Auto-Update: 2024-09-14T06:00:16.925704+00:00

This commit is contained in:
cad-safe-bot 2024-09-14 06:03:15 +00:00
parent bd90921333
commit 2943b1f2fe
8 changed files with 312 additions and 21 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2236",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-06T22:15:57.977",
"lastModified": "2024-04-25T17:15:49.467",
"lastModified": "2024-09-14T04:15:02.903",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -59,10 +59,6 @@
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245218",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268268",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-8039",
"sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",
"published": "2024-09-14T04:15:04.377",
"lastModified": "2024-09-14T04:15:04.377",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper permission configurationDomain configuration vulnerability of the mobile application (com.afmobi.boomplayer) can lead to account takeover risks."
}
],
"metrics": {},
"weaknesses": [
{
"source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"references": [
{
"url": "https://security.tecno.com/SRC/blogdetail/307?lang=en_US",
"source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea"
},
{
"url": "https://security.tecno.com/SRC/securityUpdates?type=SA",
"source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-8246",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-14T04:15:04.493",
"lastModified": "2024-09-14T04:15:04.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Post Form \u2013 Registration Form \u2013 Profile Form for User Profiles \u2013 Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.8.11. This is due to plugin not properly restricting what users have access to set the default role on registration forms. This makes it possible for authenticated attackers, with contributor-level access and above, to create a registration form with a custom role that allows them to register as administrators."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3149760/buddyforms/trunk/includes/admin/form-builder/meta-boxes/metabox-registration.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/40760f60-b81a-447b-a2c8-83c7666ce410?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-8479",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-14T04:15:04.733",
"lastModified": "2024-09-14T04:15:04.733",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The Simple Spoiler plugin for WordPress is vulnerable to arbitrary shortcode execution in versions 1.2 to 1.3. This is due to the plugin adding the filter add_filter('comment_text', 'do_shortcode'); which will run all shortcodes in comments. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/simple-spoiler/trunk/simple-spoiler.php#L108",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3151179%40simple-spoiler&new=3151179%40simple-spoiler&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ffc76d8-b841-4c26-bbc6-1f96664efe36?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-8669",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-14T04:15:04.963",
