From 7cc706292846eb3d47e3465c31d1ce5c63325d58 Mon Sep 17 00:00:00 2001 From: cvelistV5 Github Action Date: Thu, 28 Nov 2024 02:42:40 +0000 Subject: [PATCH] 5 changes (4 new | 1 updated): - 4 new CVEs: CVE-2024-38309, CVE-2024-38389, CVE-2024-38658, CVE-2024-53008 - 1 updated CVEs: CVE-2024-11667 --- cves/2024/11xxx/CVE-2024-11667.json | 6 +- cves/2024/38xxx/CVE-2024-38309.json | 80 +++++++++ cves/2024/38xxx/CVE-2024-38389.json | 70 ++++++++ cves/2024/38xxx/CVE-2024-38658.json | 70 ++++++++ cves/2024/53xxx/CVE-2024-53008.json | 119 +++++++++++++ cves/delta.json | 44 +++-- cves/deltaLog.json | 254 +++++----------------------- 7 files changed, 409 insertions(+), 234 deletions(-) create mode 100644 cves/2024/38xxx/CVE-2024-38309.json create mode 100644 cves/2024/38xxx/CVE-2024-38389.json create mode 100644 cves/2024/38xxx/CVE-2024-38658.json create mode 100644 cves/2024/53xxx/CVE-2024-53008.json diff --git a/cves/2024/11xxx/CVE-2024-11667.json b/cves/2024/11xxx/CVE-2024-11667.json index db16a5a3c0d2..257979288f24 100644 --- a/cves/2024/11xxx/CVE-2024-11667.json +++ b/cves/2024/11xxx/CVE-2024-11667.json @@ -8,7 +8,7 @@ "assignerShortName": "Zyxel", "dateReserved": "2024-11-25T07:15:56.063Z", "datePublished": "2024-11-27T09:39:41.691Z", - "dateUpdated": "2024-11-27T14:40:20.084Z" + "dateUpdated": "2024-11-28T02:11:49.265Z" }, "containers": { "cna": { @@ -111,14 +111,14 @@ "providerMetadata": { "orgId": "96e50032-ad0d-4058-a115-4d2c13821f9f", "shortName": "Zyxel", - "dateUpdated": "2024-11-27T09:39:41.691Z" + "dateUpdated": "2024-11-28T02:11:49.265Z" }, "references": [ { "tags": [ "vendor-advisory" ], - "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-protecting-against-recent-firewall-threats-11-21-2024" + "url": "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-protecting-against-recent-firewall-threats-11-27-2024" } ], "source": { diff --git a/cves/2024/38xxx/CVE-2024-38309.json b/cves/2024/38xxx/CVE-2024-38309.json new file mode 100644 index 000000000000..7d73ca64c271 --- /dev/null +++ b/cves/2024/38xxx/CVE-2024-38309.json @@ -0,0 +1,80 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-38309", + "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", + "state": "PUBLISHED", + "assignerShortName": "jpcert", + "dateReserved": "2024-06-19T15:02:02.236Z", + "datePublished": "2024-11-28T02:10:32.213Z", + "dateUpdated": "2024-11-28T02:10:32.213Z" + }, + "containers": { + "cna": { + "affected": [ + { + "vendor": "FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd.", + "product": "V-SFT", + "versions": [ + { + "version": "v6.2.2.0 and earlier", + "status": "affected" + } + ] + }, + { + "vendor": "FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd.", + "product": "TELLUS", + "versions": [ + { + "version": "v4.0.19.0 and earlier", + "status": "affected" + } + ] + }, + { + "vendor": "FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd.", + "product": "TELLUS Lite", + "versions": [ + { + "version": "v4.0.19.0 and earlier", + "status": "affected" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "There are multiple stack-based buffer overflow vulnerabilities in V-SFT (v6.2.2.0 and earlier), TELLUS (v4.0.19.0 and earlier), and TELLUS Lite (v4.0.19.0 and earlier).\r\nIf a user opens a specially crafted file, information may be disclosed and/or arbitrary code may be executed." + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "description": "Stack-based buffer overflow", + "lang": "en-US", + "cweId": "CWE-121", + "type": "CWE" + } + ] + } + ], + "references": [ + { + "url": "https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU97531313/" + } + ], + "providerMetadata": { + "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", + "shortName": "jpcert", + "dateUpdated": "2024-11-28T02:10:32.213Z" + } + } + } +} \ No newline at end of file diff --git a/cves/2024/38xxx/CVE-2024-38389.json b/cves/2024/38xxx/CVE-2024-38389.json new file mode 100644 index 000000000000..2707b36b3160 --- /dev/null +++ b/cves/2024/38xxx/CVE-2024-38389.json @@ -0,0 +1,70 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-38389", + "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", + "state": "PUBLISHED", + "assignerShortName": "jpcert", + "dateReserved": "2024-06-19T15:02:00.425Z", + "datePublished": "2024-11-28T02:11:04.326Z", + "dateUpdated": "2024-11-28T02:11:04.326Z" + }, + "containers": { + "cna": { + "affected": [ + { + "vendor": "FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd.", + "product": "TELLUS", + "versions": [ + { + "version": "v4.0.19.0 and earlier", + "status": "affected" + } + ] + }, + { + "vendor": "FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd.", + "product": "TELLUS Lite", + "versions": [ + { + "version": "v4.0.19.0 and earlier", + "status": "affected" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "There is an Out-of-bounds read vulnerability in TELLUS (v4.0.19.0 and earlier) and TELLUS Lite (v4.0.19.0 and earlier). If a user opens a specially crafted file, information may be disclosed and/or arbitrary code may be executed." + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "description": "Out-of-bounds