Skip to content

Commit

Permalink
2 changes (0 new | 2 updated):
Browse files Browse the repository at this point in the history
      - 0 new CVEs:
      - 2 updated CVEs: CVE-2002-20002, CVE-2024-56830
  • Loading branch information
cvelistV5 Github Action committed Jan 2, 2025
1 parent eef1549 commit 5ec8a11
Show file tree
Hide file tree
Showing 4 changed files with 93 additions and 167 deletions.
54 changes: 34 additions & 20 deletions cves/2002/20xxx/CVE-2002-20002.json
Original file line number Diff line number Diff line change
Expand Up @@ -5,35 +5,47 @@
"cveId": "CVE-2002-20002",
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"dateUpdated": "2025-01-02T04:58:10.382967",
"dateUpdated": "2025-01-02T05:00:27.855Z",
"dateReserved": "2025-01-02T00:00:00",
"datePublished": "2025-01-02T00:00:00"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2025-01-02T04:58:10.382967"
},
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Net::EasyTCP package before 0.15 for Perl always uses Perl's builtin rand(), which is not a strong random number generator, for cryptographic keys."
}
],
"affected": [
"problemTypes": [
{
"vendor": "n/a",
"product": "n/a",
"versions": [
"descriptions": [
{
"version": "n/a",
"status": "affected"
"cweId": "CWE-338",
"description": "CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2025-01-02T05:00:27.855Z"
},
"references": [
{
"url": "https://metacpan.org/release/MNAGUIB/EasyTCP-0.26/changes"
Expand All @@ -45,15 +57,17 @@
"url": "https://metacpan.org/release/MNAGUIB/EasyTCP-0.15/view/EasyTCP.pm"
}
],
"problemTypes": [
"x_generator": {
"engine": "enrichogram 0.0.1"
},
"metrics": [
{
"descriptions": [
{
"type": "text",
"lang": "en",
"description": "n/a"
}
]
"cvssV3_1": {
"version": "3.1",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N"
}
}
]
}
Expand Down
54 changes: 34 additions & 20 deletions cves/2024/56xxx/CVE-2024-56830.json
Original file line number Diff line number Diff line change
Expand Up @@ -5,35 +5,47 @@
"cveId": "CVE-2024-56830",
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"dateUpdated": "2025-01-02T04:57:45.542694",
"dateUpdated": "2025-01-02T05:00:55.766Z",
"dateReserved": "2025-01-02T00:00:00",
"datePublished": "2025-01-02T00:00:00"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2025-01-02T04:57:45.542694"
},
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present."
}
],
"affected": [
"problemTypes": [
{
"vendor": "n/a",
"product": "n/a",
"versions": [
"descriptions": [
{
"version": "n/a",
"status": "affected"
"cweId": "CWE-338",
"description": "CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre",
"dateUpdated": "2025-01-02T05:00:55.766Z"
},
"references": [
{
"url": "https://metacpan.org/release/MNAGUIB/EasyTCP-0.26/changes"
Expand All @@ -42,15 +54,17 @@
"url": "https://github.com/briandfoy/cpan-security-advisory/issues/184"
}
],
"problemTypes": [
"x_generator": {
"engine": "enrichogram 0.0.1"
},
"metrics": [
{
"descriptions": [
{
"type": "text",
"lang": "en",
"description": "n/a"
}
]
"cvssV3_1": {
"version": "3.1",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N"
}
}
]
}
Expand Down
10 changes: 5 additions & 5 deletions cves/delta.json
Original file line number Diff line number Diff line change
@@ -1,20 +1,20 @@
{
"fetchTime": "2025-01-02T04:58:35.991Z",
"fetchTime": "2025-01-02T05:06:52.805Z",
"numberOfChanges": 2,
"new": [
"new": [],
"updated": [
{
"cveId": "CVE-2002-20002",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2002-20002",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2002/20xxx/CVE-2002-20002.json",
"dateUpdated": "2025-01-02T04:58:10.382967"
"dateUpdated": "2025-01-02T05:00:27.855Z"
},
{
"cveId": "CVE-2024-56830",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56830",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56830.json",
"dateUpdated": "2025-01-02T04:57:45.542694"
"dateUpdated": "2025-01-02T05:00:55.766Z"
}
],
"updated": [],
"error": []
}
142 changes: 20 additions & 122 deletions cves/deltaLog.json
Original file line number Diff line number Diff line change
@@ -1,4 +1,24 @@
[
{
"fetchTime": "2025-01-02T05:06:52.805Z",
"numberOfChanges": 2,
"new": [],
"updated": [
{
"cveId": "CVE-2002-20002",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2002-20002",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2002/20xxx/CVE-2002-20002.json",
"dateUpdated": "2025-01-02T05:00:27.855Z"
},
{
