diff --git a/cves/2024/56xxx/CVE-2024-56211.json b/cves/2024/56xxx/CVE-2024-56211.json new file mode 100644 index 000000000000..843524dd1fcc --- /dev/null +++ b/cves/2024/56xxx/CVE-2024-56211.json @@ -0,0 +1,110 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-56211", + "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", + "state": "PUBLISHED", + "assignerShortName": "Patchstack", + "dateReserved": "2024-12-18T19:03:36.424Z", + "datePublished": "2024-12-31T10:03:12.435Z", + "dateUpdated": "2024-12-31T10:03:12.435Z" + }, + "containers": { + "cna": { + "affected": [ + { + "defaultStatus": "unaffected", + "product": "Userpro", + "vendor": "DeluxeThemes", + "versions": [ + { + "lessThanOrEqual": "5.1.9", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ] + } + ], + "credits": [ + { + "lang": "en", + "type": "finder", + "user": "00000000-0000-4000-9000-000000000000", + "value": "Rafie Muhammad (Patchstack)" + } + ], + "descriptions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Missing Authorization vulnerability in DeluxeThemes Userpro.

This issue affects Userpro: from n/a through 5.1.9.

" + } + ], + "value": "Missing Authorization vulnerability in DeluxeThemes Userpro.This issue affects Userpro: from n/a through 5.1.9." + } + ], + "metrics": [ + { + "cvssV3_1": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + }, + "format": "CVSS", + "scenarios": [ + { + "lang": "en", + "value": "GENERAL" + } + ] + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "cweId": "CWE-862", + "description": "CWE-862 Missing Authorization", + "lang": "en", + "type": "CWE" + } + ] + } + ], + "providerMetadata": { + "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", + "shortName": "Patchstack", + "dateUpdated": "2024-12-31T10:03:12.435Z" + }, + "references": [ + { + "tags": [ + "vdb-entry" + ], + "url": "https://patchstack.com/database/wordpress/plugin/userpro/vulnerability/wordpress-userpro-plugin-5-1-9-authenticated-arbitrary-user-meta-update-vulnerability?_s_id=cve" + } + ], + "source": { + "discovery": "EXTERNAL" + }, + "title": "WordPress UserPro plugin <= 5.1.9 - Authenticated Arbitrary User Meta Update vulnerability", + "x_generator": { + "engine": "Vulnogram 0.2.0" + } + } + } +} \ No newline at end of file diff --git a/cves/2024/56xxx/CVE-2024-56212.json b/cves/2024/56xxx/CVE-2024-56212.json new file mode 100644 index 000000000000..bf5cdd8ae856 --- /dev/null +++ b/cves/2024/56xxx/CVE-2024-56212.json @@ -0,0 +1,110 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-56212", + "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", + "state": "PUBLISHED", + "assignerShortName": "Patchstack", + "dateReserved": "2024-12-18T19:03:36.424Z", + "datePublished": "2024-12-31T10:04:12.727Z", + "dateUpdated": "2024-12-31T10:04:12.727Z" + }, + "containers": { + "cna": { + "affected": [ + { + "defaultStatus": "unaffected", + "product": "Userpro", + "vendor": "DeluxeThemes", + "versions": [ + { + "lessThanOrEqual": "5.1.9", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ] + } + ], + "credits": [ + { + "lang": "en", + "type": "finder", + "user": "00000000-0000-4000-9000-000000000000", + "value": "Rafie Muhammad (Patchstack)" + } + ], + "descriptions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in DeluxeThemes Userpro.

This issue affects Userpro: from n/a through 5.1.9.

" + } + ], + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in DeluxeThemes Userpro.This issue affects Userpro: from n/a through 5.1.9." + } + ], + "metrics": [ + { + "cvssV3_1": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "version": "3.1" + }, + "format": "CVSS", + "scenarios": [ + { + "lang": "en", + "value": "GENERAL" + } + ] + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "cweId": "CWE-89", + "description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", + "lang": "en", + "type": "CWE" + } + ] + } + ], + "providerMetadata": { + "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", + "shortName": "Patchstack", + "dateUpdated": "2024-12-31T10:04:12.727Z" + }, + "references": [ + { + "tags": [ + "vdb-entry" + ], + "url": "https://patchstack.com/database/wordpress/plugin/userpro/vulnerability/wordpress-userpro-plugin-5-1-9-sql-injection-vulnerability?_s_id=cve" + } + ], + "source": { + "discovery": "EXTERNAL" + }, + "title": "WordPress UserPro plugin <= 5.1.9 - SQL Injection vulnerability", + "x_generator": { + "engine": "Vulnogram 0.2.0" + } + } + } +} \ No newline at end of file diff --git a/cves/2024/56xxx/CVE-2024-56213.json b/cves/2024/56xxx/CVE-2024-56213.json new file mode 100644 index 000000000000..5d491fd1e6f9 --- /dev/null +++ b/cves/2024/56xxx/CVE-2024-56213.json @@ -0,0 +1,142 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-56213", + "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", + "state": "PUBLISHED", + "assignerShortName": "Patchstack", + "dateReserved": "2024-12-18T19:03:54.296Z", + "datePublished": "2024-12-31T10:02:21.132Z", + "dateUpdated": "2024-12-31T10:02:21.132Z" + }, + "containers": { + "cna": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "defaultStatus": "unaffected", + "packageName": "wp-event-solution", + "product": "Eventin", + "vendor": "Themewinter", + "versions": [ + { + "changes": [ + { + "at": "4.0.9", + "status": "unaffected" + } + ], + "lessThanOrEqual": "4.0.7", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ] + } + ], + "credits": [ + { + "lang": "en", + "type": "finder", + "user": "00000000-0000-4000-9000-000000000000", + "value": "João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance)" + } + ], + "descriptions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Path Traversal: '.../...//' vulnerability in Themewinter Eventin allows Path Traversal.

