Auto-Update: 2024-09-19T06:00:16.863787+00:00

This commit is contained in:
cad-safe-bot 2024-09-19 06:03:17 +00:00
parent 4fc8c2ba45
commit 8990204982
6 changed files with 240 additions and 17 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2022-4533",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-19T04:15:05.860",
"lastModified": "2024-09-19T04:15:05.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Limit Login Attempts Plus plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 1.1.0. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-348"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/limit-login-attempts-plus/trunk/core/LimitLoginAttempts.php#L1043",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aec7b59f-1c8a-4403-b33b-c119bd96ad9d?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-46946",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-19T05:15:11.857",
"lastModified": "2024-09-19T05:15:11.857",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "langchain_experimental (aka LangChain Experimental) 0.1.17 through 0.3.0 for LangChain allows attackers to execute arbitrary code through sympy.sympify (which uses eval) in LLMSymbolicMathChain. LLMSymbolicMathChain was introduced in fcccde406dd9e9b05fc9babcbeb9ff527b0ec0c6 (2023-10-05)."
}
],
"metrics": {},
"references": [
{
"url": "https://cwe.mitre.org/data/definitions/95.html",
"source": "cve@mitre.org"
},
{
"url": "https://docs.sympy.org/latest/modules/codegen.html",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/12end/68c0c58d2564ef4141bccd4651480820#file-cve-2024-46946-txt",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/langchain-ai/langchain/releases/tag/langchain-experimental%3D%3D0.3.0",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-8364",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-19T04:15:06.270",
"lastModified": "2024-09-19T04:15:06.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP Custom Fields Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpcfs-preset shortcode in all versions up to, and including, 1.2.35 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-custom-fields-search/trunk/plugin.php#L53",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/wp-custom-fields-search/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ef36a2a1-b3be-4270-8890-76705817b4b5?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-8850",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-19T04:15:06.557",