"lastModified": "2024-09-14T04:15:04.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Backuply \u2013 Backup, Restore, Migrate and Clone plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter passed to the backuply_wp_clone_sql() function in all versions up to, and including, 1.3.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/backuply/trunk/functions.php#L1477",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3151205/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6a061553-c988-4a31-a0a2-7a2608faa33f?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-8724",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-14T04:15:05.210",
"lastModified": "2024-09-14T04:15:05.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Waitlist Woocommerce ( Back in stock notifier ) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.7.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/waitlist-woocommerce/trunk/admin/templates/xoo-wl-import-form.php#L8",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3151186%40waitlist-woocommerce&new=3151186%40waitlist-woocommerce&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c298c87e-cf3c-4b72-bb0e-a01ca2dfe52f?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-14T04:00:17.136186+00:00
2024-09-14T06:00:16.925704+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-14T03:15:08.987000+00:00
2024-09-14T04:15:05.210000+00:00
```
### Last Data Feed Release
@ -33,24 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
262871
262876
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `5`
- [CVE-2022-3459](CVE-2022/CVE-2022-34xx/CVE-2022-3459.json) (`2024-09-14T03:15:02.347`)
- [CVE-2024-8271](CVE-2024/CVE-2024-82xx/CVE-2024-8271.json) (`2024-09-14T03:15:08.730`)
- [CVE-2024-8775](CVE-2024/CVE-2024-87xx/CVE-2024-8775.json) (`2024-09-14T03:15:08.987`)
- [CVE-2024-8039](CVE-2024/CVE-2024-80xx/CVE-2024-8039.json) (`2024-09-14T04:15:04.377`)
- [CVE-2024-8246](CVE-2024/CVE-2024-82xx/CVE-2024-8246.json) (`2024-09-14T04:15:04.493`)
- [CVE-2024-8479](CVE-2024/CVE-2024-84xx/CVE-2024-8479.json) (`2024-09-14T04:15:04.733`)
- [CVE-2024-8669](CVE-2024/CVE-2024-86xx/CVE-2024-8669.json) (`2024-09-14T04:15:04.963`)
- [CVE-2024-8724](CVE-2024/CVE-2024-87xx/CVE-2024-8724.json) (`2024-09-14T04:15:05.210`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `1`
- [CVE-2023-5156](CVE-2023/CVE-2023-51xx/CVE-2023-5156.json) (`2024-09-14T03:15:02.617`)
- [CVE-2024-6387](CVE-2024/CVE-2024-63xx/CVE-2024-6387.json) (`2024-09-14T03:15:08.143`)
- [CVE-2024-2236](CVE-2024/CVE-2024-22xx/CVE-2024-2236.json) (`2024-09-14T04:15:02.903`)
## Download and Usage

View File

@ -201694,7 +201694,7 @@ CVE-2022-3458,0,0,834446b0b464109915b4b499bcb648e2d2c701525e05ff89129f7d9fe10106
CVE-2022-34580,0,0,3bc493ad0e7a0b4170568437f86af4c3c964701c1bd5abd9bfc45a505c7b51d1,2022-08-04T17:15:01.383000
CVE-2022-34586,0,0,a011579053ff27f86e6a88cc003457abbf5ee9d851589f7bfe3e86ae3f13ca6a,2022-07-26T11:53:37.197000
CVE-2022-34588,0,0,cbb99e45e15a33c631198f107a59981a56fc2f86de13eb744bfca0b900846a6b,2022-07-26T11:53:11.643000