This issue affects Eventin: from n/a through 4.0.7.

" + } + ], + "value": "Path Traversal: '.../...//' vulnerability in Themewinter Eventin allows Path Traversal.This issue affects Eventin: from n/a through 4.0.7." + } + ], + "impacts": [ + { + "capecId": "CAPEC-126", + "descriptions": [ + { + "lang": "en", + "value": "CAPEC-126 Path Traversal" + } + ] + } + ], + "metrics": [ + { + "cvssV3_1": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + }, + "format": "CVSS", + "scenarios": [ + { + "lang": "en", + "value": "GENERAL" + } + ] + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "cweId": "CWE-35", + "description": "CWE-35 Path Traversal: '.../...//'", + "lang": "en", + "type": "CWE" + } + ] + } + ], + "providerMetadata": { + "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", + "shortName": "Patchstack", + "dateUpdated": "2024-12-31T10:02:21.132Z" + }, + "references": [ + { + "tags": [ + "vdb-entry" + ], + "url": "https://patchstack.com/database/wordpress/plugin/wp-event-solution/vulnerability/wordpress-eventin-plugin-4-0-7-contributor-limited-local-file-inclusion-vulnerability?_s_id=cve" + } + ], + "solutions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update the WordPress Eventin wordpress plugin to the latest available version (at least 4.0.9)." + } + ], + "value": "Update the WordPress Eventin wordpress plugin to the latest available version (at least 4.0.9)." + } + ], + "source": { + "discovery": "EXTERNAL" + }, + "title": "WordPress Eventin plugin <= 4.0.7 - Contributor+ Limited Local File Inclusion vulnerability", + "x_generator": { + "engine": "Vulnogram 0.2.0" + } + } + } +} \ No newline at end of file diff --git a/cves/2024/56xxx/CVE-2024-56214.json b/cves/2024/56xxx/CVE-2024-56214.json new file mode 100644 index 000000000000..7c8d30e6c484 --- /dev/null +++ b/cves/2024/56xxx/CVE-2024-56214.json @@ -0,0 +1,121 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-56214", + "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", + "state": "PUBLISHED", + "assignerShortName": "Patchstack", + "dateReserved": "2024-12-18T19:03:54.297Z", + "datePublished": "2024-12-31T10:01:33.191Z", + "dateUpdated": "2024-12-31T10:01:33.191Z" + }, + "containers": { + "cna": { + "affected": [ + { + "defaultStatus": "unaffected", + "product": "Userpro", + "vendor": "DeluxeThemes", + "versions": [ + { + "lessThanOrEqual": "5.1.9", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ] + } + ], + "credits": [ + { + "lang": "en", + "type": "finder", + "user": "00000000-0000-4000-9000-000000000000", + "value": "Rafie Muhammad (Patchstack)" + } + ], + "descriptions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Path Traversal: '.../...//' vulnerability in DeluxeThemes Userpro allows Path Traversal.

This issue affects Userpro: from n/a through 5.1.9.