"lastModified": "2024-09-19T04:15:06.557",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The MC4WP: Mailchimp for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'email' parameter when a placeholder such as {email} is used for the field in versions 4.9.9 to 4.9.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/mailchimp-for-wp/tags/4.9.16/config/default-form-content.php#L8",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3153075%40mailchimp-for-wp&new=3153075%40mailchimp-for-wp&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d2ba8ea-a75f-4069-b67d-f832acb1deef?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-19T04:00:17.072172+00:00
2024-09-19T06:00:16.863787+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-19T02:35:32.187000+00:00
2024-09-19T05:15:11.857000+00:00
```
### Last Data Feed Release
@ -33,25 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
263421
263425
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `4`
- [CVE-2022-4533](CVE-2022/CVE-2022-45xx/CVE-2022-4533.json) (`2024-09-19T04:15:05.860`)
- [CVE-2024-46946](CVE-2024/CVE-2024-469xx/CVE-2024-46946.json) (`2024-09-19T05:15:11.857`)
- [CVE-2024-8364](CVE-2024/CVE-2024-83xx/CVE-2024-8364.json) (`2024-09-19T04:15:06.270`)
- [CVE-2024-8850](CVE-2024/CVE-2024-88xx/CVE-2024-8850.json) (`2024-09-19T04:15:06.557`)
### CVEs modified in the last Commit
Recently modified CVEs: `6`
Recently modified CVEs: `0`
- [CVE-2023-41610](CVE-2023/CVE-2023-416xx/CVE-2023-41610.json) (`2024-09-19T02:35:17.530`)
- [CVE-2023-45511](CVE-2023/CVE-2023-455xx/CVE-2023-45511.json) (`2024-09-19T02:35:26.067`)
- [CVE-2024-29851](CVE-2024/CVE-2024-298xx/CVE-2024-29851.json) (`2024-09-19T02:35:32.187`)
- [CVE-2024-45496](CVE-2024/CVE-2024-454xx/CVE-2024-45496.json) (`2024-09-19T02:15:02.793`)
- [CVE-2024-45607](CVE-2024/CVE-2024-456xx/CVE-2024-45607.json) (`2024-09-19T02:05:28.707`)
- [CVE-2024-7387](CVE-2024/CVE-2024-73xx/CVE-2024-7387.json) (`2024-09-19T02:15:02.907`)
## Download and Usage

View File

@ -209914,6 +209914,7 @@ CVE-2022-45320,0,0,86332dd85b2cfbe963629398e0cf08bee0d12d85c646f1ab6ad9a2add7bda
CVE-2022-45326,0,0,fe6a2e80df3508e3c963b0fb62f4bbda18000e14d7327c7cdf358306d46dda13,2022-12-08T16:34:51.260000
CVE-2022-45328,0,0,ba18c1e472ebe99fbb3cd9ab39fc2adf0e31fdeca86523f982b6d9dc58b6709e,2022-12-01T23:22:07.887000
CVE-2022-45329,0,0,6b07a09d463fac7037e5691e5599cc792bb7a8dcfcb831831de8c1f2261aee8a,2022-11-30T04:58:16.687000
CVE-2022-4533,1,1,76d3999274721037b83ac75c5bb59467ac305675ed61a3c60d327eee8a16b28b,2024-09-19T04:15:05.860000
CVE-2022-45330,0,0,cd98ddc24a4f7a2a8b2e81c2a45252ce58f305bbc00492852d07bcbfa4fd87c9,2022-11-23T16:04:50.373000
CVE-2022-45331,0,0,d56f749377ee32baee9704d453f5cd7e14fbd7458db161db1deffebffb365eef,2022-11-23T16:04:58.820000
CVE-2022-45332,0,0,94e4da01e7f2e9d6ba2c8e99622553188f4f4167cbc35169367dcc156794dbb9,2022-12-02T16:00:13.253000
@ -231446,7 +231447,7 @@ CVE-2023-41603,0,0,7eae02bcb404653f8cf9e28340ec8a561b47a402fdb727d540cee5e43f7a6
CVE-2023-41605,0,0,c09977e342b3399cb054a02d7c15a161158f613f02f666ee1f6dfa3b4009a9cb,2023-11-07T04:21:00.217000