"cveId": "CVE-2024-56830",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56830",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56830.json",
"dateUpdated": "2025-01-02T05:00:55.766Z"
}
],
"error": []
},
{
"fetchTime": "2025-01-02T04:58:35.991Z",
"numberOfChanges": 2,
Expand Down Expand Up @@ -116607,127 +116627,5 @@
],
"updated": [],
"error": []
},
{
"fetchTime": "2024-12-03T05:00:23.646Z",
"numberOfChanges": 19,
"new": [],
"updated": [
{
"cveId": "CVE-2024-10905",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10905",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10905.json",
"dateUpdated": "2024-12-03T04:55:23.774Z"
},
{
"cveId": "CVE-2024-20125",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-20125",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/20xxx/CVE-2024-20125.json",
"dateUpdated": "2024-12-03T04:55:25.355Z"
},
{
"cveId": "CVE-2024-20130",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-20130",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/20xxx/CVE-2024-20130.json",
"dateUpdated": "2024-12-03T04:55:26.732Z"
},
{
"cveId": "CVE-2024-20131",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-20131",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/20xxx/CVE-2024-20131.json",
"dateUpdated": "2024-12-03T04:55:28.022Z"
},
{
"cveId": "CVE-2024-20132",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-20132",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/20xxx/CVE-2024-20132.json",
"dateUpdated": "2024-12-03T04:55:29.222Z"
},
{
"cveId": "CVE-2024-20133",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-20133",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/20xxx/CVE-2024-20133.json",
"dateUpdated": "2024-12-03T04:55:30.550Z"
},
{
"cveId": "CVE-2024-20134",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-20134",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/20xxx/CVE-2024-20134.json",
"dateUpdated": "2024-12-03T04:55:31.780Z"
},
{
"cveId": "CVE-2024-20135",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-20135",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/20xxx/CVE-2024-20135.json",
"dateUpdated": "2024-12-03T04:55:33.058Z"
},
{
"cveId": "CVE-2024-33036",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-33036",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/33xxx/CVE-2024-33036.json",
"dateUpdated": "2024-12-03T04:55:43.338Z"
},
{
"cveId": "CVE-2024-33039",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-33039",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/33xxx/CVE-2024-33039.json",
"dateUpdated": "2024-12-03T04:55:44.526Z"
},
{
"cveId": "CVE-2024-33040",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-33040",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/33xxx/CVE-2024-33040.json",
"dateUpdated": "2024-12-03T04:55:45.919Z"
},
{
"cveId": "CVE-2024-33044",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-33044",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/33xxx/CVE-2024-33044.json",
"dateUpdated": "2024-12-03T04:55:34.319Z"
},
{
"cveId": "CVE-2024-33053",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-33053",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/33xxx/CVE-2024-33053.json",
"dateUpdated": "2024-12-03T04:55:47.167Z"
},
{
"cveId": "CVE-2024-33056",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-33056",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/33xxx/CVE-2024-33056.json",
"dateUpdated": "2024-12-03T04:55:35.719Z"
},
{
"cveId": "CVE-2024-43048",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43048",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43048.json",
"dateUpdated": "2024-12-03T04:55:36.961Z"
},
{
"cveId": "CVE-2024-43049",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43049",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43049.json",
"dateUpdated": "2024-12-03T04:55:38.243Z"
},
{
"cveId": "CVE-2024-43050",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43050",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43050.json",
"dateUpdated": "2024-12-03T04:55:39.595Z"
},
{
"cveId": "CVE-2024-43052",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43052",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43052.json",
"dateUpdated": "2024-12-03T04:55:40.842Z"
},
{
"cveId": "CVE-2024-43053",
"cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43053",
"githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43053.json",
"dateUpdated": "2024-12-03T04:55:42.097Z"
}
],
"error": []
}
]

0 comments on commit 5ec8a11

Please sign in to comment.