mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-30 18:21:17 +00:00
Auto-Update: 2024-12-15T05:00:19.526553+00:00
This commit is contained in:
parent
5fc0b01395
commit
589ce3ec39
21
CVE-2024/CVE-2024-559xx/CVE-2024-55969.json
Normal file
21
CVE-2024/CVE-2024-559xx/CVE-2024-55969.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-55969",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-15T04:15:04.657",
|
||||
"lastModified": "2024-12-15T04:15:04.657",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DocIO in Syncfusion Essential Studio for ASP.NET MVC before 27.1.55 throws XMLException during the resaving of a DOCX document with an external reference XML, aka I640714."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ej2.syncfusion.com/aspnetmvc/documentation/release-notes/27.1.55?type=all",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-559xx/CVE-2024-55970.json
Normal file
21
CVE-2024/CVE-2024-559xx/CVE-2024-55970.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-55970",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-15T03:15:15.263",
|
||||
"lastModified": "2024-12-15T03:15:15.263",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "File Manager in Syncfusion Essential Studio for ASP.NET MVC before 27.1.55 has a traversal issue that is related to the request parameter, aka I644734."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://ej2.syncfusion.com/aspnetmvc/documentation/release-notes/27.1.55?type=all",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-560xx/CVE-2024-56072.json
Normal file
25
CVE-2024/CVE-2024-560xx/CVE-2024-56072.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-56072",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-15T03:15:16.323",
|
||||
"lastModified": "2024-12-15T03:15:16.323",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in FastNetMon Community Edition through 1.2.7. The sFlow v5 plugin allows remote attackers to cause a denial of service (application crash) via a crafted packet that specifies many sFlow samples."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pavel-odintsov/fastnetmon/commit/5164a29603fff9dd445b7660a35090989f005000",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pavel-odintsov/fastnetmon/commit/65c40ee92dd5bcad1ab52cbafa1afd62cf669e48",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-560xx/CVE-2024-56073.json
Normal file
25
CVE-2024/CVE-2024-560xx/CVE-2024-56073.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-56073",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-15T03:15:16.433",
|
||||
"lastModified": "2024-12-15T03:15:16.433",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in FastNetMon Community Edition through 1.2.7. Zero-length templates for Netflow v9 allow remote attackers to cause a denial of service (divide-by-zero error and application crash)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cwe.mitre.org/data/definitions/369.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pavel-odintsov/fastnetmon/commit/a36718525e08ad0f2a809363001bf105efc5fe1c",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
37
CVE-2024/CVE-2024-560xx/CVE-2024-56074.json
Normal file
37
CVE-2024/CVE-2024-560xx/CVE-2024-56074.json
Normal file
@ -0,0 +1,37 @@
|
||||
{
|
||||
"id": "CVE-2024-56074",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-12-15T04:15:05.360",
|
||||
"lastModified": "2024-12-15T04:15:05.360",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "gitingest before 9996a06 mishandles symbolic links that point outside of the base directory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cyclotruc/gitingest/blob/9996a06a94450497c1abb35997f5e6cbc9b571ff/src/ingest.py#L22-L30",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cyclotruc/gitingest/blob/9996a06a94450497c1abb35997f5e6cbc9b571ff/src/ingest.py#L99-L100",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cyclotruc/gitingest/commit/9996a06a94450497c1abb35997f5e6cbc9b571ff",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cyclotruc/gitingest/pull/23",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://gitingest.com/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