CVE-2023-41609,0,0,3bd4e736f9f83dbe7ac5c6a636f09e590cb9ec36b1af4f2b64690d67593848e4,2023-09-14T17:58:35.633000
CVE-2023-4161,0,0,7df03f1cfebd5d12fb7dd64830212873f12e24a1c77995358c2ceb34fcbbcca9,2023-11-07T04:22:12.317000
CVE-2023-41610,0,1,b7f7a34d68344fcacda56f897b769d9e1f77b8f6d7295930f14e3658a166c532,2024-09-19T02:35:17.530000
CVE-2023-41610,0,0,b7f7a34d68344fcacda56f897b769d9e1f77b8f6d7295930f14e3658a166c532,2024-09-19T02:35:17.530000
CVE-2023-41611,0,0,ef3eb69758db1d9b28c7123b9952141b7f86bac3088be654c4225e15336606c4,2024-09-18T18:15:05.750000
CVE-2023-41612,0,0,77598d5263c6c419dc4441eae8cb7f6904d208d828905d2cbf9e1bd7873a6842,2024-09-18T18:15:05.803000
CVE-2023-41613,0,0,14a8003db8756e22aa6e34184a53a524c8848112d2658b820d2d53e6d4a30f92,2023-12-07T21:08:08.163000
@ -234055,7 +234056,7 @@ CVE-2023-4550,0,0,3875d2ef928bb2ce7bc2731ff3fd246e8c140e8ac5064f7af0ae86a5a345a2
CVE-2023-45503,0,0,0bcc6bee1985b91dfb34ba4df83762a6c6977dcacd78e3459a513da67f8664ae,2024-08-01T13:44:57.620000
CVE-2023-4551,0,0,30c450811df944077c61b850656a1ad83903b648c76a118de39bc5f11543f4ad,2024-02-05T22:02:02.550000
CVE-2023-45510,0,0,95ec13089e5a8f1f6f38bec4a800643c30de82e9ef02421078bf52c52538a7d0,2024-09-18T19:35:08.307000
CVE-2023-45511,0,1,6a83b3b6e8ef3421fb625ab6b3efe4a060ef6fdb1aa115c72fc3336b2273558b,2024-09-19T02:35:26.067000
CVE-2023-45511,0,0,6a83b3b6e8ef3421fb625ab6b3efe4a060ef6fdb1aa115c72fc3336b2273558b,2024-09-19T02:35:26.067000
CVE-2023-4552,0,0,f0537603c3e5921898d4c4486b214591cfc8340feaf410d7a71774714a6fb778,2024-02-05T21:59:35.087000
CVE-2023-4553,0,0,7f7b3a1004c52632b83f35e4ed5b600ac3f6bf55e8037452043bd49f8b38d638,2024-02-05T21:56:14.073000
CVE-2023-45539,0,0,14e5807e2e545a12b44e0f4dc1ccdba533d2f724acf1b5d66372955165f5d45d,2023-12-14T17:15:07.860000
@ -249867,7 +249868,7 @@ CVE-2024-29848,0,0,572f203a18b60b1fdf8b35785afb572e4ba27bc9b1677d0760a64742aa875
CVE-2024-29849,0,0,072b0476443be0a966db74d66f638a80778dd162866abb6662b51c636fbdf995,2024-07-11T15:05:34.760000
CVE-2024-2985,0,0,eccd7e0304328f19c740fa6917e6be8e07842d176de854a8967fc91747386345,2024-05-17T02:38:40.683000
CVE-2024-29850,0,0,97868bac62290aeeaf47d9bee0575c21786d7518d529b709efa87179f84a22a5,2024-07-03T01:52:48.473000
CVE-2024-29851,0,1,a89530d2196122bf2e1df60f524dc0d42f1a66aa656e26ff3129a8660d38d5fc,2024-09-19T02:35:32.187000
CVE-2024-29851,0,0,a89530d2196122bf2e1df60f524dc0d42f1a66aa656e26ff3129a8660d38d5fc,2024-09-19T02:35:32.187000
CVE-2024-29852,0,0,726c48fca6ecce09ba0891a4732d56a8cd51267214424717a9c0997e21d90cb7,2024-07-03T01:52:49.260000
CVE-2024-29853,0,0,c1ae8cba1ec19d8da2e0ffbfe16c680f8b2163da29207d481a72323097831057,2024-07-03T01:52:49.947000
CVE-2024-29855,0,0,b2802ced0a558e4f090c6287efb3198501503af3c94eb0da01eddf25e7dcba7e,2024-06-11T13:54:12.057000
