43:57.400000
|
||||
CVE-2024-22358,0,0,c07de741e1bd331a637c3117a238b4cd328eb061aeff477aa27560ea4017f135,2024-04-15T13:15:31.997000
|
||||
CVE-2024-22359,0,0,7527962a22af823da8ade98e556ee19eb46f6b251e797d4d139c988ae5d9426a,2024-04-15T13:15:31.997000
|
||||
CVE-2024-2236,0,0,bb2a644225f51160d2d70ae285671d5c5f0eb62471234242a76e7ba857116af7,2024-04-25T17:15:49.467000
|
||||
CVE-2024-2236,0,1,e5b6845b6af232ea28836733d1c554f2997af2cc954a6fedfc237cd2b5ae70a2,2024-09-14T04:15:02.903000
|
||||
CVE-2024-22360,0,0,794526f63f464dad1a4d5860395245506ca742cb67b982581354267152f1e10b,2024-06-10T17:16:19.007000
|
||||
CVE-2024-22361,0,0,e267f7a58b4385dec5a7f5aef03064380edb1a73a3ecd2124af7f1bc930e0f03,2024-02-16T21:35:31.953000
|
||||
CVE-2024-22362,0,0,2767965890a6410063670fad313b54e2e770a22b941b7425a3750acfeece9725,2024-08-01T23:15:33.430000
|
||||
@ -261339,7 +261339,7 @@ CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036a
|
||||
CVE-2024-6384,0,0,69acc14adf4ad2dfa9acf19196e8d21558fac0b5469b1fd3bf540f24a32ab6da,2024-08-16T14:29:24.947000
|
||||
CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000
|
||||
CVE-2024-6386,0,0,9164927dbad6e7427231be8044dd2ccc9162f1a1173b863f2e4642cbddb16648,2024-08-22T12:48:02.790000
|
||||
CVE-2024-6387,0,1,33e863f5fbdb5ebd28cdb76db79962b7a834a7793cc2d1eb4023a387b3acaea2,2024-09-14T03:15:08.143000
|
||||
CVE-2024-6387,0,0,33e863f5fbdb5ebd28cdb76db79962b7a834a7793cc2d1eb4023a387b3acaea2,2024-09-14T03:15:08.143000
|
||||
CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000
|
||||
CVE-2024-6389,0,0,0f5288bc36ccabdeb644a7f1f848b2af478db86c3740cc3462d350146445ead0,2024-09-12T18:14:03.913000
|
||||
CVE-2024-6390,0,0,a350381d3f247972bbe468db9ec2332b3c135e89cdf36bdf1358f9f5965e67ff,2024-08-05T14:35:08.267000
|
||||
@ -262527,6 +262527,7 @@ CVE-2024-8030,0,0,b6f55198da4c8a890918e236b9cb91502d6b60f60aed340690526a7aff836e
|
||||
CVE-2024-8033,0,0,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fcdc,2024-08-27T19:39:04.953000
|
||||
CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000
|
||||
CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000
|
||||
CVE-2024-8039,1,1,8f2a2fcfd7c417ecae97778cd9132c74092430c0901ca7e28725e71c9490e2ac,2024-09-14T04:15:04.377000
|
||||
CVE-2024-8041,0,0,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a6898399,2024-09-11T16:54:10.997000
|
||||
CVE-2024-8042,0,0,fe11fe06852bd8872b8038bbdb1b59f9abf17559f4fd0139db22bc4b00f3a1bd,2024-09-09T18:30:12.050000
|
||||
CVE-2024-8045,0,0,05d36d75d042c2c9517546223100d3f67299fb6baf521e764ed39ac43e964a74,2024-09-11T16:26:11.920000
|
||||
@ -262649,6 +262650,7 @@ CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab149
|
||||
CVE-2024-8235,0,0,7072b68d002bcf4f9595f61b4137bd3d5b31c93ce76df9863ff0a1c3da8ed948,2024-09-03T12:59:02.453000
