From 723aac46a4b682636d8615579dd5520466ed4b1f Mon Sep 17 00:00:00 2001 From: cvelistV5 Github Action Date: Fri, 3 Jan 2025 00:18:56 +0000 Subject: [PATCH] 7 changes (7 new | 0 updated): - 7 new CVEs: CVE-2024-43077, CVE-2024-43097, CVE-2024-43762, CVE-2024-43764, CVE-2024-43767, CVE-2024-43768, CVE-2024-43769 - 0 updated CVEs: --- cves/2024/43xxx/CVE-2024-43077.json | 56 +++++ cves/2024/43xxx/CVE-2024-43097.json | 75 +++++++ cves/2024/43xxx/CVE-2024-43762.json | 75 +++++++ cves/2024/43xxx/CVE-2024-43764.json | 63 ++++++ cves/2024/43xxx/CVE-2024-43767.json | 75 +++++++ cves/2024/43xxx/CVE-2024-43768.json | 75 +++++++ cves/2024/43xxx/CVE-2024-43769.json | 67 ++++++ cves/delta.json | 328 +++------------------------- cves/deltaLog.json | 157 +++++-------- 9 files changed, 568 insertions(+), 403 deletions(-) create mode 100644 cves/2024/43xxx/CVE-2024-43077.json create mode 100644 cves/2024/43xxx/CVE-2024-43097.json create mode 100644 cves/2024/43xxx/CVE-2024-43762.json create mode 100644 cves/2024/43xxx/CVE-2024-43764.json create mode 100644 cves/2024/43xxx/CVE-2024-43767.json create mode 100644 cves/2024/43xxx/CVE-2024-43768.json create mode 100644 cves/2024/43xxx/CVE-2024-43769.json diff --git a/cves/2024/43xxx/CVE-2024-43077.json b/cves/2024/43xxx/CVE-2024-43077.json new file mode 100644 index 000000000000..1ea14969beda --- /dev/null +++ b/cves/2024/43xxx/CVE-2024-43077.json @@ -0,0 +1,56 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-43077", + "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "state": "PUBLISHED", + "assignerShortName": "google_android", + "dateReserved": "2024-08-05T14:29:24.254Z", + "datePublished": "2025-01-02T23:58:26.607Z", + "dateUpdated": "2025-01-02T23:58:26.607Z" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "shortName": "google_android", + "dateUpdated": "2025-01-02T23:58:26.607Z" + }, + "problemTypes": [ + { + "descriptions": [ + { + "lang": "en", + "description": "Elevation of privilege" + } + ] + } + ], + "affected": [ + { + "vendor": "Google", + "product": "Android", + "versions": [ + { + "version": "Android SoC", + "status": "affected" + } + ], + "defaultStatus": "unaffected" + } + ], + "descriptions": [ + { + "lang": "en", + "value": "In DevmemValidateFlags of devicemem_server.c , there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "references": [ + { + "url": "https://source.android.com/security/bulletin/2024-12-01" + } + ] + } + } +} \ No newline at end of file diff --git a/cves/2024/43xxx/CVE-2024-43097.json b/cves/2024/43xxx/CVE-2024-43097.json new file mode 100644 index 000000000000..850ce59d0455 --- /dev/null +++ b/cves/2024/43xxx/CVE-2024-43097.json @@ -0,0 +1,75 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-43097", + "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "state": "PUBLISHED", + "assignerShortName": "google_android", + "dateReserved": "2024-08-05T14:29:53.937Z", + "datePublished": "2025-01-02T23:58:26.791Z", + "dateUpdated": "2025-01-02T23:58:26.791Z" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "shortName": "google_android", + "dateUpdated": "2025-01-02T23:58:26.791Z" + }, + "problemTypes": [ + { + "descriptions": [ + { + "lang": "en", + "description": "Elevation of privilege" + } + ] + } + ], + "affected": [ + { + "vendor": "Google", + "product": "Android", + "versions": [ + { + "version": "15", + "status": "affected" + }, + { + "version": "14", + "status": "affected" + }, + { + "version": "13", + "status": "affected" + }, + { + "version": "12L", + "status": "affected" + }, + { + "version": "12", + "status": "affected" + } + ], + "defaultStatus": "unaffected" + } + ], + "descriptions": [ + { + "lang": "en", + "value": "In resizeToAtLeast of SkRegion.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "references": [ + { + "url": "https://android.googlesource.com/platform/external/skia/+/8d355fe1d0795fc30b84194b87563f75c6f8f2a7" + }, + { + "url": "https://source.android.com/security/bulletin/2024-12-01" + } + ] + } + } +} \ No newline at end of file diff --git a/cves/2024/43xxx/CVE-2024-43762.json b/cves/2024/43xxx/CVE-2024-43762.json new file mode 100644 index 000000000000..1d6593d9a97d --- /dev/null +++ b/cves/2024/43xxx/CVE-2024-43762.json @@ -0,0 +1,75 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-43762", + "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "state": "PUBLISHED", + "assignerShortName": "google_android", + "dateReserved": "2024-08-15T20:40:04.309Z", + "datePublished": "2025-01-02T23:58:26.886Z", + "dateUpdated": "2025-01-02T23:58:26.886Z" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "shortName": "google_android", + "dateUpdated": "2025-01-02T23:58:26.886Z" + }, + "problemTypes": [ + { + "descriptions": [ + { + "lang": "en", + "description": "Elevation of privilege" + } + ] + } + ], + "affected": [ + { + "vendor": "Google", + "product": "Android", + "versions": [ + { + "version": "15", + "status": "affected" + }, + { + "version": "14", + "status": "affected" + }, + { + "version": "13", + "status": "affected" + }, + { + "version": "12L", + "status": "affected" + }, + { + "version": "12", + "status": "affected" + } + ], + "defaultStatus": "unaffected" + } + ], + "descriptions": [ + { + "lang": "en", + "value": "In multiple locations, there is a possible way to avoid unbinding of a service from the system due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "references": [ + { + "url": "https://android.googlesource.com/platform/frameworks/base/+/ae43ac7f3d3d5112b0f54b5315a15b08208acf9c" + }, + { + "url": "https://source.android.com/security/bulletin/2024-12-01" + } + ] + } + } +} \ No newline at end of file diff --git a/cves/2024/43xxx/CVE-2024-43764.json b/cves/2024/43xxx/CVE-2024-43764.json new file mode 100644 index 000000000000..6145029c18e3 --- /dev/null +++ b/cves/2024/43xxx/CVE-2024-43764.json @@ -0,0 +1,63 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-43764", + "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "state": "PUBLISHED", + "assignerShortName": "google_android", + "dateReserved": "2024-08-15T20:40:04.309Z", + "datePublished": "2025-01-02T23:58:27.018Z", + "dateUpdated": "2025-01-02T23:58:27.018Z" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "shortName": "google_android", + "dateUpdated": "2025-01-02T23:58:27.018Z" + }, + "problemTypes": [ + { + "descriptions": [ + { + "lang": "en", + "description": "Elevation of privilege" + } + ] + } + ], + "affected": [ + { + "vendor": "Google", + "product": "Android", + "versions": [ + { + "version": "14", + "status": "affected" + }, + { + "version": "13", + "status": "affected" + } + ], + "defaultStatus": "unaffected" + } + ], + "descriptions": [ + { + "lang": "en", + "value": "In onPrimaryClipChanged of ClipboardListener.java, there is a possible way to partially bypass lock screen. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "references": [ + { + "url": "https://android.googlesource.com/platform/frameworks/base/+/70eb75df7d342429c3ee225feb7c011df727442f" + }, + { + "url": "https://source.android.com/security/bulletin/2024-12-01" + } + ] + } + } +} \ No newline at end of file diff --git a/cves/2024/43xxx/CVE-2024-43767.json b/cves/2024/43xxx/CVE-2024-43767.json new file mode 100644 index 000000000000..a722e9745dd2 --- /dev/null +++ b/cves/2024/43xxx/CVE-2024-43767.json @@ -0,0 +1,75 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-43767", + "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "state": "PUBLISHED", + "assignerShortName": "google_android", + "dateReserved": "2024-08-15T20:40:04.309Z", + "datePublished": "2025-01-02T23:58:27.162Z", + "dateUpdated": "2025-01-02T23:58:27.162Z" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "shortName": "google_android", + "dateUpdated": "2025-01-02T23:58:27.162Z" + }, + "problemTypes": [ + { + "descriptions": [ + { + "lang": "en", + "description": "Remote code execution" + } + ] + } + ], + "affected": [ + { + "vendor": "Google", + "product": "Android", + "versions": [ + { + "version": "15", + "status": "affected" + }, + { + "version": "14", + "status": "affected" + }, + { + "version": "13", + "status": "affected" + }, + { + "version": "12L", + "status": "affected" + }, + { + "version": "12", + "status": "affected" + } + ], + "defaultStatus": "unaffected" + } + ], + "descriptions": [ + { + "lang": "en", + "value": "In prepare_to_draw_into_mask of SkBlurMaskFilterImpl.cpp, there is a possible heap overflow due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "references": [ + { + "url": "https://android.googlesource.com/platform/external/skia/+/796c2040f641bb287dba66c9823ce45e9f8b5807" + }, + { + "url": "https://source.android.com/security/bulletin/2024-12-01" + } + ] + } + } +} \ No newline at end of file diff --git a/cves/2024/43xxx/CVE-2024-43768.json b/cves/2024/43xxx/CVE-2024-43768.json new file mode 100644 index 000000000000..e61199192bc3 --- /dev/null +++ b/cves/2024/43xxx/CVE-2024-43768.json @@ -0,0 +1,75 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-43768", + "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "state": "PUBLISHED", + "assignerShortName": "google_android", + "dateReserved": "2024-08-15T20:40:04.310Z", + "datePublished": "2025-01-02T23:58:27.245Z", + "dateUpdated": "2025-01-02T23:58:27.245Z" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "shortName": "google_android", + "dateUpdated": "2025-01-02T23:58:27.245Z" + }, + "problemTypes": [ + { + "descriptions": [ + { + "lang": "en", + "description": "Elevation of privilege" + } + ] + } + ], + "affected": [ + { + "vendor": "Google", + "product": "Android", + "versions": [ + { + "version": "15", + "status": "affected" + }, + { + "version": "14", + "status": "affected" + }, + { + "version": "13", + "status": "affected" + }, + { + "version": "12L", + "status": "affected" + }, + { + "version": "12", + "status": "affected" + } + ], + "defaultStatus": "unaffected" + } + ], + "descriptions": [ + { + "lang": "en", + "value": "In skia_alloc_func of SkDeflate.