diff --git a/cves/2023/6xxx/CVE-2023-6841.json b/cves/2023/6xxx/CVE-2023-6841.json index 8a9f38e096f2..777980450943 100644 --- a/cves/2023/6xxx/CVE-2023-6841.json +++ b/cves/2023/6xxx/CVE-2023-6841.json @@ -8,7 +8,7 @@ "assignerShortName": "redhat", "dateReserved": "2023-12-15T12:33:39.292Z", "datePublished": "2024-09-10T16:15:32.639Z", - "dateUpdated": "2024-11-15T15:15:22.570Z" + "dateUpdated": "2024-12-31T03:08:26.458Z" }, "containers": { "cna": { @@ -48,6 +48,19 @@ } ], "affected": [ + { + "versions": [ + { + "status": "affected", + "version": "0", + "lessThan": "24.0.0", + "versionType": "semver" + } + ], + "packageName": "keycloak", + "collectionURL": "https://github.com/keycloak/keycloak", + "defaultStatus": "unaffected" + }, { "vendor": "Red Hat", "product": "Red Hat build of Quarkus", @@ -171,7 +184,7 @@ "providerMetadata": { "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", - "dateUpdated": "2024-11-15T15:15:22.570Z" + "dateUpdated": "2024-12-31T03:08:26.458Z" } }, "adp": [ diff --git a/cves/2024/52xxx/CVE-2024-52336.json b/cves/2024/52xxx/CVE-2024-52336.json index d702cfd94dbd..012dbfe3ba90 100644 --- a/cves/2024/52xxx/CVE-2024-52336.json +++ b/cves/2024/52xxx/CVE-2024-52336.json @@ -8,7 +8,7 @@ "assignerShortName": "redhat", "dateReserved": "2024-11-08T13:09:39.004Z", "datePublished": "2024-11-26T15:21:13.518Z", - "dateUpdated": "2024-12-05T13:54:21.852Z" + "dateUpdated": "2024-12-31T03:11:06.440Z" }, "containers": { "cna": { @@ -48,6 +48,19 @@ } ], "affected": [ + { + "versions": [ + { + "status": "affected", + "version": "2.23.0", + "lessThan": "2.24.1", + "versionType": "semver" + } + ], + "packageName": "tuned", + "collectionURL": "https://github.com/redhat-performance/tuned", + "defaultStatus": "unaffected" + }, { "vendor": "Red Hat", "product": "Red Hat Enterprise Linux 9", @@ -63,11 +76,11 @@ } ], "cpes": [ - "cpe:/a:redhat:enterprise_linux:9::nfv", - "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::sap", "cpe:/a:redhat:enterprise_linux:9::realtime", + "cpe:/a:redhat:enterprise_linux:9::nfv", + "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::sap_hana" ] }, @@ -86,11 +99,11 @@ } ], "cpes": [ - "cpe:/a:redhat:enterprise_linux:9::nfv", - "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::sap", "cpe:/a:redhat:enterprise_linux:9::realtime", + "cpe:/a:redhat:enterprise_linux:9::nfv", + "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::sap_hana" ] }, @@ -227,7 +240,7 @@ "providerMetadata": { "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", - "dateUpdated": "2024-12-05T13:54:21.852Z" + "dateUpdated": "2024-12-31T03:11:06.440Z" } }, "adp": [ diff --git a/cves/2024/52xxx/CVE-2024-52337.json b/cves/2024/52xxx/CVE-2024-52337.json index a14dc5193662..f9bbbe77aed0 100644 --- a/cves/2024/52xxx/CVE-2024-52337.json +++ b/cves/2024/52xxx/CVE-2024-52337.json @@ -8,7 +8,7 @@ "assignerShortName": "redhat", "dateReserved": "2024-11-08T13:09:39.005Z", "datePublished": "2024-11-26T15:21:17.538Z", - "dateUpdated": "2024-12-18T08:34:18.827Z" + "dateUpdated": "2024-12-31T03:11:30.583Z" }, "containers": { "cna": { @@ -48,6 +48,19 @@ } ], "affected": [ + { + "versions": [ + { + "status": "affected", + "version": "2.23.0", + "lessThan": "2.24.1", + "versionType": "semver" + } + ], + "packageName": "tuned", + "collectionURL": "https://github.com/redhat-performance/tuned", + "defaultStatus": "unaffected" + }, { "vendor": "Red Hat", "product": "Red Hat Enterprise Linux 7 Extended Lifecycle Support", @@ -63,10 +76,10 @@ } ], "cpes": [ - "cpe:/a:redhat:rhel_extras_sap_els:7", "cpe:/o:redhat:rhel_els:7", "cpe:/a:redhat:rhel_extras_rt_els:7", - "cpe:/a:redhat:rhel_extras_sap_hana_els:7" + "cpe:/a:redhat:rhel_extras_sap_hana_els:7", + "cpe:/a:redhat:rhel_extras_sap_els:7" ] }, { @@ -84,10 +97,10 @@ } ], "cpes": [ - "cpe:/a:redhat:rhel_extras_sap_els:7", "cpe:/o:redhat:rhel_els:7", "cpe:/a:redhat:rhel_extras_rt_els:7", - "cpe:/a:redhat:rhel_extras_sap_hana_els:7" + "cpe:/a:redhat:rhel_extras_sap_hana_els:7", + "cpe:/a:redhat:rhel_extras_sap_els:7" ] }, { @@ -105,12 +118,12 @@ } ], "cpes": [ - "cpe:/a:redhat:enterprise_linux:8::sap_hana", - "cpe:/a:redhat:enterprise_linux:8::appstream", - "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime", + "cpe:/a:redhat:enterprise_linux:8::sap", + "cpe:/a:redhat:enterprise_linux:8::sap_hana", "cpe:/o:redhat:enterprise_linux:8::baseos", - "cpe:/a:redhat:enterprise_linux:8::sap" + "cpe:/a:redhat:enterprise_linux:8::nfv", + "cpe:/a:redhat:enterprise_linux:8::appstream" ] }, { @@ -128,12 +141,12 @@ } ], "cpes": [ - "cpe:/a:redhat:enterprise_linux:8::sap_hana", - "cpe:/a:redhat:enterprise_linux:8::appstream", - "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime", + "cpe:/a:redhat:enterprise_linux:8::sap", + "cpe:/a:redhat:enterprise_linux:8::sap_hana", "cpe:/o:redhat:enterprise_linux:8::baseos", - "cpe:/a:redhat:enterprise_linux:8::sap" + "cpe:/a:redhat:enterprise_linux:8::nfv", + "cpe:/a:redhat:enterprise_linux:8::appstream" ] }, { @@ -151,12 +164,12 @@ } ], "cpes": [ - "cpe:/a:redhat:enterprise_linux:9::nfv", + "cpe:/a:redhat:enterprise_linux:9::sap_hana", "cpe:/o:redhat:enterprise_linux:9::baseos", - "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::realtime", - "cpe:/a:redhat:enterprise_linux:9::sap_hana", - "cpe:/a:redhat:enterprise_linux:9::sap" + "cpe:/a:redhat:enterprise_linux:9::appstream", + "cpe:/a:redhat:enterprise_linux:9::sap", + "cpe:/a:redhat:enterprise_linux:9::nfv" ] }, { @@ -174,12 +187,12 @@ } ], "cpes": [ - "cpe:/a:redhat:enterprise_linux:9::nfv", + "cpe:/a:redhat:enterprise_linux:9::sap_hana", "cpe:/o:redhat:enterprise_linux:9::baseos", - "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::realtime", - "cpe:/a:redhat:enterprise_linux:9::sap_hana", - "cpe:/a:redhat:enterprise_linux:9::sap" + "cpe:/a:redhat:enterprise_linux:9::appstream", + "cpe:/a:redhat:enterprise_linux:9::sap", + "cpe:/a:redhat:enterprise_linux:9::nfv" ] }, { @@ -311,7 +324,7 @@ "providerMetadata": { "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", - "dateUpdated": "2024-12-18T08:34:18.827Z" + "dateUpdated": "2024-12-31T03:11:30.583Z" } }, "adp": [ diff --git a/cves/2024/5xxx/CVE-2024-5037.json b/cves/2024/5xxx/CVE-2024-5037.json index d771a0c9072e..4fedeefe9152 100644 --- a/cves/2024/5xxx/CVE-2024-5037.json +++ b/cves/2024/5xxx/CVE-2024-5037.json @@ -8,7 +8,7 @@ "assignerShortName": "redhat", "dateReserved": "2024-05-16T22:03:32.375Z", "datePublished": "2024-06-05T18:03:23.194Z", - "dateUpdated": "2024-11-24T17:17:04.382Z" + "dateUpdated": "2024-12-31T03:08:51.589Z" }, "containers": { "cna": { @@ -48,6 +48,19 @@ } ], "affected": [ + { + "versions": [ + { + "status": "affected", + "version": "4.16", + "lessThan": "4.17", + "versionType": "semver" + } + ], + "packageName": "telemeter", + "collectionURL": "https://github.com/openshift/telemeter", + "defaultStatus": "unaffected" + }, { "vendor": "Red Hat", "product": "Red Hat OpenShift Container Platform 4.12", @@ -82,8 +95,8 @@ } ], "cpes": [ - "cpe:/a:redhat:openshift:4.13::el8", - "cpe:/a:redhat:openshift:4.13::el9" + "cpe:/a:redhat:openshift:4.13::el9", + "cpe:/a:redhat:openshift:4.13::el8" ] }, { @@ -101,8 +114,8 @@ } ], "cpes": [ - "cpe:/a:redhat:openshift:4.14::el9", - "cpe:/a:redhat:openshift:4.14::el8" + "cpe:/a:redhat:openshift:4.14::el8", + "cpe:/a:redhat:openshift:4.14::el9" ] }, { @@ -146,7 +159,7 @@ "vendor": "Red Hat", "product": "Logging Subsystem for Red Hat OpenShift", "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", - "packageName": "openshift-logging/opa-openshift-rhel9", + "packageName": "openshift-logging/opa-openshift-rhel8", "defaultStatus": "unaffected", "cpes": [ "cpe:/a:redhat:logging:5" @@ -265,7 +278,7 @@ "providerMetadata": { "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", - "dateUpdated": "2024-11-24T17:17:04.382Z" + "dateUpdated": "2024-12-31T03:08:51.589Z" } }, "adp": [ diff --git a/cves/2024/5xxx/CVE-2024-5564.json b/cves/2024/5xxx/CVE-2024-5564.json index be9b438f2f59..5fbf94a7cf4e 100644 --- a/cves/2024/5xxx/CVE-2024-5564.json +++ b/cves/2024/5xxx/CVE-2024-5564.json @@ -7,7 +7,7 @@ "assignerShortName": "redhat", "dateReserved": "2024-05-31T13:34:41.061Z", "datePublished": "2024-05-31T18:31:47.333Z", - "dateUpdated": "2024-11-24T17:48:18.476Z" + "dateUpdated": "2024-12-31T03:09:13.581Z" }, "containers": { "cna": { @@ -47,6 +47,19 @@ } ], "affected": [ + { + "versions": [ + { + "status": "affected", + "version": "1.0", + "lessThan": "1.7-7", + "versionType": "semver" + } + ], + "packageName": "libndp", + "collectionURL": "https://github.com/jpirko/libndp", + "defaultStatus": "unaffected" + }, { "vendor": "Red Hat", "product": "Red Hat Enterprise Linux 7 Extended Lifecycle Support", @@ -116,9 +129,9 @@ } ], "cpes": [ + "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos", - "cpe:/o:redhat:rhel_aus:8.4::baseos", - "cpe:/o:redhat:rhel_e4s:8.4::baseos" + "cpe:/o:redhat:rhel_aus:8.4::baseos" ] }, { @@ -136,9 +149,9 @@ } ], "cpes": [ + "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos", - "cpe:/o:redhat:rhel_aus:8.4::baseos", - "cpe:/o:redhat:rhel_e4s:8.4::baseos" + "cpe:/o:redhat:rhel_aus:8.4::baseos" ] }, { @@ -156,9 +169,9 @@ } ], "cpes": [ + "cpe:/o:redhat:rhel_e4s:8.4::baseos", "cpe:/o:redhat:rhel_tus:8.4::baseos", - "cpe:/o:redhat:rhel_aus:8.4::baseos", - "cpe:/o:redhat:rhel_e4s:8.4::baseos" + "cpe:/o:redhat:rhel_aus:8.4::baseos" ] }, { @@ -424,7 +437,7 @@ "providerMetadata": { "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", - "dateUpdated": "2024-11-24T17:48:18.476Z" + "dateUpdated": "2024-12-31T03:09:13.581Z" } }, "adp": [ diff --git a/cves/2024/5xxx/CVE-2024-5651.json b/cves/2024/5xxx/CVE-2024-5651.json index 564f6fcc30aa..4a4316c078d7 100644 --- a/cves/2024/5xxx/CVE-2024-5651.json +++ b/cves/2024/5xxx/CVE-2024-5651.json @@ -8,7 +8,7 @@ "assignerShortName": "redhat", "dateReserved": "2024-06-05T09:57:33.499Z", "datePublished": "2024-08-12T05:46:16.035Z", - "dateUpdated": "2024-11-24T16:03:18.618Z" + "dateUpdated": "2024-12-31T03:09:31.508Z" }, "containers": { "cna": { @@ -48,6 +48,19 @@ } ], "affected": [ + { + "versions": [ + { + "status": "affected", + "version": "0.4.0", + "lessThan": "0.4.1-22", + "versionType": "semver" + } + ], + "packageName": "fence-agents-remediation", + "collectionURL": "https://github.com/medik8s/fence-agents-remediation", + "defaultStatus": "affected" + }, { "vendor": "Red Hat", "product": "Fence Agents Remediation 0.4 for RHEL 8", @@ -151,7 +164,7 @@ "providerMetadata": { "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", - "dateUpdated": "2024-11-24T16:03:18.618Z" + "dateUpdated": "2024-12-31T03:09:31.508Z" } }, "adp": [ diff --git a/cves/2024/6xxx/CVE-2024-6239.json b/cves/2024/6xxx/CVE-2024-6239.json index d910e73f45c2..41dc9dfdaba2 100644 --- a/cves/2024/6xxx/CVE-2024-6239.json +++ b/cves/2024/6xxx/CVE-2024-6239.json @@ -8,7 +8,7 @@ "assignerShortName": "redhat", "dateReserved": "2024-06-21T04:27:59.923Z", "datePublished": "2024-06-21T13:28:23.857Z", - "dateUpdated": "2024-11-24T16:16:33.625Z" + "dateUpdated": "2024-12-31T03:09:51.583Z" }, "containers": { "cna": { @@ -48,6 +48,19 @@ } ], "affected": [ + { + "versions": [ + { + "status": "affected", + "version": "24.06.0", + "versionType": "semver", + "lessThanOrEqual": "24.06.1" + } + ], + "packageName": "poppler", + "collectionURL": "https://gitlab.freedesktop.org/poppler/poppler", + "defaultStatus": "unaffected" + }, { "vendor": "Red Hat", "product": "Red Hat Enterprise Linux 8", @@ -63,8 +76,8 @@ } ], "cpes": [ - "cpe:/a:redhat:enterprise_linux:8::appstream", - "cpe:/a:redhat:enterprise_linux:8::crb" + "cpe:/a:redhat:enterprise_linux:8::crb", + "cpe:/a:redhat:enterprise_linux:8::appstream" ] }, { @@ -82,8 +95,8 @@ } ], "cpes": [ - "cpe:/a:redhat:enterprise_linux:9::appstream", - "cpe:/a:redhat:enterprise_linux:9::crb" + "cpe:/a:redhat:enterprise_linux:9::crb", + "cpe:/a:redhat:enterprise_linux:9::appstream" ] }, { @@ -229,7 +242,7 @@ "providerMetadata": { "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", - "dateUpdated": "2024-11-24T16:16:33.625Z" + "dateUpdated": "2024-12-31T03:09:51.583Z" } }, "adp": [ diff --git a/cves/2024/6xxx/CVE-2024-6501.json b/cves/2024/6xxx/CVE-2024-6501.json index ea4bc4948ed1..39f75173f66d 100644 --- a/cves/2024/6xxx/CVE-2024-6501.json +++ b/cves/2024/6xxx/CVE-2024-6501.json @@ -8,7 +8,7 @@ "assignerShortName": "redhat", "dateReserved": "2024-07-04T05:13:32.680Z", "datePublished": "2024-07-09T19:27:11.133Z", - "dateUpdated": "2024-11-24T14:07:29.787Z" + "dateUpdated": "2024-12-31T03:10:09.533Z" }, "containers": { "cna": { @@ -48,6 +48,19 @@ } ], "affected": [ + { + "versions": [ + { + "status": "affected", + "version": "1.40", + "lessThan": "1.48.10-2", + "versionType": "semver" + } + ], + "packageName": "NetworkManager", + "collectionURL": "https://github.com/NetworkManager/NetworkManager", + "defaultStatus": "unaffected" + }, { "vendor": "Red Hat", "product": "Red Hat Enterprise Linux 9", @@ -63,8 +76,8 @@ } ], "cpes": [ - "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos", + "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ] }, @@ -83,8 +96,8 @@ } ], "cpes": [ - "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos", + "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/a:redhat:enterprise_linux:9::crb" ] }, @@ -183,7 +196,7 @@ "providerMetadata": { "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", - "dateUpdated": "2024-11-24T14:07:29.787Z" + "dateUpdated": "2024-12-31T03:10:09.533Z" } }, "adp": [ diff --git a/cves/2024/6xxx/CVE-2024-6535.json b/cves/2024/6xxx/CVE-2024-6535.json index 1a277b9073b5..7dab0ece6c28 100644 --- a/cves/2024/6xxx/CVE-2024-6535.json +++ b/cves/2024/6xxx/CVE-2024-6535.json @@ -8,7 +8,7 @@ "assignerShortName": "redhat", "dateReserved": "2024-07-05T18:48:04.548Z", "datePublished": "2024-07-17T02:25:25.958Z", - "dateUpdated": "2024-11-24T17:49:58.693Z" + "dateUpdated": "2024-12-31T03:10:29.622Z" }, "containers": { "cna": { @@ -48,6 +48,19 @@ } ], "affected": [ + { + "versions": [ + { + "status": "affected", + "version": "0", + "lessThan": "0.0.0-20240703184342-c26bce4079ff", + "versionType": "custom" + } + ], + "packageName": "skupper", + "collectionURL": "https://github.com/skupperproject/skupper", + "defaultStatus": "unaffected" + }, { "vendor": "Red Hat", "product": "Service Interconnect 1.4 for RHEL 9", @@ -193,7 +206,7 @@ "providerMetadata": { "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", - "dateUpdated": "2024-11-24T17:49:58.693Z" + "dateUpdated": "2024-12-31T03:10:29.622Z" } }, "adp": [ diff --git a/cves/delta.json b/cves/delta.json index 27239919d9f3..ca9be019f414 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,14 +1,62 @@ { - "fetchTime": "2024-12-31T02:32:35.038Z", - "numberOfChanges": 1, - "new": [ - { - "cveId": "CVE-2024-45497", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-45497", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/45xxx/CVE-2024-45497.json", - "dateUpdated": "2024-12-31T02:19:22.553Z" + "fetchTime": "2024-12-31T03:13:02.925Z", + "numberOfChanges": 9, + "new": [], + "updated": [ + { + "cveId": "CVE-2023-6841", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-6841", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/6xxx/CVE-2023-6841.json", + "dateUpdated": "2024-12-31T03:08:26.458Z" + }, + { + "cveId": "CVE-2024-52336", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-52336", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/52xxx/CVE-2024-52336.json", + "dateUpdated": "2024-12-31T03:11:06.440Z" + }, + { + "cveId": "CVE-2024-52337", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-52337", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/52xxx/CVE-2024-52337.json", + "dateUpdated": "2024-12-31T03:11:30.583Z" + }, + { + "cveId": "CVE-2024-5037", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-5037", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/5xxx/CVE-2024-5037.json", + "dateUpdated": "2024-12-31T03:08:51.589Z" + }, + { + "cveId": "CVE-2024-5564", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-5564", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/5xxx/CVE-2024-5564.json", + "dateUpdated": "2024-12-31T03:09:13.581Z" + }, + { + "cveId": "CVE-2024-5651", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-5651", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/5xxx/CVE-2024-5651.json", + "dateUpdated": "2024-12-31T03:09:31.508Z" + }, + { + "cveId": "CVE-2024-6239", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-6239", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/6xxx/CVE-2024-6239.json", + "dateUpdated": "2024-12-31T03:09:51.583Z" + }, + { + "cveId": "CVE-2024-6501", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-6501", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/6xxx/CVE-2024-6501.json", + "dateUpdated": "2024-12-31T03:10:09.533Z" + }, + { + "cveId": "CVE-2024-6535", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-6535", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/6xxx/CVE-2024-6535.json", + "dateUpdated": "2024-12-31T03:10:29.622Z" } ], - "updated": [], "error": [] } \ No newline at end of file diff --git a/cves/deltaLog.json b/cves/deltaLog.json index 24741a8cc7e8..2e55a4909e30 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,66 @@ [ + { + "fetchTime": "2024-12-31T03:13:02.925Z", + "numberOfChanges": 9, + "new": [], + "updated": [ + { + "cveId": "CVE-2023-6841", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-6841", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/6xxx/CVE-2023-6841.json", + "dateUpdated": "2024-12-31T03:08:26.458Z" + }, + { + "cveId": "CVE-2024-52336", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-52336", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/52xxx/CVE-2024-52336.json", + "dateUpdated": "2024-12-31T03:11:06.440Z" + }, + { + "cveId": "CVE-2024-52337", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-52337", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/52xxx/CVE-2024-52337.json", + "dateUpdated": "2024-12-31T03:11:30.583Z" + }, + { + "cveId": "CVE-2024-5037", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-5037", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/5xxx/CVE-2024-5037.json", + "dateUpdated": "2024-12-31T03:08:51.589Z" + }, + { + "cveId": "CVE-2024-5564", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-5564", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/5xxx/CVE-2024-5564.json", + "dateUpdated": "2024-12-31T03:09:13.581Z" + }, + { + "cveId": "CVE-2024-5651", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-5651", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/5xxx/CVE-2024-5651.json", + "dateUpdated": "2024-12-31T03:09:31.508Z" + }, + { + "cveId": "CVE-2024-6239", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-6239", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/6xxx/CVE-2024-6239.json", + "dateUpdated": "2024-12-31T03:09:51.583Z" + }, + { + "cveId": "CVE-2024-6501", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-6501", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/6xxx/CVE-2024-6501.json", + "dateUpdated": "2024-12-31T03:10:09.533Z" + }, + { + "cveId": "CVE-2024-6535", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-6535", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/6xxx/CVE-2024-6535.json", + "dateUpdated": "2024-12-31T03:10:29.622Z" + } + ], + "error": [] + }, { "fetchTime": "2024-12-31T02:32:35.038Z", "numberOfChanges": 1,