diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3345.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3345.json index 30945340738..2ccd75c9374 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3345.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3345.json @@ -2,13 +2,13 @@ "id": "CVE-2023-3345", "sourceIdentifier": "contact@wpscan.com", "published": "2023-07-31T10:15:10.653", - "lastModified": "2023-11-07T04:18:34.260", + "lastModified": "2024-08-30T09:15:04.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The LMS by Masteriyo WordPress plugin before 1.6.8 does not properly safeguards sensitive user information, like other user's email addresses, making it possible for any students to leak them via some of the plugin's REST API endpoints." + "value": "The LMS by Masteriyo WordPress plugin before 1.6.8 does not have proper authorization in one some of its REST API endpoints, making it possible for any students to retrieve email addresses of other students" } ], "metrics": { diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6257.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6257.json index 65d040ee8ee..0033bea0ec9 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6257.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6257.json @@ -2,13 +2,13 @@ "id": "CVE-2023-6257", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-11T05:15:47.090", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-08-30T08:15:04.443", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Inline Related Posts WordPress plugin before 3.6.0 does not ensure that post content displayed via an AJAX action are accessible to the user, allowing any authenticated user, such as subscriber to retrieve the content of password protected posts" + "value": "The Inline Related Posts WordPress plugin before 3.6.0 is missing authorization in an AJAX action to ensure that users are allowed to see the content of the posts displayed, allowing any authenticated user, such as subscriber to retrieve the content of password protected posts" }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6821.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6821.json index 77e9efbc793..8a0e1541817 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6821.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6821.json @@ -2,13 +2,13 @@ "id": "CVE-2023-6821", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-18T19:15:06.097", - "lastModified": "2024-03-18T19:40:00.173", + "lastModified": "2024-08-30T08:15:04.520", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Error Log Viewer by BestWebSoft WordPress plugin before 1.1.3 contains a vulnerability that allows you to read and download PHP logs without authorization" + "value": "The Error Log Viewer by BestWebSoft WordPress plugin before 1.1.3 is affected by a Directory Listing issue, allowing users to read and download PHP logs without authorization" }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44944.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44944.json new file mode 100644 index 00000000000..1d93c1a6765 --- /dev/null +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44944.json @@ -0,0 +1,49 @@ +{ + "id": "CVE-2024-44944", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2024-08-30T08:15:04.580", + "lastModified": "2024-08-30T08:15:04.