Auto-Update: 2024-09-28T04:00:17.066937+00:00

This commit is contained in:
cad-safe-bot 2024-09-28 04:03:16 +00:00
parent 3e06cd7f9c
commit 45aa3b32cb
9 changed files with 420 additions and 18 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2002",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-18T13:15:07.657",
"lastModified": "2024-04-19T23:15:10.720",
"lastModified": "2024-09-28T03:15:02.157",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -63,10 +63,6 @@
{
"url": "https://github.com/davea42/libdwarf-code/blob/main/bugxml/data.txt",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGPVLSPIXR32J6FOAFTTIMYTUUXJICGW/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,76 @@
{
"id": "CVE-2024-8353",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-28T02:15:09.880",
"lastModified": "2024-09-28T02:15:09.880",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The GiveWP \u2013 Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.16.1 via deserialization of untrusted input via several parameters like 'give_title' and 'card_address'. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to delete arbitrary files and achieve remote code execution. This is essentially the same vulnerability as CVE-2024-5932, however, it was discovered the the presence of stripslashes_deep on user_info allows the is_serialized check to be bypassed. This issue was mostly patched in 3.16.1, but further hardening was added in 3.16.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/give/tags/3.16.0/includes/process-donation.php#L154",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3149290/give/tags/3.16.1/includes/admin/admin-actions.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3149290/give/tags/3.16.1/includes/process-donation.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3149290/give/tags/3.16.1/src/Helpers/Utils.php",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3157829/give/tags/3.16.2/includes/process-donation.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c4c530fa-eaf4-4721-bfb6-9fc06d7f343c?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-8547",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-28T02:15:10.150",
"lastModified": "2024-09-28T02:15:10.150",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Simple Popup Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's [popup] shortcode in all versions up to, and including, 4.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/simple-popup-plugin/trunk/simple_popup_plugin.php#L87",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/217da4de-38df-41ff-b138-f12d4f8999cd?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-8715",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-28T03:15:02.330",
"lastModified": "2024-09-28T03:15:02.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Simple LDAP Login plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.6.0. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/simple-ldap-login/tags/1.6.0/Simple-LDAP-Login-Admin.php#L15",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3158322/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cbaa95d4-899f-49a0-a888-4ffee61c0335?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-8788",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-28T02:15:10.380",
