From 8e8fc67ad30d3cfb154f049e42acdbfb5e8a76c8 Mon Sep 17 00:00:00 2001 From: cvelistV5 Github Action Date: Wed, 4 Dec 2024 22:07:10 +0000 Subject: [PATCH] 4 changes (3 new | 1 updated): - 3 new CVEs: CVE-2018-9396, CVE-2024-12180, CVE-2024-12181 - 1 updated CVEs: CVE-2024-53916 --- cves/2018/9xxx/CVE-2018-9396.json | 59 +++++++++ cves/2024/12xxx/CVE-2024-12180.json | 156 ++++++++++++++++++++++ cves/2024/12xxx/CVE-2024-12181.json | 159 ++++++++++++++++++++++ cves/2024/53xxx/CVE-2024-53916.json | 7 +- cves/delta.json | 199 +++------------------------- cves/deltaLog.json | 92 +++++-------- 6 files changed, 434 insertions(+), 238 deletions(-) create mode 100644 cves/2018/9xxx/CVE-2018-9396.json create mode 100644 cves/2024/12xxx/CVE-2024-12180.json create mode 100644 cves/2024/12xxx/CVE-2024-12181.json diff --git a/cves/2018/9xxx/CVE-2018-9396.json b/cves/2018/9xxx/CVE-2018-9396.json new file mode 100644 index 000000000000..0ba04f4fe76e --- /dev/null +++ b/cves/2018/9xxx/CVE-2018-9396.json @@ -0,0 +1,59 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2018-9396", + "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "state": "PUBLISHED", + "assignerShortName": "google_android", + "dateReserved": "2018-04-05T00:00:00.000Z", + "datePublished": "2024-12-04T21:59:02.879Z", + "dateUpdated": "2024-12-04T21:59:02.879Z" + }, + "containers": { + "cna": { + "affected": [ + { + "defaultStatus": "unaffected", + "product": "Android", + "vendor": "Google", + "versions": [ + { + "status": "affected", + "version": "Kernel" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "In rpc_msg_handler and related handlers of drivers/misc/mediatek/eccci/port_rpc.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation." + } + ], + "value": "In rpc_msg_handler and related handlers of drivers/misc/mediatek/eccci/port_rpc.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation." + } + ], + "providerMetadata": { + "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "shortName": "google_android", + "dateUpdated": "2024-12-04T21:59:02.879Z" + }, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2018-06-01" + } + ], + "source": { + "discovery": "UNKNOWN" + }, + "x_generator": { + "engine": "Vulnogram 0.2.0" + } + } + } +} \ No newline at end of file diff --git a/cves/2024/12xxx/CVE-2024-12180.json b/cves/2024/12xxx/CVE-2024-12180.json new file mode 100644 index 000000000000..99bc97166425 --- /dev/null +++ b/cves/2024/12xxx/CVE-2024-12180.json @@ -0,0 +1,156 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-12180", + "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", + "state": "PUBLISHED", + "assignerShortName": "VulDB", + "dateReserved": "2024-12-04T16:30:46.328Z", + "datePublished": "2024-12-04T22:00:12.689Z", + "dateUpdated": "2024-12-04T22:00:12.689Z" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", + "shortName": "VulDB", + "dateUpdated": "2024-12-04T22:00:12.689Z" + }, + "title": "DedeCMS article_add.php cross site scripting", + "problemTypes": [ + { + "descriptions": [ + { + "type": "CWE", + "cweId": "CWE-79", + "lang": "en", + "description": "Cross Site Scripting" + } + ] + }, + { + "descriptions": [ + { + "type": "CWE", + "cweId": "CWE-94", + "lang": "en", + "description": "Code Injection" + } + ] + } + ], + "affected": [ + { + "vendor": "n/a", + "product": "DedeCMS", + "versions": [ + { + "version": "5.7.116", + "status": "affected" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in DedeCMS 5.7.116. Affected is an unknown function of the file /member/article_add.php. The manipulation of the argument body leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "de", + "value": "Es wurde eine problematische Schwachstelle in DedeCMS 5.7.116 entdeckt. Es geht dabei um eine nicht klar definierte Funktion der Datei /member/article_add.php. Dank der Manipulation des Arguments body mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung." + } + ], + "metrics": [ + { + "cvssV4_0": { + "version": "4.0", + "baseScore": 5.3, + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", + "baseSeverity": "MEDIUM" + } + }, + { + "cvssV3_1": { + "version": "3.1", + "baseScore": 3.