diff --git a/cves/2024/1xxx/CVE-2024-1394.json b/cves/2024/1xxx/CVE-2024-1394.json index b87fd24f91a4..8cf4685d4ead 100644 --- a/cves/2024/1xxx/CVE-2024-1394.json +++ b/cves/2024/1xxx/CVE-2024-1394.json @@ -8,7 +8,7 @@ "assignerShortName": "redhat", "dateReserved": "2024-02-09T06:02:35.056Z", "datePublished": "2024-03-21T12:16:38.790Z", - "dateUpdated": "2024-09-23T05:06:18.319Z" + "dateUpdated": "2024-09-26T23:05:16.153Z" }, "containers": { "cna": { @@ -63,12 +63,12 @@ } ], "cpes": [ - "cpe:/a:redhat:ansible_automation_platform:2.4::el8", - "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9", - "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", + "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el9", + "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", + "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9", - "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8" + "cpe:/a:redhat:ansible_automation_platform:2.4::el8" ] }, { @@ -86,12 +86,12 @@ } ], "cpes": [ - "cpe:/a:redhat:ansible_automation_platform:2.4::el8", - "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9", - "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", + "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el9", + "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", + "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9", - "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8" + "cpe:/a:redhat:ansible_automation_platform:2.4::el8" ] }, { @@ -202,6 +202,24 @@ "cpe:/a:redhat:enterprise_linux:8::appstream" ] }, + { + "vendor": "Red Hat", + "product": "Red Hat Enterprise Linux 8", + "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", + "packageName": "osbuild-composer", + "defaultStatus": "affected", + "versions": [ + { + "version": "0:101-2.el8_10", + "lessThan": "*", + "versionType": "rpm", + "status": "unaffected" + } + ], + "cpes": [ + "cpe:/a:redhat:enterprise_linux:8::appstream" + ] + }, { "vendor": "Red Hat", "product": "Red Hat Enterprise Linux 9", @@ -555,7 +573,7 @@ "defaultStatus": "affected", "versions": [ { - "version": "0:1.25.5-13.1.rhaos4.12.git76343da.el8", + "version": "0:1.25.3-5.2.rhaos4.12.git44a2cb2.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -574,7 +592,7 @@ "defaultStatus": "affected", "versions": [ { - "version": "0:1.25.0-2.2.el8", + "version": "0:1.25.0-2.2.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -593,7 +611,7 @@ "defaultStatus": "affected", "versions": [ { - "version": "0:2.14.0-7.1.rhaos4.12.el8", + "version": "0:2.14.0-5.2.rhaos4.12.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -612,7 +630,7 @@ "defaultStatus": "affected", "versions": [ { - "version": "0:4.12.0-202403251017.p0.gd4c9e3c.assembly.stream.el9", + "version": "0:4.12.0-202403251017.p0.gd4c9e3c.assembly.stream.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -631,7 +649,7 @@ "defaultStatus": "affected", "versions": [ { - "version": "3:4.2.0-7.2.rhaos4.12.el9", + "version": "3:4.4.1-2.1.rhaos4.12.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -669,7 +687,7 @@ "defaultStatus": "affected", "versions": [ { - "version": "2:1.9.4-3.2.rhaos4.12.el8", + "version": "2:1.9.4-3.2.rhaos4.12.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -688,15 +706,15 @@ "defaultStatus": "affected", "versions": [ { - "version": "1:1.29.1-2.2.rhaos4.13.el9", + "version": "1:1.29.1-2.2.rhaos4.13.