diff --git a/cves/2017/13xxx/CVE-2017-13322.json b/cves/2017/13xxx/CVE-2017-13322.json
new file mode 100644
index 000000000000..c4e2c7aed404
--- /dev/null
+++ b/cves/2017/13xxx/CVE-2017-13322.json
@@ -0,0 +1,93 @@
+{
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.1",
+ "cveMetadata": {
+ "cveId": "CVE-2017-13322",
+ "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
+ "state": "PUBLISHED",
+ "assignerShortName": "google_android",
+ "dateReserved": "2017-08-23T00:00:00.000Z",
+ "datePublished": "2025-01-17T23:06:15.618Z",
+ "dateUpdated": "2025-01-17T23:06:15.618Z"
+ },
+ "containers": {
+ "cna": {
+ "affected": [
+ {
+ "defaultStatus": "unaffected",
+ "product": "Android",
+ "vendor": "Google",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "Android Kernel"
+ }
+ ]
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "In endCallForSubscriber of PhoneInterfaceManager.java, there is a possible way to prevent access to emergency services due to a logic error in the code. This could lead to a local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "value": "In endCallForSubscriber of PhoneInterfaceManager.java, there is a possible way to prevent access to emergency services due to a logic error in the code. This could lead to a local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "metrics": [
+ {
+ "cvssV4_0": {
+ "Automatable": "NOT_DEFINED",
+ "Recovery": "NOT_DEFINED",
+ "Safety": "NOT_DEFINED",
+ "attackComplexity": "LOW",
+ "attackRequirements": "NONE",
+ "attackVector": "NETWORK",
+ "baseScore": 10,
+ "baseSeverity": "CRITICAL",
+ "privilegesRequired": "NONE",
+ "providerUrgency": "NOT_DEFINED",
+ "subAvailabilityImpact": "HIGH",
+ "subConfidentialityImpact": "HIGH",
+ "subIntegrityImpact": "HIGH",
+ "userInteraction": "NONE",
+ "valueDensity": "NOT_DEFINED",
+ "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
+ "version": "4.0",
+ "vulnAvailabilityImpact": "HIGH",
+ "vulnConfidentialityImpact": "HIGH",
+ "vulnIntegrityImpact": "HIGH",
+ "vulnerabilityResponseEffort": "NOT_DEFINED"
+ },
+ "format": "CVSS",
+ "scenarios": [
+ {
+ "lang": "en",
+ "value": "GENERAL"
+ }
+ ]
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
+ "shortName": "google_android",
+ "dateUpdated": "2025-01-17T23:06:15.618Z"
+ },
+ "references": [
+ {
+ "url": "https://source.android.com/security/bulletin/pixel/2018-05-01"
+ }
+ ],
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.2.0"
+ }
+ }
+ }
+}
\ No newline at end of file
diff --git a/cves/2018/9xxx/CVE-2018-9375.json b/cves/2018/9xxx/CVE-2018-9375.json
new file mode 100644
index 000000000000..e9132ebc18e4
--- /dev/null
+++ b/cves/2018/9xxx/CVE-2018-9375.json
@@ -0,0 +1,59 @@
+{
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.1",
+ "cveMetadata": {
+ "cveId": "CVE-2018-9375",
+ "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
+ "state": "PUBLISHED",
+ "assignerShortName": "google_android",
+ "dateReserved": "2018-04-05T00:00:00.000Z",
+ "datePublished": "2025-01-17T23:07:14.793Z",
+ "dateUpdated": "2025-01-17T23:07:14.793Z"
+ },
+ "containers": {
+ "cna": {
+ "affected": [
+ {
+ "defaultStatus": "unaffected",
+ "product": "Android",
+ "vendor": "Google",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "Android Kernel"
+ }
+ ]
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "In multiple functions of UserDictionaryProvider.java, there is a possible way to add and delete words in the user dictionary due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
"
+ }
+ ],
+ "value": "In multiple functions of UserDictionaryProvider.java, there is a possible way to add and delete words in the user dictionary due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
+ "shortName": "google_android",
+ "dateUpdated": "2025-01-17T23:07:14.793Z"
+ },
+ "references": [
+ {
+ "url": "https://source.android.com/security/bulletin/pixel/2018-06-01"
+ }
+ ],
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.2.0"
+ }
+ }
+ }
+}
\ No newline at end of file
diff --git a/cves/2018/9xxx/CVE-2018-9377.json b/cves/2018/9xxx/CVE-2018-9377.json
index c237011f6e44..31ddab4eabfc 100644
--- a/cves/2018/9xxx/CVE-2018-9377.json
+++ b/cves/2018/9xxx/CVE-2018-9377.json