CVE-2022-3459,1,1,fdfaa1f2f0802788e318c638ef4508044708f0526fd6d2c140a4813b546870c5,2024-09-14T03:15:02.347000
CVE-2022-3459,0,0,fdfaa1f2f0802788e318c638ef4508044708f0526fd6d2c140a4813b546870c5,2024-09-14T03:15:02.347000
CVE-2022-34590,0,0,c8d44270c11381c2331bf6e1dc899e03a4a3498d1b44f02101242c3cfd3f9af4,2022-07-26T11:52:00.287000
CVE-2022-34592,0,0,a74e2dc297296157bdc0c6e09ba85ba1c5bd50b0c3f22b27833690d3cc3b2da0,2023-08-01T21:15:10.193000
CVE-2022-34593,0,0,b5d1f52496cf0925fd1c45183671a1ec1c74868575dbcc8a48a75bb69d63b20a,2022-08-04T03:06:17.717000
@ -238240,7 +238240,7 @@ CVE-2023-51556,0,0,acf42d2aaeb30a8daebf4eac2d1231837be1ce96aad80f5e4a67db28fa961
CVE-2023-51557,0,0,b3a5ade703e5c090a16f65ace8367c37780cb7d68dd55f1a1560a9cfdc21be57,2024-05-03T12:48:41.067000
CVE-2023-51558,0,0,86b22ac23f78994f1de34336fa68b28a4a165fb8939338fe9b9f0d23ae3e99de,2024-05-03T12:48:41.067000
CVE-2023-51559,0,0,d63ad902cf8cb899668ee02ff8cc1bb13aa7066d9b0d0a4c9df9041bc9cc0cce,2024-05-03T12:48:41.067000
CVE-2023-5156,0,1,6fe396d6bc9b51c9b8db26bd9bb3711102eafce86ed40c14eaa952b7cd2dc61c,2024-09-14T03:15:02.617000
CVE-2023-5156,0,0,6fe396d6bc9b51c9b8db26bd9bb3711102eafce86ed40c14eaa952b7cd2dc61c,2024-09-14T03:15:02.617000
CVE-2023-51560,0,0,a069f88025a379ad5f37716f531b230028c1b7a6ff2d0a31c39268d7bf3c03d8,2024-05-03T12:48:41.067000
CVE-2023-51561,0,0,6c95bac784c1c5207b1802cee51d4b7f04e8b0870845701dd794ca7cffd8d042,2024-05-03T12:48:41.067000
CVE-2023-51562,0,0,0d2032fc20b9283a82066d8337227a6ef8147fa667ae1c70416d055922ceaa50,2024-05-03T12:48:41.067000
@ -244708,7 +244708,7 @@ CVE-2024-22356,0,0,d7816a9ba601446ddf2f1791b2a20c669256f6d1556e00ed5243ed494ceab
CVE-2024-22357,0,0,0bb0c823fb3ba54d21074ab797aca42f7312b217f24630a0cf642d75fe688e72,2024-04-12T12:43:57.400000
CVE-2024-22358,0,0,c07de741e1bd331a637c3117a238b4cd328eb061aeff477aa27560ea4017f135,2024-04-15T13:15:31.997000
CVE-2024-22359,0,0,7527962a22af823da8ade98e556ee19eb46f6b251e797d4d139c988ae5d9426a,2024-04-15T13:15:31.997000
CVE-2024-2236,0,0,bb2a644225f51160d2d70ae285671d5c5f0eb62471234242a76e7ba857116af7,2024-04-25T17:15:49.467000
CVE-2024-2236,0,1,e5b6845b6af232ea28836733d1c554f2997af2cc954a6fedfc237cd2b5ae70a2,2024-09-14T04:15:02.903000
CVE-2024-22360,0,0,794526f63f464dad1a4d5860395245506ca742cb67b982581354267152f1e10b,2024-06-10T17:16:19.007000
CVE-2024-22361,0,0,e267f7a58b4385dec5a7f5aef03064380edb1a73a3ecd2124af7f1bc930e0f03,2024-02-16T21:35:31.953000
CVE-2024-22362,0,0,2767965890a6410063670fad313b54e2e770a22b941b7425a3750acfeece9725,2024-08-01T23:15:33.430000
@ -261339,7 +261339,7 @@ CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036a
CVE-2024-6384,0,0,69acc14adf4ad2dfa9acf19196e8d21558fac0b5469b1fd3bf540f24a32ab6da,2024-08-16T14:29:24.947000
CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000
CVE-2024-6386,0,0,9164927dbad6e7427231be8044dd2ccc9162f1a1173b863f2e4642cbddb16648,2024-08-22T12:48:02.790000
CVE-2024-6387,0,1,33e863f5fbdb5ebd28cdb76db79962b7a834a7793cc2d1eb4023a387b3acaea2,2024-09-14T03:15:08.143000
CVE-2024-6387,0,0,33e863f5fbdb5ebd28cdb76db79962b7a834a7793cc2d1eb4023a387b3acaea2,2024-09-14T03:15:08.143000
CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000