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" } ], "cpes": [ - "cpe:/a:redhat:openshift:4.13::el9", - "cpe:/a:redhat:openshift:4.13::el8" + "cpe:/a:redhat:openshift:4.13::el8", + "cpe:/a:redhat:openshift:4.13::el9" ] }, { @@ -714,8 +732,8 @@ } ], "cpes": [ - "cpe:/a:redhat:openshift:4.13::el9", - "cpe:/a:redhat:openshift:4.13::el8" + "cpe:/a:redhat:openshift:4.13::el8", + "cpe:/a:redhat:openshift:4.13::el9" ] }, { @@ -733,8 +751,8 @@ } ], "cpes": [ - "cpe:/a:redhat:openshift:4.13::el9", - "cpe:/a:redhat:openshift:4.13::el8" + "cpe:/a:redhat:openshift:4.13::el8", + "cpe:/a:redhat:openshift:4.13::el9" ] }, { @@ -752,8 +770,8 @@ } ], "cpes": [ - "cpe:/a:redhat:openshift:4.13::el9", - "cpe:/a:redhat:openshift:4.13::el8" + "cpe:/a:redhat:openshift:4.13::el8", + "cpe:/a:redhat:openshift:4.13::el9" ] }, { @@ -771,8 +789,8 @@ } ], "cpes": [ - "cpe:/a:redhat:openshift:4.13::el9", - "cpe:/a:redhat:openshift:4.13::el8" + "cpe:/a:redhat:openshift:4.13::el8", + "cpe:/a:redhat:openshift:4.13::el9" ] }, { @@ -783,15 +801,15 @@ "defaultStatus": "affected", "versions": [ { - "version": "0:4.13.0-202404020737.p0.gd192e90.assembly.stream.el9", + "version": "0:4.13.0-202404020737.p0.gd192e90.assembly.stream.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" } ], "cpes": [ - "cpe:/a:redhat:openshift:4.13::el9", - "cpe:/a:redhat:openshift:4.13::el8" + "cpe:/a:redhat:openshift:4.13::el8", + "cpe:/a:redhat:openshift:4.13::el9" ] }, { @@ -802,15 +820,15 @@ "defaultStatus": "affected", "versions": [ { - "version": "3:4.4.1-6.2.rhaos4.13.el9", + "version": "3:4.4.1-5.2.rhaos4.13.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" } ], "cpes": [ - "cpe:/a:redhat:openshift:4.13::el9", - "cpe:/a:redhat:openshift:4.13::el8" + "cpe:/a:redhat:openshift:4.13::el8", + "cpe:/a:redhat:openshift:4.13::el9" ] }, { @@ -828,8 +846,8 @@ } ], "cpes": [ - "cpe:/a:redhat:openshift:4.13::el9", - "cpe:/a:redhat:openshift:4.13::el8" + "cpe:/a:redhat:openshift:4.13::el8", + "cpe:/a:redhat:openshift:4.13::el9" ] }, { @@ -840,15 +858,15 @@ "defaultStatus": "affected", "versions": [ { - "version": "2:1.11.2-2.2.rhaos4.13.el8", + "version": "2:1.11.2-2.2.rhaos4.13.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" } ], "cpes": [ - "cpe:/a:redhat:openshift:4.13::el9", - "cpe:/a:redhat:openshift:4.13::el8" + "cpe:/a:redhat:openshift:4.13::el8", + "cpe:/a:redhat:openshift:4.13::el9" ] }, { @@ -954,7 +972,7 @@ "defaultStatus": "affected", "versions": [ { - "version": "0:4.14.0-202403261640.p0.gf7b14a9.assembly.stream.el9", + "version": "0:4.14.0-202403261640.p0.gf7b14a9.assembly.stream.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1163,7 +1181,7 @@ "defaultStatus": "affected", "versions": [ { - "version": "0:4.14.0-202404160939.p0.g7bee54d.assembly.stream.el8", + "version": "0:4.14.0-202404160939.p0.g7bee54d.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1277,7 +1295,7 @@ "defaultStatus": "affected", "versions": [ { - "version": "3:4.4.1-11.4.rhaos4.14.el8", + "version": "3:4.4.1-11.4.rhaos4.14.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1315,7 +1333,7 @@ "defaultStatus": "affected", "versions": [ { - "version": "2:1.11.2-10.4.rhaos4.14.el8", + "version": "2:1.11.2-10.4.rhaos4.14.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -1378,8 +1396,8 @@ } ], "cpes": [ - "cpe:/a:redhat:openshift:4.15::el8", - "cpe:/a:redhat:openshift:4.15::el9" + "cpe:/a:redhat:openshift:4.15::el9", + "cpe:/a:redhat:openshift:4.15::el8" ] }, { @@ -1397,8 +1415,8 @@ } ], "cpes": [ - "cpe:/a:redhat:openshift:4.15::el8", - "cpe:/a:redhat:openshift:4.15::el9" + "cpe:/a:redhat:openshift:4.15::el9", + "cpe:/a:redhat:openshift:4.15::el8" ] }, { @@ -1416,8 +1434,8 @@ } ], "cpes": [ - "cpe:/a:redhat:openshift:4.15::el8", - "cpe:/a:redhat:openshift:4.15::el9" + "cpe:/a:redhat:openshift:4.15::el9", + "cpe:/a:redhat:openshift:4.15::el8" ] }, { @@ -1435,8 +1453,8 @@ } ], "cpes": [ - "cpe:/a:redhat:openshift:4.15::el8", - "cpe:/a:redhat:openshift:4.15::el9" + "cpe:/a:redhat:openshift:4.15::el9", + "cpe:/a:redhat:openshift:4.15::el8" ] }, { @@ -1454,8 +1472,8 @@ } ], "cpes": [ - "cpe:/a:redhat:openshift:4.15::el8", - "cpe:/a:redhat:openshift:4.15::el9" + "cpe:/a:redhat:openshift:4.15::el9", + "cpe:/a:redhat:openshift:4.15::el8" ] }, { @@ -1473,8 +1491,8 @@ } ], "cpes": [ - "cpe:/a:redhat:openshift:4.15::el8", - "cpe:/a:redhat:openshift:4.15::el9" + "cpe:/a:redhat:openshift:4.15::el9", + "cpe:/a:redhat:openshift:4.15::el8" ] }, { @@ -1485,15 +1503,15 @@ "defaultStatus": "affected", "versions": [ { - "version": "0:4.15.0-202403211240.p0.g62c4d45.assembly.stream.el8", + "version": "0:4.15.0-202403211240.p0.g62c4d45.