@@ -8,7 +8,7 @@
"assignerShortName": "google_android",
"dateReserved": "2018-04-05T00:00:00.000Z",
"datePublished": "2024-11-28T00:23:14.763Z",
- "dateUpdated": "2024-11-29T21:15:13.647Z"
+ "dateUpdated": "2025-01-17T23:08:41.086Z"
},
"containers": {
"cna": {
@@ -56,16 +56,16 @@
{
"base64": false,
"type": "text/html",
- "value": "In BnAudioPolicyService::onTransact of IAudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
"
+ "value": "In getIntentForIntentSender of ActivityManagerService.java, there is a possible way to access user metadata due to a pending intent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
"
}
],
- "value": "In BnAudioPolicyService::onTransact of IAudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
+ "value": "In getIntentForIntentSender of ActivityManagerService.java, there is a possible way to access user metadata due to a pending intent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"providerMetadata": {
"orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
"shortName": "google_android",
- "dateUpdated": "2024-11-28T00:23:14.763Z"
+ "dateUpdated": "2025-01-17T23:08:41.086Z"
},
"references": [
{
diff --git a/cves/2018/9xxx/CVE-2018-9379.json b/cves/2018/9xxx/CVE-2018-9379.json
new file mode 100644
index 000000000000..a86147bc75af
--- /dev/null
+++ b/cves/2018/9xxx/CVE-2018-9379.json
@@ -0,0 +1,59 @@
+{
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.1",
+ "cveMetadata": {
+ "cveId": "CVE-2018-9379",
+ "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
+ "state": "PUBLISHED",
+ "assignerShortName": "google_android",
+ "dateReserved": "2018-04-05T00:00:00.000Z",
+ "datePublished": "2025-01-17T23:09:39.761Z",
+ "dateUpdated": "2025-01-17T23:09:39.761Z"
+ },
+ "containers": {
+ "cna": {
+ "affected": [
+ {
+ "defaultStatus": "unaffected",
+ "product": "Android",
+ "vendor": "Google",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "Android Kernel"
+ }
+ ]
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "In multiple functions of MiniThumbFile.java, there is a possible way to view the thumbnails of deleted photos due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
"
+ }
+ ],
+ "value": "In multiple functions of MiniThumbFile.java, there is a possible way to view the thumbnails of deleted photos due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
+ "shortName": "google_android",
+ "dateUpdated": "2025-01-17T23:09:39.761Z"
+ },
+ "references": [
+ {
+ "url": "https://source.android.com/security/bulletin/pixel/2018-06-01"
+ }
+ ],
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.2.0"
+ }
+ }
+ }
+}
\ No newline at end of file
diff --git a/cves/2018/9xxx/CVE-2018-9382.json b/cves/2018/9xxx/CVE-2018-9382.json
new file mode 100644
index 000000000000..61e7ec1b94df
--- /dev/null
+++ b/cves/2018/9xxx/CVE-2018-9382.json
@@ -0,0 +1,59 @@
+{
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.1",
+ "cveMetadata": {
+ "cveId": "CVE-2018-9382",
+ "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
+ "state": "PUBLISHED",
+ "assignerShortName": "google_android",
+ "dateReserved": "2018-04-05T00:00:00.000Z",
+ "datePublished": "2025-01-17T23:10:28.749Z",
+ "dateUpdated": "2025-01-17T23:10:28.749Z"
+ },
+ "containers": {
+ "cna": {
+ "affected": [
+ {
+ "defaultStatus": "unaffected",
+ "product": "Android",
+ "vendor": "Google",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "Android Kernel"
+ }
+ ]
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "In multiple functions of WifiServiceImpl.java, there is a possible way to activate Wi-Fi hotspot from a non-owner profile due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
"
+ }
+ ],
+ "value": "In multiple functions of WifiServiceImpl.java, there is a possible way to activate Wi-Fi hotspot from a non-owner profile due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
+ "shortName": "google_android",
+ "dateUpdated": "2025-01-17T23:10:28.749Z"
+ },
+ "references": [
+ {
+ "url": "https://source.android.com/security/bulletin/pixel/2018-06-01"
+ }
+ ],
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.2.0"
+ }
+ }
+ }
+}
\ No newline at end of file