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: ctnetlink: use helper function to calculate expect ID\n\nDelete expectation path is missing a call to the nf_expect_get_id()\nhelper function to calculate the expectation ID, otherwise LSB of the\nexpectation object address is leaked to userspace." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/24f407042cf90b0872de667460230d8d50c06c39", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/27662b46f2adaa52c1665a82af4b21c42c4337fd", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/5e2c24f7b0911b15c29aefce760bcf770542fb61", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/64c0b8e64be8368617ef08dfc59a3160563a1435", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/66e7650dbbb8e236e781c670b167edc81e771450", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/74de442b8e12a207c07953ee068009a7701aff8f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/782161895eb4ac45cf7cfa8db375bd4766cb8299", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/eb4ca1a97e08ff5b920664ba292e576257e2d184", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8319.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8319.json new file mode 100644 index 00000000000..d6ab7a08d24 --- /dev/null +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8319.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-8319", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-08-30T08:15:04.653", + "lastModified": "2024-08-30T08:15:04.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Tourfic plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.11.20. This is due to missing or incorrect nonce validation on the tf_order_status_email_resend_function, tf_visitor_details_edit_function, tf_checkinout_details_edit_function, tf_order_status_edit_function, tf_order_bulk_action_edit_function, tf_remove_room_order_ids, and tf_delete_old_review_fields functions. This makes it possible for unauthenticated attackers to resend order status emails, update visitor/order details, edit check-in/out details, edit order status, perform bulk order status updates, remove room order IDs, and delete old review fields, respectively, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3054266/tourfic", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/07fa7b1a-9137-4049-a20a-8eb6df7ca578?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index dabdad499dd..82971092480 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-08-30T08:00:16.830478+00:00 +2024-08-30T10:00:18.738778+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-08-30T07:15:12.140000+00:00 +2024-08-30T09:15:04.030000+00:00 ``` ### Last Data Feed Release @@ -33,25 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -261567 +261569 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `2` -- [CVE-2024-34577](CVE-2024/CVE-2024-345xx/CVE-2024-34577.json) (`2024-08-30T07:15:11.660`) -- [CVE-2024-3673](CVE-2024/CVE-2024-36xx/CVE-2024-3673.json) (`2024-08-30T06:15:05.400`) -- [CVE-2024-39300](CVE-2024/CVE-2024-393xx/CVE-2024-39300.json) (`2024-08-30T07:15:11.837`) -- [CVE-2024-42412](CVE-2024/CVE-2024-424xx/CVE-2024-42412.json) (`2024-08-30T07:15:12.070`) -- [CVE-2024-8016](CVE-2024/CVE-2024-80xx/CVE-2024-8016.json) (`2024-08-30T07:15:12.140`) -- [CVE-2024-8333](CVE-2024/CVE-2024-83xx/CVE-2024-8333.json) (`2024-08-30T06:15:05.577`) +- [CVE-2024-44944](CVE-2024/CVE-2024-449xx/CVE-2024-44944.json) (`2024-08-30T08:15:04.580`) +- [CVE-2024-8319](CVE-2024/CVE-2024-83xx/CVE-2024-8319.json) (`2024-08-30T08:15:04.653`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `3` +- [CVE-2023-3345](CVE-2023/CVE-2023-33xx/CVE-2023-3345.json) (`2024-08-30T09:15:04.030`) +- [CVE-2023-6257](CVE-2023/CVE-2023-62xx/CVE-2023-6257.json) (`2024-08-30T08:15:04.443`) +- [CVE-2023-6821](CVE-2023/CVE-2023-68xx/CVE-2023-6821.json) (`2024-08-30T08:15:04.520`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d261646723b..de913e900d0 