|
||||
CVE-2024-8241,0,0,35ebd2ab4c68ddc81effc80c2cf2eb8cf12caf111e7ab884d603a2c6bde8e766,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8242,0,0,eabaead787165955228d106aa395c02975627e82992ac6cac37c9a4940da9675,2024-09-13T16:37:22.997000
|
||||
CVE-2024-8246,1,1,f0634060b837e4911410fbf282109997688f216bc9da0e6449507685f47dac46,2024-09-14T04:15:04.493000
|
||||
CVE-2024-8247,0,0,5202f9f70242e6e766f5bf4ee04774da230414090293c913b32ce2eadeefe661,2024-09-06T12:08:04.550000
|
||||
CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b8c,2024-08-30T16:32:16.917000
|
||||
CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c205,2024-09-03T14:31:27.243000
|
||||
@ -262658,7 +262660,7 @@ CVE-2024-8258,0,0,f89f58eb5f0b3759dea8f0dae08eaa2a66704ca0d9d3594730a9f2f38b881d
|
||||
CVE-2024-8260,0,0,812d2a62f9a14f293d2814006504d857c705848c99804aae9066abfa5d1408ba,2024-09-03T12:59:02.453000
|
||||
CVE-2024-8268,0,0,ceeeab380c4c185371d3b97780ec883236427fb28d279219c56301bfbb794609,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8269,0,0,6959df07ba8dca53d305fc4ba2d36f7423abf6d3d4634237c83207cd594aadae,2024-09-13T16:37:22.997000
|
||||
CVE-2024-8271,1,1,faec4d17d0baa154f128f00974772adc6c7c3d567e0c31a66664b6f33cd04cdf,2024-09-14T03:15:08.730000
|
||||
CVE-2024-8271,0,0,faec4d17d0baa154f128f00974772adc6c7c3d567e0c31a66664b6f33cd04cdf,2024-09-14T03:15:08.730000
|
||||
CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a376a,2024-09-03T14:28:06.853000
|
||||
CVE-2024-8276,0,0,3274d76cbc571327fcfea77f70e01de12a7ccc769cbd3850878973b51b7dc40b,2024-09-13T19:19:42.293000
|
||||
CVE-2024-8277,0,0,927cb844bbeb99202846ea688baa5f560a39fb495f1767a0a934290c2ae10e58,2024-09-11T16:26:11.920000
|
||||
@ -262769,6 +262771,7 @@ CVE-2024-8471,0,0,d4cac4daadf018326a13905f788e8fc27e503497a3cff6ab0ea980773a6f76
|
||||
CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918cef,2024-09-06T11:44:34.543000
|
||||
CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000
|
||||
CVE-2024-8478,0,0,e333806b3f124cdccad931974c458d04f248d7fe56143afacc5e05746f5f352e,2024-09-10T12:09:50.377000
|
||||
CVE-2024-8479,1,1,5c812f3018d4ea30d0c31e629c501c2141087315132048a0077bbd0ac30929b6,2024-09-14T04:15:04.733000
|
||||
CVE-2024-8480,0,0,6f63c0c2b913be669f1e72f74bb0555ea9046fdf00f5eabae51a6bc6bb95358b,2024-09-06T12:08:04.550000
|
||||
CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000
|
||||
CVE-2024-8504,0,0,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000
|
||||
@ -262835,6 +262838,7 @@ CVE-2024-8656,0,0,fc862011d1e771531d08fceed2dec553d3fda9d67ee9f88d486fa676eb49a8
|
||||
CVE-2024-8663,0,0,95df1e4ddd212aa242aadc3c7cf5dbe906cc5735393ec0be59f396093ac78f31,2024-09-13T14:06:04.777000
|
