diff --git a/cves/2024/53xxx/CVE-2024-53909.json b/cves/2024/53xxx/CVE-2024-53909.json new file mode 100644 index 000000000000..77d6cc0ee874 --- /dev/null +++ b/cves/2024/53xxx/CVE-2024-53909.json @@ -0,0 +1,74 @@ +{ + "dataType": "CVE_RECORD", + "cveMetadata": { + "state": "PUBLISHED", + "cveId": "CVE-2024-53909", + "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "assignerShortName": "mitre", + "dateUpdated": "2024-11-24T20:52:46.355437", + "dateReserved": "2024-11-24T00:00:00", + "datePublished": "2024-11-24T00:00:00" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "shortName": "mitre", + "dateUpdated": "2024-11-24T20:52:46.355437" + }, + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the server in Veritas Enterprise Vault before 15.2, ZDI-CAN-24334. It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized." + } + ], + "affected": [ + { + "vendor": "n/a", + "product": "n/a", + "versions": [ + { + "version": "n/a", + "status": "affected" + } + ] + } + ], + "references": [ + { + "url": "https://www.veritas.com/content/support/en_US/security/VTS24-014" + } + ], + "metrics": [ + { + "cvssV3_1": { + "version": "3.1", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + } + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "type": "text", + "lang": "en", + "description": "n/a" + } + ] + } + ] + } + }, + "dataVersion": "5.1" +} \ No newline at end of file diff --git a/cves/2024/53xxx/CVE-2024-53910.json b/cves/2024/53xxx/CVE-2024-53910.json new file mode 100644 index 000000000000..3e22091c4d35 --- /dev/null +++ b/cves/2024/53xxx/CVE-2024-53910.json @@ -0,0 +1,74 @@ +{ + "dataType": "CVE_RECORD", + "cveMetadata": { + "state": "PUBLISHED", + "cveId": "CVE-2024-53910", + "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "assignerShortName": "mitre", + "dateUpdated": "2024-11-24T20:52:39.063340", + "dateReserved": "2024-11-24T00:00:00", + "datePublished": "2024-11-24T00:00:00" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "shortName": "mitre", + "dateUpdated": "2024-11-24T20:52:39.063340" + }, + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the server in Veritas Enterprise Vault before 15.2, ZDI-CAN-24336. It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized." + } + ], + "affected": [ + { + "vendor": "n/a", + "product": "n/a", + "versions": [ + { + "version": "n/a", + "status": "affected" + } + ] + } + ], + "references": [ + { + "url": "https://www.veritas.com/content/support/en_US/security/VTS24-014" + } + ], + "metrics": [ + { + "cvssV3_1": { + "version": "3.1", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + } + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "type": "text", + "lang": "en", + "description": "n/a" + } + ] + } + ] + } + }, + "dataVersion": "5.1" +} \ No newline at end of file diff --git a/cves/2024/53xxx/CVE-2024-53911.json b/cves/2024/53xxx/CVE-2024-53911.json new file mode 100644 index 000000000000..08bcb7f84a73 --- /dev/null +++ b/cves/2024/53xxx/CVE-2024-53911.json @@ -0,0 +1,74 @@ +{ + "dataType": "CVE_RECORD", + "cveMetadata": { + "state": "PUBLISHED", + "cveId": "CVE-2024-53911", + "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "assignerShortName": "mitre", + "dateUpdated": "2024-11-24T20:52:29.548936", + "dateReserved": "2024-11-24T00:00:00", + "datePublished": "2024-11-24T00:00:00" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "shortName": "mitre", + "dateUpdated": "2024-11-24T20:52:29.548936" + }, + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the server in Veritas Enterprise Vault before 15.2, ZDI-CAN-24339. It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized." + } + ], + "affected": [ + { + "vendor": "n/a", + "product": "n/a", + "versions": [ + { + "version": "n/a", + "status": "affected" + } + ] + } + ], + "references": [ + { + "url": "https://www.veritas.com/content/support/en_US/security/VTS24-014" + } + ], + "metrics": [ + { + "cvssV3_1": { + "version": "3.1", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + } + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "type": "text", + "lang": "en", + "description": "n/a" + } + ] + } + ] + } + }, + "dataVersion": "5.1" +} \ No newline at end of file diff --git a/cves/2024/53xxx/CVE-2024-53912.json b/cves/2024/53xxx/CVE-2024-53912.json new file mode 100644 index 000000000000..ab5c3e3286d1 --- /dev/null +++ b/cves/2024/53xxx/CVE-2024-53912.json @@ -0,0 +1,74 @@ +{ + "dataType": "CVE_RECORD", + "cveMetadata": { + "state": "PUBLISHED", + "cveId": "CVE-2024-53912", + "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "assignerShortName": "mitre", + "dateUpdated": "2024-11-24T20:52:21.128270", + "dateReserved": "2024-11-24T00:00:00", + "datePublished": "2024-11-24T00:00:00" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "shortName": "mitre", + "dateUpdated": "2024-11-24T20:52:21.128270" + }, + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the server in Veritas Enterprise Vault before 15.2, ZDI-CAN-24341. It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized." + } + ], + "affected": [ + { + "vendor": "n/a", + "product": "n/a", + "versions": [ + { + "version": "n/a", + "status": "affected" + } + ] + } + ], + "references": [ + { + "url": "https://www.veritas.com/content/support/en_US/security/VTS24-014" + } + ], + "metrics": [ + { + "cvssV3_1": { + "version": "3.1", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + } + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "type": "text", + "lang": "en", + "description": "n/a" + } + ] + } + ] + } + }, + "dataVersion": "5.1" +} \ No newline at end of file diff --git a/cves/2024/53xxx/CVE-2024-53913.json b/cves/2024/53xxx/CVE-2024-53913.json new file mode 100644 index 000000000000..13cada6f17ae --- /dev/null +++ b/cves/2024/53xxx/CVE-2024-53913.json @@ -0,0 +1,74 @@ +{ + "dataType": "CVE_RECORD", + "cveMetadata": { + "state": "PUBLISHED", + "cveId": "CVE-2024-53913", + "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "assignerShortName": "mitre", + "dateUpdated": "2024-11-24T20:52:15.577451", + "dateReserved": "2024-11-24T00:00:00", + "datePublished": "2024-11-24T00:00:00" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "shortName": "mitre", + "dateUpdated": "2024-11-24T20:52:15.577451" + }, + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the server in Veritas Enterprise Vault before 15.2, ZDI-CAN-24343. It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized." + } + ], + "affected": [ + { + "vendor": "n/a", + "product": "n/a", + "versions": [ + { + "version": "n/a", + "status": "affected" + } + ] + } + ], + "references": [ + { + "url": "https://www.veritas.com/content/support/en_US/security/VTS24-014" + } + ], + "metrics": [ + { + "cvssV3_1": { + "version": "3.1", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + } + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "type": "text", + "lang": "en", + "description": "n/a" + } + ] + } + ] + } + }, + "dataVersion": "5.1" +} \ No newline at end of file diff --git a/cves/2024/53xxx/CVE-2024-53914.json b/cves/2024/53xxx/CVE-2024-53914.json new file mode 100644 index 000000000000..f8abbc9931b3 --- /dev/null +++ b/cves/2024/53xxx/CVE-2024-53914.json @@ -0,0 +1,74 @@ +{ + "dataType": "CVE_RECORD", + "cveMetadata": { + "state": "PUBLISHED", + "cveId": "CVE-2024-53914", + "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "assignerShortName": "mitre", + "dateUpdated": "2024-11-24T20:52:08.807359", + "dateReserved": "2024-11-24T00:00:00", + "datePublished": "2024-11-24T00:00:00" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "shortName": "mitre", + "dateUpdated": "2024-11-24T20:52:08.807359" + }, + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the server in Veritas Enterprise Vault before 15.2, ZDI-CAN-24344. It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized." + } + ], + "affected": [ + { + "vendor": "n/a", + "product": "n/a", + "versions": [ + { + "version": "n/a", + "status": "affected" + } + ] + } + ], + "references": [ + { + "url": "https://www.veritas.com/content/support/en_US/security/VTS24-014" + } + ], + "metrics": [ + { + "cvssV3_1": { + "version": "3.1", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + } + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "type": "text", + "lang": "en", + "description": "n/a" + } + ] + } + ] + } + }, + "dataVersion": "5.1" +} \ No newline at end of file diff --git a/cves/2024/53xxx/CVE-2024-53915.json b/cves/2024/53xxx/CVE-2024-53915.json new file mode 100644 index 000000000000..a006b7dec52b --- /dev/null +++ b/cves/2024/53xxx/CVE-2024-53915.json @@ -0,0 +1,74 @@ +{ + "dataType": "CVE_RECORD", + "cveMetadata": { + "state": "PUBLISHED", + "cveId": "CVE-2024-53915", + "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "assignerShortName": "mitre", + "dateUpdated": "2024-11-24T20:52:00.732829", + "dateReserved": "2024-11-24T00:00:00", + "datePublished": "2024-11-24T00:00:00" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "shortName": "mitre", + "dateUpdated": "2024-11-24T20:52:00.732829" + }, + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the server in Veritas Enterprise Vault before 15.2, ZDI-CAN-24405. It allows remote attackers to execute arbitrary code because untrusted data, received on a .NET Remoting TCP port, is deserialized." + } + ], + "affected": [ + { + "vendor": "n/a", + "product": "n/a", + "versions": [ + { + "version": "n/a", + "status": "affected" + } + ] + } + ], + "references": [ + { + "url": "https://www.veritas.com/content/support/en_US/security/VTS24-014" + } + ], + "metrics": [ + { + "cvssV3_1": { + "version": "3.1", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + } + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "type": "text", + "lang": "en", + "description": "n/a" + } + ] + } + ] + } + }, + "dataVersion": "5.1" +} \ No newline at end of file diff --git a/cves/delta.json b/cves/delta.json index c621e38b2cce..d7058ee3fb16 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,20 +1,50 @@ { - "fetchTime": "2024-11-24T20:13:18.911Z", - "numberOfChanges": 2, - "new": [], - "updated": [ + "fetchTime": "2024-11-24T20:57:40.622Z", + "numberOfChanges": 