diff --git a/cves/2002/20xxx/CVE-2002-20002.json b/cves/2002/20xxx/CVE-2002-20002.json index ba83f180c2a5..1a31c9795ae4 100644 --- a/cves/2002/20xxx/CVE-2002-20002.json +++ b/cves/2002/20xxx/CVE-2002-20002.json @@ -5,35 +5,47 @@ "cveId": "CVE-2002-20002", "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", - "dateUpdated": "2025-01-02T04:58:10.382967", + "dateUpdated": "2025-01-02T05:00:27.855Z", "dateReserved": "2025-01-02T00:00:00", "datePublished": "2025-01-02T00:00:00" }, "containers": { "cna": { - "providerMetadata": { - "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", - "shortName": "mitre", - "dateUpdated": "2025-01-02T04:58:10.382967" - }, + "affected": [ + { + "product": "n/a", + "vendor": "n/a", + "versions": [ + { + "status": "affected", + "version": "n/a" + } + ] + } + ], "descriptions": [ { "lang": "en", "value": "The Net::EasyTCP package before 0.15 for Perl always uses Perl's builtin rand(), which is not a strong random number generator, for cryptographic keys." } ], - "affected": [ + "problemTypes": [ { - "vendor": "n/a", - "product": "n/a", - "versions": [ + "descriptions": [ { - "version": "n/a", - "status": "affected" + "cweId": "CWE-338", + "description": "CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", + "lang": "en", + "type": "CWE" } ] } ], + "providerMetadata": { + "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "shortName": "mitre", + "dateUpdated": "2025-01-02T05:00:27.855Z" + }, "references": [ { "url": "https://metacpan.org/release/MNAGUIB/EasyTCP-0.26/changes" @@ -45,15 +57,17 @@ "url": "https://metacpan.org/release/MNAGUIB/EasyTCP-0.15/view/EasyTCP.pm" } ], - "problemTypes": [ + "x_generator": { + "engine": "enrichogram 0.0.1" + }, + "metrics": [ { - "descriptions": [ - { - "type": "text", - "lang": "en", - "description": "n/a" - } - ] + "cvssV3_1": { + "version": "3.1", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" + } } ] } diff --git a/cves/2024/56xxx/CVE-2024-56830.json b/cves/2024/56xxx/CVE-2024-56830.json index cdb5aef44033..823f0b914acc 100644 --- a/cves/2024/56xxx/CVE-2024-56830.json +++ b/cves/2024/56xxx/CVE-2024-56830.json @@ -5,35 +5,47 @@ "cveId": "CVE-2024-56830", "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", - "dateUpdated": "2025-01-02T04:57:45.542694", + "dateUpdated": "2025-01-02T05:00:55.766Z", "dateReserved": "2025-01-02T00:00:00", "datePublished": "2025-01-02T00:00:00" }, "containers": { "cna": { - "providerMetadata": { - "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", - "shortName": "mitre", - "dateUpdated": "2025-01-02T04:57:45.542694" - }, + "affected": [ + { + "product": "n/a", + "vendor": "n/a", + "versions": [ + { + "status": "affected", + "version": "n/a" + } + ] + } + ], "descriptions": [ { "lang": "en", "value": "The Net::EasyTCP package 0.15 through 0.26 for Perl uses Perl's builtin rand() if no strong randomization module is present." } ], - "affected": [ + "problemTypes": [ { - "vendor": "n/a", - "product": "n/a", - "versions": [ + "descriptions": [ { - "version": "n/a", - "status": "affected" + "cweId": "CWE-338", + "description": "CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)", + "lang": "en", + "type": "CWE" } ] } ], + "providerMetadata": { + "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "shortName": "mitre", + "dateUpdated": "2025-01-02T05:00:55.766Z" + }, "references": [ { "url": "https://metacpan.org/release/MNAGUIB/EasyTCP-0.26/changes" @@ -42,15 +54,17 @@ "url": "https://github.com/briandfoy/cpan-security-advisory/issues/184" } ], - "problemTypes": [ + "x_generator": { + "engine": "enrichogram 0.0.1" + }, + "metrics": [ { - "descriptions": [ - { - "type": "text", - "lang": "en", - "description": "n/a" - } - ] + "cvssV3_1": { + "version": "3.1", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" + } } ] } diff --git a/cves/delta.json b/cves/delta.json index f42b4fdbd2f1..b4fa232273e0 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,20 +1,20 @@ { - "fetchTime": "2025-01-02T04:58:35.991Z", + "fetchTime": "2025-01-02T05:06:52.805Z", "numberOfChanges": 2, - "new": [ + "new": [], + "updated": [ { "cveId": "CVE-2002-20002", "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2002-20002", "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2002/20xxx/CVE-2002-20002.json", - "dateUpdated": "2025-01-02T04:58:10.382967" + "dateUpdated": "2025-01-02T05:00:27.855Z" }, { "cveId": "CVE-2024-56830", "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56830", "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56830.json", - "dateUpdated": "2025-01-02T04:57:45.542694" + "dateUpdated": "2025-01-02T05:00:55.766Z" } ], - "updated": [], "error": [] } \ No newline at end of file diff --git a/cves/deltaLog.json b/cves/deltaLog.json index 09b3b7372124..e0474aa201ca 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,24 @@ [ + { + "fetchTime": "2025-01-02T05:06:52.805Z", + "numberOfChanges": 