@ -259905,7 +259906,7 @@ CVE-2024-4549,0,0,e09f9cdaebb6118867e13a9d3ab643eb98c9f9e356cd137ad04d5c4afde157
CVE-2024-45490,0,0,4a9544858f8ad52701885faaacc054b024c5e1d139687b3f21fcc2ee9f6ad4a9,2024-09-04T14:28:19.313000
CVE-2024-45491,0,0,e460156ea6419a80b45a0f265018e72555b70e117c8be4ee37cb347a447d976e,2024-09-04T14:28:33.953000
CVE-2024-45492,0,0,073ca72c9147ce0bd071ae42dd069b817368a461c31ddb6a6a85b43c752a5921,2024-09-04T14:28:41.760000
CVE-2024-45496,0,1,08eb19f3f05bf3d568667310a8870040d05f727452352b7dad72f44be07285f7,2024-09-19T02:15:02.793000
CVE-2024-45496,0,0,08eb19f3f05bf3d568667310a8870040d05f727452352b7dad72f44be07285f7,2024-09-19T02:15:02.793000
CVE-2024-45498,0,0,c0b73fd56e19fc295690d422c61db0b0a34ba9767e31b80f7a635220e3379808,2024-09-09T13:03:38.303000
CVE-2024-4550,0,0,15fbc24f09319144879d8500386f895513bfa5772ea62a92e0fabd950300c406,2024-09-14T11:47:14.677000
CVE-2024-45504,0,0,d1fb07a3228efd18f7c0af3faab016c97edb9e2da8e02dba547168a8c292ae66,2024-09-10T12:09:50.377000
@ -259943,7 +259944,7 @@ CVE-2024-45601,0,0,68a61c7fb218a1533d3e7ba7c27d30ed89f1e5c575368ebb4614ebef9094a
CVE-2024-45604,0,0,df9309ebee69f4ec700bb7840ba1cc6f02080f3fc26293d013bd69264df2338d,2024-09-17T20:15:04.893000
CVE-2024-45605,0,0,e087e48cc4df76249173d7a618d4b2cb5065b1483d2a45b39541842585093271,2024-09-17T20:15:05.120000
CVE-2024-45606,0,0,8b315609968854b688a141eba7c889d1bac462088775a65d9695e6d2d8c00cf9,2024-09-17T20:15:05.393000
CVE-2024-45607,0,1,9d199e13e4c36b979d30a8467667e188e65d4bf0165b27173d5a6e5dc2ce7529,2024-09-19T02:05:28.707000
CVE-2024-45607,0,0,9d199e13e4c36b979d30a8467667e188e65d4bf0165b27173d5a6e5dc2ce7529,2024-09-19T02:05:28.707000
CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000
CVE-2024-45612,0,0,ef43e3990d9c954ad7bf7532592a25b6df1296840bab862dfc7fa4022c718569,2024-09-17T19:15:28.250000
CVE-2024-45615,0,0,c6d6282e5a9613bcbeb55c568082301f30c66c5c3e170d6aa78e0325f2dae6b9,2024-09-13T19:21:15.423000
@ -260313,6 +260314,7 @@ CVE-2024-46937,0,0,07fdd1d78aaed903fbff4e5d9a0ce758118188db8683180f256eed71d0649
CVE-2024-46938,0,0,9e276dbb5f511d90ea6307dc9981b04eafca4332d1a762536bafb02391c73acc,2024-09-17T15:35:10.980000
CVE-2024-46942,0,0,39b03564ad46dfa226521fed6197bd85a5899e9352724095b0a13d9a65f5effe,2024-09-17T15:35:11.740000
CVE-2024-46943,0,0,152386ee346108a0b10024e97836216e24787fcc13e07313dcb51a8afe0ec6cb,2024-09-17T15:35:11.950000
CVE-2024-46946,1,1,305cc9846ab8bbd287bbeeabd9e5cf07221485fc33fd6738193013b4b18a667e,2024-09-19T05:15:11.857000
CVE-2024-4695,0,0,aa253f1bdce79ef626aa7622c4e367006f6b60359a6a2b0af989b23a6e81f980,2024-05-21T12:37:59.687000
CVE-2024-46958,0,0,55b6c34933d7f404734afe78f6fca5f500d88d2d153f0079c17dd51e529b774d,2024-09-16T15:30:28.733000
CVE-2024-46959,0,0,47d5f83d561a982f4a4be7b405a83d2d9fa4ba828de30b6ae661fef4ddec5ff0,2024-09-18T18:15:06.730000
