From 89902049824acb6f4ab0698a201838692b46799c Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 19 Sep 2024 06:03:17 +0000 Subject: [PATCH] Auto-Update: 2024-09-19T06:00:16.863787+00:00 --- CVE-2022/CVE-2022-45xx/CVE-2022-4533.json | 60 +++++++++++++++++++ CVE-2024/CVE-2024-469xx/CVE-2024-46946.json | 33 +++++++++++ CVE-2024/CVE-2024-83xx/CVE-2024-8364.json | 64 +++++++++++++++++++++ CVE-2024/CVE-2024-88xx/CVE-2024-8850.json | 64 +++++++++++++++++++++ README.md | 20 +++---- _state.csv | 16 ++++-- 6 files changed, 240 insertions(+), 17 deletions(-) create mode 100644 CVE-2022/CVE-2022-45xx/CVE-2022-4533.json create mode 100644 CVE-2024/CVE-2024-469xx/CVE-2024-46946.json create mode 100644 CVE-2024/CVE-2024-83xx/CVE-2024-8364.json create mode 100644 CVE-2024/CVE-2024-88xx/CVE-2024-8850.json diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4533.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4533.json new file mode 100644 index 00000000000..60bdce8ee6a --- /dev/null +++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4533.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2022-4533", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-09-19T04:15:05.860", + "lastModified": "2024-09-19T04:15:05.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Limit Login Attempts Plus plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 1.1.0. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-348" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/limit-login-attempts-plus/trunk/core/LimitLoginAttempts.php#L1043", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aec7b59f-1c8a-4403-b33b-c119bd96ad9d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46946.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46946.json new file mode 100644 index 00000000000..cf6da21628b --- /dev/null +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46946.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-46946", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-19T05:15:11.857", + "lastModified": "2024-09-19T05:15:11.857", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "langchain_experimental (aka LangChain Experimental) 0.1.17 through 0.3.0 for LangChain allows attackers to execute arbitrary code through sympy.sympify (which uses eval) in LLMSymbolicMathChain. LLMSymbolicMathChain was introduced in fcccde406dd9e9b05fc9babcbeb9ff527b0ec0c6 (2023-10-05)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://cwe.mitre.org/data/definitions/95.html", + "source": "cve@mitre.org" + }, + { + "url": "https://docs.sympy.org/latest/modules/codegen.html", + "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/12end/68c0c58d2564ef4141bccd4651480820#file-cve-2024-46946-txt", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/langchain-ai/langchain/releases/tag/langchain-experimental%3D%3D0.3.0", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8364.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8364.json new file mode 100644 index 00000000000..49252c8e34e --- /dev/null +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8364.