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + } + }, + { + "cvssV3_0": { + "version": "3.0", + "baseScore": 3.5, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + } + }, + { + "cvssV2_0": { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N" + } + } + ], + "timeline": [ + { + "time": "2024-12-04T00:00:00.000Z", + "lang": "en", + "value": "Advisory disclosed" + }, + { + "time": "2024-12-04T01:00:00.000Z", + "lang": "en", + "value": "VulDB entry created" + }, + { + "time": "2024-12-04T17:36:00.000Z", + "lang": "en", + "value": "VulDB entry last update" + } + ], + "credits": [ + { + "lang": "en", + "value": "jiashenghe (VulDB User)", + "type": "reporter" + } + ], + "references": [ + { + "url": "https://vuldb.com/?id.286902", + "name": "VDB-286902 | DedeCMS article_add.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description" + ] + }, + { + "url": "https://vuldb.com/?ctiid.286902", + "name": "VDB-286902 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required" + ] + }, + { + "url": "https://vuldb.com/?submit.452969", + "name": "Submit #452969 | DedeCMS V5.7.116 Cross Site Scripting", + "tags": [ + "third-party-advisory" + ] + }, + { + "url": "https://github.com/Hebing123/cve/issues/76", + "tags": [ + "exploit", + "issue-tracking" + ] + } + ] + } + } +} \ No newline at end of file diff --git a/cves/2024/12xxx/CVE-2024-12181.json b/cves/2024/12xxx/CVE-2024-12181.json new file mode 100644 index 000000000000..c8dcd2880ed1 --- /dev/null +++ b/cves/2024/12xxx/CVE-2024-12181.json @@ -0,0 +1,159 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-12181", + "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", + "state": "PUBLISHED", + "assignerShortName": "VulDB", + "dateReserved": "2024-12-04T16:30:48.958Z", + "datePublished": "2024-12-04T22:00:14.645Z", + "dateUpdated": "2024-12-04T22:00:14.645Z" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", + "shortName": "VulDB", + "dateUpdated": "2024-12-04T22:00:14.645Z" + }, + "title": "DedeCMS SWF File uploads_add.php cross site scripting", + "problemTypes": [ + { + "descriptions": [ + { + "type": "CWE", + "cweId": "CWE-79", + "lang": "en", + "description": "Cross Site Scripting" + } + ] + }, + { + "descriptions": [ + { + "type": "CWE", + "cweId": "CWE-94", + "lang": "en", + "description": "Code Injection" + } + ] + } + ], + "affected": [ + { + "vendor": "n/a", + "product": "DedeCMS", + "versions": [ + { + "version": "5.7.116", + "status": "affected" + } + ], + "modules": [ + "SWF File Handler" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in DedeCMS 5.7.116. Affected by this vulnerability is an unknown functionality of the file /member/uploads_add.php of the component SWF File Handler. The manipulation of the argument mediatype leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "de", + "value": "In DedeCMS 5.7.116 wurde eine problematische Schwachstelle entdeckt. Dabei geht es um eine nicht genauer bekannte Funktion der Datei /member/uploads_add.php der Komponente SWF File Handler. Dank Manipulation des Arguments mediatype mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung." + } + ], + "metrics": [ + { + "cvssV4_0": { + "version": "4.0", + "baseScore": 5.3, + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N", + "baseSeverity": "MEDIUM" + } + }, + { + "cvssV3_1": { + "version": "3.1", + "baseScore": 3.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + } + }, + { + "cvssV3_0": { + "version": "3.0", + "baseScore": 3.5, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + } + }, + { + "cvssV2_0": { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N" + } + } + ], + "timeline": [ + { + "time": "2024-12-04T00:00:00.000Z", + "lang": "en", + "value": "Advisory disclosed" + }, + { + "time": "2024-12-04T01:00:00.000Z", + "lang": "en", + "value": "VulDB entry created" + }, + { + "time": "2024-12-04T17:36:01.000Z", + "lang": "en", + "value": "VulDB entry last update" + } + ], + "credits": [ + { + "lang": "en", + "value": "jiashenghe (VulDB User)", + "type": "reporter" + } + ], + "references": [ + { + "url": "https://vuldb.com/?id.286903", + "name": "VDB-286903 | DedeCMS SWF File uploads_add.php cross site scripting", + "tags": [ + "vdb-entry", + "technical-description" + ] + }, + { + "url": "https://vuldb.com/?ctiid.286903", + "name": "VDB-286903 | CTI Indicators (IOB, IOC, TTP, IOA)", + "tags": [ + "signature", + "permissions-required" + ] + }, + { + "url": "https://vuldb.com/?submit.452983", + "name": "Submit #452983 | DedeCMS V5.7.116 Cross Site Scripting", + "tags": [ + "third-party-advisory" + ] + }, + { + "url": "https://github.com/Hebing123/cve/issues/77", + "tags": [ + "exploit", + "issue-tracking" + ] + } + ] + } + } +} \ No newline at end of file diff --git a/cves/2024/53xxx/CVE-2024-53916.json b/cves/2024/53xxx/CVE-2024-53916.json index 5f190ad79da9..0693e42a0e9d 100644 --- a/cves/2024/53xxx/CVE-2024-53916.json +++ b/cves/2024/53xxx/CVE-2024-53916.json @@ -5,7 +5,7 @@ "cveId": "CVE-2024-53916", "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", - "dateUpdated": "2024-12-04T03:45:38.107231", + "dateUpdated": "2024-12-04T22:01:18.911622Z", "dateReserved": "2024-11-24T00:00:00", "datePublished": "2024-11-24T00:00:00" }, @@ -14,7 +14,7 @@ "providerMetadata": { "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre", - "dateUpdated": "2024-12-04T03:45:38.107231" + "dateUpdated": "2024-12-04T22:01:18.911622Z" }, "descriptions": [ { @@ -43,6 +43,9 @@ }, { "url": "https://github.com/openstack/neutron/blob/363ffa6e9e1ab5968f87d45bc2f1cb6394f48b9f/neutron/extensions/tagging.py#L138-L232" + }, + { + "url": "https://security.openstack.org/ossa/OSSA-2024-005.html" } ], "problemTypes": [ diff --git a/cves/delta.json b/cves/delta.json index a4f2f5eddabc..ab5e5d51b78e 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,187 +1,32 @@ { - "fetchTime": "2024-12-04T21:46:36.927Z", - "numberOfChanges": 30, - "new": [], - "updated": [ - { - "cveId": "CVE-2023-20756", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-20756", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/20xxx/CVE-2023-20756.json", - "dateUpdated": "2024-12-04T21:42:31.141Z" - }, - { - "cveId": "CVE-2023-20757", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-20757", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/20xxx/CVE-2023-20757.json", - "dateUpdated": "2024-12-04T21:42:17.859Z" - }, - { - "cveId": "CVE-2023-20758", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-20758", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/20xxx/CVE-2023-20758.json", - "dateUpdated": "2024-12-04T21:42:06.835Z" - }, - { - "cveId": "CVE-2023-20759", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-20759", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/20xxx/CVE-2023-20759.json", - "dateUpdated": "2024-12-04T21:41:53.694Z" - }, - { - "cveId": "CVE-2023-20761", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-20761", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/20xxx/CVE-2023-20761.json", - "dateUpdated": "2024-12-04T21:41:39.995Z" - }, - { - "cveId": "CVE-2023-20766", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-20766", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/20xxx/CVE-2023-20766.json", - "dateUpdated": "2024-12-04T21:41:27.363Z" - }, - { - "cveId": "CVE-2023-20767", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-20767", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/20xxx/CVE-2023-20767.json", - "dateUpdated": "2024-12-04T21:41:17.672Z" - }, - { - "cveId": "CVE-2023-20768", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-20768", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/20xxx/CVE-2023-20768.json", - "dateUpdated": "2024-12-04T21:41:05.844Z" - }, - { - "cveId": "CVE-2023-20771", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-20771", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/20xxx/CVE-2023-20771.json", - "dateUpdated": "2024-12-04T21:40:41.801Z" - }, - { - "cveId": "CVE-2023-21198", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-21198", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/21xxx/CVE-2023-21198.json", - "dateUpdated": "2024-12-04T21:43:46.259Z" - }, - { - "cveId": "CVE-2023-21236", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