diff --git a/cves/2018/9xxx/CVE-2018-9384.json b/cves/2018/9xxx/CVE-2018-9384.json
new file mode 100644
index 000000000000..066fd1bd0042
--- /dev/null
+++ b/cves/2018/9xxx/CVE-2018-9384.json
@@ -0,0 +1,59 @@
+{
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.1",
+ "cveMetadata": {
+ "cveId": "CVE-2018-9384",
+ "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
+ "state": "PUBLISHED",
+ "assignerShortName": "google_android",
+ "dateReserved": "2018-04-05T00:00:00.000Z",
+ "datePublished": "2025-01-17T23:04:49.336Z",
+ "dateUpdated": "2025-01-17T23:04:49.336Z"
+ },
+ "containers": {
+ "cna": {
+ "affected": [
+ {
+ "defaultStatus": "unaffected",
+ "product": "Android",
+ "vendor": "Google",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "Android Kernel"
+ }
+ ]
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "In multiple locations, there is a possible way to bypass KASLR due to an unusual root cause. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
"
+ }
+ ],
+ "value": "In multiple locations, there is a possible way to bypass KASLR due to an unusual root cause. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
+ "shortName": "google_android",
+ "dateUpdated": "2025-01-17T23:04:49.336Z"
+ },
+ "references": [
+ {
+ "url": "https://source.android.com/security/bulletin/pixel/2018-06-01"
+ }
+ ],
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.2.0"
+ }
+ }
+ }
+}
\ No newline at end of file
diff --git a/cves/2018/9xxx/CVE-2018-9434.json b/cves/2018/9xxx/CVE-2018-9434.json
new file mode 100644
index 000000000000..0c5e611eaa6f
--- /dev/null
+++ b/cves/2018/9xxx/CVE-2018-9434.json
@@ -0,0 +1,59 @@
+{
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.1",
+ "cveMetadata": {
+ "cveId": "CVE-2018-9434",
+ "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
+ "state": "PUBLISHED",
+ "assignerShortName": "google_android",
+ "dateReserved": "2018-04-05T00:00:00.000Z",
+ "datePublished": "2025-01-17T23:11:16.145Z",
+ "dateUpdated": "2025-01-17T23:11:16.145Z"
+ },
+ "containers": {
+ "cna": {
+ "affected": [
+ {
+ "defaultStatus": "unaffected",
+ "product": "Android",
+ "vendor": "Google",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "Android Kernel"
+ }
+ ]
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "In multiple functions of Parcel.cpp, there is a possible way to bypass address space layout randomization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
"
+ }
+ ],
+ "value": "In multiple functions of Parcel.cpp, there is a possible way to bypass address space layout randomization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
+ "shortName": "google_android",
+ "dateUpdated": "2025-01-17T23:11:16.145Z"
+ },
+ "references": [
+ {
+ "url": "https://source.android.com/security/bulletin/pixel/2018-07-01"
+ }
+ ],
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.2.0"
+ }
+ }
+ }
+}
\ No newline at end of file
diff --git a/cves/2018/9xxx/CVE-2018-9447.json b/cves/2018/9xxx/CVE-2018-9447.json
new file mode 100644
index 000000000000..687df6be65e8
--- /dev/null
+++ b/cves/2018/9xxx/CVE-2018-9447.json
@@ -0,0 +1,59 @@
+{
+ "dataType": "CVE_RECORD",
+ "dataVersion": "5.1",
+ "cveMetadata": {
+ "cveId": "CVE-2018-9447",
+ "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
+ "state": "PUBLISHED",
+ "assignerShortName": "google_android",
+ "dateReserved": "2018-04-05T00:00:00.000Z",
+ "datePublished": "2025-01-17T23:12:29.500Z",
+ "dateUpdated": "2025-01-17T23:12:29.500Z"
+ },
+ "containers": {
+ "cna": {
+ "affected": [
+ {
+ "defaultStatus": "unaffected",
+ "product": "Android",
+ "vendor": "Google",
+ "versions": [
+ {
+ "status": "affected",
+ "version": "Android Kernel"
+ }
+ ]
+ }
+ ],
+ "descriptions": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "In onCreate of EmergencyCallbackModeExitDialog.java, there is a possible way to crash the emergency callback mode due to a missing null check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
"
+ }
+ ],
+ "value": "In onCreate of EmergencyCallbackModeExitDialog.java, there is a possible way to crash the emergency callback mode due to a missing null check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation."