7, + "new": [ { - "cveId": "CVE-2024-10033", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10033", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10033.json", - "dateUpdated": "2024-11-24T20:05:14.572Z" + "cveId": "CVE-2024-53909", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53909", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53909.json", + "dateUpdated": "2024-11-24T20:52:46.355437" }, { - "cveId": "CVE-2024-8553", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8553", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8553.json", - "dateUpdated": "2024-11-24T20:04:33.536Z" + "cveId": "CVE-2024-53910", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53910", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53910.json", + "dateUpdated": "2024-11-24T20:52:39.063340" + }, + { + "cveId": "CVE-2024-53911", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53911", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53911.json", + "dateUpdated": "2024-11-24T20:52:29.548936" + }, + { + "cveId": "CVE-2024-53912", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53912", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53912.json", + "dateUpdated": "2024-11-24T20:52:21.128270" + }, + { + "cveId": "CVE-2024-53913", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53913", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53913.json", + "dateUpdated": "2024-11-24T20:52:15.577451" + }, + { + "cveId": "CVE-2024-53914", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53914", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53914.json", + "dateUpdated": "2024-11-24T20:52:08.807359" + }, + { + "cveId": "CVE-2024-53915", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53915", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53915.json", + "dateUpdated": "2024-11-24T20:52:00.732829" } ], + "updated": [], "error": [] } \ No newline at end of file diff --git a/cves/deltaLog.json b/cves/deltaLog.json index f7b9a09bb382..669a3b44451c 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,54 @@ [ + { + "fetchTime": "2024-11-24T20:57:40.622Z", + "numberOfChanges": 7, + "new": [ + { + "cveId": "CVE-2024-53909", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53909", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53909.json", + "dateUpdated": "2024-11-24T20:52:46.355437" + }, + { + "cveId": "CVE-2024-53910", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53910", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53910.json", + "dateUpdated": "2024-11-24T20:52:39.063340" + }, + { + "cveId": "CVE-2024-53911", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53911", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53911.json", + "dateUpdated": "2024-11-24T20:52:29.548936" + }, + { + "cveId": "CVE-2024-53912", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53912", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53912.json", + "dateUpdated": "2024-11-24T20:52:21.128270" + }, + { + "cveId": "CVE-2024-53913", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53913", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53913.json", + "dateUpdated": "2024-11-24T20:52:15.577451" + }, + { + "cveId": "CVE-2024-53914", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53914", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53914.json", + "dateUpdated": "2024-11-24T20:52:08.807359" + }, + { + "cveId": "CVE-2024-53915", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53915", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53915.json", + "dateUpdated": "2024-11-24T20:52:00.732829" + } + ], + "updated": [], + "error": [] + }, { "fetchTime": "2024-11-24T20:13:18.911Z", "numberOfChanges": 2, @@ -148791,341 +148841,5 @@ ], "updated": [], "error": [] - }, - { - "fetchTime": "2024-10-25T20:55:04.474Z", - "numberOfChanges": 6, - "new": [], - "updated": [ - { - "cveId": "CVE-2024-10348", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10348", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10348.json", - "dateUpdated": "2024-10-25T20:52:18.773Z" - }, - { - "cveId": "CVE-2024-10349", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10349", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10349.json", - "dateUpdated": "2024-10-25T20:53:03.398Z" - }, - { - "cveId": "CVE-2024-10350", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10350", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10350.json", - "dateUpdated": "2024-10-25T20:50:53.603Z" - }, - { - "cveId": "CVE-2024-10351", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10351", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10351.json", - "dateUpdated": "2024-10-25T20:50:14.294Z" - }, - { - "cveId": "CVE-2024-10369", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10369", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10369.json", - "dateUpdated": "2024-10-25T20:48:38.100Z" - }, - { - "cveId": "CVE-2024-10370", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10370", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10370.json", - "dateUpdated": "2024-10-25T20:47:38.848Z" - } - ], - "error": [] - }, - { - "fetchTime": "2024-10-25T20:47:08.214Z", - "numberOfChanges": 