||||
CVE-2024-8664,0,0,2555823c9f06fc746960b11f9d47a03631001b4434e03f9cf5f8083f2818653d,2024-09-13T14:06:04.777000
|
||||
CVE-2024-8665,0,0,09ab15f5f9bd70753d6f594bff7ff364c9764fb90e308cd08c47d778b9a8291f,2024-09-13T14:06:04.777000
|
||||
CVE-2024-8669,1,1,48602ca81adf826b8998af599afbec3560f42367d0a900c043afc8b95bc6b524,2024-09-14T04:15:04.963000
|
||||
CVE-2024-8686,0,0,ede88dcdbc0e792bd803e1f16895e5a739a1631453b49ef7e6a4fb82c32bd0dd,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8687,0,0,113cfff3abfee2dabf4872656a1085a998928e6c5f0a4785deb63af7b2621db8,2024-09-12T12:35:54.013000
|
||||
CVE-2024-8688,0,0,622feee60e16c8839b74efa94c0181d710fda4c1e7dbcb6de36b0dc3a1f1b61b,2024-09-12T12:35:54.013000
|
||||
@ -262854,6 +262858,7 @@ CVE-2024-8709,0,0,c4b78e9440da9a95da6880cb2eb594efc3dc26da0951b28cab597493ad1bb0
|
||||
CVE-2024-8710,0,0,4c5169ef585cdb335030b939d5748b4dbbc0a0ee6166dc565231ca1259e5b90c,2024-09-13T16:25:47.510000
|
||||
CVE-2024-8711,0,0,0a0fc486d277b8c36cfb49b6365925dae98dcfc88dd0e7309623a05e1f41ecb4,2024-09-13T16:18:15.670000
|
||||
CVE-2024-8714,0,0,14a80f672ac1addf2d6af312a3f9385aa51382477b48f1d6f20d0d47ee2ed76e,2024-09-13T16:37:22.997000
|
||||
CVE-2024-8724,1,1,760294304489112d275229c5edb430cdf6b365f53fb3979cc18477b428e2dd71,2024-09-14T04:15:05.210000
|
||||
CVE-2024-8730,0,0,07c237b22c1734957bdddd9f125f75ca033621d7b6a879c80b743a6b915122b0,2024-09-13T16:37:22.997000
|
||||
CVE-2024-8731,0,0,50a7afa44defac1c6ff0a2deb04f044634f339c2f1ca60bcd4a80d6dbf3437d5,2024-09-13T16:37:22.997000
|
||||
CVE-2024-8732,0,0,df7c83cce42f420b4b7d2e75a581be77048b76765bdf0b0cc3e2fff5e9adac06,2024-09-13T16:37:22.997000
|
||||
@ -262866,7 +262871,7 @@ CVE-2024-8750,0,0,418fabeb18e7b297a31252c3e8fef09ccda76bf14212f7478abfd99c5bae6a
|
||||
CVE-2024-8751,0,0,dd4f77422f5dc981129a2e765da3e243ee86648b85be15172cd0c4e6601f992a,2024-09-13T14:06:04.777000
|
||||
CVE-2024-8754,0,0,dcef29ecbc812aa49fbf1b13b0eb401b8ca812115ed5357160273332851b27b7,2024-09-12T18:14:03.913000
|
||||
CVE-2024-8762,0,0,3365b2a60700d4c241af4290619684dfef583475bffb6fbc1a1478d60b8c3c6d,2024-09-13T14:06:04.777000
|
||||
CVE-2024-8775,1,1,9c7a2c7607df17819648d9553bf2e2c7ee01c28f4d5223eb962d1525c112062b,2024-09-14T03:15:08.987000
|
||||
CVE-2024-8775,0,0,9c7a2c7607df17819648d9553bf2e2c7ee01c28f4d5223eb962d1525c112062b,2024-09-14T03:15:08.987000
|
||||
CVE-2024-8782,0,0,501c3b3a165d141bbc3bb94c461ca06a9bef3c326910611a1048598228ce7cef,2024-09-13T18:15:07.920000
|
||||
CVE-2024-8783,0,0,3a34098c67c08db9d3236f30ec7f0369a15c553a22b6b91542612c74c80835bf,2024-09-13T19:15:18.120000
|
||||
CVE-2024-8784,0,0,b8f4f74d0f03db496bcb727221454329f3d27fa057332e76fa82e85a162fa5a3,2024-09-13T19:15:18.430000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user