" + } + ], + "value": "Path Traversal: '.../...//' vulnerability in DeluxeThemes Userpro allows Path Traversal.This issue affects Userpro: from n/a through 5.1.9." + } + ], + "impacts": [ + { + "capecId": "CAPEC-126", + "descriptions": [ + { + "lang": "en", + "value": "CAPEC-126 Path Traversal" + } + ] + } + ], + "metrics": [ + { + "cvssV3_1": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "version": "3.1" + }, + "format": "CVSS", + "scenarios": [ + { + "lang": "en", + "value": "GENERAL" + } + ] + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "cweId": "CWE-35", + "description": "CWE-35 Path Traversal: '.../...//'", + "lang": "en", + "type": "CWE" + } + ] + } + ], + "providerMetadata": { + "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", + "shortName": "Patchstack", + "dateUpdated": "2024-12-31T10:01:33.191Z" + }, + "references": [ + { + "tags": [ + "vdb-entry" + ], + "url": "https://patchstack.com/database/wordpress/plugin/userpro/vulnerability/wordpress-userpro-plugin-5-1-9-local-file-inclusion-vulnerability?_s_id=cve" + } + ], + "source": { + "discovery": "EXTERNAL" + }, + "title": "WordPress UserPro plugin <= 5.1.9 - Local File Inclusion vulnerability", + "x_generator": { + "engine": "Vulnogram 0.2.0" + } + } + } +} \ No newline at end of file diff --git a/cves/2024/56xxx/CVE-2024-56216.json b/cves/2024/56xxx/CVE-2024-56216.json new file mode 100644 index 000000000000..e81ae0fe15d2 --- /dev/null +++ b/cves/2024/56xxx/CVE-2024-56216.json @@ -0,0 +1,142 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-56216", + "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", + "state": "PUBLISHED", + "assignerShortName": "Patchstack", + "dateReserved": "2024-12-18T19:03:54.297Z", + "datePublished": "2024-12-31T09:59:08.138Z", + "dateUpdated": "2024-12-31T09:59:08.138Z" + }, + "containers": { + "cna": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "defaultStatus": "unaffected", + "packageName": "themify-builder", + "product": "Themify Builder", + "vendor": "Themify", + "versions": [ + { + "changes": [ + { + "at": "7.6.5", + "status": "unaffected" + } + ], + "lessThanOrEqual": "7.6.3", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ] + } + ], + "credits": [ + { + "lang": "en", + "type": "finder", + "user": "00000000-0000-4000-9000-000000000000", + "value": "João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance)" + } + ], + "descriptions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Themify Themify Builder allows PHP Local File Inclusion.

This issue affects Themify Builder: from n/a through 7.6.3.

" + } + ], + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Themify Themify Builder allows PHP Local File Inclusion.This issue affects Themify Builder: from n/a through 7.6.3." + } + ], + "impacts": [ + { + "capecId": "CAPEC-252", + "descriptions": [ + { + "lang": "en", + "value": "CAPEC-252 PHP Local File Inclusion" + } + ] + } + ], + "metrics": [ + { + "cvssV3_1": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1" + }, + "format": "CVSS", + "scenarios": [ + { + "lang": "en", + "value": "GENERAL" + } + ] + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "cweId": "CWE-98", + "description": "CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')", + "lang": "en", + "type": "CWE" + } + ] + } + ], + "providerMetadata": { + "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", + "shortName": "Patchstack", + "dateUpdated": "2024-12-31T09:59:08.138Z" + }, + "references": [ + { + "tags": [ + "vdb-entry" + ], + "url": "https://patchstack.com/database/wordpress/plugin/themify-builder/vulnerability/wordpress-themify-builder-plugin-7-6-3-local-file-inclusion-vulnerability?_s_id=cve" + } + ], + "solutions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update the WordPress Themify Builder plugin to the latest available version (at least 7.6.5)." + } + ], + "value": "Update the WordPress Themify Builder plugin to the latest available version (at least 7.6.5)." + } + ], + "source": { + "discovery": "EXTERNAL" + }, + "title": "WordPress Themify Builder plugin <= 7.6.3 - Local File Inclusion vulnerability", + "x_generator": { + "engine": "Vulnogram 0.2.0" + } + } + } +} \ No newline at end of file diff --git a/cves/2024/56xxx/CVE-2024-56230.json b/cves/2024/56xxx/CVE-2024-56230.json new file mode 100644 index 000000000000..f638bcba4887 --- /dev/null +++ b/cves/2024/56xxx/CVE-2024-56230.json @@ -0,0 +1,142 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-56230", + "assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", + "state": "PUBLISHED", + "assignerShortName": "Patchstack", + "dateReserved": "2024-12-18T19:04:02.340Z", + "datePublished": "2024-12-31T09:58:31.961Z", + "dateUpdated": "2024-12-31T09:58:31.961Z" + }, + "containers": { + "cna": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "defaultStatus": "unaffected", + "packageName": "dynamic-product-categories-design", + "product": "Dynamic Product Category Grid, Slider for WooCommerce", + "vendor": "Dynamic Web Lab", + "versions": [ + { + "changes": [ + { + "at": "1.1.4", + "status": "unaffected" + } + ], + "lessThanOrEqual": "1.1.3", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ] + } + ], + "credits": [ + { + "lang": "en", + "type": "finder", + "user": "00000000-0000-4000-9000-000000000000", + "value": "João Pedro Soares de Alcântara - Kinorth (Patchstack Alliance)" + } + ], + "descriptions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Dynamic Web Lab Dynamic Product Category Grid, Slider for WooCommerce allows PHP Local File Inclusion.