CVE-2024-6389,0,0,0f5288bc36ccabdeb644a7f1f848b2af478db86c3740cc3462d350146445ead0,2024-09-12T18:14:03.913000
CVE-2024-6390,0,0,a350381d3f247972bbe468db9ec2332b3c135e89cdf36bdf1358f9f5965e67ff,2024-08-05T14:35:08.267000
@ -262527,6 +262527,7 @@ CVE-2024-8030,0,0,b6f55198da4c8a890918e236b9cb91502d6b60f60aed340690526a7aff836e
CVE-2024-8033,0,0,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fcdc,2024-08-27T19:39:04.953000
CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000
CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000
CVE-2024-8039,1,1,8f2a2fcfd7c417ecae97778cd9132c74092430c0901ca7e28725e71c9490e2ac,2024-09-14T04:15:04.377000
CVE-2024-8041,0,0,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a6898399,2024-09-11T16:54:10.997000
CVE-2024-8042,0,0,fe11fe06852bd8872b8038bbdb1b59f9abf17559f4fd0139db22bc4b00f3a1bd,2024-09-09T18:30:12.050000
CVE-2024-8045,0,0,05d36d75d042c2c9517546223100d3f67299fb6baf521e764ed39ac43e964a74,2024-09-11T16:26:11.920000
@ -262649,6 +262650,7 @@ CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab149
CVE-2024-8235,0,0,7072b68d002bcf4f9595f61b4137bd3d5b31c93ce76df9863ff0a1c3da8ed948,2024-09-03T12:59:02.453000
CVE-2024-8241,0,0,35ebd2ab4c68ddc81effc80c2cf2eb8cf12caf111e7ab884d603a2c6bde8e766,2024-09-10T12:09:50.377000
CVE-2024-8242,0,0,eabaead787165955228d106aa395c02975627e82992ac6cac37c9a4940da9675,2024-09-13T16:37:22.997000
CVE-2024-8246,1,1,f0634060b837e4911410fbf282109997688f216bc9da0e6449507685f47dac46,2024-09-14T04:15:04.493000
CVE-2024-8247,0,0,5202f9f70242e6e766f5bf4ee04774da230414090293c913b32ce2eadeefe661,2024-09-06T12:08:04.550000
CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b8c,2024-08-30T16:32:16.917000
CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c205,2024-09-03T14:31:27.243000
@ -262658,7 +262660,7 @@ CVE-2024-8258,0,0,f89f58eb5f0b3759dea8f0dae08eaa2a66704ca0d9d3594730a9f2f38b881d
CVE-2024-8260,0,0,812d2a62f9a14f293d2814006504d857c705848c99804aae9066abfa5d1408ba,2024-09-03T12:59:02.453000
CVE-2024-8268,0,0,ceeeab380c4c185371d3b97780ec883236427fb28d279219c56301bfbb794609,2024-09-10T12:09:50.377000
CVE-2024-8269,0,0,6959df07ba8dca53d305fc4ba2d36f7423abf6d3d4634237c83207cd594aadae,2024-09-13T16:37:22.997000
CVE-2024-8271,1,1,faec4d17d0baa154f128f00974772adc6c7c3d567e0c31a66664b6f33cd04cdf,2024-09-14T03:15:08.730000
CVE-2024-8271,0,0,faec4d17d0baa154f128f00974772adc6c7c3d567e0c31a66664b6f33cd04cdf,2024-09-14T03:15:08.730000
CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a376a,2024-09-03T14:28:06.853000
CVE-2024-8276,0,0,3274d76cbc571327fcfea77f70e01de12a7ccc769cbd3850878973b51b7dc40b,2024-09-13T19:19:42.293000
CVE-2024-8277,0,0,927cb844bbeb99202846ea688baa5f560a39fb495f1767a0a934290c2ae10e58,2024-09-11T16:26:11.920000
@ -262769,6 +262771,7 @@ CVE-2024-8471,0,0,d4cac4daadf018326a13905f788e8fc27e503497a3cff6ab0ea980773a6f76
CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918cef,2024-09-06T11:44:34.543000
CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000
CVE-2024-8478,0,0,e333806b3f124cdccad931974c458d04f248d7fe56143afacc5e05746f5f352e,2024-09-10T12:09:50.377000