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" } ], "cpes": [ - "cpe:/a:redhat:openshift:4.15::el8", - "cpe:/a:redhat:openshift:4.15::el9" + "cpe:/a:redhat:openshift:4.15::el9", + "cpe:/a:redhat:openshift:4.15::el8" ] }, { @@ -1504,15 +1522,15 @@ "defaultStatus": "affected", "versions": [ { - "version": "0:4.15.0-202403211549.p0.g2e3cca1.assembly.stream.el8", + "version": "0:4.15.0-202403211549.p0.g2e3cca1.assembly.stream.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" } ], "cpes": [ - "cpe:/a:redhat:openshift:4.15::el8", - "cpe:/a:redhat:openshift:4.15::el9" + "cpe:/a:redhat:openshift:4.15::el9", + "cpe:/a:redhat:openshift:4.15::el8" ] }, { @@ -1530,8 +1548,8 @@ } ], "cpes": [ - "cpe:/a:redhat:openshift:4.15::el8", - "cpe:/a:redhat:openshift:4.15::el9" + "cpe:/a:redhat:openshift:4.15::el9", + "cpe:/a:redhat:openshift:4.15::el8" ] }, { @@ -1542,15 +1560,15 @@ "defaultStatus": "affected", "versions": [ { - "version": "4:1.1.12-1.1.rhaos4.15.el9", + "version": "4:1.1.12-1.1.rhaos4.15.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" } ], "cpes": [ - "cpe:/a:redhat:openshift:4.15::el8", - "cpe:/a:redhat:openshift:4.15::el9" + "cpe:/a:redhat:openshift:4.15::el9", + "cpe:/a:redhat:openshift:4.15::el8" ] }, { @@ -1568,8 +1586,8 @@ } ], "cpes": [ - "cpe:/a:redhat:openshift:4.15::el8", - "cpe:/a:redhat:openshift:4.15::el9" + "cpe:/a:redhat:openshift:4.15::el9", + "cpe:/a:redhat:openshift:4.15::el8" ] }, { @@ -1605,8 +1623,8 @@ } ], "cpes": [ - "cpe:/a:redhat:openshift:4.15::el8", - "cpe:/a:redhat:openshift:4.15::el9" + "cpe:/a:redhat:openshift:4.15::el9", + "cpe:/a:redhat:openshift:4.15::el8" ] }, { @@ -1957,16 +1975,6 @@ "cpe:/o:redhat:enterprise_linux:8" ] }, - { - "vendor": "Red Hat", - "product": "Red Hat Enterprise Linux 8", - "collectionURL": "https://access.redhat.com/downloads/content/package-browser/", - "packageName": "osbuild-composer", - "defaultStatus": "affected", - "cpes": [ - "cpe:/o:redhat:enterprise_linux:8" - ] - }, { "vendor": "Red Hat", "product": "Red Hat Enterprise Linux 8", @@ -2625,6 +2633,14 @@ "x_refsource_REDHAT" ] }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:7262", + "name": "RHSA-2024:7262", + "tags": [ + "vendor-advisory", + "x_refsource_REDHAT" + ] + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-1394", "tags": [ @@ -2697,7 +2713,7 @@ "providerMetadata": { "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", - "dateUpdated": "2024-09-23T05:06:18.319Z" + "dateUpdated": "2024-09-26T23:05:16.153Z" } }, "adp": [ diff --git a/cves/2024/4xxx/CVE-2024-4099.json b/cves/2024/4xxx/CVE-2024-4099.json new file mode 100644 index 000000000000..f77f045d8b3a --- /dev/null +++ b/cves/2024/4xxx/CVE-2024-4099.json @@ -0,0 +1,129 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-4099", + "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", + "state": "PUBLISHED", + "assignerShortName": "GitLab", + "dateReserved": "2024-04-23T20:30:35.566Z", + "datePublished": "2024-09-26T23:02:15.810Z", + "dateUpdated": "2024-09-26T23:02:15.810Z" + }, + "containers": { + "cna": { + "title": "Improper Encoding or Escaping of Output in GitLab", + "descriptions": [ + { + "lang": "en", + "value": "An issue has been discovered in GitLab EE affecting all versions starting from 16.0 prior to 17.2.8, from 17.3 prior to 17.3.4, and from 17.4 prior to 17.4.1. An AI feature was found to read unsanitized content in a way that could have allowed an attacker to hide prompt injection." + } + ], + "affected": [ + { + "vendor": "GitLab", + "product": "GitLab", + "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", + "cpes": [ + "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" + ], + "versions": [ + { + "version": "16.0", + "status": "affected", + "lessThan": "17.2.8", + "versionType": "semver" + }, + { + "version": "17.3", + "status": "affected", + "lessThan": "17.3.4", + "versionType": "semver" + }, + { + "version": "17.4", + "status": "affected", + "lessThan": "17.4.