-21236", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/21xxx/CVE-2023-21236.json", - "dateUpdated": "2024-12-04T21:43:34.089Z" - }, - { - "cveId": "CVE-2023-21517", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-21517", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/21xxx/CVE-2023-21517.json", - "dateUpdated": "2024-12-04T21:43:05.684Z" - }, - { - "cveId": "CVE-2023-34796", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-34796", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/34xxx/CVE-2023-34796.json", - "dateUpdated": "2024-12-04T21:45:02.484Z" - }, - { - "cveId": "CVE-2023-34923", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-34923", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/34xxx/CVE-2023-34923.json", - "dateUpdated": "2024-12-04T21:41:52.409Z" - }, + "fetchTime": "2024-12-04T22:06:57.631Z", + "numberOfChanges": 4, + "new": [ { - "cveId": "CVE-2023-34927", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-34927", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/34xxx/CVE-2023-34927.json", - "dateUpdated": "2024-12-04T21:40:56.754Z" + "cveId": "CVE-2018-9396", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9396", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9396.json", + "dateUpdated": "2024-12-04T21:59:02.879Z" }, { - "cveId": "CVE-2023-3330", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-3330", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/3xxx/CVE-2023-3330.json", - "dateUpdated": "2024-12-04T21:42:54.798Z" + "cveId": "CVE-2024-12180", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12180", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12180.json", + "dateUpdated": "2024-12-04T22:00:12.689Z" }, { - "cveId": "CVE-2024-11576", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11576", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11576.json", - "dateUpdated": "2024-12-04T21:42:58.512Z" - }, - { - "cveId": "CVE-2024-11577", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11577", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11577.json", - "dateUpdated": "2024-12-04T21:42:46.254Z" - }, - { - "cveId": "CVE-2024-11578", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11578", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11578.json", - "dateUpdated": "2024-12-04T21:42:32.879Z" - }, - { - "cveId": "CVE-2024-11579", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11579", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11579.json", - "dateUpdated": "2024-12-04T21:42:19.285Z" - }, - { - "cveId": "CVE-2024-11580", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11580", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11580.json", - "dateUpdated": "2024-12-04T21:42:06.953Z" - }, - { - "cveId": "CVE-2024-6246", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-6246", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/6xxx/CVE-2024-6246.json", - "dateUpdated": "2024-12-04T21:43:36.425Z" - }, - { - "cveId": "CVE-2024-6247", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-6247", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/6xxx/CVE-2024-6247.json", - "dateUpdated": "2024-12-04T21:43:24.007Z" - }, - { - "cveId": "CVE-2024-6248", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-6248", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/6xxx/CVE-2024-6248.json", - "dateUpdated": "2024-12-04T21:43:13.028Z" - }, - { - "cveId": "CVE-2024-9714", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-9714", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/9xxx/CVE-2024-9714.json", - "dateUpdated": "2024-12-04T21:41:50.180Z" - }, - { - "cveId": "CVE-2024-9715", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-9715", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/9xxx/CVE-2024-9715.json", - "dateUpdated": "2024-12-04T21:41:32.358Z" - }, - { - "cveId": "CVE-2024-9716", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-9716", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/9xxx/CVE-2024-9716.json", - "dateUpdated": "2024-12-04T21:41:18.380Z" - }, - { - "cveId": "CVE-2024-9717", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-9717", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/9xxx/CVE-2024-9717.json", - "dateUpdated": "2024-12-04T21:41:03.405Z" - }, - { - "cveId": "CVE-2024-9718", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-9718", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/9xxx/CVE-2024-9718.json", - "dateUpdated": "2024-12-04T21:40:45.821Z" - }, + "cveId": "CVE-2024-12181", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12181", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12181.json", + "dateUpdated": "2024-12-04T22:00:14.645Z" + } + ], + "updated": [ { - "cveId": "CVE-2024-9719", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-9719", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/9xxx/CVE-2024-9719.json", - "dateUpdated": "2024-12-04T21:40:32.795Z" + "cveId": "CVE-2024-53916", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53916", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53916.json", + "dateUpdated": "2024-12-04T22:01:18.911622Z" } ], "error": [] diff --git a/cves/deltaLog.json b/cves/deltaLog.json index a9ee4231f419..caaa1ab7a17d 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,37 @@ [ + { + "fetchTime": "2024-12-04T22:06:57.631Z", + "numberOfChanges": 4, + "new": [ + { + "cveId": "CVE-2018-9396", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9396", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9396.json", + "dateUpdated": "2024-12-04T21:59:02.879Z" + }, + { + "cveId": "CVE-2024-12180", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12180", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12180.json", + "dateUpdated": "2024-12-04T22:00:12.689Z" + }, + { + "cveId": "CVE-2024-12181", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-12181", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/12xxx/CVE-2024-12181.json", + "dateUpdated": "2024-12-04T22:00:14.645Z" + } + ], + "updated": [ + { + "cveId": "CVE-2024-53916", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53916", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53916.json", + "dateUpdated": "2024-12-04T22:01:18.911622Z" + } + ], + "error": [] + }, { "fetchTime": "2024-12-04T21:46:36.927Z", "numberOfChanges": 30, @@ -137212,64 +137245,5 @@ ], "updated": [], "error": [] - }, - { - "fetchTime": "2024-11-04T22:00:52.084Z", - "numberOfChanges": 1, - "new": [], - "updated": [ - { - "cveId": "CVE-2024-26708", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-26708", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/26xxx/CVE-2024-26708.json", - "dateUpdated": "2024-11-04T21:56:45.799Z" - } - ], - "error": [] - }, - { - "fetchTime": "2024-11-04T21:53:20.280Z", - "numberOfChanges": 6, - "new": [ - { - "cveId": "CVE-2024-51744", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-51744", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/51xxx/CVE-2024-51744.json", - "dateUpdated": "2024-11-04T21:47:12.170Z" - } - ], - "updated": [ - { - "cveId": "CVE-2024-21119", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-21119", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/21xxx/CVE-2024-21119.json", - "dateUpdated": "2024-11-04T21:48:10.140Z" - }, - { - "cveId": "CVE-2024-39637", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-39637", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/39xxx/CVE-2024-39637.json", - "dateUpdated": "2024-11-04T21:47:10.395Z" - }, - { - "cveId": "CVE-2024-44185", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-44185", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/44xxx/CVE-2024-44185.json", - "dateUpdated": "2024-11-04T21:46:06.727Z" - }, - { - "cveId": "CVE-2024-44233", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-44233", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/44xxx/CVE-2024-44233.json", - "dateUpdated": "2024-11-04T21:48:22.282Z" - }, - { - "cveId": "CVE-2024-47189", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-47189", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/47xxx/CVE-2024-47189.json", - "dateUpdated": "2024-11-04T21:50:17.150Z" - } - ], - "error": [] } ] \ No newline at end of file