"lastModified": "2024-09-28T02:15:10.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The EU/UK VAT Manager for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.12.11. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/eu-vat-for-woocommerce/tags/2.12.12/includes/admin/class-alg-wc-eu-vat-admin.php#L461",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3158296/eu-vat-for-woocommerce/tags/2.12.14/includes/admin/class-alg-wc-eu-vat-admin.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/443c57bf-2f3d-4b8f-9dae-b11142a74341?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-9023",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-28T02:15:10.630",
"lastModified": "2024-09-28T02:15:10.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP-WebAuthn plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wwa_login_form shortcode in all versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-webauthn/trunk/blocks/blocks.build.js#L1",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/wp-webauthn/trunk/wwa-shortcodes.php#L51",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/wp-webauthn/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/77247a6b-2473-4b36-9ad8-b7802e4fad32?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-9189",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-28T02:15:10.860",
"lastModified": "2024-09-28T02:15:10.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The EU/UK VAT Manager for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the alg_wc_eu_vat_exempt_vat_from_admin() function in all versions up to, and including, 2.12.12. This makes it possible for unauthenticated attackers to update the VAT status for any order."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/eu-vat-for-woocommerce/tags/2.12.12/includes/class-alg-wc-eu-vat-ajax.php#L285",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3158296/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c6db680e-1fd4-420c-98f4-2b6dc5cf6781?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-27T23:55:17.257007+00:00
2024-09-28T04:00:17.066937+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-27T22:15:13.363000+00:00
2024-09-28T03:15:02.330000+00:00
```
### Last Data Feed Release
@ -27,28 +27,32 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-09-27T00:00:08.672806+00:00
2024-09-28T00:00:08.677685+00:00
```
### Total Number of included CVEs
```plain
264071
264077
```
### CVEs added in the last Commit
Recently added CVEs: `3`
Recently added CVEs: `6`
- [CVE-2024-23586](CVE-2024/CVE-2024-235xx/CVE-2024-23586.json) (`2024-09-27T22:15:12.930`)
- [CVE-2024-38796](CVE-2024/CVE-2024-387xx/CVE-2024-38796.json) (`2024-09-27T22:15:13.153`)
- [CVE-2024-9294](CVE-2024/CVE-2024-92xx/CVE-2024-9294.json) (`2024-09-27T22:15:13.363`)
- [CVE-2024-8353](CVE-2024/CVE-2024-83xx/CVE-2024-8353.json) (`2024-09-28T02:15:09.880`)
- [CVE-2024-8547](CVE-2024/CVE-2024-85xx/CVE-2024-8547.json) (`2024-09-28T02:15:10.150`)