+ }
+ ],
+ "providerMetadata": {
+ "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6",
+ "shortName": "google_android",
+ "dateUpdated": "2025-01-17T23:12:29.500Z"
+ },
+ "references": [
+ {
+ "url": "https://source.android.com/security/bulletin/pixel/2018-08-01"
+ }
+ ],
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "x_generator": {
+ "engine": "Vulnogram 0.2.0"
+ }
+ }
+ }
+}
\ No newline at end of file
diff --git a/cves/delta.json b/cves/delta.json
index fed3cd1fc047..5d65480c36c6 100644
--- a/cves/delta.json
+++ b/cves/delta.json
@@ -1,26 +1,56 @@
{
- "fetchTime": "2025-01-17T23:04:27.526Z",
- "numberOfChanges": 3,
+ "fetchTime": "2025-01-17T23:13:13.892Z",
+ "numberOfChanges": 8,
"new": [
{
- "cveId": "CVE-2018-9383",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9383",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9383.json",
- "dateUpdated": "2025-01-17T23:03:54.771Z"
+ "cveId": "CVE-2017-13322",
+ "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2017-13322",
+ "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2017/13xxx/CVE-2017-13322.json",
+ "dateUpdated": "2025-01-17T23:06:15.618Z"
},
{
- "cveId": "CVE-2022-20128",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-20128",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/20xxx/CVE-2022-20128.json",
- "dateUpdated": "2025-01-17T22:57:20.590Z"
+ "cveId": "CVE-2018-9375",
+ "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9375",
+ "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9375.json",
+ "dateUpdated": "2025-01-17T23:07:14.793Z"
+ },
+ {
+ "cveId": "CVE-2018-9379",
+ "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9379",
+ "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9379.json",
+ "dateUpdated": "2025-01-17T23:09:39.761Z"
+ },
+ {
+ "cveId": "CVE-2018-9382",
+ "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9382",
+ "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9382.json",
+ "dateUpdated": "2025-01-17T23:10:28.749Z"
+ },
+ {
+ "cveId": "CVE-2018-9384",
+ "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9384",
+ "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9384.json",
+ "dateUpdated": "2025-01-17T23:04:49.336Z"
+ },
+ {
+ "cveId": "CVE-2018-9434",
+ "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9434",
+ "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9434.json",
+ "dateUpdated": "2025-01-17T23:11:16.145Z"
+ },
+ {
+ "cveId": "CVE-2018-9447",
+ "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9447",
+ "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9447.json",
+ "dateUpdated": "2025-01-17T23:12:29.500Z"
}
],
"updated": [
{
- "cveId": "CVE-2021-0937",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-0937",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/0xxx/CVE-2021-0937.json",
- "dateUpdated": "2025-01-17T22:57:40.070Z"
+ "cveId": "CVE-2018-9377",
+ "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9377",
+ "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9377.json",
+ "dateUpdated": "2025-01-17T23:08:41.086Z"
}
],
"error": []
diff --git a/cves/deltaLog.json b/cves/deltaLog.json
index 258b0b366511..709799877865 100644
--- a/cves/deltaLog.json
+++ b/cves/deltaLog.json
@@ -1,4 +1,61 @@
[
+ {
+ "fetchTime": "2025-01-17T23:13:13.892Z",
+ "numberOfChanges": 8,
+ "new": [
+ {
+ "cveId": "CVE-2017-13322",
+ "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2017-13322",
+ "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2017/13xxx/CVE-2017-13322.json",
+ "dateUpdated": "2025-01-17T23:06:15.618Z"
+ },
+ {
+ "cveId": "CVE-2018-9375",
+ "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9375",
+ "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9375.json",
+ "dateUpdated": "2025-01-17T23:07:14.793Z"
+ },
+ {
+ "cveId": "CVE-2018-9379",
+ "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9379",
+ "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9379.json",
+ "dateUpdated": "2025-01-17T23:09:39.761Z"
+ },
+ {
+ "cveId": "CVE-2018-9382",
+ "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9382",
+ "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9382.json",
+ "dateUpdated": "2025-01-17T23:10:28.749Z"
+ },
+ {
+ "cveId": "CVE-2018-9384",
+ "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9384",
+ "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9384.json",
+ "dateUpdated": "2025-01-17T23:04:49.336Z"
+ },
+ {
+ "cveId": "CVE-2018-9434",
+ "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9434",
+ "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9434.json",
+ "dateUpdated": "2025-01-17T23:11:16.145Z"
+ },
+ {
+ "cveId": "CVE-2018-9447",
+ "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9447",
+ "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9447.json",
+ "dateUpdated": "2025-01-17T23:12:29.500Z"
+ }
+ ],
+ "updated": [
+ {
+ "cveId": "CVE-2018-9377",
+ "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9377",
+ "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9377.json",
+ "dateUpdated": "2025-01-17T23:08:41.086Z"
+ }
+ ],
+ "error": []
+ },
{
"fetchTime": "2025-01-17T23:04:27.526Z",
"numberOfChanges": 3,
@@ -130817,476 +130874,5 @@
}
],
"error": []
- },
- {
- "fetchTime": "2024-12-18T23:13:07.247Z",
- "numberOfChanges": 77,
- "new": [
- {