2, + "new": [], + "updated": [ + { + "cveId": "CVE-2002-20002", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2002-20002", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2002/20xxx/CVE-2002-20002.json", + "dateUpdated": "2025-01-02T05:00:27.855Z" + }, + { + "cveId": "CVE-2024-56830", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56830", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56830.json", + "dateUpdated": "2025-01-02T05:00:55.766Z" + } + ], + "error": [] + }, { "fetchTime": "2025-01-02T04:58:35.991Z", "numberOfChanges": 2, @@ -116607,127 +116627,5 @@ ], "updated": [], "error": [] - }, - { - "fetchTime": "2024-12-03T05:00:23.646Z", - "numberOfChanges": 19, - "new": [], - "updated": [ - { - "cveId": "CVE-2024-10905", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10905", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10905.json", - "dateUpdated": "2024-12-03T04:55:23.774Z" - }, - { - "cveId": "CVE-2024-20125", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-20125", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/20xxx/CVE-2024-20125.json", - "dateUpdated": "2024-12-03T04:55:25.355Z" - }, - { - "cveId": "CVE-2024-20130", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-20130", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/20xxx/CVE-2024-20130.json", - "dateUpdated": "2024-12-03T04:55:26.732Z" - }, - { - "cveId": "CVE-2024-20131", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-20131", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/20xxx/CVE-2024-20131.json", - "dateUpdated": "2024-12-03T04:55:28.022Z" - }, - { - "cveId": "CVE-2024-20132", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-20132", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/20xxx/CVE-2024-20132.json", - "dateUpdated": "2024-12-03T04:55:29.222Z" - }, - { - "cveId": "CVE-2024-20133", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-20133", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/20xxx/CVE-2024-20133.json", - "dateUpdated": "2024-12-03T04:55:30.550Z" - }, - { - "cveId": "CVE-2024-20134", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-20134", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/20xxx/CVE-2024-20134.json", - "dateUpdated": "2024-12-03T04:55:31.780Z" - }, - { - "cveId": "CVE-2024-20135", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-20135", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/20xxx/CVE-2024-20135.json", - "dateUpdated": "2024-12-03T04:55:33.058Z" - }, - { - "cveId": "CVE-2024-33036", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-33036", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/33xxx/CVE-2024-33036.json", - "dateUpdated": "2024-12-03T04:55:43.338Z" - }, - { - "cveId": "CVE-2024-33039", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-33039", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/33xxx/CVE-2024-33039.json", - "dateUpdated": "2024-12-03T04:55:44.526Z" - }, - { - "cveId": "CVE-2024-33040", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-33040", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/33xxx/CVE-2024-33040.json", - "dateUpdated": "2024-12-03T04:55:45.919Z" - }, - { - "cveId": "CVE-2024-33044", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-33044", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/33xxx/CVE-2024-33044.json", - "dateUpdated": "2024-12-03T04:55:34.319Z" - }, - { - "cveId": "CVE-2024-33053", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-33053", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/33xxx/CVE-2024-33053.json", - "dateUpdated": "2024-12-03T04:55:47.167Z" - }, - { - "cveId": "CVE-2024-33056", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-33056", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/33xxx/CVE-2024-33056.json", - "dateUpdated": "2024-12-03T04:55:35.719Z" - }, - { - "cveId": "CVE-2024-43048", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43048", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43048.json", - "dateUpdated": "2024-12-03T04:55:36.961Z" - }, - { - "cveId": "CVE-2024-43049", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43049", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43049.json", - "dateUpdated": "2024-12-03T04:55:38.243Z" - }, - { - "cveId": "CVE-2024-43050", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43050", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43050.json", - "dateUpdated": "2024-12-03T04:55:39.595Z" - }, - { - "cveId": "CVE-2024-43052", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43052", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43052.json", - "dateUpdated": "2024-12-03T04:55:40.842Z" - }, - { - "cveId": "CVE-2024-43053", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43053", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43053.json", - "dateUpdated": "2024-12-03T04:55:42.097Z" - } - ], - "error": [] } ] \ No newline at end of file