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "lang": "en", + "description": "CWE-116: Improper Encoding or Escaping of Output", + "cweId": "CWE-116", + "type": "CWE" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/457798", + "name": "GitLab Issue #457798", + "tags": [ + "issue-tracking", + "permissions-required" + ] + }, + { + "url": "https://hackerone.com/reports/2459597", + "name": "HackerOne Bug Bounty Report #2459597", + "tags": [ + "technical-description", + "exploit", + "permissions-required" + ] + } + ], + "metrics": [ + { + "format": "CVSS", + "scenarios": [ + { + "lang": "en", + "value": "GENERAL" + } + ], + "cvssV3_1": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + } + } + ], + "solutions": [ + { + "lang": "en", + "value": "Upgrade to versions 17.2.8, 17.3.4, 17.4.1 or above." + } + ], + "credits": [ + { + "lang": "en", + "value": "Thanks [joaxcar](https://hackerone.com/joaxcar) for reporting this vulnerability through our HackerOne bug bounty program", + "type": "finder" + } + ], + "providerMetadata": { + "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", + "shortName": "GitLab", + "dateUpdated": "2024-09-26T23:02:15.810Z" + } + } + } +} \ No newline at end of file diff --git a/cves/2024/8xxx/CVE-2024-8974.json b/cves/2024/8xxx/CVE-2024-8974.json new file mode 100644 index 000000000000..eaf57a8893cf --- /dev/null +++ b/cves/2024/8xxx/CVE-2024-8974.json @@ -0,0 +1,120 @@ +{ + "dataType": "CVE_RECORD", + "dataVersion": "5.1", + "cveMetadata": { + "cveId": "CVE-2024-8974", + "assignerOrgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", + "state": "PUBLISHED", + "assignerShortName": "GitLab", + "dateReserved": "2024-09-18T14:01:58.766Z", + "datePublished": "2024-09-26T23:02:00.153Z", + "dateUpdated": "2024-09-26T23:02:00.153Z" + }, + "containers": { + "cna": { + "title": "Incorrect Provision of Specified Functionality in GitLab", + "descriptions": [ + { + "lang": "en", + "value": "Information disclosure in Gitlab EE/CE affecting all versions from 15.6 prior to 17.2.8, 17.3 prior to 17.3.4, and 17.4 prior to 17.4.1 in specific conditions it was possible to disclose to an unauthorised user the path of a private project.\"" + } + ], + "affected": [ + { + "vendor": "GitLab", + "product": "GitLab", + "repo": "git://git@gitlab.com:gitlab-org/gitlab.git", + "cpes": [ + "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*" + ], + "versions": [ + { + "version": "15.6", + "status": "affected", + "lessThan": "17.2.8", + "versionType": "semver" + }, + { + "version": "17.3", + "status": "affected", + "lessThan": "17.3.4", + "versionType": "semver" + }, + { + "version": "17.4", + "status": "affected", + "lessThan": "17.4.1", + "versionType": "semver" + } + ], + "defaultStatus": "unaffected" + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "lang": "en", + "description": "CWE-684: Incorrect Provision of Specified Functionality", + "cweId": "CWE-684", + "type": "CWE" + } + ] + } + ], + "references": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/482843", + "name": "GitLab Issue #482843", + "tags": [ + "issue-tracking", + "permissions-required" + ] + } + ], + "metrics": [ + { + "format": "CVSS", + "scenarios": [ + { + "lang": "en", + "value": "GENERAL" + } + ], + "cvssV3_1": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.6, + "baseSeverity": "LOW" + } + } + ], + "solutions": [ + { + "lang": "en", + "value": "Upgrade to version 17.4.1, 17.3.4, 