- "cveId": "CVE-2024-56317",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56317",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56317.json",
- "dateUpdated": "2024-12-18T23:12:42.400Z"
- },
- {
- "cveId": "CVE-2024-56318",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56318",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56318.json",
- "dateUpdated": "2024-12-18T23:12:18.482810"
- }
- ],
- "updated": [
- {
- "cveId": "CVE-2024-43594",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43594",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43594.json",
- "dateUpdated": "2024-12-18T23:08:05.847Z"
- },
- {
- "cveId": "CVE-2024-43600",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43600",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43600.json",
- "dateUpdated": "2024-12-18T23:07:49.208Z"
- },
- {
- "cveId": "CVE-2024-49041",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49041",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49041.json",
- "dateUpdated": "2024-12-18T23:08:02.580Z"
- },
- {
- "cveId": "CVE-2024-49057",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49057",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49057.json",
- "dateUpdated": "2024-12-18T23:07:24.256Z"
- },
- {
- "cveId": "CVE-2024-49059",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49059",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49059.json",
- "dateUpdated": "2024-12-18T23:07:25.084Z"
- },
- {
- "cveId": "CVE-2024-49062",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49062",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49062.json",
- "dateUpdated": "2024-12-18T23:07:49.729Z"
- },
- {
- "cveId": "CVE-2024-49063",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49063",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49063.json",
- "dateUpdated": "2024-12-18T23:07:50.175Z"
- },
- {
- "cveId": "CVE-2024-49064",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49064",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49064.json",
- "dateUpdated": "2024-12-18T23:07:25.794Z"
- },
- {
- "cveId": "CVE-2024-49065",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49065",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49065.json",
- "dateUpdated": "2024-12-18T23:07:50.714Z"
- },
- {
- "cveId": "CVE-2024-49068",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49068",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49068.json",
- "dateUpdated": "2024-12-18T23:08:04.408Z"
- },
- {
- "cveId": "CVE-2024-49069",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49069",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49069.json",
- "dateUpdated": "2024-12-18T23:07:26.385Z"
- },
- {
- "cveId": "CVE-2024-49070",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49070",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49070.json",
- "dateUpdated": "2024-12-18T23:07:26.929Z"
- },
- {
- "cveId": "CVE-2024-49071",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49071",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49071.json",
- "dateUpdated": "2024-12-18T23:08:03.318Z"
- },
- {
- "cveId": "CVE-2024-49072",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49072",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49072.json",
- "dateUpdated": "2024-12-18T23:07:51.222Z"
- },
- {
- "cveId": "CVE-2024-49073",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49073",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49073.json",
- "dateUpdated": "2024-12-18T23:07:27.490Z"
- },
- {
- "cveId": "CVE-2024-49074",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49074",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49074.json",
- "dateUpdated": "2024-12-18T23:07:28.214Z"
- },
- {
- "cveId": "CVE-2024-49075",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49075",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49075.json",
- "dateUpdated": "2024-12-18T23:07:51.805Z"
- },
- {
- "cveId": "CVE-2024-49076",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49076",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49076.json",
- "dateUpdated": "2024-12-18T23:07:52.253Z"
- },
- {
- "cveId": "CVE-2024-49077",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49077",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49077.json",
- "dateUpdated": "2024-12-18T23:07:52.871Z"
- },
- {
- "cveId": "CVE-2024-49078",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49078",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49078.json",
- "dateUpdated": "2024-12-18T23:07:53.472Z"
- },
- {
- "cveId": "CVE-2024-49079",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49079",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49079.json",
- "dateUpdated": "2024-12-18T23:07:53.915Z"
- },
- {
- "cveId": "CVE-2024-49080",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49080",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49080.json",
- "dateUpdated": "2024-12-18T23:07:54.534Z"
- },
- {
- "cveId": "CVE-2024-49081",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49081",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49081.json",
- "dateUpdated": "2024-12-18T23:07:55.211Z"
- },
- {
- "cveId": "CVE-2024-49082",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49082",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49082.json",
