From 374a7c6c25d4921b805f8401f5076b9b9406f438 Mon Sep 17 00:00:00 2001 From: cvelistV5 Github Action Date: Fri, 17 Jan 2025 23:13:25 +0000 Subject: [PATCH] 8 changes (7 new | 1 updated): - 7 new CVEs: CVE-2017-13322, CVE-2018-9375, CVE-2018-9379, CVE-2018-9382, CVE-2018-9384, CVE-2018-9434, CVE-2018-9447 - 1 updated CVEs: CVE-2018-9377 --- cves/2017/13xxx/CVE-2017-13322.json | 93 +++++ cves/2018/9xxx/CVE-2018-9375.json | 59 ++++ cves/2018/9xxx/CVE-2018-9377.json | 8 +- cves/2018/9xxx/CVE-2018-9379.json | 59 ++++ cves/2018/9xxx/CVE-2018-9382.json | 59 ++++ cves/2018/9xxx/CVE-2018-9384.json | 59 ++++ cves/2018/9xxx/CVE-2018-9434.json | 59 ++++ cves/2018/9xxx/CVE-2018-9447.json | 59 ++++ cves/delta.json | 58 ++- cves/deltaLog.json | 528 +++------------------------- 10 files changed, 552 insertions(+), 489 deletions(-) create mode 100644 cves/2017/13xxx/CVE-2017-13322.json create mode 100644 cves/2018/9xxx/CVE-2018-9375.json create mode 100644 cves/2018/9xxx/CVE-2018-9379.json create mode 100644 cves/2018/9xxx/CVE-2018-9382.json create mode 100644 cves/2018/9xxx/CVE-2018-9384.json create mode 100644 cves/2018/9xxx/CVE-2018-9434.json create mode 100644 cves/2018/9xxx/CVE-2018-9447.json diff --git a/cves/2017/13xxx/CVE-2017-13322.json b/cves/2017/13xxx/CVE-2017-13322.json new file mode 100644 index 000000000000..c4e2c7aed404 --- /dev/null +++ b/cves/2017/13xxx/CVE-2017-13322.json @@ -0,0 +1,93 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2017-13322", + "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "state": "PUBLISHED", + "assignerShortName": "google_android", + "dateReserved": "2017-08-23T00:00:00.000Z", + "datePublished": "2025-01-17T23:06:15.618Z", + "dateUpdated": "2025-01-17T23:06:15.618Z" + }, + "containers": { + "cna": { + "affected": [ + { + "defaultStatus": "unaffected", + "product": "Android", + "vendor": "Google", + "versions": [ + { + "status": "affected", + "version": "Android Kernel" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "In endCallForSubscriber of PhoneInterfaceManager.java, there is a possible way to prevent access to emergency services due to a logic error in the code. This could lead to a local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "value": "In endCallForSubscriber of PhoneInterfaceManager.java, there is a possible way to prevent access to emergency services due to a logic error in the code. This could lead to a local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": [ + { + "cvssV4_0": { + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "attackVector": "NETWORK", + "baseScore": 10, + "baseSeverity": "CRITICAL", + "privilegesRequired": "NONE", + "providerUrgency": "NOT_DEFINED", + "subAvailabilityImpact": "HIGH", + "subConfidentialityImpact": "HIGH", + "subIntegrityImpact": "HIGH", + "userInteraction": "NONE", + "valueDensity": "NOT_DEFINED", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H", + "version": "4.0", + "vulnAvailabilityImpact": "HIGH", + "vulnConfidentialityImpact": "HIGH", + "vulnIntegrityImpact": "HIGH", + "vulnerabilityResponseEffort": "NOT_DEFINED" + }, + "format": "CVSS", + "scenarios": [ + { + "lang": "en", + "value": "GENERAL" + } + ] + } + ], + "providerMetadata": { + "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "shortName": "google_android", + "dateUpdated": "2025-01-17T23:06:15.618Z" + }, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2018-05-01" + } + ], + "source": { + "discovery": "UNKNOWN" + }, + "x_generator": { + "engine": "Vulnogram 0.2.0" + } + } + } +} \ No newline at end of file diff --git a/cves/2018/9xxx/CVE-2018-9375.json b/cves/2018/9xxx/CVE-2018-9375.json new file mode 100644 index 000000000000..e9132ebc18e4 --- /dev/null +++ b/cves/2018/9xxx/CVE-2018-9375.json @@ -0,0 +1,59 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2018-9375", + "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "state": "PUBLISHED", + "assignerShortName": "google_android", + "dateReserved": "2018-04-05T00:00:00.000Z", + "datePublished": "2025-01-17T23:07:14.793Z", + "dateUpdated": "2025-01-17T23:07:14.793Z" + }, + "containers": { + "cna": { + "affected": [ + { + "defaultStatus": "unaffected", + "product": "Android", + "vendor": "Google", + "versions": [ + { + "status": "affected", + "version": "Android Kernel" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "In multiple functions of UserDictionaryProvider.java, there is a possible way to add and delete words in the user dictionary due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