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-8364", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-09-19T04:15:06.270", + "lastModified": "2024-09-19T04:15:06.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WP Custom Fields Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpcfs-preset shortcode in all versions up to, and including, 1.2.35 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/wp-custom-fields-search/trunk/plugin.php#L53", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/wp-custom-fields-search/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ef36a2a1-b3be-4270-8890-76705817b4b5?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8850.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8850.json new file mode 100644 index 00000000000..7064c19ba1f --- /dev/null +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8850.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-8850", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-09-19T04:15:06.557", + "lastModified": "2024-09-19T04:15:06.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The MC4WP: Mailchimp for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'email' parameter when a placeholder such as {email} is used for the field in versions 4.9.9 to 4.9.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/mailchimp-for-wp/tags/4.9.16/config/default-form-content.php#L8", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3153075%40mailchimp-for-wp&new=3153075%40mailchimp-for-wp&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d2ba8ea-a75f-4069-b67d-f832acb1deef?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index bd68d36cfce..3512782d354 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-19T04:00:17.072172+00:00 +2024-09-19T06:00:16.863787+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-19T02:35:32.187000+00:00 +2024-09-19T05:15:11.857000+00:00 ``` ### Last Data Feed Release @@ -33,25 +33,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -263421 +263425 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `4` +- [CVE-2022-4533](CVE-2022/CVE-2022-45xx/CVE-2022-4533.json) (`2024-09-19T04:15:05.860`) +- [CVE-2024-46946](CVE-2024/CVE-2024-469xx/CVE-2024-46946.json) (`2024-09-19T05:15:11.857`) +- [CVE-2024-8364](CVE-2024/CVE-2024-83xx/CVE-2024-8364.json) (`2024-09-19T04:15:06.270`) +- [CVE-2024-8850](CVE-2024/CVE-2024-88xx/CVE-2024-8850.json) (`2024-09-19T04:15:06.557`) ### CVEs modified in the last Commit -Recently modified CVEs: `6` +Recently modified CVEs: `0` -- [CVE-2023-41610](CVE-2023/CVE-2023-416xx/CVE-2023-41610.json) (`2024-09-19T02:35:17.530`) -- [CVE-2023-45511](CVE-2023/CVE-2023-455xx/CVE-2023-45511.json) (`2024-09-19T02:35:26.067`) -- [CVE-2024-29851](CVE-2024/CVE-2024-298xx/CVE-2024-29851.json) (`2024-09-19T02:35:32.187`) -- [CVE-2024-45496](CVE-2024/CVE-2024-454xx/CVE-2024-45496.json) (`2024-09-19T02:15:02.793`) -- [CVE-2024-45607](CVE-2024/CVE-2024-456xx/CVE-2024-45607.json) (`2024-09-19T02:05:28.707`) -- [CVE-2024-7387](CVE-2024/CVE-2024-73xx/CVE-2024-7387.json) (`2024-09-19T02:15:02.907`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 88f59f0f1f1..2db38d27aae 100644 --- a/_state.csv +++ b/_state.csv @@ -209914,6 +209914,7 @@ CVE-2022-45320,0,0,86332dd85b2cfbe963629398e0cf08bee0d12d85c646f1ab6ad9a2add7bda CVE-2022-45326,0,0,fe6a2e80df3508e3c963b0fb62f4bbda18000e14d7327c7cdf358306d46dda13,2022-12-08T16:34:51.260000 CVE-2022-45328,0,0,ba18c1e472ebe99fbb3cd9ab39fc2adf0e31fdeca86523f982b6d9dc58b6709e,2022-12-01T23:22:07.887000 CVE-2022-45329,0,0,6b07a09d463fac7037e5691e5599cc792bb7a8dcfcb831831de8c1f2261aee8a,2022-11-30T04:58:16.687000 +CVE-2022-4533,1,1,76d3999274721037b83ac75c5bb59467ac305675ed61a3c60d327eee8a16b28b,2024-09-19T04:15:05.860000 CVE-2022-45330,0,0,cd98ddc24a4f7a2a8b2e81c2a45252ce58f305bbc00492852d07bcbfa4fd87c9,2022-11-23T16:04:50.373000 CVE-2022-45331,0,0,d56f749377ee32baee9704d453f5cd7e14fbd7458db161db1deffebffb365eef,2022-11-23T16:04:58.820000 CVE-2022-45332,0,0,94e4da01e7f2e9d6ba2c8e99622553188f4f4167cbc35169367dcc156794dbb9,2022-12-02T16:00:13.253000 @@ -231446,7 +231447,7 @@ CVE-2023-41603,0,0,7eae02bcb404653f8cf9e28340ec8a561b47a402fdb727d540cee5e43f7a6 CVE-2023-41605,0,0,c09977e342b3399cb054a02d7c15a161158f613f02f666ee1f6dfa3b4009a9cb,2023-11-07T04:21:00.217000 CVE-2023-41609,0,0,3bd4e736f9f83dbe7ac5c6a636f09e590cb9ec36b1af4f2b64690d67593848e4,2023-09-14T17:58:35.633000 CVE-2023-4161,0,0,7df03f1cfebd5d12fb7dd64830212873f12e24a1c77995358c2ceb34fcbbcca9,2023-11-07T04:22:12.317000 -CVE-2023-41610,0,1,b7f7a34d68344fcacda56f897b769d9e1f77b8f6d7295930f14e3658a166c532,2024-09-19T02:35:17.530000 +CVE-2023-41610,0,0,b7f7a34d68344fcacda56f897b769d9e1f77b8f6d7295930f14e3658a166c532,2024-09-19T02:35:17.530000 CVE-2023-41611,0,0,ef3eb69758db1d9b28c7123b9952141b7f86bac3088be654c4225e15336606c4,2024-09-18T18:15:05.750000 CVE-2023-41612,0,0,77598d5263c6c419dc4441eae8cb7f6904d208d828905d2cbf9e1bd7873a6842,2024-09-18T18:15:05.803000 CVE-2023-41613,0,0,14a8003db8756e22aa6e34184a53a524c8848112d2658b820d2d53e6d4a30f92,2023-12-07T21:08:08.163000 @@ -234055,7 +234056,7 @@ CVE-2023-4550,0,0,3875d2ef928bb2ce7bc2731ff3fd246e8c140e8ac5064f7af0ae86a5a345a2 CVE-2023-45503,0,0,0bcc6bee1985b91dfb34ba4df83762a6c6977dcacd78e3459a513da67f8664ae,2024-08-01T13:44:57.620000 CVE-2023-4551,0,0,30c450811df944077c61b850656a1ad83903b648c76a118de39bc5f11543f4ad,2024-02-05T22:02:02.550000 CVE-2023-45510,0,0,95ec13089e5a8f1f6f38bec4a800643c30de82e9ef02421078bf52c52538a7d0,2024-09-18T19:35:08.307000 -CVE-2023-45511,0,1,6a83b3b6e8ef3421fb625ab6b3efe4a060ef6fdb1aa115c72fc3336b2273558b,2024-09-19T02:35:26.067000 +CVE-2023-45511,0,0,6a83b3b6e8ef3421fb625ab6b3efe4a060ef6fdb1aa115c72fc3336b2273558b,2024-09-19T02:35:26.067000 CVE-2023-4552,0,0,f0537603c3e5921898d4c4486b214591cfc8340feaf410d7a71774714a6fb778,2024-02-05T21:59:35.087000 CVE-2023-4553,0,0,7f7b3a1004c52632b83f35e4ed5b600ac3f6bf55e8037452043bd49f8b38d638,2024-02-05T21:56:14.073000 CVE-2023-45539,0,0,14e5807e2e545a12b44e0f4dc1ccdba533d2f724acf1b5d66372955165f5d45d,2023-12-14T17:15:07.860000 @@ -249867,7 +249868,7 @@ CVE-2024-29848,0,0,572f203a18b60b1fdf8b35785afb572e4ba27bc9b1677d0760a64742aa875 CVE-2024-29849,0,0,072b0476443be0a966db74d66f638a80778dd162866abb6662b51c636fbdf995,2024-07-11T15:05:34.760000 