- [CVE-2024-8715](CVE-2024/CVE-2024-87xx/CVE-2024-8715.json) (`2024-09-28T03:15:02.330`)
- [CVE-2024-8788](CVE-2024/CVE-2024-87xx/CVE-2024-8788.json) (`2024-09-28T02:15:10.380`)
- [CVE-2024-9023](CVE-2024/CVE-2024-90xx/CVE-2024-9023.json) (`2024-09-28T02:15:10.630`)
- [CVE-2024-9189](CVE-2024/CVE-2024-91xx/CVE-2024-9189.json) (`2024-09-28T02:15:10.860`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `1`
- [CVE-2024-2002](CVE-2024/CVE-2024-20xx/CVE-2024-2002.json) (`2024-09-28T03:15:02.157`)
## Download and Usage

View File

@ -243078,7 +243078,7 @@ CVE-2024-20016,0,0,23d42679a125731e1842dc4827fc98ffaa2afa5f0ebd1d4093677bb31bac3
CVE-2024-20017,0,0,e059139e195c0968ff52ee5f455fa4418ea8a9a143b13fab90741213fcc95a4f,2024-09-25T01:36:50.810000
CVE-2024-20018,0,0,726df3dd864299e07f583c1e2b849252cfb17de57b97096fe56062a3e8e057c7,2024-08-27T21:35:08.523000
CVE-2024-20019,0,0,9ac59b07fd070968055b3fc5eec95b892ffe4596c92f97cb9ed025632cc29b53,2024-08-01T13:46:17.030000
CVE-2024-2002,0,0,9bb787dd73ad4270fec473ae00d969f2b5c55795bbfeec9dd3a74d6c7578cada,2024-04-19T23:15:10.720000
CVE-2024-2002,0,1,9af87a6a6f4fec7b7ca2736b6ab4f773d20d2aa8d6b389c0c4913098c0225885,2024-09-28T03:15:02.157000
CVE-2024-20020,0,0,1af2be5239e7889690a24490c95fb1d9708b12f77c9dc96edd896786cba1d93c,2024-03-04T13:58:23.447000
CVE-2024-20021,0,0,9da6b4090664581723961fe14bfe7a2d90b8c57bd1123df3f77b75a47e068fa3,2024-07-03T01:45:47.187000
CVE-2024-20022,0,0,6248993b7a916d38fa8ce9e8b47c6621a4becdde41eda305169e026bd72d98e8,2024-03-04T13:58:23.447000
@ -245550,7 +245550,7 @@ CVE-2024-2358,0,0,0ca353146b040adce527451621b2de0180b82568eb0731d510f8a061107831
CVE-2024-23580,0,0,5718ea9f66086a41a59f079246d02ed41858f86711210914df45620e8d73526f,2024-07-03T01:47:56.403000
CVE-2024-23583,0,0,f98c04f8a3f19a919e4cfb4d28d06a64ab798bebf069087ad8f6f94890d95eb5,2024-05-20T13:00:34.807000
CVE-2024-23584,0,0,25f43dde9216afa9143a8cf07755b8e095a8ff52fd4b037e0c34ead99c4a7c82,2024-04-11T01:24:48.327000
CVE-2024-23586,1,1,6ee72891a4683cc42660aaf3bba524a29cd501473051e34da54738b14189bde2,2024-09-27T22:15:12.930000
CVE-2024-23586,0,0,6ee72891a4683cc42660aaf3bba524a29cd501473051e34da54738b14189bde2,2024-09-27T22:15:12.930000
CVE-2024-23588,0,0,616193c58804c0df33f02bbe918628fdff6c0cb92f6852ea08810ac3765e566c,2024-07-08T15:28:10.993000
CVE-2024-2359,0,0,bea5a27f1890e6b98f8fc3b4cbe7c984687ed5b340caf950afed71935b795710,2024-06-07T14:56:05.647000
CVE-2024-23591,0,0,65ea9c151d9d7befc9470a956acb00d512d494f9281b48487341988483da52d2,2024-02-20T22:15:08.353000
@ -256429,7 +256429,7 @@ CVE-2024-3879,0,0,a6db760401fb215a79d8f48992cc838e1a5c23839a86defd39dd342ef1c5f8
CVE-2024-38791,0,0,5a7109970d4cb90cfbe2865705276e5511d9a261f6cba475b72302a204ad6517,2024-08-02T12:59:43.990000
CVE-2024-38793,0,0,8ad7655f99bb4b3fa4f36342468e0b68d719584b816ac8effce8d0ff63e4b98c,2024-09-13T20:57:16.150000
CVE-2024-38795,0,0,83e6ed558db6ed1b1b849abb4b7528bc0fb3b0856b9448de9d080b54c41c3121,2024-08-30T16:31:03.887000
CVE-2024-38796,1,1,427b62fcd3401b83db8f34cb8e43b32c20a3cb4a0ccf3e3dde8fc590ec06176a,2024-09-27T22:15:13.153000
CVE-2024-38796,0,0,427b62fcd3401b83db8f34cb8e43b32c20a3cb4a0ccf3e3dde8fc590ec06176a,2024-09-27T22:15:13.153000