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "references": [ + { + "url": "https://android.googlesource.com/platform/external/skia/+/b5543cb8c6b95623743016055220378efe73eb93" + }, + { + "url": "https://source.android.com/security/bulletin/2024-12-01" + } + ] + } + } +} \ No newline at end of file diff --git a/cves/2024/43xxx/CVE-2024-43769.json b/cves/2024/43xxx/CVE-2024-43769.json new file mode 100644 index 000000000000..259828048ade --- /dev/null +++ b/cves/2024/43xxx/CVE-2024-43769.json @@ -0,0 +1,67 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-43769", + "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "state": "PUBLISHED", + "assignerShortName": "google_android", + "dateReserved": "2024-08-15T20:40:04.310Z", + "datePublished": "2025-01-02T23:58:27.333Z", + "dateUpdated": "2025-01-02T23:58:27.333Z" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "shortName": "google_android", + "dateUpdated": "2025-01-02T23:58:27.333Z" + }, + "problemTypes": [ + { + "descriptions": [ + { + "lang": "en", + "description": "Elevation of privilege" + } + ] + } + ], + "affected": [ + { + "vendor": "Google", + "product": "Android", + "versions": [ + { + "version": "15", + "status": "affected" + }, + { + "version": "14", + "status": "affected" + }, + { + "version": "13", + "status": "affected" + } + ], + "defaultStatus": "unaffected" + } + ], + "descriptions": [ + { + "lang": "en", + "value": "In isPackageDeviceAdmin of PackageManagerService.java, there is a possible edge case which could prevent the uninstallation of CloudDpc due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "references": [ + { + "url": "https://android.googlesource.com/platform/frameworks/base/+/619ffc299bf33566ba6daee8301ee0fc96e015f4" + }, + { + "url": "https://source.android.com/security/bulletin/2024-12-01" + } + ] + } + } +} \ No newline at end of file diff --git a/cves/delta.json b/cves/delta.json index 0ae781b82b59..693492ef862c 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,314 +1,50 @@ { - "fetchTime": "2025-01-02T21:42:32.575Z", - "numberOfChanges": 51, - "new": [], - "updated": [ + "fetchTime": "2025-01-03T00:18:45.572Z", + "numberOfChanges": 7, + "new": [ { - "cveId": "CVE-2022-24480", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-24480", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/24xxx/CVE-2022-24480.json", - "dateUpdated": "2025-01-02T21:36:50.890Z" + "cveId": "CVE-2024-43077", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43077", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43077.json", + "dateUpdated": "2025-01-02T23:58:26.607Z" }, { - "cveId": "CVE-2022-26804", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26804", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26804.json", - "dateUpdated": "2025-01-02T21:36:51.406Z" + "cveId": "CVE-2024-43097", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43097", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43097.json", + "dateUpdated": "2025-01-02T23:58:26.791Z" }, { - "cveId": "CVE-2022-26805", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26805", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26805.json", - "dateUpdated": "2025-01-02T21:36:52.012Z" + "cveId": "CVE-2024-43762", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43762", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43762.json", + "dateUpdated": "2025-01-02T23:58:26.886Z" }, { - "cveId": "CVE-2022-26806", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-26806", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/26xxx/CVE-2022-26806.json", - "dateUpdated": "2025-01-02T21:36:52.470Z" + "cveId": "CVE-2024-43764", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43764", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43764.json", + "dateUpdated": "2025-01-02T23:58:27.018Z" }, { - "cveId": "CVE-2022-41074", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-41074", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/41xxx/CVE-2022-41074.json", - "dateUpdated": "2025-01-02T21:36:54.086Z" + "cveId": "CVE-2024-43767", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43767", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43767.json", + "dateUpdated": "2025-01-02T23:58:27.162Z" }, { - "cveId": "CVE-2022-41076", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-41076", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/41xxx/CVE-2022-41076.json", - "dateUpdated": "2025-01-02T21:36:54.618Z" + "cveId": "CVE-2024-43768", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43768", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43768.json", + "dateUpdated": "2025-01-02T23:58:27.245Z" }, { - "cveId": "CVE-2022-41077", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-41077", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/41xxx/CVE-2022-41077.json", - "dateUpdated": "2025-01-02T21:36:55.850Z" - }, - { - "cveId": "CVE-2022-41089", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-41089", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/41xxx/CVE-2022-41089.json", - "dateUpdated": "2025-01-02T21:36:52.938Z" - }, - { - "cveId": "CVE-2022-41094", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-41094", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/41xxx/CVE-2022-41094.json", - "dateUpdated": "2025-01-02T21:36:53.546Z" - }, - { - "cveId": "CVE-2022-41115", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-41115", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/41xxx/CVE-2022-41115.json", - "dateUpdated": "2025-01-02T21:36:55.252Z" - }, - { - "cveId": "CVE-2022-41121", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-41121", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/41xxx/CVE-2022-41121.json", - "dateUpdated": "2025-01-02T21:36:56.468Z" - }, - { - "cveId": "CVE-2022-41127", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-41127", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/41xxx/CVE-2022-41127.json", - "dateUpdated": "2025-01-02T21:36:33.003Z" - }, - { - "cveId": "CVE-2022-44666", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44666", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44666.json", - "dateUpdated": "2025-01-02T21:36:34.103Z" - }, - { - "cveId": "CVE-2022-44667", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44667", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44667.json", - "dateUpdated": "2025-01-02T21:36:34.795Z" - }, - { - "cveId": "CVE-2022-44668", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44668", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44668.json", - "dateUpdated": "2025-01-02T21:36:35.344Z" - }, - { - "cveId": "CVE-2022-44669", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44669", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44669.json", - "dateUpdated": "2025-01-02T21:36:56.960Z" - }, - { - "cveId": "CVE-2022-44670", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44670", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44670.json", - "dateUpdated": "2025-01-02T21:36:57.576Z" - }, - { - "cveId": "CVE-2022-44671", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44671", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44671.json", - "dateUpdated": "2025-01-02T21:36:58.282Z" - }, - { - "cveId": "CVE-2022-44673", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44673", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44673.json", - "dateUpdated": "2025-01-02T21:36:35.855Z" - }, - { - "cveId": "CVE-2022-44674", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44674", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44674.json", - "dateUpdated": "2025-01-02T21:36:36.455Z" - }, - { - "cveId": "CVE-2022-44675", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44675", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44675.json", - "dateUpdated": "2025-01-02T21:36:36.987Z" - }, - { - "cveId": "CVE-2022-44676", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44676", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44676.json", - "dateUpdated": "2025-01-02T21:36:37.564Z" - }, - { - "cveId": "CVE-2022-44677", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44677", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44677.json", - "dateUpdated": "2025-01-02T21:36:38.281Z" - }, - { - "cveId": "CVE-2022-44678", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44678", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44678.json", - "dateUpdated": "2025-01-02T21:36:38.951Z" - }, - { - "cveId": "CVE-2022-44679", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44679", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44679.json", - "dateUpdated": "2025-01-02T21:36:39.624Z" - }, - { - "cveId": "CVE-2022-44680", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44680", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44680.json", - "dateUpdated": "2025-01-02T21:36:40.309Z" - }, - { - "cveId": "CVE-2022-44681", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44681", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44681.json", - "dateUpdated": "2025-01-02T21:36:41.188Z" - }, - { - "cveId": "CVE-2022-44682", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44682", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44682.json", - "dateUpdated": "2025-01-02T21:36:41.768Z" - }, - { - "cveId": "CVE-2022-44683", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44683", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44683.json", - "dateUpdated": "2025-01-02T21:36:42.354Z" - }, - { - "cveId": "CVE-2022-44687", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44687", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44687.json", - "dateUpdated": "2025-01-02T21:36:58.857Z" - }, - { - "cveId": "CVE-2022-44688", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44688", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44688.json", - "dateUpdated": "2025-01-02T21:36:42.885Z" - }, - { - "cveId": "CVE-2022-44689", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44689", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44689.json", - "dateUpdated": "2025-01-02T21:36:59.505Z" - }, - { - "cveId": "CVE-2022-44690", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44690", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44690.json", - "dateUpdated": "2025-01-02T21:36:43.458Z" - }, - { - "cveId": "CVE-2022-44691", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44691", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44691.json", - "dateUpdated": "2025-01-02T21:36:43.961Z" - }, - { - "cveId": "CVE-2022-44692", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44692", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44692.json", - "dateUpdated": "2025-01-02T21:36:44.400Z" - }, - { - "cveId": "CVE-2022-44693", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44693", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44693.json", - "dateUpdated": "2025-01-02T21:36:45.215Z" - }, - { - "cveId": "CVE-2022-44694", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44694", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44694.json", - "dateUpdated": "2025-01-02T21:36:45.815Z" - }, - { - "cveId": "CVE-2022-44695", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44695", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44695.json", - "dateUpdated": "2025-01-02T21:36:46.422Z" - }, - { - "cveId": "CVE-2022-44696", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44696", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44696.json", - "dateUpdated": "2025-01-02T21:36:46.978Z" - }, - { - "cveId": "CVE-2022-44697", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44697", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44697.json", - "dateUpdated": "2025-01-02T21:36:47.586Z" - }, - { - "cveId": "CVE-2022-44698", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44698", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44698.json", - "dateUpdated": "2025-01-02T21:36:48.212Z" - }, - { - "cveId": "CVE-2022-44699", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44699", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44699.json", - "dateUpdated": "2025-01-02T21:37:00.487Z" - }, - { - "cveId": "CVE-2022-44702", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44702", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44702.json", - "dateUpdated": "2025-01-02T21:36:48.811Z" - }, - { - "cveId": "CVE-2022-44704", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44704", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44704.json", - "dateUpdated": "2025-01-02T21:36:49.301Z" - }, - { - "cveId": "CVE-2022-44707", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44707", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44707.json", - "dateUpdated": "2025-01-02T21:36:49.830Z" - }, - { - "cveId": "CVE-2022-44708", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44708", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44708.json", - "dateUpdated": "2025-01-02T21:36:50.350Z" - }, - { - "cveId": "CVE-2022-44710", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44710", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44710.json", - "dateUpdated": "2025-01-02T21:37:01.068Z" - }, - { - "cveId": "CVE-2022-44713", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-44713", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/44xxx/CVE-2022-44713.json", - "dateUpdated": "2025-01-02T21:37:01.934Z" - }, - { - "cveId": "CVE-2022-47211", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-47211", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/47xxx/CVE-2022-47211.json", - "dateUpdated": "2025-01-02T21:37:02.955Z" - }, - { - "cveId": "CVE-2022-47212", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-47212", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/47xxx/CVE-2022-47212.json", - "dateUpdated": "2025-01-02T21:37:03.626Z" - }, - { - "cveId": "CVE-2022-47213", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-47213", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/47xxx/CVE-2022-47213.json", - "dateUpdated": "2025-01-02T21:37:04.095Z" + "cveId": "CVE-2024-43769", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43769", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43769.json", + "dateUpdated": "2025-01-02T23:58:27.333Z" } ], + "updated": [], "error": [] } \ No newline at end of file diff --git a/cves/deltaLog.json b/cves/deltaLog.json index 3da12f3a9bad..ba80425a6524 