read", + "lang": "en-US", + "cweId": "CWE-125", + "type": "CWE" + } + ] + } + ], + "references": [ + { + "url": "https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU97531313/" + } + ], + "providerMetadata": { + "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", + "shortName": "jpcert", + "dateUpdated": "2024-11-28T02:11:04.326Z" + } + } + } +} \ No newline at end of file diff --git a/cves/2024/38xxx/CVE-2024-38658.json b/cves/2024/38xxx/CVE-2024-38658.json new file mode 100644 index 000000000000..ffdaa1daedd0 --- /dev/null +++ b/cves/2024/38xxx/CVE-2024-38658.json @@ -0,0 +1,70 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-38658", + "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", + "state": "PUBLISHED", + "assignerShortName": "jpcert", + "dateReserved": "2024-06-19T15:02:01.369Z", + "datePublished": "2024-11-28T02:11:21.840Z", + "dateUpdated": "2024-11-28T02:11:21.840Z" + }, + "containers": { + "cna": { + "affected": [ + { + "vendor": "FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd.", + "product": "V-Server", + "versions": [ + { + "version": "v4.0.19.0 and earlier", + "status": "affected" + } + ] + }, + { + "vendor": "FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd.", + "product": "V-Server Lite", + "versions": [ + { + "version": "v4.0.19.0 and earlier", + "status": "affected" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "There is an Out-of-bounds read vulnerability in V-Server (v4.0.19.0 and earlier) and V-Server Lite (v4.0.19.0 and earlier). If a user opens a specially crafted file, information may be disclosed and/or arbitrary code may be executed." + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "description": "Out-of-bounds read", + "lang": "en-US", + "cweId": "CWE-125", + "type": "CWE" + } + ] + } + ], + "references": [ + { + "url": "https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php" + }, + { + "url": "https://jvn.jp/en/vu/JVNVU97531313/" + } + ], + "providerMetadata": { + "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", + "shortName": "jpcert", + "dateUpdated": "2024-11-28T02:11:21.840Z" + } + } + } +} \ No newline at end of file diff --git a/cves/2024/53xxx/CVE-2024-53008.json b/cves/2024/53xxx/CVE-2024-53008.json new file mode 100644 index 000000000000..3f6ab76ad1e2 --- /dev/null +++ b/cves/2024/53xxx/CVE-2024-53008.json @@ -0,0 +1,119 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-53008", + "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", + "state": "PUBLISHED", + "assignerShortName": "jpcert", + "dateReserved": "2024-11-18T23:29:20.816Z", + "datePublished": "2024-11-28T02:10:43.901Z", + "dateUpdated": "2024-11-28T02:10:43.901Z" + }, + "containers": { + "cna": { + "affected": [ + { + "vendor": "HAProxy Project", + "product": "HAProxy 2.6", + "versions": [ + { + "version": "2.6.18 and earlier", + "status": "affected" + } + ] + }, + { + "vendor": "HAProxy Project", + "product": "HAProxy 2.8", + "versions": [ + { + "version": "2.8.10 and earlier", + "status": "affected" + } + ] + }, + { + "vendor": "HAProxy Project", + "product": "HAProxy 2.9", + "versions": [ + { + "version": "2.9.9 and earlier", + "status": "affected" + } + ] + }, + { + "vendor": "HAProxy Project", + "product": "HAProxy 3.0", + "versions": [ + { + "version": "3.0.2 and earlier", + "status": "affected" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Inconsistent interpretation of HTTP requests ('HTTP Request/Response Smuggling') issue exists in HAProxy. If this vulnerability is exploited, a remote attacker may access a path that is restricted by ACL (Access Control List) set on the product. As a result, the attacker may obtain sensitive information." + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "description": "Inconsistent interpretation of HTTP requests ('HTTP Request/Response Smuggling')", + "lang": "en-US", + "cweId": "CWE-444", + "type": "CWE" + } + ] + } + ], + "references": [ + { + "url": "https://www.haproxy.org/" + }, + { + "url": "https://git.haproxy.org/?p=haproxy-2.6.git;a=commit;h=1afca10150ac3e4e2224055cc31b6f1e4a70efe2" + }, + { + "url": "https://git.haproxy.org/?p=haproxy-2.8.git;a=commit;h=01c1056a44823c5ffb8f74660b32c099d9b5355b" + }, + { + "url": "https://git.haproxy.org/?p=haproxy-2.9.git;a=commit;h=4bcaece344c8738dac1ab5bd8cc81e2a22701d71" + }, + { + "url": "https://git.haproxy.org/?p=haproxy-3.0.git;a=commit;h=95a607c4b3af09be2a495b9c2872ea252ccff603" + }, + { + "url": "https://jvn.jp/en/jp/JVN88385716/" + } + ], + "metrics": [ + { + "format": "CVSS", + "scenarios": [ + { + "lang": "en-US", + "value": "GENERAL" + } + ], + "cvssV3_0": { + "version": "3.0", + "baseSeverity": "MEDIUM", + "baseScore": 5.