This issue affects Dynamic Product Category Grid, Slider for WooCommerce: from n/a through 1.1.3.

" + } + ], + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Dynamic Web Lab Dynamic Product Category Grid, Slider for WooCommerce allows PHP Local File Inclusion.This issue affects Dynamic Product Category Grid, Slider for WooCommerce: from n/a through 1.1.3." + } + ], + "impacts": [ + { + "capecId": "CAPEC-252", + "descriptions": [ + { + "lang": "en", + "value": "CAPEC-252 PHP Local File Inclusion" + } + ] + } + ], + "metrics": [ + { + "cvssV3_1": { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + }, + "format": "CVSS", + "scenarios": [ + { + "lang": "en", + "value": "GENERAL" + } + ] + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "cweId": "CWE-98", + "description": "CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')", + "lang": "en", + "type": "CWE" + } + ] + } + ], + "providerMetadata": { + "orgId": "21595511-bba5-4825-b968-b78d1f9984a3", + "shortName": "Patchstack", + "dateUpdated": "2024-12-31T09:58:31.961Z" + }, + "references": [ + { + "tags": [ + "vdb-entry" + ], + "url": "https://patchstack.com/database/wordpress/plugin/dynamic-product-categories-design/vulnerability/wordpress-dynamic-product-category-grid-slider-for-woocommerce-plugin-1-1-3-local-file-inclusion-vulnerability?_s_id=cve" + } + ], + "solutions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update the WordPress Dynamic Product Category Grid, Slider for WooCommerce plugin to the latest available version (at least 1.1.4)." + } + ], + "value": "Update the WordPress Dynamic Product Category Grid, Slider for WooCommerce plugin to the latest available version (at least 1.1.4)." + } + ], + "source": { + "discovery": "EXTERNAL" + }, + "title": "WordPress Dynamic Product Category Grid, Slider for WooCommerce plugin <= 1.1.3 - Local File Inclusion vulnerability", + "x_generator": { + "engine": "Vulnogram 0.2.0" + } + } + } +} \ No newline at end of file diff --git a/cves/delta.json b/cves/delta.json index 2d28d11b1289..93c940a07dd1 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,12 +1,42 @@ { - "fetchTime": "2024-12-31T09:06:31.838Z", - "numberOfChanges": 1, + "fetchTime": "2024-12-31T10:04:37.290Z", + "numberOfChanges": 6, "new": [ { - "cveId": "CVE-2024-13067", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-13067", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/13xxx/CVE-2024-13067.json", - "dateUpdated": "2024-12-31T09:00:52.751Z" + "cveId": "CVE-2024-56211", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56211", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56211.json", + "dateUpdated": "2024-12-31T10:03:12.435Z" + }, + { + "cveId": "CVE-2024-56212", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56212", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56212.json", + "dateUpdated": "2024-12-31T10:04:12.727Z" + }, + { + "cveId": "CVE-2024-56213", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56213", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56213.json", + "dateUpdated": "2024-12-31T10:02:21.132Z" + }, + { + "cveId": "CVE-2024-56214", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56214", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56214.json", + "dateUpdated": "2024-12-31T10:01:33.191Z" + }, + { + "cveId": "CVE-2024-56216", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56216", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56216.json", + "dateUpdated": "2024-12-31T09:59:08.138Z" + }, + { + "cveId": "CVE-2024-56230", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56230", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56230.json", + "dateUpdated": "2024-12-31T09:58:31.961Z" } ], "updated": [], diff --git a/cves/deltaLog.json b/cves/deltaLog.json index 084b7b41d66e..11dc7b6cfd21 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,48 @@ [ + { + "fetchTime": "2024-12-31T10:04:37.290Z", + "numberOfChanges": 6, + "new": [ + { + "cveId": "CVE-2024-56211", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56211", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56211.json", + "dateUpdated": "2024-12-31T10:03:12.435Z" + }, + { + "cveId": "CVE-2024-56212", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56212", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56212.json", + "dateUpdated": "2024-12-31T10:04:12.727Z" + }, + { + "cveId": "CVE-2024-56213", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56213", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56213.json", + "dateUpdated": "2024-12-31T10:02:21.132Z" + }, + { + "cveId": "CVE-2024-56214", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56214", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56214.json", + "dateUpdated": "2024-12-31T10:01:33.191Z" + }, + { + "cveId": "CVE-2024-56216", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56216", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56216.json", + "dateUpdated": "2024-12-31T09:59:08.138Z" + }, + { + "cveId": "CVE-2024-56230", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56230", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56230.json", + "dateUpdated": "2024-12-31T09:58:31.961Z" + } + ], + "updated": [], + "error": [] + }, { "fetchTime": "2024-12-31T09:06:31.838Z", "numberOfChanges": 1,