3, - "new": [], - "updated": [ - { - "cveId": "CVE-2024-0429", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-0429", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/0xxx/CVE-2024-0429.json", - "dateUpdated": "2024-10-25T20:42:40.852Z" - }, - { - "cveId": "CVE-2024-10372", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10372", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10372.json", - "dateUpdated": "2024-10-25T20:46:53.609Z" - }, - { - "cveId": "CVE-2024-7591", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-7591", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/7xxx/CVE-2024-7591.json", - "dateUpdated": "2024-10-25T20:42:57.041Z" - } - ], - "error": [] - }, - { - "fetchTime": "2024-10-25T20:39:30.515Z", - "numberOfChanges": 4, - "new": [], - "updated": [ - { - "cveId": "CVE-2022-4959", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-4959", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/4xxx/CVE-2022-4959.json", - "dateUpdated": "2024-10-25T20:32:48.342Z" - }, - { - "cveId": "CVE-2024-0413", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-0413", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/0xxx/CVE-2024-0413.json", - "dateUpdated": "2024-10-25T20:36:12.013Z" - }, - { - "cveId": "CVE-2024-0419", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-0419", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/0xxx/CVE-2024-0419.json", - "dateUpdated": "2024-10-25T20:34:35.559Z" - }, - { - "cveId": "CVE-2024-24564", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-24564", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/24xxx/CVE-2024-24564.json", - "dateUpdated": "2024-10-25T20:33:03.845Z" - } - ], - "error": [] - }, - { - "fetchTime": "2024-10-25T20:30:47.486Z", - "numberOfChanges": 12, - "new": [ - { - "cveId": "CVE-2024-48229", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-48229", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/48xxx/CVE-2024-48229.json", - "dateUpdated": "2024-10-25T20:25:46.192708" - }, - { - "cveId": "CVE-2024-48230", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-48230", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/48xxx/CVE-2024-48230.json", - "dateUpdated": "2024-10-25T20:21:55.485169" - }, - { - "cveId": "CVE-2024-48232", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-48232", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/48xxx/CVE-2024-48232.json", - "dateUpdated": "2024-10-25T20:24:58.513919" - }, - { - "cveId": "CVE-2024-48233", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-48233", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/48xxx/CVE-2024-48233.json", - "dateUpdated": "2024-10-25T20:23:19.644552" - }, - { - "cveId": "CVE-2024-48396", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-48396", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/48xxx/CVE-2024-48396.json", - "dateUpdated": "2024-10-25T20:29:37.505636" - } - ], - "updated": [ - { - "cveId": "CVE-2023-28899", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-28899", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/28xxx/CVE-2023-28899.json", - "dateUpdated": "2024-10-25T20:21:34.771Z" - }, - { - "cveId": "CVE-2023-52026", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-52026", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/52xxx/CVE-2023-52026.json", - "dateUpdated": "2024-10-25T20:28:09.223Z" - }, - { - "cveId": "CVE-2024-10150", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10150", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10150.json", - "dateUpdated": "2024-10-25T20:28:37.940Z" - }, - { - "cveId": "CVE-2024-10341", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10341", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10341.json", - "dateUpdated": "2024-10-25T20:24:06.158Z" - }, - { - "cveId": "CVE-2024-10342", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10342", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10342.json", - "dateUpdated": "2024-10-25T20:25:51.703Z" - }, - { - "cveId": "CVE-2024-21591", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-21591", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/21xxx/CVE-2024-21591.json", - "dateUpdated": "2024-10-25T20:23:00.384Z" - }, - { - "cveId": "CVE-2024-48654", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-48654", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/48xxx/CVE-2024-48654.json", - "dateUpdated": "2024-10-25T20:27:11.997Z" - } - ], - "error": [] - }, - { - "fetchTime": "2024-10-25T20:20:00.999Z", - "numberOfChanges": 24, - "new": [ - { - "cveId": "CVE-2024-48218", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-48218", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/48xxx/CVE-2024-48218.json", - "dateUpdated": "2024-10-25T20:13:30.330428" - }, - { - "cveId": "CVE-2024-48222", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-48222", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/48xxx/CVE-2024-48222.json", - "dateUpdated": "2024-10-25T20:09:33.726652" - }, - { - "cveId": "CVE-2024-48223", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-48223", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/48xxx/CVE-2024-48223.json", - "dateUpdated": "2024-10-25T20:11:30.829812" - }, - { - "cveId": "CVE-2024-48224", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-48224", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/48xxx/CVE-2024-48224.json", - "dateUpdated": "2024-10-25T20:14:48.320277" - }, - { - "cveId": "CVE-2024-48225", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-48225", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/48xxx/CVE-2024-48225.json", - "dateUpdated": "2024-10-25T20:17:14.705960" - }, - { - "cveId": "CVE-2024-48226", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-48226", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/48xxx/CVE-2024-48226.json", - "dateUpdated": "2024-10-25T20:18:42.599210" - }, - { - "cveId": "CVE-2024-48227", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-48227", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/48xxx/CVE-2024-48227.json", - "dateUpdated": "2024-10-25T20:19:56.833152" - } - ], - "updated": [ - { - "cveId": "CVE-2022-30357", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-30357", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/30xxx/CVE-2022-30357.json", - "dateUpdated": "2024-10-25T20:08:42.618Z" - }, - { - "cveId": "CVE-2023-31029", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-31029", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/31xxx/CVE-2023-31029.json", - "dateUpdated": "2024-10-25T20:15:35.568Z" - }, - { - "cveId": "CVE-2023-51791", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-51791", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/51xxx/CVE-2023-51791.json", - "dateUpdated": "2024-10-25T20:09:40.358Z" - }, - { - "cveId": "CVE-2023-52533", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-52533", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/52xxx/CVE-2023-52533.json", - "dateUpdated": "2024-10-25T20:19:09.972Z" - }, - { - "cveId": "CVE-2023-6395", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-6395", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/6xxx/CVE-2023-6395.json", - "dateUpdated": "2024-10-25T20:12:04.076Z" - }, - { - "cveId": "CVE-2024-10386", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10386", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10386.json", - "dateUpdated": "2024-10-25T20:17:55.566Z" - }, - { - "cveId": "CVE-2024-10387", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10387", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10387.json", - "dateUpdated": "2024-10-25T20:14:03.121Z" - }, - { - "cveId": "CVE-2024-22014", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-22014", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/22xxx/CVE-2024-22014.json", - "dateUpdated": "2024-10-25T20:12:06.056Z" - }, - { - "cveId": "CVE-2024-23076", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-23076", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/23xxx/CVE-2024-23076.json", - "dateUpdated": "2024-10-25T20:17:57.300Z" - }, - { - "cveId": "CVE-2024-32286", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-32286", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/32xxx/CVE-2024-32286.json", - "dateUpdated": "2024-10-25T20:10:35.356Z" - }, - { - "cveId": "CVE-2024-32301", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-32301", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/32xxx/CVE-2024-32301.json", - "dateUpdated": "2024-10-25T20:11:07.556Z" - }, - { - "cveId": "CVE-2024-49766", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49766", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49766.json", - "dateUpdated": "2024-10-25T20:08:55.985Z" - }, - { - "cveId": "CVE-2024-49767", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49767", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49767.json", - "dateUpdated": "2024-10-25T20:07:56.560Z" - }, - { - "cveId": "CVE-2024-50583", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50583", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50583.json", - "dateUpdated": "2024-10-25T20:17:21.221Z" - }, - { - "cveId": "CVE-2024-9109", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-9109", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/9xxx/CVE-2024-9109.json", - "dateUpdated": "2024-10-25T20:09:15.280Z" - }, - { - "cveId": "CVE-2024-9488", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-9488", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/9xxx/CVE-2024-9488.json", - "dateUpdated": "2024-10-25T20:12:18.574Z" - }, - { - "cveId": "CVE-2024-9607", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-9607", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/9xxx/CVE-2024-9607.json", - "dateUpdated": "2024-10-25T20:15:42.641Z" - } - ], - "error": [] } ] \ No newline at end of file