Auto-Update: 2024-12-15T05:00:19.526553+00:00

This commit is contained in:
cad-safe-bot 2024-12-15 05:03:43 +00:00
parent 5fc0b01395
commit 589ce3ec39
7 changed files with 20931 additions and 20817 deletions

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-55969",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-15T04:15:04.657",
"lastModified": "2024-12-15T04:15:04.657",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DocIO in Syncfusion Essential Studio for ASP.NET MVC before 27.1.55 throws XMLException during the resaving of a DOCX document with an external reference XML, aka I640714."
}
],
"metrics": {},
"references": [
{
"url": "https://ej2.syncfusion.com/aspnetmvc/documentation/release-notes/27.1.55?type=all",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-55970",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-15T03:15:15.263",
"lastModified": "2024-12-15T03:15:15.263",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "File Manager in Syncfusion Essential Studio for ASP.NET MVC before 27.1.55 has a traversal issue that is related to the request parameter, aka I644734."
}
],
"metrics": {},
"references": [
{
"url": "https://ej2.syncfusion.com/aspnetmvc/documentation/release-notes/27.1.55?type=all",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-56072",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-15T03:15:16.323",
"lastModified": "2024-12-15T03:15:16.323",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in FastNetMon Community Edition through 1.2.7. The sFlow v5 plugin allows remote attackers to cause a denial of service (application crash) via a crafted packet that specifies many sFlow samples."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/pavel-odintsov/fastnetmon/commit/5164a29603fff9dd445b7660a35090989f005000",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/pavel-odintsov/fastnetmon/commit/65c40ee92dd5bcad1ab52cbafa1afd62cf669e48",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-56073",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-15T03:15:16.433",
"lastModified": "2024-12-15T03:15:16.433",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in FastNetMon Community Edition through 1.2.7. Zero-length templates for Netflow v9 allow remote attackers to cause a denial of service (divide-by-zero error and application crash)."
}
],
"metrics": {},
"references": [
{
"url": "https://cwe.mitre.org/data/definitions/369.html",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/pavel-odintsov/fastnetmon/commit/a36718525e08ad0f2a809363001bf105efc5fe1c",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-56074",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-15T04:15:05.360",
"lastModified": "2024-12-15T04:15:05.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "gitingest before 9996a06 mishandles symbolic links that point outside of the base directory."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/cyclotruc/gitingest/blob/9996a06a94450497c1abb35997f5e6cbc9b571ff/src/ingest.py#L22-L30",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/cyclotruc/gitingest/blob/9996a06a94450497c1abb35997f5e6cbc9b571ff/src/ingest.py#L99-L100",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/cyclotruc/gitingest/commit/9996a06a94450497c1abb35997f5e6cbc9b571ff",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/cyclotruc/gitingest/pull/23",