" + } + ], + "value": "In multiple functions of UserDictionaryProvider.java, there is a possible way to add and delete words in the user dictionary due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "providerMetadata": { + "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "shortName": "google_android", + "dateUpdated": "2025-01-17T23:07:14.793Z" + }, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2018-06-01" + } + ], + "source": { + "discovery": "UNKNOWN" + }, + "x_generator": { + "engine": "Vulnogram 0.2.0" + } + } + } +} \ No newline at end of file diff --git a/cves/2018/9xxx/CVE-2018-9377.json b/cves/2018/9xxx/CVE-2018-9377.json index c237011f6e44..31ddab4eabfc 100644 --- a/cves/2018/9xxx/CVE-2018-9377.json +++ b/cves/2018/9xxx/CVE-2018-9377.json @@ -8,7 +8,7 @@ "assignerShortName": "google_android", "dateReserved": "2018-04-05T00:00:00.000Z", "datePublished": "2024-11-28T00:23:14.763Z", - "dateUpdated": "2024-11-29T21:15:13.647Z" + "dateUpdated": "2025-01-17T23:08:41.086Z" }, "containers": { "cna": { @@ -56,16 +56,16 @@ { "base64": false, "type": "text/html", - "value": "In BnAudioPolicyService::onTransact of IAudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
" + "value": "In getIntentForIntentSender of ActivityManagerService.java, there is a possible way to access user metadata due to a pending intent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
" } ], - "value": "In BnAudioPolicyService::onTransact of IAudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + "value": "In getIntentForIntentSender of ActivityManagerService.java, there is a possible way to access user metadata due to a pending intent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." } ], "providerMetadata": { "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", "shortName": "google_android", - "dateUpdated": "2024-11-28T00:23:14.763Z" + "dateUpdated": "2025-01-17T23:08:41.086Z" }, "references": [ { diff --git a/cves/2018/9xxx/CVE-2018-9379.json b/cves/2018/9xxx/CVE-2018-9379.json new file mode 100644 index 000000000000..a86147bc75af --- /dev/null +++ b/cves/2018/9xxx/CVE-2018-9379.json @@ -0,0 +1,59 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2018-9379", + "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "state": "PUBLISHED", + "assignerShortName": "google_android", + "dateReserved": "2018-04-05T00:00:00.000Z", + "datePublished": "2025-01-17T23:09:39.761Z", + "dateUpdated": "2025-01-17T23:09:39.761Z" + }, + "containers": { + "cna": { + "affected": [ + { + "defaultStatus": "unaffected", + "product": "Android", + "vendor": "Google", + "versions": [ + { + "status": "affected", + "version": "Android Kernel" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "In multiple functions of MiniThumbFile.java, there is a possible way to view the thumbnails of deleted photos due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
" + } + ], + "value": "In multiple functions of MiniThumbFile.java, there is a possible way to view the thumbnails of deleted photos due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "providerMetadata": { + "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "shortName": "google_android", + "dateUpdated": "2025-01-17T23:09:39.761Z" + }, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2018-06-01" + } + ], + "source": { + "discovery": "UNKNOWN" + }, + "x_generator": { + "engine": "Vulnogram 0.2.0" + } + } + } +} \ No newline at end of file diff --git a/cves/2018/9xxx/CVE-2018-9382.json b/cves/2018/9xxx/CVE-2018-9382.json new file mode 100644 index 000000000000..61e7ec1b94df --- /dev/null +++ b/cves/2018/9xxx/CVE-2018-9382.json @@ -0,0 +1,59 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2018-9382", + "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "state": "PUBLISHED", + "assignerShortName": "google_android", + "dateReserved": "2018-04-05T00:00:00.000Z", + "datePublished": "2025-01-17T23:10:28.749Z", + "dateUpdated": "2025-01-17T23:10:28.749Z" + }, + "containers": { + "cna": { + "affected": [ + { + "defaultStatus": "unaffected", + "product": "Android", + "vendor": "Google", + "versions": [ + { + "status": "affected", + "version": "Android Kernel" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "In multiple functions of WifiServiceImpl.java, there is a possible way to activate Wi-Fi hotspot from a non-owner profile due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
" + } + ], + "value": "In multiple functions of WifiServiceImpl.java, there is a possible way to activate Wi-Fi hotspot from a non-owner profile due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "providerMetadata": { + "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "shortName": "google_android", + "dateUpdated": "2025-01-17T23:10:28.749Z" + }, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2018-06-01" + } + ], + "source": { + "discovery": "UNKNOWN" + }, + "x_generator": { + "engine": "Vulnogram 0.2.0" + } + } + } +} \ No newline at end of file diff --git a/cves/2018/9xxx/CVE-2018-9384.json b/cves/2018/9xxx/CVE-2018-9384.json new file mode 100644 index 000000000000..066fd1bd0042 --- /dev/null +++ b/cves/2018/9xxx/CVE-2018-9384.json @@ -0,0 +1,59 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2018-9384", + "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "state": "PUBLISHED", + "assignerShortName": "google_android", + "dateReserved": "2018-04-05T00:00:00.000Z", + "datePublished": "2025-01-17T23:04:49.336Z", + "dateUpdated": "2025-01-17T23:04:49.336Z" + }, + "containers": { + "cna": { + "affected": [ + { + "defaultStatus": "unaffected", + "product": "Android", + "vendor": "Google", + "versions": [ + { + "status": "affected", + "version": "Android Kernel" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "In multiple locations, there is a possible way to bypass KASLR due to an unusual root cause. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