- "dateUpdated": "2024-12-18T23:07:55.817Z"
- },
- {
- "cveId": "CVE-2024-49083",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49083",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49083.json",
- "dateUpdated": "2024-12-18T23:07:56.333Z"
- },
- {
- "cveId": "CVE-2024-49084",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49084",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49084.json",
- "dateUpdated": "2024-12-18T23:07:28.969Z"
- },
- {
- "cveId": "CVE-2024-49085",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49085",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49085.json",
- "dateUpdated": "2024-12-18T23:07:29.515Z"
- },
- {
- "cveId": "CVE-2024-49086",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49086",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49086.json",
- "dateUpdated": "2024-12-18T23:07:30.194Z"
- },
- {
- "cveId": "CVE-2024-49087",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49087",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49087.json",
- "dateUpdated": "2024-12-18T23:07:30.787Z"
- },
- {
- "cveId": "CVE-2024-49088",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49088",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49088.json",
- "dateUpdated": "2024-12-18T23:07:56.815Z"
- },
- {
- "cveId": "CVE-2024-49089",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49089",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49089.json",
- "dateUpdated": "2024-12-18T23:07:31.886Z"
- },
- {
- "cveId": "CVE-2024-49090",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49090",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49090.json",
- "dateUpdated": "2024-12-18T23:07:57.447Z"
- },
- {
- "cveId": "CVE-2024-49091",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49091",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49091.json",
- "dateUpdated": "2024-12-18T23:07:32.355Z"
- },
- {
- "cveId": "CVE-2024-49092",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49092",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49092.json",
- "dateUpdated": "2024-12-18T23:07:32.856Z"
- },
- {
- "cveId": "CVE-2024-49093",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49093",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49093.json",
- "dateUpdated": "2024-12-18T23:07:33.400Z"
- },
- {
- "cveId": "CVE-2024-49094",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49094",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49094.json",
- "dateUpdated": "2024-12-18T23:07:33.863Z"
- },
- {
- "cveId": "CVE-2024-49095",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49095",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49095.json",
- "dateUpdated": "2024-12-18T23:07:57.964Z"
- },
- {
- "cveId": "CVE-2024-49096",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49096",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49096.json",
- "dateUpdated": "2024-12-18T23:07:34.326Z"
- },
- {
- "cveId": "CVE-2024-49097",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49097",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49097.json",
- "dateUpdated": "2024-12-18T23:07:34.978Z"
- },
- {
- "cveId": "CVE-2024-49098",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49098",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49098.json",
- "dateUpdated": "2024-12-18T23:07:35.428Z"
- },
- {
- "cveId": "CVE-2024-49099",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49099",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49099.json",
- "dateUpdated": "2024-12-18T23:07:35.959Z"
- },
- {
- "cveId": "CVE-2024-49101",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49101",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49101.json",
- "dateUpdated": "2024-12-18T23:07:36.505Z"
- },
- {
- "cveId": "CVE-2024-49102",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49102",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49102.json",
- "dateUpdated": "2024-12-18T23:07:36.962Z"
- },
- {
- "cveId": "CVE-2024-49103",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49103",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49103.json",
- "dateUpdated": "2024-12-18T23:07:37.480Z"
- },
- {
- "cveId": "CVE-2024-49104",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49104",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49104.json",
- "dateUpdated": "2024-12-18T23:07:38.124Z"
- },
- {
- "cveId": "CVE-2024-49105",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49105",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49105.json",
- "dateUpdated": "2024-12-18T23:07:38.693Z"
- },
- {
- "cveId": "CVE-2024-49106",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49106",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49106.json",
- "dateUpdated": "2024-12-18T23:07:39.319Z"
- },
- {
- "cveId": "CVE-2024-49107",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49107",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49107.json",
- "dateUpdated": "2024-12-18T23:07:39.794Z"
- },
- {
- "cveId": "CVE-2024-49108",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49108",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49108.json",
- "dateUpdated": "2024-12-18T23:07:40.553Z"
- },
- {
- "cveId": "CVE-2024-49109",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49109",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49109.json",