17.2.8." + } + ], + "credits": [ + { + "lang": "en", + "value": "This vulnerability has been discovered internally by GitLab team member [Lukas Eipert](https://gitlab.com/leipert)", + "type": "finder" + } + ], + "providerMetadata": { + "orgId": "ceab7361-8a18-47b1-92ba-4d7d25f6715a", + "shortName": "GitLab", + "dateUpdated": "2024-09-26T23:02:00.153Z" + } + } + } +} \ No newline at end of file diff --git a/cves/delta.json b/cves/delta.json index a66e1c9e7e12..799cc0bbd84b 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,31 +1,26 @@ { - "fetchTime": "2024-09-26T22:10:13.906Z", - "numberOfChanges": 4, - "new": [], - "updated": [ - { - "cveId": "CVE-2023-3114", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-3114", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/3xxx/CVE-2023-3114.json", - "dateUpdated": "2024-09-26T22:07:27.156Z" - }, + "fetchTime": "2024-09-26T23:07:06.831Z", + "numberOfChanges": 3, + "new": [ { - "cveId": "CVE-2024-47076", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-47076", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/47xxx/CVE-2024-47076.json", - "dateUpdated": "2024-09-26T22:01:09.793Z" + "cveId": "CVE-2024-4099", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-4099", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/4xxx/CVE-2024-4099.json", + "dateUpdated": "2024-09-26T23:02:15.810Z" }, { - "cveId": "CVE-2024-47176", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-47176", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/47xxx/CVE-2024-47176.json", - "dateUpdated": "2024-09-26T22:02:16.605Z" - }, + "cveId": "CVE-2024-8974", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8974", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8974.json", + "dateUpdated": "2024-09-26T23:02:00.153Z" + } + ], + "updated": [ { - "cveId": "CVE-2024-47177", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-47177", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/47xxx/CVE-2024-47177.json", - "dateUpdated": "2024-09-26T22:02:36.767Z" + "cveId": "CVE-2024-1394", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-1394", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/1xxx/CVE-2024-1394.json", + "dateUpdated": "2024-09-26T23:05:16.153Z" } ], "error": [] diff --git a/cves/deltaLog.json b/cves/deltaLog.json index ef36bfa24a08..30609d3b8c87 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,31 @@ [ + { + "fetchTime": "2024-09-26T23:07:06.831Z", + "numberOfChanges": 3, + "new": [ + { + "cveId": "CVE-2024-4099", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-4099", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/4xxx/CVE-2024-4099.json", + "dateUpdated": "2024-09-26T23:02:15.810Z" + }, + { + "cveId": "CVE-2024-8974", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8974", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8974.json", + "dateUpdated": "2024-09-26T23:02:00.153Z" + } + ], + "updated": [ + { + "cveId": "CVE-2024-1394", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-1394", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/1xxx/CVE-2024-1394.json", + "dateUpdated": "2024-09-26T23:05:16.153Z" + } + ], + "error": [] + }, { "fetchTime": "2024-09-26T22:10:13.906Z", "numberOfChanges": 4, @@ -285437,25 +285464,5 @@ ], "updated": [], "error": [] - }, - { - "fetchTime": "2024-08-27T22:36:42.705Z", - "numberOfChanges": 2, - "new": [ - { - "cveId": "CVE-2024-8222", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8222", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8222.json", - "dateUpdated": "2024-08-27T22:31:05.261Z" - }, - { - "cveId": "CVE-2024-8223", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-8223", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/8xxx/CVE-2024-8223.json", - "dateUpdated": "2024-08-27T22:31:07.080Z" - } - ], - "updated": [], - "error": [] } ] \ No newline at end of file