" + } + ], + "value": "In multiple locations, there is a possible way to bypass KASLR due to an unusual root cause. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation." + } + ], + "providerMetadata": { + "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "shortName": "google_android", + "dateUpdated": "2025-01-17T23:04:49.336Z" + }, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2018-06-01" + } + ], + "source": { + "discovery": "UNKNOWN" + }, + "x_generator": { + "engine": "Vulnogram 0.2.0" + } + } + } +} \ No newline at end of file diff --git a/cves/2018/9xxx/CVE-2018-9434.json b/cves/2018/9xxx/CVE-2018-9434.json new file mode 100644 index 000000000000..0c5e611eaa6f --- /dev/null +++ b/cves/2018/9xxx/CVE-2018-9434.json @@ -0,0 +1,59 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2018-9434", + "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "state": "PUBLISHED", + "assignerShortName": "google_android", + "dateReserved": "2018-04-05T00:00:00.000Z", + "datePublished": "2025-01-17T23:11:16.145Z", + "dateUpdated": "2025-01-17T23:11:16.145Z" + }, + "containers": { + "cna": { + "affected": [ + { + "defaultStatus": "unaffected", + "product": "Android", + "vendor": "Google", + "versions": [ + { + "status": "affected", + "version": "Android Kernel" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "In multiple functions of Parcel.cpp, there is a possible way to bypass address space layout randomization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
" + } + ], + "value": "In multiple functions of Parcel.cpp, there is a possible way to bypass address space layout randomization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "providerMetadata": { + "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "shortName": "google_android", + "dateUpdated": "2025-01-17T23:11:16.145Z" + }, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2018-07-01" + } + ], + "source": { + "discovery": "UNKNOWN" + }, + "x_generator": { + "engine": "Vulnogram 0.2.0" + } + } + } +} \ No newline at end of file diff --git a/cves/2018/9xxx/CVE-2018-9447.json b/cves/2018/9xxx/CVE-2018-9447.json new file mode 100644 index 000000000000..687df6be65e8 --- /dev/null +++ b/cves/2018/9xxx/CVE-2018-9447.json @@ -0,0 +1,59 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2018-9447", + "assignerOrgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "state": "PUBLISHED", + "assignerShortName": "google_android", + "dateReserved": "2018-04-05T00:00:00.000Z", + "datePublished": "2025-01-17T23:12:29.500Z", + "dateUpdated": "2025-01-17T23:12:29.500Z" + }, + "containers": { + "cna": { + "affected": [ + { + "defaultStatus": "unaffected", + "product": "Android", + "vendor": "Google", + "versions": [ + { + "status": "affected", + "version": "Android Kernel" + } + ] + } + ], + "descriptions": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "In onCreate of EmergencyCallbackModeExitDialog.java, there is a possible way to crash the emergency callback mode due to a missing null check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
" + } + ], + "value": "In onCreate of EmergencyCallbackModeExitDialog.java, there is a possible way to crash the emergency callback mode due to a missing null check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "providerMetadata": { + "orgId": "baff130e-b8d5-4e15-b3d3-c3cf5d5545c6", + "shortName": "google_android", + "dateUpdated": "2025-01-17T23:12:29.500Z" + }, + "references": [ + { + "url": "https://source.android.com/security/bulletin/pixel/2018-08-01" + } + ], + "source": { + "discovery": "UNKNOWN" + }, + "x_generator": { + "engine": "Vulnogram 0.2.0" + } + } + } +} \ No newline at end of file diff --git a/cves/delta.json b/cves/delta.json index fed3cd1fc047..5d65480c36c6 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,26 +1,56 @@ { - "fetchTime": "2025-01-17T23:04:27.526Z", - "numberOfChanges": 3, + "fetchTime": "2025-01-17T23:13:13.892Z", + "numberOfChanges": 8, "new": [ { - "cveId": "CVE-2018-9383", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9383", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9383.json", - "dateUpdated": "2025-01-17T23:03:54.771Z" + "cveId": "CVE-2017-13322", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2017-13322", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2017/13xxx/CVE-2017-13322.json", + "dateUpdated": "2025-01-17T23:06:15.618Z" }, { - "cveId": "CVE-2022-20128", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-20128", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/20xxx/CVE-2022-20128.json", - "dateUpdated": "2025-01-17T22:57:20.590Z" + "cveId": "CVE-2018-9375", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9375", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9375.json", + "dateUpdated": "2025-01-17T23:07:14.793Z" + }, + { + "cveId": "CVE-2018-9379", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9379", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9379.json", + "dateUpdated": "2025-01-17T23:09:39.761Z" + }, + { + "cveId": "CVE-2018-9382", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9382", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9382.json", + "dateUpdated": "2025-01-17T23:10:28.749Z" + }, + { + "cveId": "CVE-2018-9384", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9384", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9384.json", + "dateUpdated": "2025-01-17T23:04:49.336Z" + }, + { + "cveId": "CVE-2018-9434", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9434", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9434.json", + "dateUpdated": "2025-01-17T23:11:16.145Z" + }, + { + "cveId": "CVE-2018-9447", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9447", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9447.json", + "dateUpdated": "2025-01-17T23:12:29.500Z" } ], "updated": [ { - "cveId": "CVE-2021-0937", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-0937", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/0xxx/CVE-2021-0937.json", - "dateUpdated": "2025-01-17T22:57:40.070Z" + "cveId": "CVE-2018-9377", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9377", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9377.json", + "dateUpdated": "2025-01-17T23:08:41.086Z" } ], "error": [] diff --git a/cves/deltaLog.json b/cves/deltaLog.json index 258b0b366511..709799877865 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,61 @@ [ + { + "fetchTime": "2025-01-17T23:13:13.892Z", + "numberOfChanges": 8, + "new": [ + { + "cveId": "CVE-2017-13322", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2017-13322", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2017/13xxx/CVE-2017-13322.json", + "dateUpdated": "2025-01-17T23:06:15.618Z" + }, + { + "cveId": "CVE-2018-9375", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9375", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9375.json", + "dateUpdated": "2025-01-17T23:07:14.793Z" + }, + { + "cveId": "CVE-2018-9379", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9379", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9379.json", + "dateUpdated": "2025-01-17T23:09:39.761Z" + }, + { + "cveId": "CVE-2018-9382", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9382", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9382.json", + "dateUpdated": "2025-01-17T23:10:28.749Z" + }, + { + "cveId": "CVE-2018-9384", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9384", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9384.json", + "dateUpdated": "2025-01-17T23:04:49.336Z" + }, + { + "cveId": "CVE-2018-9434", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9434", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9434.json", + "dateUpdated": "2025-01-17T23:11:16.145Z" + }, + { + "cveId": "CVE-2018-9447", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9447", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9447.json", + "dateUpdated": "2025-01-17T23:12:29.500Z" + } + ], + "updated": [ + { + "cveId": "CVE-2018-9377", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2018-9377", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2018/9xxx/CVE-2018-9377.json", + "dateUpdated": "2025-01-17T23:08:41.086Z" + } + ], + "error": [] + }, { "fetchTime": "2025-01-17T23:04:27.526Z", "numberOfChanges": 3, @@ -130817,476 +130874,5 @@ } ], "error": [] - }, - { - "fetchTime": "2024-12-18T23:13:07.247Z", - "numberOfChanges": 77, - "new": [ - { - "cveId": "CVE-2024-56317", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56317", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56317.json", - "dateUpdated": "2024-12-18T23:12:42.400Z" - }, - { - "cveId": "CVE-2024-56318", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56318", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56318.json", - "dateUpdated": "2024-12-18T23:12:18.482810" - } - ], - "updated": [ - { - "cveId": "CVE-2024-43594", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43594", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43594.json", - "dateUpdated": "2024-12-18T23:08:05.847Z" - }, - { - "cveId": "CVE-2024-43600", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-43600", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/43xxx/CVE-2024-43600.json", - "dateUpdated": "2024-12-18T23:07:49.208Z" - }, - { - "cveId": "CVE-2024-49041", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49041", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49041.json", - "dateUpdated": "2024-12-18T23:08:02.580Z" - }, - { - "cveId": "CVE-2024-49057", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49057", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49057.json", - "dateUpdated": "2024-12-18T23:07:24.256Z" - }, - { - "cveId": "CVE-2024-49059", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49059", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49059.json", - "dateUpdated": "2024-12-18T23:07:25.084Z" - }, - { - "cveId": "CVE-2024-49062", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49062", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49062.json", - "dateUpdated": "2024-12-18T23:07:49.729Z" - }, - { - "cveId": "CVE-2024-49063", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49063", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49063.json", - "dateUpdated": "2024-12-18T23:07:50.175Z" - }, - { - "cveId": "CVE-2024-49064", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49064", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49064.json", - "dateUpdated": "2024-12-18T23:07:25.794Z" - }, - { - "cveId": "CVE-2024-49065", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49065", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49065.json", - "dateUpdated": "2024-12-18T23:07:50.714Z" - }, - { - "cveId": "CVE-2024-49068", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49068", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49068.json", - "dateUpdated": "2024-12-18T23:08:04.408Z" - }, - { - "cveId": "CVE-2024-49069", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49069", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49069.json", - "dateUpdated": "2024-12-18T23:07:26.385Z" - }, - { - "cveId": "CVE-2024-49070", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49070", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49070.json", - "dateUpdated": "2024-12-18T23:07:26.929Z" - }, - { - "cveId": "CVE-2024-49071", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49071", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49071.json", - "dateUpdated": "2024-12-18T23:08:03.318Z" - }, - { - "cveId": "CVE-2024-49072", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49072", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49072.json", - "dateUpdated": "2024-12-18T23:07:51.222Z" - }, - { - "cveId": "CVE-2024-49073", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49073", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49073.json", - "dateUpdated": "2024-12-18T23:07:27.490Z" - }, - { - "cveId": "CVE-2024-49074", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49074", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49074.json", - "dateUpdated": "2024-12-18T23:07:28.214Z" - }, - { - "cveId": "CVE-2024-49075", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49075", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49075.json", - "dateUpdated": "2024-12-18T23:07:51.805Z" - }, - { - "cveId": "CVE-2024-49076", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49076", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49076.json", - "dateUpdated": "2024-12-18T23:07:52.253Z" - }, - { - "cveId": "CVE-2024-49077", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49077", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49077.json", - "dateUpdated": "2024-12-18T23:07:52.871Z" - }, - { - "cveId": "CVE-2024-49078", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49078", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49078.json", - "dateUpdated": "2024-12-18T23:07:53.472Z" - }, - { - "cveId": "CVE-2024-49079", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49079", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49079.json", - "dateUpdated": "2024-12-18T23:07:53.915Z" - }, - { - "cveId": "CVE-2024-49080", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49080", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49080.json", - "dateUpdated": "2024-12-18T23:07:54.534Z" - }, - { - "cveId": "CVE-2024-49081", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49081", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49081.json", - "dateUpdated": "2024-12-18T23:07:55.211Z" - }, - { - "cveId": "CVE-2024-49082", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49082", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49082.json", - "dateUpdated": "2024-12-18T23:07:55.817Z" - }, - { - "cveId": "CVE-2024-49083", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49083", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49083.json", - "dateUpdated": "2024-12-18T23:07:56.333Z" - }, - { - "cveId": "CVE-2024-49084", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49084", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49084.json", - "dateUpdated": "2024-12-18T23:07:28.969Z" - }, - { - "cveId": "CVE-2024-49085", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49085", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49085.json", - "dateUpdated": "2024-12-18T23:07:29.515Z" - }, - { - "cveId": "CVE-2024-49086", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49086", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49086.json", - "dateUpdated": "2024-12-18T23:07:30.194Z" - }, - { - "cveId": "CVE-2024-49087", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49087", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49087.json", - "dateUpdated": "2024-12-18T23:07:30.787Z" - }, - { - "cveId": "CVE-2024-49088", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49088", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49088.json", - "dateUpdated": "2024-12-18T23:07:56.815Z" - }, - { - "cveId": "CVE-2024-49089", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49089", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49089.json", - "dateUpdated": "2024-12-18T23:07:31.886Z" - }, - { - "cveId": "CVE-2024-49090", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49090", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49090.json", - "dateUpdated": "2024-12-18T23:07:57.447Z" - }, - { - "cveId": "CVE-2024-49091", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49091", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49091.json", - "dateUpdated": "2024-12-18T23:07:32.355Z" - }, - { - "cveId": "CVE-2024-49092", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49092", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49092.json", - "dateUpdated": "2024-12-18T23:07:32.856Z" - }, - { - "cveId": "CVE-2024-49093", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49093", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49093.json", - "dateUpdated": "2024-12-18T23:07:33.400Z" - }, - { - "cveId": "CVE-2024-49094", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49094", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49094.json", - "dateUpdated": "2024-12-18T23:07:33.863Z" - }, - { - "cveId": "CVE-2024-49095", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49095", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49095.json", - "dateUpdated": "2024-12-18T23:07:57.964Z" - }, - { - "cveId": "CVE-2024-49096", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49096", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49096.json", - "dateUpdated": "2024-12-18T23:07:34.326Z" - }, - { - "cveId": "CVE-2024-49097", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49097", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49097.json", - "dateUpdated": "2024-12-18T23:07:34.978Z" - }, - { - "cveId": "CVE-2024-49098", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49098", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49098.json", - "dateUpdated": "2024-12-18T23:07:35.428Z" - }, - { - "cveId": "CVE-2024-49099", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49099", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49099.json", - "dateUpdated": "2024-12-18T23:07:35.959Z" - }, - { - "cveId": "CVE-2024-49101", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49101", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49101.json", - "dateUpdated": "2024-12-18T23:07:36.505Z" - }, - { - "cveId": "CVE-2024-49102", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49102", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49102.json", - "dateUpdated": "2024-12-18T23:07:36.962Z" - }, - { - "cveId": "CVE-2024-49103", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49103", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49103.json", - "dateUpdated": "2024-12-18T23:07:37.480Z" - }, - { - "cveId": "CVE-2024-49104", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49104", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49104.json", - "dateUpdated": "2024-12-18T23:07:38.124Z" - }, - { - "cveId": "CVE-2024-49105", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49105", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49105.json", - "dateUpdated": "2024-12-18T23:07:38.693Z" - }, - { - "cveId": "CVE-2024-49106", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49106", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49106.json", - "dateUpdated": "2024-12-18T23:07:39.319Z" - }, - { - "cveId": "CVE-2024-49107", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49107", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49107.json", - "dateUpdated": "2024-12-18T23:07:39.794Z" - }, - { - "cveId": "CVE-2024-49108", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49108", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49108.json", - "dateUpdated": "2024-12-18T23:07:40.553Z" - }, - { - "cveId": "CVE-2024-49109", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49109", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49109.json", - "dateUpdated": "2024-12-18T23:08:03.856Z" - }, - { - "cveId": "CVE-2024-49110", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49110", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49110.json", - "dateUpdated": "2024-12-18T23:07:58.493Z" - }, - { - "cveId": "CVE-2024-49111", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