diff --git a/cves/2020/25xxx/CVE-2020-25613.json b/cves/2020/25xxx/CVE-2020-25613.json index d512c3d066b4..6e7c9441b12a 100644 --- a/cves/2020/25xxx/CVE-2020-25613.json +++ b/cves/2020/25xxx/CVE-2020-25613.json @@ -6,7 +6,7 @@ "cveId": "CVE-2020-25613", "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", - "dateUpdated": "2023-04-30T00:00:00", + "dateUpdated": "2024-01-24T05:06:30.204645", "dateReserved": "2020-09-16T00:00:00", "datePublished": "2020-10-06T00:00:00" }, @@ -15,7 +15,7 @@ "providerMetadata": { "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre", - "dateUpdated": "2023-04-30T00:00:00" + "dateUpdated": "2024-01-24T05:06:30.204645" }, "descriptions": [ { @@ -68,6 +68,13 @@ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html" + }, + { + "name": "GLSA-202401-27", + "tags": [ + "vendor-advisory" + ], + "url": "https://security.gentoo.org/glsa/202401-27" } ], "problemTypes": [ diff --git a/cves/2021/31xxx/CVE-2021-31810.json b/cves/2021/31xxx/CVE-2021-31810.json index cce2bae13f33..dee05c69c97d 100644 --- a/cves/2021/31xxx/CVE-2021-31810.json +++ b/cves/2021/31xxx/CVE-2021-31810.json @@ -6,7 +6,7 @@ "cveId": "CVE-2021-31810", "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", - "dateUpdated": "2023-04-30T00:00:00", + "dateUpdated": "2024-01-24T05:06:36.810387", "dateReserved": "2021-04-26T00:00:00", "datePublished": "2021-07-13T00:00:00" }, @@ -15,7 +15,7 @@ "providerMetadata": { "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre", - "dateUpdated": "2023-04-30T00:00:00" + "dateUpdated": "2024-01-24T05:06:36.810387" }, "descriptions": [ { @@ -68,6 +68,13 @@ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html" + }, + { + "name": "GLSA-202401-27", + "tags": [ + "vendor-advisory" + ], + "url": "https://security.gentoo.org/glsa/202401-27" } ], "problemTypes": [ diff --git a/cves/2021/32xxx/CVE-2021-32066.json b/cves/2021/32xxx/CVE-2021-32066.json index f567ad83c38d..f267fa168acc 100644 --- a/cves/2021/32xxx/CVE-2021-32066.json +++ b/cves/2021/32xxx/CVE-2021-32066.json @@ -6,7 +6,7 @@ "cveId": "CVE-2021-32066", "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", - "dateUpdated": "2023-04-30T00:00:00", + "dateUpdated": "2024-01-24T05:06:31.921371", "dateReserved": "2021-05-06T00:00:00", "datePublished": "2021-08-01T00:00:00" }, @@ -15,7 +15,7 @@ "providerMetadata": { "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre", - "dateUpdated": "2023-04-30T00:00:00" + "dateUpdated": "2024-01-24T05:06:31.921371" }, "descriptions": [ { @@ -64,6 +64,13 @@ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html" + }, + { + "name": "GLSA-202401-27", + "tags": [ + "vendor-advisory" + ], + "url": "https://security.gentoo.org/glsa/202401-27" } ], "problemTypes": [ diff --git a/cves/2021/33xxx/CVE-2021-33479.json b/cves/2021/33xxx/CVE-2021-33479.json index ba794ed9b0af..f56fc04af5bb 100644 --- a/cves/2021/33xxx/CVE-2021-33479.json +++ b/cves/2021/33xxx/CVE-2021-33479.json @@ -1,133 +1,67 @@ { + "dataType": "CVE_RECORD", + "dataVersion": "5.0", + "cveMetadata": { + "state": "PUBLISHED", + "cveId": "CVE-2021-33479", + "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", + "assignerShortName": "fedora", + "dateUpdated": "2024-01-24T05:06:43.268942", + "dateReserved": "2021-05-20T00:00:00", + "datePublished": "2021-11-17T00:00:00" + }, "containers": { "cna": { - "affected": [ - { - "product": "gocr", - "vendor": "n/a", - "versions": [ - { - "status": "affected", - "version": "gocr 0.53-20200802" - } - ] - } - ], + "providerMetadata": { + "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", + "shortName": "fedora", + "dateUpdated": "2024-01-24T05:06:43.268942" + }, "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability was discovered in gocr through 0.53-20200802 in measure_pitch() in pgm2asc.c." } ], - "problemTypes": [ + "affected": [ { - "descriptions": [ + "vendor": "n/a", + "product": "gocr", + "versions": [ { - "cweId": "CWE-119", - "description": "CWE-119", - "lang": "en", - "type": "CWE" + "version": "gocr 0.53-20200802", + "status": "affected" } ] } ], - "providerMetadata": { - "dateUpdated": "2021-11-17T17:51:44", - "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", - "shortName": "fedora" - }, "references": [ { - "tags": [ - "x_refsource_MISC" - ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962861" }, { + "url": "https://sourceforge.net/p/jocr/bugs/39/" + }, + { + "name": "GLSA-202401-28", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://sourceforge.net/p/jocr/bugs/39/" + "url": "https://security.gentoo.org/glsa/202401-28" } ], - "x_legacyV4Record": { - "CVE_data_meta": { - "ASSIGNER": "patrick@puiterwijk.org", - "ID": "CVE-2021-33479", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "gocr", - "version": { - "version_data": [ - { - "version_value": "gocr 0.53-20200802" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A stack-based buffer overflow vulnerability was discovered in gocr through 0.53-20200802 in measure_pitch() in pgm2asc.c." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-119" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1962861", - "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962861" - }, + "problemTypes": [ + { + "descriptions": [ { - "name": "https://sourceforge.net/p/jocr/bugs/39/", - "refsource": "MISC", - "url": "https://sourceforge.net/p/jocr/bugs/39/" + "type": "CWE", + "lang": "en", + "description": "CWE-119", + "cweId": "CWE-119" } ] } - } + ] } - }, - "cveMetadata": { - "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", - "assignerShortName": "fedora", - "cveId": "CVE-2021-33479", - "datePublished": "2021-11-17T17:51:44", - "dateReserved": "2021-05-20T00:00:00", - "dateUpdated": "2021-11-17T17:51:44", - "state": "PUBLISHED" - }, - "dataType": "CVE_RECORD", - "dataVersion": "5.0" + } } \ No newline at end of file diff --git a/cves/2021/33xxx/CVE-2021-33480.json b/cves/2021/33xxx/CVE-2021-33480.json index 25ae05421d88..7a54a61a71b3 100644 --- a/cves/2021/33xxx/CVE-2021-33480.json +++ b/cves/2021/33xxx/CVE-2021-33480.json @@ -1,144 +1,70 @@ { + "dataType": "CVE_RECORD", + "dataVersion": "5.0", + "cveMetadata": { + "state": "PUBLISHED", + "cveId": "CVE-2021-33480", + "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", + "assignerShortName": "fedora", + "dateUpdated": "2024-01-24T05:06:46.403630", + "dateReserved": "2021-05-20T00:00:00", + "datePublished": "2021-11-17T00:00:00" + }, "containers": { "cna": { - "affected": [ - { - "product": "gocr", - "vendor": "n/a", - "versions": [ - { - "status": "affected", - "version": "gocr 0.53-20200802" - } - ] - } - ], + "providerMetadata": { + "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", + "shortName": "fedora", + "dateUpdated": "2024-01-24T05:06:46.403630" + }, "descriptions": [ { "lang": "en", "value": "An use-after-free vulnerability was discovered in gocr through 0.53-20200802 in context_correction() in pgm2asc.c." } ], - "problemTypes": [ + "affected": [ { - "descriptions": [ + "vendor": "n/a", + "product": "gocr", + "versions": [ { - "cweId": "CWE-416", - "description": "CWE-416", - "lang": "en", - "type": "CWE" + "version": "gocr 0.53-20200802", + "status": "affected" } ] } ], - "providerMetadata": { - "dateUpdated": "2021-11-17T17:50:52", - "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", - "shortName": "fedora" - }, "references": [ { - "tags": [ - "x_refsource_MISC" - ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962854" }, { - "tags": [ - "x_refsource_MISC" - ], "url": "https://sourceforge.net/p/jocr/bugs/40/" }, { + "url": "https://sourceforge.net/p/jocr/bugs/41/" + }, + { + "name": "GLSA-202401-28", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://sourceforge.net/p/jocr/bugs/41/" + "url": "https://security.gentoo.org/glsa/202401-28" } ], - "x_legacyV4Record": { - "CVE_data_meta": { - "ASSIGNER": "patrick@puiterwijk.org", - "ID": "CVE-2021-33480", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "gocr", - "version": { - "version_data": [ - { - "version_value": "gocr 0.53-20200802" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "An use-after-free vulnerability was discovered in gocr through 0.53-20200802 in context_correction() in pgm2asc.c." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-416" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1962854", - "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962854" - }, - { - "name": "https://sourceforge.net/p/jocr/bugs/40/", - "refsource": "MISC", - "url": "https://sourceforge.net/p/jocr/bugs/40/" - }, + "problemTypes": [ + { + "descriptions": [ { - "name": "https://sourceforge.net/p/jocr/bugs/41/", - "refsource": "MISC", - "url": "https://sourceforge.net/p/jocr/bugs/41/" + "type": "CWE", + "lang": "en", + "description": "CWE-416", + "cweId": "CWE-416" } ] } - } + ] } - }, - "cveMetadata": { - "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", - "assignerShortName": "fedora", - "cveId": "CVE-2021-33480", - "datePublished": "2021-11-17T17:50:52", - "dateReserved": "2021-05-20T00:00:00", - "dateUpdated": "2021-11-17T17:50:52", - "state": "PUBLISHED" - }, - "dataType": "CVE_RECORD", - "dataVersion": "5.0" + } } \ No newline at end of file diff --git a/cves/2021/33xxx/CVE-2021-33481.json b/cves/2021/33xxx/CVE-2021-33481.json index fb01b373b2bd..f011bedc2378 100644 --- a/cves/2021/33xxx/CVE-2021-33481.json +++ b/cves/2021/33xxx/CVE-2021-33481.json @@ -1,133 +1,67 @@ { + "dataType": "CVE_RECORD", + "dataVersion": "5.0", + "cveMetadata": { + "state": "PUBLISHED", + "cveId": "CVE-2021-33481", + "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", + "assignerShortName": "fedora", + "dateUpdated": "2024-01-24T05:06:44.701577", + "dateReserved": "2021-05-20T00:00:00", + "datePublished": "2021-11-17T00:00:00" + }, "containers": { "cna": { - "affected": [ - { - "product": "gocr", - "vendor": "n/a", - "versions": [ - { - "status": "affected", - "version": "gocr 