CVE-2024-3880,0,0,6dd5da57a8412b823038a64a32d07af4547e4dfdd637b54b90b4556bfd34431d,2024-06-04T19:20:26
CVE-2024-38806,0,0,aa1ff0885d521aab036aaf6506258a484aa869322b524482869e0e1df3ac4a48,2024-07-19T13:01:44.567000
CVE-2024-38807,0,0,6663b89433c5ca3162ac8e0676fc16d9b92af7b1823f84debbce11cbc23a4743,2024-08-23T16:18:28.547000
@ -263676,6 +263676,7 @@ CVE-2024-8347,0,0,14715b4855076c65c4bf21be6c68b62e0d22e8650a0e63bf9f5074414663f3
CVE-2024-8348,0,0,d08ea1deaed5cbc2f4a773e843468145326bb3a1da186780c7ff7b6cd74aae9b,2024-09-04T16:43:30.310000
CVE-2024-8349,0,0,66c929a2bd31259ac7f99499cacb7946e158950a66ce33bab4e6efb6d8c7636a,2024-09-26T13:32:02.803000
CVE-2024-8350,0,0,f8ffd63945ba91a36195e839079351a67afb6a0aef5d0bff0efca569bbd0260e,2024-09-26T13:32:02.803000
CVE-2024-8353,1,1,7873b1b26e2f282038fe014741f07e32586bb76fb27d55cfbf21f17de32bf93d,2024-09-28T02:15:09.880000
CVE-2024-8354,0,0,0cb564ed9384fcf3167b4bc2e43f53ae9109518b7fd9476c53aef4e78eb45a15,2024-09-25T16:58:59.537000
CVE-2024-8362,0,0,54abf718b9bfba93199694e9f50bfa28d6dfde9a56fb3c77d91594ed8cbda92f,2024-09-04T14:35:16.777000
CVE-2024-8363,0,0,01e2f3c42ed63ca762fc774c70d7336df5274e0f5dacdde750731dfd76f769a2,2024-09-11T16:35:05.653000
@ -263770,6 +263771,7 @@ CVE-2024-8538,0,0,037a1de419d434bcf3dba0ee797a8b9a465b537393317b1c47cc2bb770ec2f
CVE-2024-8543,0,0,1827ebc325d7546f1e75a8e16ffad13bc42c9eac828d9fdcb95bbdde0c532bed,2024-09-27T16:46:26.243000
CVE-2024-8544,0,0,029a23631e96ee15c1045dd3fa22aca85d39405998de7d891aefcd30e632fd70,2024-09-27T12:57:21.617000
CVE-2024-8546,0,0,21c437f0d9de25e8960a2d9fbc9927a015111c992509c4b53747f59b9615f4f7,2024-09-26T13:32:02.803000
CVE-2024-8547,1,1,ad348c287d155b64ea4b0103a16f672d6e30a6a1d965182b02cee0946fe0d765,2024-09-28T02:15:10.150000
CVE-2024-8549,0,0,26824bba4a7be5d3e1980cceb3f14676382c512f326742b207079a7edab4cb14,2024-09-26T13:32:02.803000
CVE-2024-8552,0,0,6594d79506dd28071c715cfa6c7597507b339576bdff1f377ea688092ea69413,2024-09-26T13:32:02.803000
CVE-2024-8554,0,0,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000
@ -263875,6 +263877,7 @@ CVE-2024-8710,0,0,4c5169ef585cdb335030b939d5748b4dbbc0a0ee6166dc565231ca1259e5b9
CVE-2024-8711,0,0,0a0fc486d277b8c36cfb49b6365925dae98dcfc88dd0e7309623a05e1f41ecb4,2024-09-13T16:18:15.670000
CVE-2024-8713,0,0,77e6eb32497c4838ab6eff0729860dc19e9280431833bec790cbdd0c191045a7,2024-09-26T13:32:02.803000
CVE-2024-8714,0,0,2bf1d2039d26904f97b1e8fc522abe5916905f0e0d26ed18e01afb2d802fce13,2024-09-26T20:06:46.330000
CVE-2024-8715,1,1,5dd80a9e377e26833109e36a9f853397f40930511fcbb10d79b8fb2a0b5afb14,2024-09-28T03:15:02.330000
CVE-2024-8716,0,0,1bb41aeeebe4e896420adf3cdaff53e3d88a64a7e4d1f07d25f8bcb2da122bf8,2024-09-26T17:03:05.487000
CVE-2024-8723,0,0,778d0a0398aed78fe986c3e106c93b2232e3d42b0102981078399ce3c143c0f8,2024-09-26T13:32:02.803000
CVE-2024-8724,0,0,41e3dd453fbe3c0072e7ab470e5d529ac122f059bb60a2be671564b989c49676,2024-09-27T15:56:00.073000
@ -263910,6 +263913,7 @@ CVE-2024-8780,0,0,390f3cd9aeaa4212ebd65fe7e603fc1df2783bc2afd801c860ac757dc6f099
CVE-2024-8782,0,0,ec0da4baac22ae9eceb8ce2507375e0a71b6a51926de3cc40576bcd259fd7175,2024-09-19T01:46:07.003000