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,54 @@ [ + { + "fetchTime": "2025-01-03T00:18:45.572Z", + "numberOfChanges": 7, + "new": [ + { + "cveId": "CVE-2024-43077", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43077", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43077.json", + "dateUpdated": "2025-01-02T23:58:26.607Z" + }, + { + "cveId": "CVE-2024-43097", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43097", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43097.json", + "dateUpdated": "2025-01-02T23:58:26.791Z" + }, + { + "cveId": "CVE-2024-43762", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43762", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43762.json", + "dateUpdated": "2025-01-02T23:58:26.886Z" + }, + { + "cveId": "CVE-2024-43764", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43764", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43764.json", + "dateUpdated": "2025-01-02T23:58:27.018Z" + }, + { + "cveId": "CVE-2024-43767", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43767", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43767.json", + "dateUpdated": "2025-01-02T23:58:27.162Z" + }, + { + "cveId": "CVE-2024-43768", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43768", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43768.json", + "dateUpdated": "2025-01-02T23:58:27.245Z" + }, + { + "cveId": "CVE-2024-43769", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43769", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43769.json", + "dateUpdated": "2025-01-02T23:58:27.333Z" + } + ], + "updated": [], + "error": [] + }, { "fetchTime": "2025-01-02T21:42:32.575Z", "numberOfChanges": 51, @@ -123166,112 +123216,5 @@ ], "updated": [], "error": [] - }, - { - "fetchTime": "2024-12-03T22:20:16.964Z", - "numberOfChanges": 1, - "new": [ - { - "cveId": "CVE-2024-46624", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-46624", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/46xxx/CVE-2024-46624.json", - "dateUpdated": "2024-12-03T22:08:33.413365" - } - ], - "updated": [], - "error": [] - }, - { - "fetchTime": "2024-12-03T22:08:22.085Z", - "numberOfChanges": 2, - "new": [ - { - "cveId": "CVE-2024-46625", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-46625", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/46xxx/CVE-2024-46625.json", - "dateUpdated": "2024-12-03T22:06:53.681798" - } - ], - "updated": [ - { - "cveId": "CVE-2024-54131", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-54131", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/54xxx/CVE-2024-54131.json", - "dateUpdated": "2024-12-03T21:59:03.677Z" - } - ], - "error": [] - }, - { - "fetchTime": "2024-12-03T21:58:30.600Z", - "numberOfChanges": 6, - "new": [ - { - "cveId": "CVE-2024-40391", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-40391", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/40xxx/CVE-2024-40391.json", - "dateUpdated": "2024-12-03T21:53:48.758381" - }, - { - "cveId": "CVE-2024-51363", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-51363", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/51xxx/CVE-2024-51363.json", - "dateUpdated": "2024-12-03T21:56:51.088579" - } - ], - "updated": [ - { - "cveId": "CVE-2024-51771", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-51771", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/51xxx/CVE-2024-51771.json", - "dateUpdated": "2024-12-03T21:55:47.056Z" - }, - { - "cveId": "CVE-2024-51772", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-51772", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/51xxx/CVE-2024-51772.json", - "dateUpdated": "2024-12-03T21:54:52.951Z" - }, - { - "cveId": "CVE-2024-51773", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-51773", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/51xxx/CVE-2024-51773.json", - "dateUpdated": "2024-12-03T21:56:04.237Z" - }, - { - "cveId": "CVE-2024-53672", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53672", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53672.json", - "dateUpdated": "2024-12-03T21:56:04.111Z" - } - ], - "error": [] - }, - { - "fetchTime": "2024-12-03T21:51:00.547Z", - "numberOfChanges": 3, - "new": [ - { - "cveId": "CVE-2024-53502", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53502", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53502.json", - "dateUpdated": "2024-12-03T21:49:51.133112" - } - ], - "updated": [ - { - "cveId": "CVE-2024-51773", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-51773", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/51xxx/CVE-2024-51773.json", - "dateUpdated": "2024-12-03T21:49:56.143Z" - }, - { - "cveId": "CVE-2024-53672", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53672", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53672.json", - "dateUpdated": "2024-12-03T21:49:07.088Z" - } - ], - "error": [] } ] \ No newline at end of file