0.53-20200802" - } - ] - } - ], + "providerMetadata": { + "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", + "shortName": "fedora", + "dateUpdated": "2024-01-24T05:06:44.701577" + }, "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability was discovered in gocr through 0.53-20200802 in try_to_divide_boxes() in pgm2asc.c." } ], - "problemTypes": [ + "affected": [ { - "descriptions": [ + "vendor": "n/a", + "product": "gocr", + "versions": [ { - "cweId": "CWE-119", - "description": "CWE-119", - "lang": "en", - "type": "CWE" + "version": "gocr 0.53-20200802", + "status": "affected" } ] } ], - "providerMetadata": { - "dateUpdated": "2021-11-17T17:52:32", - "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", - "shortName": "fedora" - }, "references": [ { - "tags": [ - "x_refsource_MISC" - ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962865" }, { + "url": "https://sourceforge.net/p/jocr/bugs/42/" + }, + { + "name": "GLSA-202401-28", "tags": [ - "x_refsource_MISC" + "vendor-advisory" ], - "url": "https://sourceforge.net/p/jocr/bugs/42/" + "url": "https://security.gentoo.org/glsa/202401-28" } ], - "x_legacyV4Record": { - "CVE_data_meta": { - "ASSIGNER": "patrick@puiterwijk.org", - "ID": "CVE-2021-33481", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "gocr", - "version": { - "version_data": [ - { - "version_value": "gocr 0.53-20200802" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A stack-based buffer overflow vulnerability was discovered in gocr through 0.53-20200802 in try_to_divide_boxes() in pgm2asc.c." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-119" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1962865", - "refsource": "MISC", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1962865" - }, + "problemTypes": [ + { + "descriptions": [ { - "name": "https://sourceforge.net/p/jocr/bugs/42/", - "refsource": "MISC", - "url": "https://sourceforge.net/p/jocr/bugs/42/" + "type": "CWE", + "lang": "en", + "description": "CWE-119", + "cweId": "CWE-119" } ] } - } + ] } - }, - "cveMetadata": { - "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", - "assignerShortName": "fedora", - "cveId": "CVE-2021-33481", - "datePublished": "2021-11-17T17:52:32", - "dateReserved": "2021-05-20T00:00:00", - "dateUpdated": "2021-11-17T17:52:32", - "state": "PUBLISHED" - }, - "dataType": "CVE_RECORD", - "dataVersion": "5.0" + } } \ No newline at end of file diff --git a/cves/2021/33xxx/CVE-2021-33621.json b/cves/2021/33xxx/CVE-2021-33621.json index 271bd93e53ae..343dbea33e21 100644 --- a/cves/2021/33xxx/CVE-2021-33621.json +++ b/cves/2021/33xxx/CVE-2021-33621.json @@ -6,7 +6,7 @@ "cveId": "CVE-2021-33621", "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", - "dateUpdated": "2023-06-09T00:00:00", + "dateUpdated": "2024-01-24T05:06:28.299372", "dateReserved": "2021-05-28T00:00:00", "datePublished": "2022-11-18T00:00:00" }, @@ -15,7 +15,7 @@ "providerMetadata": { "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre", - "dateUpdated": "2023-06-09T00:00:00" + "dateUpdated": "2024-01-24T05:06:28.299372" }, "descriptions": [ { @@ -69,6 +69,13 @@ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html" + }, + { + "name": "GLSA-202401-27", + "tags": [ + "vendor-advisory" + ], + "url": "https://security.gentoo.org/glsa/202401-27" } ], "problemTypes": [ diff --git a/cves/2021/41xxx/CVE-2021-41816.json b/cves/2021/41xxx/CVE-2021-41816.json index 57144334ff4f..87847d2b9701 100644 --- a/cves/2021/41xxx/CVE-2021-41816.json +++ b/cves/2021/41xxx/CVE-2021-41816.json @@ -1,180 +1,86 @@ { + "dataType": "CVE_RECORD", + "dataVersion": "5.0", + "cveMetadata": { + "state": "PUBLISHED", + "cveId": "CVE-2021-41816", + "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "assignerShortName": "mitre", + "dateUpdated": "2024-01-24T05:06:22.268245", + "dateReserved": "2021-09-29T00:00:00", + "datePublished": "2022-02-06T00:00:00" + }, "containers": { "cna": { - "affected": [ - { - "product": "n/a", - "vendor": "n/a", - "versions": [ - { - "status": "affected", - "version": "n/a" - } - ] - } - ], + "providerMetadata": { + "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "shortName": "mitre", + "dateUpdated": "2024-01-24T05:06:22.268245" + }, "descriptions": [ { "lang": "en", "value": "CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3 has an integer overflow and resultant buffer overflow via a long string on platforms (such as Windows) where size_t and long have different numbers of bytes. This also affects the CGI gem before 0.3.1 for Ruby." } ], - "problemTypes": [ + "affected": [ { - "descriptions": [ + "vendor": "n/a", + "product": "n/a", + "versions": [ { - "description": "n/a", - "lang": "en", - "type": "text" + "version": "n/a", + "status": "affected" } ] } ], - "providerMetadata": { - "dateUpdated": "2022-05-08T03:06:33", - "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", - "shortName": "mitre" - }, "references": [ { - "tags": [ - "x_refsource_MISC" - ], "url": "https://hackerone.com/reports/1328463" }, { - "tags": [ - "x_refsource_CONFIRM" - ], "url": "https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/" }, { - "tags": [ - "x_refsource_MISC" - ], "url": "https://security-tracker.debian.org/tracker/CVE-2021-41816" }, { - "tags": [ - "x_refsource_CONFIRM" - ], "url": "https://security.netapp.com/advisory/ntap-20220303-0006/" }, { "name": "FEDORA-2022-82a9edac27", "tags": [ - "vendor-advisory", - "x_refsource_FEDORA" + "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/" }, { "name": "FEDORA-2022-8cf0124add", "tags": [ - "vendor-advisory", - "x_refsource_FEDORA" + "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/" + }, + { + "name": "GLSA-202401-27", + "tags": [ + "vendor-advisory" + ], + "url": "https://security.gentoo.org/glsa/202401-27" } ], - "x_legacyV4Record": { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2021-41816", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "CGI.escape_html in Ruby before 2.7.5 and 3.x before 3.0.3 has an integer overflow and resultant buffer overflow via a long string on platforms (such as Windows) where size_t and long have different numbers of bytes. This also affects the CGI gem before 0.3.1 for Ruby." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://hackerone.com/reports/1328463", - "refsource": "MISC", - "url": "https://hackerone.com/reports/1328463" - }, - { - "name": "https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/", - "refsource": "CONFIRM", - "url": "https://www.ruby-lang.org/en/news/2021/11/24/buffer-overrun-in-cgi-escape_html-cve-2021-41816/" - }, - { - "name": "https://security-tracker.debian.org/tracker/CVE-2021-41816", - "refsource": "MISC", - "url": "https://security-tracker.debian.org/tracker/CVE-2021-41816" - }, - { - "name": "https://security.netapp.com/advisory/ntap-20220303-0006/", - "refsource": "CONFIRM", - "url": "https://security.netapp.com/advisory/ntap-20220303-0006/" - }, - { - "name": "FEDORA-2022-82a9edac27", - "refsource": "FEDORA", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/" - }, + "problemTypes": [ + { + "descriptions": [ { - "name": "FEDORA-2022-8cf0124add", - "refsource": "FEDORA", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/" + "type": "text", + "lang": "en", + "description": "n/a" } ] } - } + ] } - }, - "cveMetadata": { - "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", - "assignerShortName": "mitre", - "cveId": "CVE-2021-41816", - "datePublished": "2022-02-06T20:51:47", - "dateReserved": "2021-09-29T00:00:00", - "dateUpdated": "2022-05-08T03:06:33", - "state": "PUBLISHED" - }, - "dataType": "CVE_RECORD", - "dataVersion": "5.0" + } } \ No newline at end of file diff --git a/cves/2021/41xxx/CVE-2021-41817.json b/cves/2021/41xxx/CVE-2021-41817.json index 4f386cc598bb..968191a337aa 100644 --- a/cves/2021/41xxx/CVE-2021-41817.json +++ b/cves/2021/41xxx/CVE-2021-41817.json @@ -1,158 +1,80 @@ { + "dataType": "CVE_RECORD", + "dataVersion": "5.0", + "cveMetadata": { + "state": "PUBLISHED", + "cveId": "CVE-2021-41817", + "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "assignerShortName": "mitre", + "dateUpdated": "2024-01-24T05:06:33.551146", + "dateReserved": "2021-09-29T00:00:00", + "datePublished": "2022-01-01T00:00:00" + }, "containers": { "cna": { - "affected": [ - { - "product": "n/a", - "vendor": "n/a", - "versions": [ - { - "status": "affected", - "version": "n/a" - } - ] - } - ], + "providerMetadata": { + "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "shortName": "mitre", + "dateUpdated": "2024-01-24T05:06:33.551146" + }, "descriptions": [ { "lang": "en", "value": "Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1." } ], - "problemTypes": [ + "affected": [ { - "descriptions": [ + "vendor": "n/a", + "product": "n/a", + "versions": [ { - "description": "n/a", - "lang": "en", - "type": "text" + "version": "n/a", + "status": "affected" } ] } ], - "providerMetadata": { - "dateUpdated": "2022-05-08T03:06:34", - "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", - "shortName": "mitre" - }, "references": [ { - "tags": [ - "x_refsource_MISC" - ], "url": "https://hackerone.com/reports/1254844" }, { - "tags": [ - "x_refsource_CONFIRM" - ], "url": "https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/" }, { "name": "FEDORA-2022-82a9edac27", "tags": [ - "vendor-advisory", - "x_refsource_FEDORA" + "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/" }, { "name": "FEDORA-2022-8cf0124add", "tags": [ - "vendor-advisory", - "x_refsource_FEDORA" + "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/" + }, + { + "name": "GLSA-202401-27", + "tags": [ + "vendor-advisory" + ], + "url": "https://security.gentoo.org/glsa/202401-27" } ], - "x_legacyV4Record": { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2021-41817", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://hackerone.com/reports/1254844", - "refsource": "MISC", - "url": "https://hackerone.com/reports/1254844" - }, - { - "name": "https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/", - "refsource": "CONFIRM", - "url": "https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/" - }, - { - "name": "FEDORA-2022-82a9edac27", - "refsource": "FEDORA", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/" - }, + "problemTypes": [ + { + "descriptions": [ { - "name": "FEDORA-2022-8cf0124add", - "refsource": "FEDORA", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/" + "type": "text", + "lang": "en", + "description": "n/a" } ] } - } + ] } - }, - "cveMetadata": { - "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", - "assignerShortName": "mitre", - "cveId": "CVE-2021-41817", - "datePublished": "2022-01-01T04:40:27", - "dateReserved": "2021-09-29T00:00:00", - "dateUpdated": "2022-05-08T03:06:34", - "state": "PUBLISHED" - }, - "dataType": "CVE_RECORD", - "dataVersion": "5.0" + } } \ No newline at end of file diff --git a/cves/2021/41xxx/CVE-2021-41819.json b/cves/2021/41xxx/CVE-2021-41819.json index 0ea7ff0df9a9..b1a910e61de2 100644 --- a/cves/2021/41xxx/CVE-2021-41819.json +++ b/cves/2021/41xxx/CVE-2021-41819.json @@ -1,169 +1,83 @@ { + "dataType": "CVE_RECORD", + "dataVersion": "5.0", + "cveMetadata": { + "state": "PUBLISHED", + "cveId": "CVE-2021-41819", + "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "assignerShortName": "mitre", + "dateUpdated": "2024-01-24T05:06:40.201990", + "dateReserved": "2021-09-29T00:00:00", + "datePublished": "2022-01-01T00:00:00" + }, "containers": { "cna": { - "affected": [ - { - "product": "n/a", - "vendor": "n/a", - "versions": [ - { - "status": "affected", - "version": "n/a" - } - ] - } - ], + "providerMetadata": { + "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "shortName": "mitre", + "dateUpdated": "2024-01-24T05:06:40.201990" + }, "descriptions": [ { "lang": "en", "value": "CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby." } ], - "problemTypes": [ + "affected": [ { - "descriptions": [ + "vendor": "n/a", + "product": "n/a", + "versions": [ { - "description": "n/a", - "lang": "en", - "type": "text" + "version": "n/a", + "status": "affected" } ] } ], - "providerMetadata": { - "dateUpdated": "2022-05-08T03:06:31", - "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", - "shortName": "mitre" - }, "references": [ { - "tags": [ - "x_refsource_MISC" - ], "url": "https://hackerone.com/reports/910552" }, { - "tags": [ - "x_refsource_CONFIRM" - ], "url": "https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/" }, { - "tags": [ - "x_refsource_CONFIRM" - ], "url": "https://security.netapp.com/advisory/ntap-20220121-0003/" }, { "name": "FEDORA-2022-82a9edac27", "tags": [ - "vendor-advisory", - "x_refsource_FEDORA" + "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/" }, { "name": "FEDORA-2022-8cf0124add", "tags": [ - "vendor-advisory", - "x_refsource_FEDORA" + "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/" + }, + { + "name": "GLSA-202401-27", + "tags": [ + "vendor-advisory" + ], + "url": "https://security.gentoo.org/glsa/202401-27" } ], - "x_legacyV4Record": { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2021-41819", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://hackerone.com/reports/910552", - "refsource": "MISC", - "url": "https://hackerone.com/reports/910552" - }, - { - "name": "https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/", - "refsource": "CONFIRM", - "url": "https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/" - }, - { - "name": "https://security.netapp.com/advisory/ntap-20220121-0003/", - "refsource": "CONFIRM", - "url": "https://security.netapp.com/advisory/ntap-20220121-0003/" - }, - { - "name": "FEDORA-2022-82a9edac27", - "refsource": "FEDORA", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IUXQCH6FRKANCVZO2Q7D2SQX33FP3KWN/" - }, + "problemTypes": [ + { + "descriptions": [ { - "name": "FEDORA-2022-8cf0124add", - "refsource": "FEDORA", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UTOJGS5IEFDK3UOO7IY4OTTFGHGLSWZF/" + "type": "text", + "lang": "en", + "description": "n/a" } ] } - } + ] } - }, - "cveMetadata": { - "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", - "assignerShortName": "mitre", - "cveId": "CVE-2021-41819", - "datePublished": "2022-01-01T05:18:57", - "dateReserved": "2021-09-29T00:00:00", - "dateUpdated": "2022-05-08T03:06:31", - "state": "PUBLISHED" - }, - "dataType": "CVE_RECORD", - "dataVersion": "5.0" + } } \ No newline at end of file diff --git a/cves/2022/28xxx/CVE-2022-28738.json b/cves/2022/28xxx/CVE-2022-28738.json index c3e18fc0bb21..647bd8c44190 100644 --- a/cves/2022/28xxx/CVE-2022-28738.json +++ b/cves/2022/28xxx/CVE-2022-28738.json @@ -1,154 +1,72 @@ { + "dataType": "CVE_RECORD", + "dataVersion": "5.0", + "cveMetadata": { + "state": "PUBLISHED", + "cveId": "CVE-2022-28738", + "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "assignerShortName": "mitre", + "dateUpdated": "2024-01-24T05:06:35.199929", + "dateReserved": "2022-04-06T00:00:00", + "datePublished": "2022-05-09T00:00:00" + }, "containers": { "cna": { - "affected": [ - { - "product": "n/a", - "vendor": "n/a", - "versions": [ - { - "status": "affected", - "version": "n/a" - } - ] - } - ], + "providerMetadata": { + "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "shortName": "mitre", + "dateUpdated": "2024-01-24T05:06:35.199929" + }, "descriptions": [ { "lang": "en", "value": "A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations." } ], - "problemTypes": [ + "affected": [ { - "descriptions": [ + "vendor": "n/a", + "product": "n/a", + "versions": [ { - "description": "n/a", - "lang": "en", - "type": "text" + "version": "n/a", + "status": "affected" } ] } ], - "providerMetadata": { - "dateUpdated": "2022-06-24T15:06:41", - "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", - "shortName": "mitre" - }, "references": [ { - "tags": [ - "x_refsource_MISC" - ], "url": "https://hackerone.com/reports/1220911" }, { - "tags": [ - "x_refsource_CONFIRM" - ], "url": "https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/" }, { - "tags": [ - "x_refsource_MISC" - ], "url": "https://security-tracker.debian.org/tracker/CVE-2022-28738" }, { + "url": "https://security.netapp.com/advisory/ntap-20220624-0002/" + }, + { + "name": "GLSA-202401-27", "tags": [ - "x_refsource_CONFIRM" + "vendor-advisory" ], - "url": "https://security.netapp.com/advisory/ntap-20220624-0002/" + "url": "https://security.gentoo.org/glsa/202401-27" } ], - "x_legacyV4Record": { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2022-28738", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://hackerone.com/reports/1220911", - "refsource": "MISC", - "url": "https://hackerone.com/reports/1220911" - }, - { - "name": "https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/", - "refsource": "CONFIRM", - "url": "https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/" - }, - { - "name": "https://security-tracker.debian.org/tracker/CVE-2022-28738", - "refsource": "MISC", - "url": "https://security-tracker.debian.org/tracker/CVE-2022-28738" - }, + "problemTypes": [ + { + "descriptions": [ { - "name": "https://security.netapp.com/advisory/ntap-20220624-0002/", - "refsource": "CONFIRM", - "url": "https://security.netapp.com/advisory/ntap-20220624-0002/" + "type": "text", + "lang": "en", + "description": "n/a" } ] } - } + ] } - }, - "cveMetadata": { - "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", - "assignerShortName": "mitre", - "cveId": "CVE-2022-28738", - "datePublished": "2022-05-09T17:38:08", - "dateReserved": "2022-04-06T00:00:00", - "dateUpdated": "2022-06-24T15:06:41", - "state": "PUBLISHED" - }, - "dataType": "CVE_RECORD", - "dataVersion": "5.0" + } } \ No newline at end of file diff --git a/cves/2022/28xxx/CVE-2022-28739.json b/cves/2022/28xxx/CVE-2022-28739.json index a4e8f1ec5b4f..93fcf2ef46e4 100644 --- a/cves/2022/28xxx/CVE-2022-28739.json +++ b/cves/2022/28xxx/CVE-2022-28739.json @@ -30,7 +30,7 @@ "versions": [ { "version": "n/a", - "status": "unknown" + "status": "affected" } ] } @@ -94,12 +94,16 @@ }, { "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html" + }, + { + "url": "https://security.gentoo.org/glsa/202401-27" } ], "problemTypes": [ { "descriptions": [ { + "type": "text", "lang": "en", "description": "n/a" } diff --git a/cves/2023/28xxx/CVE-2023-28755.json b/cves/2023/28xxx/CVE-2023-28755.json index 696d1c7496a3..93f88cc81522 100644 --- a/cves/2023/28xxx/CVE-2023-28755.json +++ b/cves/2023/28xxx/CVE-2023-28755.json @@ -6,7 +6,7 @@ "cveId": "CVE-2023-28755", "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", - "dateUpdated": "2023-05-26T00:00:00", + "dateUpdated": "2024-01-24T05:06:24.130886", "dateReserved": "2023-03-23T00:00:00", "datePublished": "2023-03-31T00:00:00" }, @@ -15,7 +15,7 @@ "providerMetadata": { "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre", - "dateUpdated": "2023-05-26T00:00:00" + "dateUpdated": "2024-01-24T05:06:24.130886" }, "descriptions": [ { @@ -78,6 +78,13 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20230526-0003/" + }, + { + "name": "GLSA-202401-27", + "tags": [ + "vendor-advisory" + ], + "url": "https://security.gentoo.org/glsa/202401-27" } ], "problemTypes": [ diff --git a/cves/2023/28xxx/CVE-2023-28756.json b/cves/2023/28xxx/CVE-2023-28756.json index e6f272f06807..f8a02bd471d1 100644 --- a/cves/2023/28xxx/CVE-2023-28756.json +++ b/cves/2023/28xxx/CVE-2023-28756.json @@ -6,7 +6,7 @@ "cveId": "CVE-2023-28756", "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", - "dateUpdated": "2023-05-26T00:00:00", + "dateUpdated": "2024-01-24T05:06:38.560368", "dateReserved": "2023-03-23T00:00:00", "datePublished": "2023-03-31T00:00:00" }, @@ -15,7 +15,7 @@ "providerMetadata": { "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre", - "dateUpdated": "2023-05-26T00:00:00" + "dateUpdated": "2024-01-24T05:06:38.560368" }, "descriptions": [ { @@ -78,6 +78,13 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20230526-0004/" + }, + { + "name": "GLSA-202401-27", + "tags": [ + "vendor-advisory" + ], + "url": "https://security.gentoo.org/glsa/202401-27" } ], "problemTypes": [ diff --git a/cves/2023/42xxx/CVE-2023-42465.json b/cves/2023/42xxx/CVE-2023-42465.json index 98aa0d645eab..65c6fe628792 100644 --- a/cves/2023/42xxx/CVE-2023-42465.json +++ b/cves/2023/42xxx/CVE-2023-42465.json @@ -6,7 +6,7 @@ "cveId": "CVE-2023-42465", "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", - "dateUpdated": "2023-12-22T15:58:22.467334", + "dateUpdated": "2024-01-24T05:06:41.774895", "dateReserved": "2023-09-11T00:00:00", "datePublished": "2023-12-22T00:00:00" }, @@ -15,7 +15,7 @@ "providerMetadata": { "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre", - "dateUpdated": "2023-12-22T15:58:22.467334" + "dateUpdated": "2024-01-24T05:06:41.774895" }, "descriptions": [ { @@ -50,6 +50,13 @@ }, { "url": "https://github.com/sudo-project/sudo/releases/tag/SUDO_1_9_15" + }, + { + "name": "GLSA-202401-29", + "tags": [ + "vendor-advisory" + ], + "url": "https://security.gentoo.org/glsa/202401-29" } ], "problemTypes": [ diff --git a/cves/delta.json b/cves/delta.json index 913816384a92..addc5eb36a4a 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,20 +1,98 @@ { - "fetchTime": "2024-01-24T04:40:57.089Z", - "numberOfChanges": 2, - "new": [ + "fetchTime": "2024-01-24T05:13:36.688Z", + "numberOfChanges": 15, + "new": [], + "updated": [ { - "cveId": "CVE-2024-22366", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-22366", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/22xxx/CVE-2024-22366.json", - "dateUpdated": "2024-01-24T04:35:55.337Z" + "cveId": "CVE-2020-25613", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2020-25613", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2020/25xxx/CVE-2020-25613.json", + "dateUpdated": "2024-01-24T05:06:30.204645" }, { - "cveId": "CVE-2024-22372", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-22372", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/22xxx/CVE-2024-22372.json", - "dateUpdated": "2024-01-24T04:38:20.199Z" + "cveId": "CVE-2021-31810", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-31810", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/31xxx/CVE-2021-31810.json", + "dateUpdated": "2024-01-24T05:06:36.810387" + }, + { + "cveId": "CVE-2021-32066", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-32066", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/32xxx/CVE-2021-32066.json", + "dateUpdated": "2024-01-24T05:06:31.921371" + }, + { + "cveId": "CVE-2021-33479", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-33479", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/33xxx/CVE-2021-33479.json", + "dateUpdated": "2024-01-24T05:06:43.268942" + }, + { + "cveId": "CVE-2021-33480", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-33480", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/33xxx/CVE-2021-33480.json", + "dateUpdated": "2024-01-24T05:06:46.403630" + }, + { + "cveId": "CVE-2021-33481", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-33481", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/33xxx/CVE-2021-33481.json", + "dateUpdated": "2024-01-24T05:06:44.701577" + }, + { + "cveId": "CVE-2021-33621", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-33621", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/33xxx/CVE-2021-33621.json", + "dateUpdated": "2024-01-24T05:06:28.299372" + }, + { + "cveId": "CVE-2021-41816", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-41816", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/41xxx/CVE-2021-41816.json", + "dateUpdated": "2024-01-24T05:06:22.268245" + }, + { + "cveId": "CVE-2021-41817", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-41817", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/41xxx/CVE-2021-41817.json", + "dateUpdated": "2024-01-24T05:06:33.551146" + }, + { + "cveId": "CVE-2021-41819", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-41819", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/41xxx/CVE-2021-41819.json", + "dateUpdated": "2024-01-24T05:06:40.201990" + }, + { + "cveId": "CVE-2022-28738", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-28738", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/28xxx/CVE-2022-28738.json", + "dateUpdated": "2024-01-24T05:06:35.199929" + }, + { + "cveId": "CVE-2022-28739", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-28739", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/28xxx/CVE-2022-28739.json", + "dateUpdated": "2022-10-30T00:00:00" + }, + { + "cveId": "CVE-2023-28755", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-28755", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/28xxx/CVE-2023-28755.json", + "dateUpdated": "2024-01-24T05:06:24.130886" + }, + { + "cveId": "CVE-2023-28756", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-28756", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/28xxx/CVE-2023-28756.json", + "dateUpdated": "2024-01-24T05:06:38.560368" + }, + { + "cveId": "CVE-2023-42465", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-42465", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/42xxx/CVE-2023-42465.json", + "dateUpdated": "2024-01-24T05:06:41.774895" } ], - "updated": [], "error": [] } \ No newline at end of file diff --git a/cves/deltaLog.json b/cves/deltaLog.json index 49e54348d992..effff9addaf7 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,102 @@ [ + { + "fetchTime": "2024-01-24T05:13:36.688Z", + "numberOfChanges": 15, + "new": [], + "updated": [ + { + "cveId": "CVE-2020-25613", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2020-25613", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2020/25xxx/CVE-2020-25613.json", + "dateUpdated": "2024-01-24T05:06:30.204645" + }, + { + "cveId": "CVE-2021-31810", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-31810", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/31xxx/CVE-2021-31810.json", + "dateUpdated": "2024-01-24T05:06:36.810387" + }, + { + "cveId": "CVE-2021-32066", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-32066", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/32xxx/CVE-2021-32066.json", + "dateUpdated": "2024-01-24T05:06:31.921371" + }, + { + "cveId": "CVE-2021-33479", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-33479", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/33xxx/CVE-2021-33479.json", + "dateUpdated": "2024-01-24T05:06:43.268942" + }, + { + "cveId": "CVE-2021-33480", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-33480", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/33xxx/CVE-2021-33480.json", + "dateUpdated": "2024-01-24T05:06:46.403630" + }, + { + "cveId": "CVE-2021-33481", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-33481", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/33xxx/CVE-2021-33481.json", + "dateUpdated": "2024-01-24T05:06:44.701577" + }, + { + "cveId": "CVE-2021-33621", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-33621", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/33xxx/CVE-2021-33621.json", + "dateUpdated": "2024-01-24T05:06:28.299372" + }, + { + "cveId": "CVE-2021-41816", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-41816", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/41xxx/CVE-2021-41816.json", + "dateUpdated": "2024-01-24T05:06:22.268245" + }, + { + "cveId": "CVE-2021-41817", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-41817", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/41xxx/CVE-2021-41817.json", + "dateUpdated": "2024-01-24T05:06:33.551146" + }, + { + "cveId": "CVE-2021-41819", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2021-41819", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2021/41xxx/CVE-2021-41819.json", + "dateUpdated": "2024-01-24T05:06:40.201990" + }, + { + "cveId": "CVE-2022-28738", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-28738", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/28xxx/CVE-2022-28738.json", + "dateUpdated": "2024-01-24T05:06:35.199929" + }, + { + "cveId": "CVE-2022-28739", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2022-28739", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2022/28xxx/CVE-2022-28739.json", + "dateUpdated": "2022-10-30T00:00:00" + }, + { + "cveId": "CVE-2023-28755", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-28755", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/28xxx/CVE-2023-28755.json", + "dateUpdated": "2024-01-24T05:06:24.130886" + }, + { + "cveId": "CVE-2023-28756", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-28756", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/28xxx/CVE-2023-28756.json", + "dateUpdated": "2024-01-24T05:06:38.560368" + }, + { + "cveId": "CVE-2023-42465", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-42465", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/42xxx/CVE-2023-42465.json", + "dateUpdated": "2024-01-24T05:06:41.774895" + } + ], + "error": [] + }, { "fetchTime": "2024-01-24T04:40:57.089Z", "numberOfChanges": 2, @@ -57142,33 +57240,5 @@ ], "updated": [], "error": [] - }, - { - "fetchTime": "2023-12-25T05:03:10.587Z", - "numberOfChanges": 1, - "new": [ - { - "cveId": "CVE-2023-30451", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-30451", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/30xxx/CVE-2023-30451.json", - "dateUpdated": "2023-12-25T05:02:47.293044" - } - ], - "updated": [], - "error": [] - }, - { - "fetchTime": "2023-12-25T04:51:01.394Z", - "numberOfChanges": 1, - "new": [ - { - "cveId": "CVE-2023-51771", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2023-51771", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2023/51xxx/CVE-2023-51771.json", - "dateUpdated": "2023-12-25T04:47:23.185135" - } - ], - "updated": [], - "error": [] } ] \ No newline at end of file