"source": "cve@mitre.org"
},
{
"url": "https://gitingest.com/",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-15T03:00:19.262894+00:00
2024-12-15T05:00:19.526553+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-14T21:15:38.707000+00:00
2024-12-15T04:15:05.360000+00:00
```
### Last Data Feed Release
@ -33,44 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
273878
273883
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `5`
- [CVE-2024-55969](CVE-2024/CVE-2024-559xx/CVE-2024-55969.json) (`2024-12-15T04:15:04.657`)
- [CVE-2024-55970](CVE-2024/CVE-2024-559xx/CVE-2024-55970.json) (`2024-12-15T03:15:15.263`)
- [CVE-2024-56072](CVE-2024/CVE-2024-560xx/CVE-2024-56072.json) (`2024-12-15T03:15:16.323`)
- [CVE-2024-56073](CVE-2024/CVE-2024-560xx/CVE-2024-56073.json) (`2024-12-15T03:15:16.433`)
- [CVE-2024-56074](CVE-2024/CVE-2024-560xx/CVE-2024-56074.json) (`2024-12-15T04:15:05.360`)
### CVEs modified in the last Commit
Recently modified CVEs: `20787`
Recently modified CVEs: `0`
- [CVE-2024-9914](CVE-2024/CVE-2024-99xx/CVE-2024-9914.json) (`2024-10-16T15:27:00.080`)
- [CVE-2024-9915](CVE-2024/CVE-2024-99xx/CVE-2024-9915.json) (`2024-10-16T15:26:12.137`)
- [CVE-2024-9916](CVE-2024/CVE-2024-99xx/CVE-2024-9916.json) (`2024-10-16T22:11:04.453`)
- [CVE-2024-9917](CVE-2024/CVE-2024-99xx/CVE-2024-9917.json) (`2024-10-19T00:49:07.090`)
- [CVE-2024-9921](CVE-2024/CVE-2024-99xx/CVE-2024-9921.json) (`2024-10-24T13:19:24.920`)
- [CVE-2024-9925](CVE-2024/CVE-2024-99xx/CVE-2024-9925.json) (`2024-10-17T18:09:40.537`)
- [CVE-2024-9927](CVE-2024/CVE-2024-99xx/CVE-2024-9927.json) (`2024-10-25T16:29:27.300`)
- [CVE-2024-9941](CVE-2024/CVE-2024-99xx/CVE-2024-9941.json) (`2024-11-26T19:37:15.283`)
- [CVE-2024-9942](CVE-2024/CVE-2024-99xx/CVE-2024-9942.json) (`2024-11-26T19:33:35.843`)
- [CVE-2024-9945](CVE-2024/CVE-2024-99xx/CVE-2024-9945.json) (`2024-12-13T16:15:28.267`)
- [CVE-2024-9952](CVE-2024/CVE-2024-99xx/CVE-2024-9952.json) (`2024-10-16T15:05:13.467`)
- [CVE-2024-9967](CVE-2024/CVE-2024-99xx/CVE-2024-9967.json) (`2024-11-22T20:22:00.697`)
- [CVE-2024-9968](CVE-2024/CVE-2024-99xx/CVE-2024-9968.json) (`2024-10-19T00:42:13.957`)
- [CVE-2024-9971](CVE-2024/CVE-2024-99xx/CVE-2024-9971.json) (`2024-10-17T20:34:30.257`)
- [CVE-2024-9973](CVE-2024/CVE-2024-99xx/CVE-2024-9973.json) (`2024-10-15T19:27:44.020`)
- [CVE-2024-9974](CVE-2024/CVE-2024-99xx/CVE-2024-9974.json) (`2024-10-15T19:28:37.377`)
- [CVE-2024-9975](CVE-2024/CVE-2024-99xx/CVE-2024-9975.json) (`2024-10-16T13:44:46.220`)
- [CVE-2024-9976](CVE-2024/CVE-2024-99xx/CVE-2024-9976.json) (`2024-10-16T13:42:24.153`)
- [CVE-2024-9979](CVE-2024/CVE-2024-99xx/CVE-2024-9979.json) (`2024-10-16T16:38:43.170`)
- [CVE-2024-9980](CVE-2024/CVE-2024-99xx/CVE-2024-9980.json) (`2024-10-17T18:03:34.807`)
- [CVE-2024-9984](CVE-2024/CVE-2024-99xx/CVE-2024-9984.json) (`2024-10-16T22:03:23.407`)
- [CVE-2024-9986](CVE-2024/CVE-2024-99xx/CVE-2024-9986.json) (`2024-10-21T13:07:47.700`)
- [CVE-2024-9988](CVE-2024/CVE-2024-99xx/CVE-2024-9988.json) (`2024-11-07T17:00:29.560`)
- [CVE-2024-9989](CVE-2024/CVE-2024-99xx/CVE-2024-9989.json) (`2024-11-07T17:00:56.337`)
- [CVE-2024-9990](CVE-2024/CVE-2024-99xx/CVE-2024-9990.json) (`2024-11-06T23:11:42.037`)
## Download and Usage

41579
_state.csv

File diff suppressed because it is too large Load Diff