100644 --- a/_state.csv +++ b/_state.csv @@ -225286,7 +225286,7 @@ CVE-2023-33439,0,0,a1ed559c68a76bba2ad761fd2abe747e531eea1568636ca492f0914e7beaf CVE-2023-3344,0,0,eb4ee284fdb2fb3e13683dd6815c4f1c1cab94ffc15d0a92c62215eb523cfe9c,2023-11-07T04:18:33.963000 CVE-2023-33440,0,0,e3c649732d7e5935e00c610e84767b37ce2884399ecd38f7be1a01564bae72ff,2023-06-01T17:15:10.743000 CVE-2023-33443,0,0,db7e13bdcf4b7e84078677ba38cb85ea171264699a45b4254af41e02082dba50,2023-06-14T19:13:04.663000 -CVE-2023-3345,0,0,96bff37570b3d5e823267b7ae6d155c6c6c69e8ac7f98fdaec070da16c69f2e8,2023-11-07T04:18:34.260000 +CVE-2023-3345,0,1,74b3de5fcc4b064c3b90bd5846c1deaefb45ca5151c6cd0264b4cc0ae3634737,2024-08-30T09:15:04.030000 CVE-2023-33457,0,0,1384ae3af2ae126b976a8a49d245e4d9d630594ec67ec1a0c83e25e59db3b525,2023-06-12T15:57:18.677000 CVE-2023-3346,0,0,33bddee86a4fcb6f7d399db916548680973608a860f8539444f55b9ca22edd3a,2023-08-11T21:01:53.977000 CVE-2023-33460,0,0,dec1279f75b613ee523baf40af12e9841457a1045d55e63c789323f254e76f54,2023-11-07T04:14:54.257000 @@ -240223,7 +240223,7 @@ CVE-2023-6252,0,0,ca2b2c2b984f544e82c6d8509f46a27f6849d2326ae97ae5832ce1f0c1989c CVE-2023-6253,0,0,368f2abf54558ec6b258adb3e354908442b0dd5d935aa9cdef55675937e61219,2023-11-30T05:40:53.983000 CVE-2023-6254,0,0,a764314e42da7cbdc88c9e544acbd7a34195729c96357e282cdf6f9bbd5c833d,2023-12-01T02:31:24.583000 CVE-2023-6255,0,0,3a906c3d0051a5d3c161cee80e9a9a9dfd501ec31d42d1ef60e7e78bc5357632,2024-02-15T19:55:09.230000 -CVE-2023-6257,0,0,8919883231ec2cee5d198eb20eef2d1a588f565a122fbd977be9892a65a6963a,2024-04-11T12:47:44.137000 +CVE-2023-6257,0,1,09d47a4e6854f82f57085fcf3b94d2f3cd9d9a198bf29f163cc6f02b00454fdb,2024-08-30T08:15:04.443000 CVE-2023-6258,0,0,6993bb3b80e1fbdd1e324d1a3fdda54930ef92d2589d1502b3997685b04621a1,2024-02-08T17:29:26.097000 CVE-2023-6259,0,0,b78b9a2afac00b53f4eb0c3d1c82f70bfd5413116754c88067596401845f1b97,2024-02-21T15:15:08.987000 CVE-2023-6260,0,0,e5614100ac77cbcd22f1c329438199d040c51e2fa377b14055e4ba3bda88ae79,2024-02-21T15:15:09.187000 @@ -240697,7 +240697,7 @@ CVE-2023-6814,0,0,f2dfd991f3eb478537c48f5d3ac3087d9f7a580ef58638c7d38447968c2e40 CVE-2023-6815,0,0,c9628ac421880e315b97a06c351a60f3525f481ceae5d652af8fc0152141d9cd,2024-02-14T04:15:08.497000 CVE-2023-6816,0,0,7325750dd0731d11c056af32d0623f65306532c99aea359f3789fd6f02f4e7b2,2024-05-22T17:16:09.970000 CVE-2023-6817,0,0,cc201b8683c94f706ae74ea5adc28642e020b44ac49d90e4b25ea49578f8bc79,2024-02-08T16:15:47.270000 -CVE-2023-6821,0,0,2680eacc2d03e89a81c4f4da393854116bb2b119cfdf689d41f3c939f5890be9,2024-03-18T19:40:00.173000 +CVE-2023-6821,0,1,1ecc3c576162236f32f9f64a56f7295ad830704c5fedf9bc87d6ba759b1f7e3e,2024-08-30T08:15:04.520000 CVE-2023-6824,0,0,317fcb7097041988b3396911807cb287d8657125154b4a375fa0829093889531,2024-01-23T15:35:27.123000 CVE-2023-6825,0,0,5f2a6b8900d2ecb14567d0b430ce60a11b72adf0d920af3176450139cc927b08,2024-03-13T18:16:18.563000 CVE-2023-6826,0,0,0b04535adf04b35ffa25089a607bb4494dc5795922b9225750066cd0ade8775d,2023-12-21T04:49:03.117000 @@ -253040,7 +253040,7 @@ CVE-2024-34572,0,0,da6acb8cd40dcbf6d2323bd9254a7bc18f8453b6d03d8a57301b37dd8d671 CVE-2024-34573,0,0,82ca0b9b260238fc8193bf82f5bea85dcdeb8c8fd722769c69f6849636d7fcda,2024-05-08T13:15:00.690000 CVE-2024-34574,0,0,3e74c1beadff3fd890d2b5da4de2565dbad760d56326afd390946b5e96fda210,2024-05-08T13:15:00.690000 CVE-2024-34575,0,0,393b99ab99d08853751fd9680d36e14a49cd8e34f0aeacbb783a82d97ec9bda1,2024-05-17T18:36:05.263000 -CVE-2024-34577,1,1,e31068571a52b23a832e3e8217c56828975f126a4e20928aecfc08a4796cfc61,2024-08-30T07:15:11.660000 +CVE-2024-34577,0,0,e31068571a52b23a832e3e8217c56828975f126a4e20928aecfc08a4796cfc61,2024-08-30T07:15:11.660000 CVE-2024-3458,0,0,87e528d305caa39d9a35bfd4c8efb11949cfac496f77400f61f34f91d68ca048,2024-05-17T02:39:57.243000 CVE-2024-34580,0,0,b13d0d10186fa8ce8e24199cc1dc2d80b13694b6d8eff194e8908c96c81a6c72,2024-08-08T18:15:10.157000 CVE-2024-34581,0,0,0413ed27e2fcdfc3f06c8169658e624099f91a9321af4014b7ce969f11436f7e,2024-07-03T02:00:40.357000 @@ -254488,7 +254488,7 @@ CVE-2024-3671,0,0,721f7e6a346cf74d875b2c4c41e32228fcdbc5d546ba420f9052982bd9032d CVE-2024-3672,0,0,3f4375d3f925965eedd3021149cf89991af4643d3a1e99168ddd0533ac28ffa8,2024-04-16T13:24:07.103000 CVE-2024-36728,0,0,685c6307c04e58fb91aa1cd3d8196094b317c76e0e4421d5d65d9f3c42021678,2024-07-03T02:03:33.547000 CVE-2024-36729,0,0,d45877829f45f72a36efe808f4ab30639504f5ee409a1f4bbca4482bbbc7cd52,2024-07-03T02:03:34.353000 -CVE-2024-3673,1,1,cc9895c4e0e8a9f91575facdb6ccdf4757b5ea1c38cd0c1fdfbdda4973faba4c,2024-08-30T06:15:05.400000 +CVE-2024-3673,0,0,cc9895c4e0e8a9f91575facdb6ccdf4757b5ea1c38cd0c1fdfbdda4973faba4c,2024-08-30T06:15:05.400000 CVE-2024-36730,0,0,64a3dffa7bbe9fe7e69b7699e79bca595a078505b7c29c8334f44bb856a96c39,2024-06-07T14:56:05.647000 CVE-2024-36732,0,0,89ef79acf914e7fa79f0997bbb77dd27a533cae855c7319e0da9cc89d060d11c,2024-08-01T13:53:14.287000 CVE-2024-36734,0,0,37607296c2114d18eb9371884ac39d9c7abe072eefba87ba6dd89607d9b61cc6,2024-08-20T14:35:24.830000 @@ -256108,7 +256108,7 @@ CVE-2024-39293,0,0,1fec2940f1bd80b7fcd0ef6093774070c9cb79d5cc06d154bd66dc488c943 CVE-2024-39296,0,0,1505e8dd09a63330ec5436e9f86022e9b63137e3bb41d294e6c4ca091f2e08ed,2024-06-25T18:50:42.040000 CVE-2024-39298,0,0,ebc8c1ac57b6c8432c32f877ad1093e868a3d2381cb98ee4d7cf51055258ad60,2024-06-25T18:50:42.040000 CVE-2024-3930,0,0,54b8e4aa07087aa149fa9bad599c7a18dec56c1b93dd2d2499327bc3c7940bbd,2024-07-31T12:57:02.300000 -CVE-2024-39300,1,1,4f8232620a681c36f4b5bce483afe0ae64bc18df8083ac115cfff8990dddafe5,2024-08-30T07:15:11.837000 +CVE-2024-39300,0,0,4f8232620a681c36f4b5bce483afe0ae64bc18df8083ac115cfff8990dddafe5,2024-08-30T07:15:11.837000 CVE-2024-39301,0,0,72934b8f63bc52924fc16a3afe1a18dbebdfa8998d51203c594a2fbcffcac42e,2024-06-25T18:50:42.040000 CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000 CVE-2024-39303,0,0,e1d113aa825245b6d1e52862ebbf0ca8379af72327c1818fa556c736e7b07e25,2024-08-21T15:54:35.650000 @@ -257860,7 +257860,7 @@ CVE-2024-42400,0,0,bada445f5210525c2b124a846736c128f6bdefeabff1b80f8c8c07a166ac6 CVE-2024-42408,0,0,4d58de4373d6b44540fc0d8799a258082f4b72e8c10ed3de4134395815aaf808,2024-08-29T14:22:45.603000 CVE-2024-4241,0,0,1e8cfaace7e8ae3194846b1351a77e14aef6cd3a07b429e780198fa55ccad7c3,2024-05-17T02:40:19.957000 CVE-2024-42411,0,0,3fcf900cd705b45045cb94d8edb3d48eeb6b58809490fd9c74760d8ca62aa9ff,2024-08-23T16:04:26.227000 -CVE-2024-42412,1,1,f1939953704b71865494dc61fca48c0d4f8122cc54bc9ba3f8d2a00cd7b2e075,2024-08-30T07:15:12.070000 +CVE-2024-42412,0,0,f1939953704b71865494dc61fca48c0d4f8122cc54bc9ba3f8d2a00cd7b2e075,2024-08-30T07:15:12.070000 CVE-2024-42418,0,0,cd8cebc8a20c18f0027a896396b37c57ee369fd63657ca2801f50759cb9c420b,2024-08-23T16:18:28.547000 CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000 CVE-2024-4243,0,0,d19512e4db8434daba47c490442c83df13ecbcadaf4fb9c501fe6a2c921256d5,2024-06-04T19:20:33.497000 @@ -258745,6 +258745,7 @@ CVE-2024-44940,0,0,6d3559648bdfa621b46434f9855de2178fa1de08defe3fd31c71176641a2c CVE-2024-44941,0,0,15a1c7001949731e4df03f4a864ae7a9e64adc22c4c644da2de0836d77651385,2024-08-26T12:47:20.187000 CVE-2024-44942,0,0,17b37362bd3ba24b1a5ce481b72105519e3d684fbcb26bdd0327529225c432f3,2024-08-27T16:09:10.010000 CVE-2024-44943,0,0,5bf597bf2fa044f6eb0ba2afa66eeb4ae405658ddc3b2a597c7fedca3c5f2035,2024-08-28T12:57:17.117000 +CVE-2024-44944,1,1,44a2bb7751a9b3a40b91b3aa16853b1f12a7e148cfcf7fa54527c6deb34cf78b,2024-08-30T08:15:04.580000 CVE-2024-4495,0,0,cb1d8bc801c43f7ab8180176a646c9e39a56603c1305eac804522af3adac0fa8,2024-05-17T02:40:25.167000 CVE-2024-4496,0,0,6e858d3d5b48b877aff577f900a80fd10c799bd74cdf4188d346fa0d13641a80,2024-06-04T19:20:39.340000 CVE-2024-4497,0,0,6a1d6365c146727895628930cc6e441179a183396cbc0224f0d3e640240772d3,2024-06-04T19:20:39.437000 @@ -261446,7 +261447,7 @@ CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8 CVE-2024-8005,0,0,c059370cb975aea915e5671e32cb80d879151797480dbd5423b1593aeba96675,2024-08-21T15:49:59.470000 CVE-2024-8007,0,0,52ca9c0e82e8a1b579386af92379a7290d3dc66a84196be21e42591213ed68f8,2024-08-23T17:06:04.643000 CVE-2024-8011,0,0,b9eccdb873cdee0aa4aaf727a8d55e87a8f1a6dcd35fe88e6cae24de39ee4994,2024-08-26T12:47:20.187000 -CVE-2024-8016,1,1,04b6d82d870dda81cd99099c7980d168d7f6e5ae898d8f8f978a101e890eeb9b,2024-08-30T07:15:12.140000 +CVE-2024-8016,0,0,04b6d82d870dda81cd99099c7980d168d7f6e5ae898d8f8f978a101e890eeb9b,2024-08-30T07:15:12.140000 CVE-2024-8022,0,0,469d074c70ed4d6e1b7ca7023005d3bb3e3f23419b5a39b3540fd69e34fadcaa,2024-08-21T12:30:33.697000 CVE-2024-8023,0,0,7f1c10536d9d4e1a728f09b10c1ff35f77d0bba503a7c61c411fbfd5f6584d46,2024-08-21T12:30:33.697000 CVE-2024-8030,0,0,b6f55198da4c8a890918e236b9cb91502d6b60f60aed340690526a7aff836eb3,2024-08-28T12:57:27.610000 @@ -261561,8 +261562,9 @@ CVE-2024-8301,0,0,a320b86a1c6d3602618f46f60fc09d8dff020322bb7a7b0e43fc9a496aef7f CVE-2024-8302,0,0,6aa1d8b6c4a0f124c66574ced2f9e480e232ca912559bf0084d593981c6213c1,2024-08-29T14:15:09.530000 CVE-2024-8303,0,0,df216f6ed6991ebfcd8d04a527576b3dbc34dfc62eb0afc850512e7710171894,2024-08-29T15:15:34.783000 CVE-2024-8304,0,0,0b11e3bd31707139d665525dc7f3be4c5c9aa682a3f15d2ded6c49c9b5d9a51b,2024-08-29T15:15:35.070000 +CVE-2024-8319,1,1,21440f1e80aabc203dfff6f5eb223560fc365a9cd6068459507b958339466757,2024-08-30T08:15:04.653000 CVE-2024-8327,0,0,b3f1d55df9565148f9d1e1c8a655cde008cdfa7e182f7f35e153adec04e41b9f,2024-08-30T03:15:04.020000 CVE-2024-8328,0,0,0eb65cb2bcbd94bffb10237fcb7b3578eb984f706ec3178c6a33aac4e483cc9d,2024-08-30T03:15:04.247000 CVE-2024-8329,0,0,068d1da5d1f1460669ff4f0ddfb5ea97052d6609fbd555280053755d29a78999,2024-08-30T03:15:04.463000 CVE-2024-8330,0,0,1d2f05a979d6309da597cf83ec43a159e1f5852252ed8cb59dfc8d12f376ce8c,2024-08-30T03:15:04.660000 -CVE-2024-8333,1,1,6f1ea39c4f9d2633b88ba89972fd9ac57009b75876255dbdb47a9abfdb00a2be,2024-08-30T06:15:05.577000 +CVE-2024-8333,0,0,6f1ea39c4f9d2633b88ba89972fd9ac57009b75876255dbdb47a9abfdb00a2be,2024-08-30T06:15:05.577000