CVE-2024-2985,0,0,eccd7e0304328f19c740fa6917e6be8e07842d176de854a8967fc91747386345,2024-05-17T02:38:40.683000 CVE-2024-29850,0,0,97868bac62290aeeaf47d9bee0575c21786d7518d529b709efa87179f84a22a5,2024-07-03T01:52:48.473000 -CVE-2024-29851,0,1,a89530d2196122bf2e1df60f524dc0d42f1a66aa656e26ff3129a8660d38d5fc,2024-09-19T02:35:32.187000 +CVE-2024-29851,0,0,a89530d2196122bf2e1df60f524dc0d42f1a66aa656e26ff3129a8660d38d5fc,2024-09-19T02:35:32.187000 CVE-2024-29852,0,0,726c48fca6ecce09ba0891a4732d56a8cd51267214424717a9c0997e21d90cb7,2024-07-03T01:52:49.260000 CVE-2024-29853,0,0,c1ae8cba1ec19d8da2e0ffbfe16c680f8b2163da29207d481a72323097831057,2024-07-03T01:52:49.947000 CVE-2024-29855,0,0,b2802ced0a558e4f090c6287efb3198501503af3c94eb0da01eddf25e7dcba7e,2024-06-11T13:54:12.057000 @@ -259905,7 +259906,7 @@ CVE-2024-4549,0,0,e09f9cdaebb6118867e13a9d3ab643eb98c9f9e356cd137ad04d5c4afde157 CVE-2024-45490,0,0,4a9544858f8ad52701885faaacc054b024c5e1d139687b3f21fcc2ee9f6ad4a9,2024-09-04T14:28:19.313000 CVE-2024-45491,0,0,e460156ea6419a80b45a0f265018e72555b70e117c8be4ee37cb347a447d976e,2024-09-04T14:28:33.953000 CVE-2024-45492,0,0,073ca72c9147ce0bd071ae42dd069b817368a461c31ddb6a6a85b43c752a5921,2024-09-04T14:28:41.760000 -CVE-2024-45496,0,1,08eb19f3f05bf3d568667310a8870040d05f727452352b7dad72f44be07285f7,2024-09-19T02:15:02.793000 +CVE-2024-45496,0,0,08eb19f3f05bf3d568667310a8870040d05f727452352b7dad72f44be07285f7,2024-09-19T02:15:02.793000 CVE-2024-45498,0,0,c0b73fd56e19fc295690d422c61db0b0a34ba9767e31b80f7a635220e3379808,2024-09-09T13:03:38.303000 CVE-2024-4550,0,0,15fbc24f09319144879d8500386f895513bfa5772ea62a92e0fabd950300c406,2024-09-14T11:47:14.677000 CVE-2024-45504,0,0,d1fb07a3228efd18f7c0af3faab016c97edb9e2da8e02dba547168a8c292ae66,2024-09-10T12:09:50.377000 @@ -259943,7 +259944,7 @@ CVE-2024-45601,0,0,68a61c7fb218a1533d3e7ba7c27d30ed89f1e5c575368ebb4614ebef9094a CVE-2024-45604,0,0,df9309ebee69f4ec700bb7840ba1cc6f02080f3fc26293d013bd69264df2338d,2024-09-17T20:15:04.893000 CVE-2024-45605,0,0,e087e48cc4df76249173d7a618d4b2cb5065b1483d2a45b39541842585093271,2024-09-17T20:15:05.120000 CVE-2024-45606,0,0,8b315609968854b688a141eba7c889d1bac462088775a65d9695e6d2d8c00cf9,2024-09-17T20:15:05.393000 -CVE-2024-45607,0,1,9d199e13e4c36b979d30a8467667e188e65d4bf0165b27173d5a6e5dc2ce7529,2024-09-19T02:05:28.707000 +CVE-2024-45607,0,0,9d199e13e4c36b979d30a8467667e188e65d4bf0165b27173d5a6e5dc2ce7529,2024-09-19T02:05:28.707000 CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000 CVE-2024-45612,0,0,ef43e3990d9c954ad7bf7532592a25b6df1296840bab862dfc7fa4022c718569,2024-09-17T19:15:28.250000 CVE-2024-45615,0,0,c6d6282e5a9613bcbeb55c568082301f30c66c5c3e170d6aa78e0325f2dae6b9,2024-09-13T19:21:15.423000 @@ -260313,6 +260314,7 @@ CVE-2024-46937,0,0,07fdd1d78aaed903fbff4e5d9a0ce758118188db8683180f256eed71d0649 CVE-2024-46938,0,0,9e276dbb5f511d90ea6307dc9981b04eafca4332d1a762536bafb02391c73acc,2024-09-17T15:35:10.980000 CVE-2024-46942,0,0,39b03564ad46dfa226521fed6197bd85a5899e9352724095b0a13d9a65f5effe,2024-09-17T15:35:11.740000 CVE-2024-46943,0,0,152386ee346108a0b10024e97836216e24787fcc13e07313dcb51a8afe0ec6cb,2024-09-17T15:35:11.950000 +CVE-2024-46946,1,1,305cc9846ab8bbd287bbeeabd9e5cf07221485fc33fd6738193013b4b18a667e,2024-09-19T05:15:11.857000 CVE-2024-4695,0,0,aa253f1bdce79ef626aa7622c4e367006f6b60359a6a2b0af989b23a6e81f980,2024-05-21T12:37:59.687000 CVE-2024-46958,0,0,55b6c34933d7f404734afe78f6fca5f500d88d2d153f0079c17dd51e529b774d,2024-09-16T15:30:28.733000 CVE-2024-46959,0,0,47d5f83d561a982f4a4be7b405a83d2d9fa4ba828de30b6ae661fef4ddec5ff0,2024-09-18T18:15:06.730000 @@ -262560,7 +262562,7 @@ CVE-2024-7381,0,0,ca7cc8a67702d68f3387a7110e4857f594b40c8a2313eee62c5e5767902903 CVE-2024-7382,0,0,38dbfd05201dede10e421fed3e3b0d675c062e51a3aa3f6428b06fad8a88c553,2024-08-12T13:41:36.517000 CVE-2024-7383,0,0,d2737cd69fd6977c5ff3be04ae298e1bf45647197e69a7bb44ed13fcf569259a,2024-09-18T20:15:03.760000 CVE-2024-7384,0,0,959c51f9d9089f82b75c53d05c8efe51e41a9d17d895f5f42948ac7d882f9351,2024-08-22T12:48:02.790000 -CVE-2024-7387,0,1,2bbecf988aac4b1609da665b74805fcbb7b33c409d5852bcd50f317ebbd02244,2024-09-19T02:15:02.907000 +CVE-2024-7387,0,0,2bbecf988aac4b1609da665b74805fcbb7b33c409d5852bcd50f317ebbd02244,2024-09-19T02:15:02.907000 CVE-2024-7388,0,0,f17b6292d40b8d2d9d22865fdbf912ed4604c49db111ea9e78f67fdbb858de85,2024-08-13T12:58:25.437000 CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000 CVE-2024-7390,0,0,7895dab66ddc704219ddf6d579bba9623189661f47faa0372744a2c8c5dc8ef9,2024-08-21T12:30:33.697000 @@ -263207,6 +263209,7 @@ CVE-2024-8347,0,0,14715b4855076c65c4bf21be6c68b62e0d22e8650a0e63bf9f5074414663f3 CVE-2024-8348,0,0,d08ea1deaed5cbc2f4a773e843468145326bb3a1da186780c7ff7b6cd74aae9b,2024-09-04T16:43:30.310000 CVE-2024-8362,0,0,54abf718b9bfba93199694e9f50bfa28d6dfde9a56fb3c77d91594ed8cbda92f,2024-09-04T14:35:16.777000 CVE-2024-8363,0,0,01e2f3c42ed63ca762fc774c70d7336df5274e0f5dacdde750731dfd76f769a2,2024-09-11T16:35:05.653000 +CVE-2024-8364,1,1,3e721283ebe00934a928d8628eb31017a2df2ef87556569b7955e4303aeb1f1e,2024-09-19T04:15:06.270000 CVE-2024-8365,0,0,81c889787151e95f50edc31d86d0d8800a4aaa4de596dc2a7252c4cbdeb9547d,2024-09-04T14:37:03.543000 CVE-2024-8366,0,0,be663b51eff047ef5324516e3dc05e341a7647978df6a6f91fe297f3f5c5eb50,2024-09-04T11:26:49.020000 CVE-2024-8367,0,0,5172ded1dd5d5dccb77f0059a7c6495922e642ce8e52859a1f0a60d7fb927bb9,2024-09-03T12:59:02.453000 @@ -263384,6 +263387,7 @@ CVE-2024-8783,0,0,b434dfc5f50cf2811a1f5688ac574f745dec48e5af54cf5f568ce8560b0e27 CVE-2024-8784,0,0,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c943431f,2024-09-19T01:38:35.177000 CVE-2024-8796,0,0,94e01fa2394b7e3cc5729adcbe04212056eb704ee3dccdfd860de0e7129048a2,2024-09-17T18:15:05.443000 CVE-2024-8797,0,0,b7273f8d72c4c7b82a815cc8357933cfcef5a0b838634eab59479c200615300b,2024-09-14T11:47:14.677000 +CVE-2024-8850,1,1,93c3effab202541418248ca686b83b93e9ac19fd90a1ab3c2b19a3b5c06db2e1,2024-09-19T04:15:06.557000 CVE-2024-8862,0,0,3c0cefe3796a3067716726cae64fd2b6a2a71c4947999e21da2abde8a533c886,2024-09-16T15:30:28.733000 CVE-2024-8863,0,0,c201c0a73f6e94fc800a591d431c13570689b06531fa3fd890390312a87785df,2024-09-16T15:30:28.733000 CVE-2024-8864,0,0,3bc8b301985cc40353022de4e4744e73398cd0188f617195b9d24ac6f8e8e30d,2024-09-17T10:38:13.410000