- "dateUpdated": "2024-12-18T23:08:03.856Z"
- },
- {
- "cveId": "CVE-2024-49110",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49110",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49110.json",
- "dateUpdated": "2024-12-18T23:07:58.493Z"
- },
- {
- "cveId": "CVE-2024-49111",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49111",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49111.json",
- "dateUpdated": "2024-12-18T23:07:41.053Z"
- },
- {
- "cveId": "CVE-2024-49112",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49112",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49112.json",
- "dateUpdated": "2024-12-18T23:07:59.007Z"
- },
- {
- "cveId": "CVE-2024-49113",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49113",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49113.json",
- "dateUpdated": "2024-12-18T23:07:59.607Z"
- },
- {
- "cveId": "CVE-2024-49114",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49114",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49114.json",
- "dateUpdated": "2024-12-18T23:08:00.197Z"
- },
- {
- "cveId": "CVE-2024-49115",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49115",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49115.json",
- "dateUpdated": "2024-12-18T23:07:41.626Z"
- },
- {
- "cveId": "CVE-2024-49116",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49116",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49116.json",
- "dateUpdated": "2024-12-18T23:08:04.862Z"
- },
- {
- "cveId": "CVE-2024-49117",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49117",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49117.json",
- "dateUpdated": "2024-12-18T23:07:42.191Z"
- },
- {
- "cveId": "CVE-2024-49118",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49118",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49118.json",
- "dateUpdated": "2024-12-18T23:08:00.846Z"
- },
- {
- "cveId": "CVE-2024-49119",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49119",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49119.json",
- "dateUpdated": "2024-12-18T23:07:42.775Z"
- },
- {
- "cveId": "CVE-2024-49120",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49120",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49120.json",
- "dateUpdated": "2024-12-18T23:07:43.277Z"
- },
- {
- "cveId": "CVE-2024-49121",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49121",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49121.json",
- "dateUpdated": "2024-12-18T23:07:43.878Z"
- },
- {
- "cveId": "CVE-2024-49122",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49122",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49122.json",
- "dateUpdated": "2024-12-18T23:07:44.351Z"
- },
- {
- "cveId": "CVE-2024-49123",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49123",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49123.json",
- "dateUpdated": "2024-12-18T23:07:44.872Z"
- },
- {
- "cveId": "CVE-2024-49124",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49124",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49124.json",
- "dateUpdated": "2024-12-18T23:07:45.568Z"
- },
- {
- "cveId": "CVE-2024-49125",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49125",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49125.json",
- "dateUpdated": "2024-12-18T23:07:46.196Z"
- },
- {
- "cveId": "CVE-2024-49126",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49126",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49126.json",
- "dateUpdated": "2024-12-18T23:07:46.750Z"
- },
- {
- "cveId": "CVE-2024-49127",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49127",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49127.json",
- "dateUpdated": "2024-12-18T23:08:01.384Z"
- },
- {
- "cveId": "CVE-2024-49128",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49128",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49128.json",
- "dateUpdated": "2024-12-18T23:08:05.397Z"
- },
- {
- "cveId": "CVE-2024-49129",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49129",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49129.json",
- "dateUpdated": "2024-12-18T23:07:47.275Z"
- },
- {
- "cveId": "CVE-2024-49132",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49132",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49132.json",
- "dateUpdated": "2024-12-18T23:07:47.744Z"
- },
- {
- "cveId": "CVE-2024-49138",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49138",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49138.json",
- "dateUpdated": "2024-12-18T23:08:02.013Z"
- },
- {
- "cveId": "CVE-2024-49142",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49142",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49142.json",
- "dateUpdated": "2024-12-18T23:07:48.197Z"
- },
- {
- "cveId": "CVE-2024-49147",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49147",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49147.json",
- "dateUpdated": "2024-12-18T23:07:48.709Z"
- },
- {
- "cveId": "CVE-2024-56319",
- "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56319",
- "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56319.json",
- "dateUpdated": "2024-12-18T23:08:25.725Z"
- }
- ],
- "error": []
}
]
\ No newline at end of file