49111", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49111.json", - "dateUpdated": "2024-12-18T23:07:41.053Z" - }, - { - "cveId": "CVE-2024-49112", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49112", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49112.json", - "dateUpdated": "2024-12-18T23:07:59.007Z" - }, - { - "cveId": "CVE-2024-49113", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49113", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49113.json", - "dateUpdated": "2024-12-18T23:07:59.607Z" - }, - { - "cveId": "CVE-2024-49114", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49114", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49114.json", - "dateUpdated": "2024-12-18T23:08:00.197Z" - }, - { - "cveId": "CVE-2024-49115", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49115", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49115.json", - "dateUpdated": "2024-12-18T23:07:41.626Z" - }, - { - "cveId": "CVE-2024-49116", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49116", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49116.json", - "dateUpdated": "2024-12-18T23:08:04.862Z" - }, - { - "cveId": "CVE-2024-49117", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49117", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49117.json", - "dateUpdated": "2024-12-18T23:07:42.191Z" - }, - { - "cveId": "CVE-2024-49118", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49118", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49118.json", - "dateUpdated": "2024-12-18T23:08:00.846Z" - }, - { - "cveId": "CVE-2024-49119", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49119", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49119.json", - "dateUpdated": "2024-12-18T23:07:42.775Z" - }, - { - "cveId": "CVE-2024-49120", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49120", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49120.json", - "dateUpdated": "2024-12-18T23:07:43.277Z" - }, - { - "cveId": "CVE-2024-49121", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49121", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49121.json", - "dateUpdated": "2024-12-18T23:07:43.878Z" - }, - { - "cveId": "CVE-2024-49122", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49122", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49122.json", - "dateUpdated": "2024-12-18T23:07:44.351Z" - }, - { - "cveId": "CVE-2024-49123", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49123", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49123.json", - "dateUpdated": "2024-12-18T23:07:44.872Z" - }, - { - "cveId": "CVE-2024-49124", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49124", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49124.json", - "dateUpdated": "2024-12-18T23:07:45.568Z" - }, - { - "cveId": "CVE-2024-49125", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49125", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49125.json", - "dateUpdated": "2024-12-18T23:07:46.196Z" - }, - { - "cveId": "CVE-2024-49126", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49126", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49126.json", - "dateUpdated": "2024-12-18T23:07:46.750Z" - }, - { - "cveId": "CVE-2024-49127", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49127", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49127.json", - "dateUpdated": "2024-12-18T23:08:01.384Z" - }, - { - "cveId": "CVE-2024-49128", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49128", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49128.json", - "dateUpdated": "2024-12-18T23:08:05.397Z" - }, - { - "cveId": "CVE-2024-49129", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49129", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49129.json", - "dateUpdated": "2024-12-18T23:07:47.275Z" - }, - { - "cveId": "CVE-2024-49132", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49132", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49132.json", - "dateUpdated": "2024-12-18T23:07:47.744Z" - }, - { - "cveId": "CVE-2024-49138", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49138", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49138.json", - "dateUpdated": "2024-12-18T23:08:02.013Z" - }, - { - "cveId": "CVE-2024-49142", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49142", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49142.json", - "dateUpdated": "2024-12-18T23:07:48.197Z" - }, - { - "cveId": "CVE-2024-49147", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-49147", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/49xxx/CVE-2024-49147.json", - "dateUpdated": "2024-12-18T23:07:48.709Z" - }, - { - "cveId": "CVE-2024-56319", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-56319", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/56xxx/CVE-2024-56319.json", - "dateUpdated": "2024-12-18T23:08:25.725Z" - } - ], - "error": [] } ] \ No newline at end of file