CVE-2024-8783,0,0,b434dfc5f50cf2811a1f5688ac574f745dec48e5af54cf5f568ce8560b0e2702,2024-09-19T01:38:57.033000
CVE-2024-8784,0,0,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c943431f,2024-09-19T01:38:35.177000
CVE-2024-8788,1,1,9acf7ba86dfe3bb0d2f7badc30361934124d525e34346debde47c3772d9f6d12,2024-09-28T02:15:10.380000
CVE-2024-8791,0,0,fb5b0ac36efac34bc9b2b46a1f471f8bc629f8b19dafbbe4161ffb4834ecffd5,2024-09-26T16:25:34.120000
CVE-2024-8794,0,0,71d6f226610d884ee512fa4051f8594e0cafa29b4878c9ac672c3de2ccd4c022,2024-09-26T16:23:46.740000
CVE-2024-8795,0,0,f7b3fc89482c22947a1a26e63d2f04d7dee1f77ad827021897b332709b04072d,2024-09-26T16:46:55.587000
@ -263986,6 +263990,7 @@ CVE-2024-9008,0,0,52622a85f30c63eabac86e540eb777bb56ea4ab0b052ff445cc04b0bad1ec8
CVE-2024-9009,0,0,8ca9aa7668c5d5c77c4f8dc75f965a1fc61562deadeb769eddb6e3d475ae864f,2024-09-25T17:46:59.077000
CVE-2024-9011,0,0,31757df34dd4fee90035c8c1e734eec12ab6ab10926115bc714ff7e9ad5eeaab,2024-09-25T17:48:14.820000
CVE-2024-9014,0,0,a8e29b928e7c02e09a31b50dee33eaa8cea5cb50c9cc022c5089f67468915a88,2024-09-26T13:32:55.343000
CVE-2024-9023,1,1,f3f770c3bab7ed6db411221917d2e6cf153aa5ab1765ee7edc1ce2207a5361ca,2024-09-28T02:15:10.630000
CVE-2024-9024,0,0,a169982dad174bdcc00c2c78e9efcbc44e6a47176e89361fcc86b05c73e5527a,2024-09-26T13:32:02.803000
CVE-2024-9025,0,0,4a3763d182986e8a9ef475614c0f7e993d3440f162fb5fd30f9debf5502d2386,2024-09-26T13:32:02.803000
CVE-2024-9027,0,0,c409316250f48b36be20429f87c4942220d7d23db3624ffd7bf099b6e997d609,2024-09-26T13:32:02.803000
@ -264050,6 +264055,7 @@ CVE-2024-9169,0,0,3e58e76dfb6d40928d7a81777e9f17fdbdc857f6ee99a9600a6d563079322d
CVE-2024-9171,0,0,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2ac2,2024-09-27T17:15:14.437000
CVE-2024-9173,0,0,2168d2731be3fe970ffc5ab950f08498fa3240b2ba08eefc5bcf00b7c10db164,2024-09-26T13:32:02.803000
CVE-2024-9177,0,0,6e2c009df0316a8da0dd2889808c0ffc99dc2f882d71b338c2c33d26f543ea1f,2024-09-26T14:15:09.697000
CVE-2024-9189,1,1,c94b870458a85f1fb676ae0d9e28df7c35aa469ab3b3e36f030359db84d8bb06,2024-09-28T02:15:10.860000
CVE-2024-9198,0,0,a1f8f54995991f245b4109ccb51ed23023f74d143c0b4e7fa6f4e4802f3b1325,2024-09-26T13:32:02.803000
CVE-2024-9199,0,0,27e0a64b81e9357b76a0a39a250ac06701e94144499cdd254c52ef2844f97315,2024-09-26T13:32:02.803000
CVE-2024-9202,0,0,5d3f2d6a33ba631f7d073198e169a0e32af3f18d36ba441e4605889790f358ed,2024-09-27T10:15:02.827000
@ -264068,5 +264074,5 @@ CVE-2024-9283,0,0,0dc135be53023bca555d778c9a31c3d6f3a80278eb8a9232d8da6a70571f14
CVE-2024-9284,0,0,a3f6be1f322902c2dd706322ffd372bfbe9b47cbadedd7cc30aad50104d2b033,2024-09-27T17:15:14.600000
CVE-2024-9291,0,0,cb57967e7b1c1e3b6bbd39bdcccb61b556906a24da36a7110dece4902c704d59,2024-09-27T21:15:03.667000
CVE-2024-9293,0,0,58d1b3c8bf6371fb336102f333c7989d6dbbcc39b37756484826d43b383204c0,2024-09-27T21:15:03.937000
CVE-2024-9294,1,1,ecc4d06c597aa37fc99c049d1c5765db52fd8734fa53dc2d290464be84fc4820,2024-09-27T22:15:13.363000
CVE-2024-9294,0,0,ecc4d06c597aa37fc99c049d1c5765db52fd8734fa53dc2d290464be84fc4820,2024-09-27T22:15:13.363000
CVE-2024-9301,0,0,f7d62ae99cd0d6877c5db63fcb4f2c0f8f043fbb8339f25415912b7f29acecf1,2024-09-27T18:15:06.163000

Can't render this file because it is too large.