From 1ac2b1847e29ccc7ee984374560ce4141c8af916 Mon Sep 17 00:00:00 2001 From: cvelistV5 Github Action Date: Thu, 7 Mar 2024 23:29:48 +0000 Subject: [PATCH] 1 changes (1 new | 0 updated): - 1 new CVEs: CVE-2024-25327 - 0 updated CVEs: --- cves/2024/25xxx/CVE-2024-25327.json | 56 +++++++++++++++++++++++++++++ cves/delta.json | 10 +++--- cves/deltaLog.json | 34 ++++++++---------- 3 files changed, 75 insertions(+), 25 deletions(-) create mode 100644 cves/2024/25xxx/CVE-2024-25327.json diff --git a/cves/2024/25xxx/CVE-2024-25327.json b/cves/2024/25xxx/CVE-2024-25327.json new file mode 100644 index 000000000000..4f3f2093abce --- /dev/null +++ b/cves/2024/25xxx/CVE-2024-25327.json @@ -0,0 +1,56 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.0", + "cveMetadata": { + "state": "PUBLISHED", + "cveId": "CVE-2024-25327", + "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "assignerShortName": "mitre", + "dateUpdated": "2024-03-07T23:24:37.711995", + "dateReserved": "2024-02-07T00:00:00", + "datePublished": "2024-03-07T00:00:00" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "shortName": "mitre", + "dateUpdated": "2024-03-07T23:24:37.711995" + }, + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting (XSS) vulnerability in Justice Systems FullCourt Enterprise v.8.2 allows a remote attacker to execute arbitrary code via the formatCaseNumber parameter of the Citation search function." + } + ], + "affected": [ + { + "vendor": "n/a", + "product": "n/a", + "versions": [ + { + "version": "n/a", + "status": "affected" + } + ] + } + ], + "references": [ + { + "url": "https://packetstormsecurity.com/files/177500/FullCourt-Enterprise-8.2-Cross-Site-Scripting.html" + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "type": "text", + "lang": "en", + "description": "n/a" + } + ] + } + ] + } + } +} \ No newline at end of file diff --git a/cves/delta.json b/cves/delta.json index 2fe64627dfbf..166ad2d2ae05 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,12 +1,12 @@ { - "fetchTime": "2024-03-07T23:16:29.553Z", + "fetchTime": "2024-03-07T23:29:45.858Z", "numberOfChanges": 1, "new": [ { - "cveId": "CVE-2024-25729", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-25729", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/25xxx/CVE-2024-25729.json", - "dateUpdated": "2024-03-07T23:09:53.862582" + "cveId": "CVE-2024-25327", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-25327", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/25xxx/CVE-2024-25327.json", + "dateUpdated": "2024-03-07T23:24:37.711995" } ], "updated": [], diff --git a/cves/deltaLog.json b/cves/deltaLog.json index d09e1c1321bd..146312b3f136 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,18 @@ [ + { + "fetchTime": "2024-03-07T23:29:45.858Z", + "numberOfChanges": 1, + "new": [ + { + "cveId": "CVE-2024-25327", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-25327", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/25xxx/CVE-2024-25327.json", + "dateUpdated": "2024-03-07T23:24:37.711995" + } + ], + "updated": [], + "error": [] + }, { "fetchTime": "2024-03-07T23:16:29.553Z", "numberOfChanges": 1, @@ -45313,25 +45327,5 @@ } ], "error": [] - }, - { - "fetchTime": "2024-02-06T23:20:10.614Z", - "numberOfChanges": 2, - "new": [ - { - "cveId": "CVE-2024-1283", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-1283", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/1xxx/CVE-2024-1283.json", - "dateUpdated": "2024-02-06T23:15:13.752Z" - }, - { - "cveId": "CVE-2024-1284", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-1284", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/1xxx/CVE-2024-1284.json", - "dateUpdated": "2024-02-06T23:15:13.358Z" - } - ], - "updated": [], - "error": [] } ] \ No newline at end of file