CVE-2024-8479,1,1,5c812f3018d4ea30d0c31e629c501c2141087315132048a0077bbd0ac30929b6,2024-09-14T04:15:04.733000
CVE-2024-8480,0,0,6f63c0c2b913be669f1e72f74bb0555ea9046fdf00f5eabae51a6bc6bb95358b,2024-09-06T12:08:04.550000
CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000
CVE-2024-8504,0,0,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000
@ -262835,6 +262838,7 @@ CVE-2024-8656,0,0,fc862011d1e771531d08fceed2dec553d3fda9d67ee9f88d486fa676eb49a8
CVE-2024-8663,0,0,95df1e4ddd212aa242aadc3c7cf5dbe906cc5735393ec0be59f396093ac78f31,2024-09-13T14:06:04.777000
CVE-2024-8664,0,0,2555823c9f06fc746960b11f9d47a03631001b4434e03f9cf5f8083f2818653d,2024-09-13T14:06:04.777000
CVE-2024-8665,0,0,09ab15f5f9bd70753d6f594bff7ff364c9764fb90e308cd08c47d778b9a8291f,2024-09-13T14:06:04.777000
CVE-2024-8669,1,1,48602ca81adf826b8998af599afbec3560f42367d0a900c043afc8b95bc6b524,2024-09-14T04:15:04.963000
CVE-2024-8686,0,0,ede88dcdbc0e792bd803e1f16895e5a739a1631453b49ef7e6a4fb82c32bd0dd,2024-09-12T12:35:54.013000
CVE-2024-8687,0,0,113cfff3abfee2dabf4872656a1085a998928e6c5f0a4785deb63af7b2621db8,2024-09-12T12:35:54.013000
CVE-2024-8688,0,0,622feee60e16c8839b74efa94c0181d710fda4c1e7dbcb6de36b0dc3a1f1b61b,2024-09-12T12:35:54.013000
@ -262854,6 +262858,7 @@ CVE-2024-8709,0,0,c4b78e9440da9a95da6880cb2eb594efc3dc26da0951b28cab597493ad1bb0
CVE-2024-8710,0,0,4c5169ef585cdb335030b939d5748b4dbbc0a0ee6166dc565231ca1259e5b90c,2024-09-13T16:25:47.510000
CVE-2024-8711,0,0,0a0fc486d277b8c36cfb49b6365925dae98dcfc88dd0e7309623a05e1f41ecb4,2024-09-13T16:18:15.670000
CVE-2024-8714,0,0,14a80f672ac1addf2d6af312a3f9385aa51382477b48f1d6f20d0d47ee2ed76e,2024-09-13T16:37:22.997000
CVE-2024-8724,1,1,760294304489112d275229c5edb430cdf6b365f53fb3979cc18477b428e2dd71,2024-09-14T04:15:05.210000
CVE-2024-8730,0,0,07c237b22c1734957bdddd9f125f75ca033621d7b6a879c80b743a6b915122b0,2024-09-13T16:37:22.997000
CVE-2024-8731,0,0,50a7afa44defac1c6ff0a2deb04f044634f339c2f1ca60bcd4a80d6dbf3437d5,2024-09-13T16:37:22.997000
CVE-2024-8732,0,0,df7c83cce42f420b4b7d2e75a581be77048b76765bdf0b0cc3e2fff5e9adac06,2024-09-13T16:37:22.997000
@ -262866,7 +262871,7 @@ CVE-2024-8750,0,0,418fabeb18e7b297a31252c3e8fef09ccda76bf14212f7478abfd99c5bae6a
CVE-2024-8751,0,0,dd4f77422f5dc981129a2e765da3e243ee86648b85be15172cd0c4e6601f992a,2024-09-13T14:06:04.777000
CVE-2024-8754,0,0,dcef29ecbc812aa49fbf1b13b0eb401b8ca812115ed5357160273332851b27b7,2024-09-12T18:14:03.913000
CVE-2024-8762,0,0,3365b2a60700d4c241af4290619684dfef583475bffb6fbc1a1478d60b8c3c6d,2024-09-13T14:06:04.777000
CVE-2024-8775,1,1,9c7a2c7607df17819648d9553bf2e2c7ee01c28f4d5223eb962d1525c112062b,2024-09-14T03:15:08.987000
CVE-2024-8775,0,0,9c7a2c7607df17819648d9553bf2e2c7ee01c28f4d5223eb962d1525c112062b,2024-09-14T03:15:08.987000
CVE-2024-8782,0,0,501c3b3a165d141bbc3bb94c461ca06a9bef3c326910611a1048598228ce7cef,2024-09-13T18:15:07.920000
CVE-2024-8783,0,0,3a34098c67c08db9d3236f30ec7f0369a15c553a22b6b91542612c74c80835bf,2024-09-13T19:15:18.120000
CVE-2024-8784,0,0,b8f4f74d0f03db496bcb727221454329f3d27fa057332e76fa82e85a162fa5a3,2024-09-13T19:15:18.430000

Can't render this file because it is too large.