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + } + ], + "providerMetadata": { + "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", + "shortName": "jpcert", + "dateUpdated": "2024-11-28T02:10:43.901Z" + } + } + } +} \ No newline at end of file diff --git a/cves/delta.json b/cves/delta.json index 9cd00d7157ee..58de17d8e579 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,26 +1,38 @@ { - "fetchTime": "2024-11-28T00:28:45.867Z", - "numberOfChanges": 3, + "fetchTime": "2024-11-28T02:42:27.230Z", + "numberOfChanges": 5, "new": [ { - "cveId": "CVE-2018-9377", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9377", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9377.json", - "dateUpdated": "2024-11-28T00:23:14.763Z" + "cveId": "CVE-2024-38309", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-38309", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/38xxx/CVE-2024-38309.json", + "dateUpdated": "2024-11-28T02:10:32.213Z" + }, + { + "cveId": "CVE-2024-38389", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-38389", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/38xxx/CVE-2024-38389.json", + "dateUpdated": "2024-11-28T02:11:04.326Z" + }, + { + "cveId": "CVE-2024-38658", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-38658", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/38xxx/CVE-2024-38658.json", + "dateUpdated": "2024-11-28T02:11:21.840Z" + }, + { + "cveId": "CVE-2024-53008", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53008", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53008.json", + "dateUpdated": "2024-11-28T02:10:43.901Z" } ], "updated": [ { - "cveId": "CVE-2023-39327", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-39327", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/39xxx/CVE-2023-39327.json", - "dateUpdated": "2024-11-28T00:20:10.906Z" - }, - { - "cveId": "CVE-2023-39329", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-39329", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/39xxx/CVE-2023-39329.json", - "dateUpdated": "2024-11-28T00:20:15.550Z" + "cveId": "CVE-2024-11667", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11667", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11667.json", + "dateUpdated": "2024-11-28T02:11:49.265Z" } ], "error": [] diff --git a/cves/deltaLog.json b/cves/deltaLog.json index c1fd642db8fe..0b84ae8265c2 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,43 @@ [ + { + "fetchTime": "2024-11-28T02:42:27.230Z", + "numberOfChanges": 5, + "new": [ + { + "cveId": "CVE-2024-38309", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-38309", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/38xxx/CVE-2024-38309.json", + "dateUpdated": "2024-11-28T02:10:32.213Z" + }, + { + "cveId": "CVE-2024-38389", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-38389", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/38xxx/CVE-2024-38389.json", + "dateUpdated": "2024-11-28T02:11:04.326Z" + }, + { + "cveId": "CVE-2024-38658", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-38658", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/38xxx/CVE-2024-38658.json", + "dateUpdated": "2024-11-28T02:11:21.840Z" + }, + { + "cveId": "CVE-2024-53008", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-53008", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/53xxx/CVE-2024-53008.json", + "dateUpdated": "2024-11-28T02:10:43.901Z" + } + ], + "updated": [ + { + "cveId": "CVE-2024-11667", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-11667", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/11xxx/CVE-2024-11667.json", + "dateUpdated": "2024-11-28T02:11:49.265Z" + } + ], + "error": [] + }, { "fetchTime": "2024-11-28T00:28:45.867Z", "numberOfChanges": 3, @@ -157740,220 +157779,5 @@ } ], "error": [] - }, - { - "fetchTime": "2024-10-29T02:10:29.267Z", - "numberOfChanges": 2, - "new": [ - { - "cveId": "CVE-2024-22065", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-22065", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/22xxx/CVE-2024-22065.json", - "dateUpdated": "2024-10-29T01:58:29.002Z" - } - ], - "updated": [ - { - "cveId": "CVE-2024-1233", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-1233", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/1xxx/CVE-2024-1233.json", - "dateUpdated": "2024-10-29T01:47:24.637Z" - } - ], - "error": [] - }, - { - "fetchTime": "2024-10-29T01:36:07.459Z", - "numberOfChanges": 2, - "new": [ - { - "cveId": "CVE-2024-10479", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10479", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10479.json", - "dateUpdated": "2024-10-29T01:00:14.763Z" - } - ], - "updated": [ - { - "cveId": "CVE-2024-43885", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43885", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43885.json", - "dateUpdated": "2024-10-29T01:17:53.150Z" - } - ], - "error": [] - }, - { - "fetchTime": "2024-10-29T00:58:35.674Z", - "numberOfChanges": 22, - "new": [ - { - "cveId": "CVE-2024-45656", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-45656", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/45xxx/CVE-2024-45656.json", - "dateUpdated": "2024-10-29T00:37:16.004Z" - }, - { - "cveId": "CVE-2024-50068", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50068", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50068.json", - "dateUpdated": "2024-10-29T00:50:08.897Z" - }, - { - "cveId": "CVE-2024-50069", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50069", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50069.json", - "dateUpdated": "2024-10-29T00:50:10.018Z" - }, - { - "cveId": "CVE-2024-50070", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50070", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50070.json", - "dateUpdated": "2024-10-29T00:50:11.130Z" - }, - { - "cveId": "CVE-2024-50071", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50071", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50071.json", - "dateUpdated": "2024-10-29T00:50:12.470Z" - }, - { - "cveId": "CVE-2024-50072", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50072", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50072.json", - "dateUpdated": "2024-10-29T00:50:14.170Z" - }, - { - "cveId": "CVE-2024-50073", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50073", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50073.json", - "dateUpdated": "2024-10-29T00:50:15.219Z" - }, - { - "cveId": "CVE-2024-50074", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50074", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50074.json", - "dateUpdated": "2024-10-29T00:50:16.263Z" - }, - { - "cveId": "CVE-2024-50075", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50075", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50075.json", - "dateUpdated": "2024-10-29T00:50:17.304Z" - }, - { - "cveId": "CVE-2024-50076", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50076", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50076.json", - "dateUpdated": "2024-10-29T00:50:18.349Z" - }, - { - "cveId": "CVE-2024-50077", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50077", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50077.json", - "dateUpdated": "2024-10-29T00:50:19.412Z" - }, - { - "cveId": "CVE-2024-50078", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50078", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50078.json", - "dateUpdated": "2024-10-29T00:50:20.446Z" - }, - { - "cveId": "CVE-2024-50079", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50079", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50079.json", - "dateUpdated": "2024-10-29T00:50:21.508Z" - }, - { - "cveId": "CVE-2024-50080", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50080", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50080.json", - "dateUpdated": "2024-10-29T00:50:22.561Z" - }, - { - "cveId": "CVE-2024-50081", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50081", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50081.json", - "dateUpdated": "2024-10-29T00:50:23.608Z" - }, - { - "cveId": "CVE-2024-50082", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50082", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50082.json", - "dateUpdated": "2024-10-29T00:50:24.667Z" - }, - { - "cveId": "CVE-2024-50083", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50083", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50083.json", - "dateUpdated": "2024-10-29T00:50:26.185Z" - }, - { - "cveId": "CVE-2024-50084", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50084", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50084.json", - "dateUpdated": "2024-10-29T00:50:27.226Z" - }, - { - "cveId": "CVE-2024-50085", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50085", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50085.json", - "dateUpdated": "2024-10-29T00:50:28.269Z" - }, - { - "cveId": "CVE-2024-50086", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50086", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50086.json", - "dateUpdated": "2024-10-29T00:50:29.284Z" - }, - { - "cveId": "CVE-2024-50087", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50087", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50087.json", - "dateUpdated": "2024-10-29T00:50:30.313Z" - }, - { - "cveId": "CVE-2024-50088", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50088", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50088.json", - "dateUpdated": "2024-10-29T00:50:31.362Z" - } - ], - "updated": [], - "error": [] - }, - { - "fetchTime": "2024-10-29T00:32:56.481Z", - "numberOfChanges": 4, - "new": [ - { - "cveId": "CVE-2024-10477", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10477", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10477.json", - "dateUpdated": "2024-10-29T00:31:08.354Z" - }, - { - "cveId": "CVE-2024-10478", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10478", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10478.json", - "dateUpdated": "2024-10-29T00:31:15.499Z" - } - ], - "updated": [ - { - "cveId": "CVE-2024-0874", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-0874", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/0xxx/CVE-2024-0874.json", - "dateUpdated": "2024-10-29T00:18:00.844Z" - }, - { - "cveId": "CVE-2024-3727", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-3727", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/3xxx/CVE-2024-3727.json", - "dateUpdated": "2024-10-29T00:10:39.166Z" - } - ], - "error": [] } ] \ No newline at end of file