@ -262560,7 +262562,7 @@ CVE-2024-7381,0,0,ca7cc8a67702d68f3387a7110e4857f594b40c8a2313eee62c5e5767902903
CVE-2024-7382,0,0,38dbfd05201dede10e421fed3e3b0d675c062e51a3aa3f6428b06fad8a88c553,2024-08-12T13:41:36.517000
CVE-2024-7383,0,0,d2737cd69fd6977c5ff3be04ae298e1bf45647197e69a7bb44ed13fcf569259a,2024-09-18T20:15:03.760000
CVE-2024-7384,0,0,959c51f9d9089f82b75c53d05c8efe51e41a9d17d895f5f42948ac7d882f9351,2024-08-22T12:48:02.790000
CVE-2024-7387,0,1,2bbecf988aac4b1609da665b74805fcbb7b33c409d5852bcd50f317ebbd02244,2024-09-19T02:15:02.907000
CVE-2024-7387,0,0,2bbecf988aac4b1609da665b74805fcbb7b33c409d5852bcd50f317ebbd02244,2024-09-19T02:15:02.907000
CVE-2024-7388,0,0,f17b6292d40b8d2d9d22865fdbf912ed4604c49db111ea9e78f67fdbb858de85,2024-08-13T12:58:25.437000
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
CVE-2024-7390,0,0,7895dab66ddc704219ddf6d579bba9623189661f47faa0372744a2c8c5dc8ef9,2024-08-21T12:30:33.697000
@ -263207,6 +263209,7 @@ CVE-2024-8347,0,0,14715b4855076c65c4bf21be6c68b62e0d22e8650a0e63bf9f5074414663f3
CVE-2024-8348,0,0,d08ea1deaed5cbc2f4a773e843468145326bb3a1da186780c7ff7b6cd74aae9b,2024-09-04T16:43:30.310000
CVE-2024-8362,0,0,54abf718b9bfba93199694e9f50bfa28d6dfde9a56fb3c77d91594ed8cbda92f,2024-09-04T14:35:16.777000
CVE-2024-8363,0,0,01e2f3c42ed63ca762fc774c70d7336df5274e0f5dacdde750731dfd76f769a2,2024-09-11T16:35:05.653000
CVE-2024-8364,1,1,3e721283ebe00934a928d8628eb31017a2df2ef87556569b7955e4303aeb1f1e,2024-09-19T04:15:06.270000
CVE-2024-8365,0,0,81c889787151e95f50edc31d86d0d8800a4aaa4de596dc2a7252c4cbdeb9547d,2024-09-04T14:37:03.543000
CVE-2024-8366,0,0,be663b51eff047ef5324516e3dc05e341a7647978df6a6f91fe297f3f5c5eb50,2024-09-04T11:26:49.020000
CVE-2024-8367,0,0,5172ded1dd5d5dccb77f0059a7c6495922e642ce8e52859a1f0a60d7fb927bb9,2024-09-03T12:59:02.453000
@ -263384,6 +263387,7 @@ CVE-2024-8783,0,0,b434dfc5f50cf2811a1f5688ac574f745dec48e5af54cf5f568ce8560b0e27
CVE-2024-8784,0,0,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c943431f,2024-09-19T01:38:35.177000
CVE-2024-8796,0,0,94e01fa2394b7e3cc5729adcbe04212056eb704ee3dccdfd860de0e7129048a2,2024-09-17T18:15:05.443000
CVE-2024-8797,0,0,b7273f8d72c4c7b82a815cc8357933cfcef5a0b838634eab59479c200615300b,2024-09-14T11:47:14.677000
CVE-2024-8850,1,1,93c3effab202541418248ca686b83b93e9ac19fd90a1ab3c2b19a3b5c06db2e1,2024-09-19T04:15:06.557000
CVE-2024-8862,0,0,3c0cefe3796a3067716726cae64fd2b6a2a71c4947999e21da2abde8a533c886,2024-09-16T15:30:28.733000
CVE-2024-8863,0,0,c201c0a73f6e94fc800a591d431c13570689b06531fa3fd890390312a87785df,2024-09-16T15:30:28.733000
CVE-2024-8864,0,0,3bc8b301985cc40353022de4e4744e73398cd0188f617195b9d24ac6f8e8e30d,2024-09-17T10:38:13.410000

Can't render this file because it is too large.