40
README.md
40
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2024-12-15T03:00:19.262894+00:00
|
||||
2024-12-15T05:00:19.526553+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2024-12-14T21:15:38.707000+00:00
|
||||
2024-12-15T04:15:05.360000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,44 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
273878
|
||||
273883
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `0`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
- [CVE-2024-55969](CVE-2024/CVE-2024-559xx/CVE-2024-55969.json) (`2024-12-15T04:15:04.657`)
|
||||
- [CVE-2024-55970](CVE-2024/CVE-2024-559xx/CVE-2024-55970.json) (`2024-12-15T03:15:15.263`)
|
||||
- [CVE-2024-56072](CVE-2024/CVE-2024-560xx/CVE-2024-56072.json) (`2024-12-15T03:15:16.323`)
|
||||
- [CVE-2024-56073](CVE-2024/CVE-2024-560xx/CVE-2024-56073.json) (`2024-12-15T03:15:16.433`)
|
||||
- [CVE-2024-56074](CVE-2024/CVE-2024-560xx/CVE-2024-56074.json) (`2024-12-15T04:15:05.360`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `20787`
|
||||
Recently modified CVEs: `0`
|
||||
|
||||
- [CVE-2024-9914](CVE-2024/CVE-2024-99xx/CVE-2024-9914.json) (`2024-10-16T15:27:00.080`)
|
||||
- [CVE-2024-9915](CVE-2024/CVE-2024-99xx/CVE-2024-9915.json) (`2024-10-16T15:26:12.137`)
|
||||
- [CVE-2024-9916](CVE-2024/CVE-2024-99xx/CVE-2024-9916.json) (`2024-10-16T22:11:04.453`)
|
||||
- [CVE-2024-9917](CVE-2024/CVE-2024-99xx/CVE-2024-9917.json) (`2024-10-19T00:49:07.090`)
|
||||
- [CVE-2024-9921](CVE-2024/CVE-2024-99xx/CVE-2024-9921.json) (`2024-10-24T13:19:24.920`)
|
||||
- [CVE-2024-9925](CVE-2024/CVE-2024-99xx/CVE-2024-9925.json) (`2024-10-17T18:09:40.537`)
|
||||
- [CVE-2024-9927](CVE-2024/CVE-2024-99xx/CVE-2024-9927.json) (`2024-10-25T16:29:27.300`)
|
||||
- [CVE-2024-9941](CVE-2024/CVE-2024-99xx/CVE-2024-9941.json) (`2024-11-26T19:37:15.283`)
|
||||
- [CVE-2024-9942](CVE-2024/CVE-2024-99xx/CVE-2024-9942.json) (`2024-11-26T19:33:35.843`)
|
||||
- [CVE-2024-9945](CVE-2024/CVE-2024-99xx/CVE-2024-9945.json) (`2024-12-13T16:15:28.267`)
|
||||
- [CVE-2024-9952](CVE-2024/CVE-2024-99xx/CVE-2024-9952.json) (`2024-10-16T15:05:13.467`)
|
||||
- [CVE-2024-9967](CVE-2024/CVE-2024-99xx/CVE-2024-9967.json) (`2024-11-22T20:22:00.697`)
|
||||
- [CVE-2024-9968](CVE-2024/CVE-2024-99xx/CVE-2024-9968.json) (`2024-10-19T00:42:13.957`)
|
||||
- [CVE-2024-9971](CVE-2024/CVE-2024-99xx/CVE-2024-9971.json) (`2024-10-17T20:34:30.257`)
|
||||
- [CVE-2024-9973](CVE-2024/CVE-2024-99xx/CVE-2024-9973.json) (`2024-10-15T19:27:44.020`)
|
||||
- [CVE-2024-9974](CVE-2024/CVE-2024-99xx/CVE-2024-9974.json) (`2024-10-15T19:28:37.377`)
|
||||
- [CVE-2024-9975](CVE-2024/CVE-2024-99xx/CVE-2024-9975.json) (`2024-10-16T13:44:46.220`)
|
||||
- [CVE-2024-9976](CVE-2024/CVE-2024-99xx/CVE-2024-9976.json) (`2024-10-16T13:42:24.153`)
|
||||
- [CVE-2024-9979](CVE-2024/CVE-2024-99xx/CVE-2024-9979.json) (`2024-10-16T16:38:43.170`)
|
||||
- [CVE-2024-9980](CVE-2024/CVE-2024-99xx/CVE-2024-9980.json) (`2024-10-17T18:03:34.807`)
|
||||
- [CVE-2024-9984](CVE-2024/CVE-2024-99xx/CVE-2024-9984.json) (`2024-10-16T22:03:23.407`)
|
||||
- [CVE-2024-9986](CVE-2024/CVE-2024-99xx/CVE-2024-9986.json) (`2024-10-21T13:07:47.700`)
|
||||
- [CVE-2024-9988](CVE-2024/CVE-2024-99xx/CVE-2024-9988.json) (`2024-11-07T17:00:29.560`)
|
||||
- [CVE-2024-9989](CVE-2024/CVE-2024-99xx/CVE-2024-9989.json) (`2024-11-07T17:00:56.337`)
|
||||
- [CVE-2024-9990](CVE-2024/CVE-2024-99xx/CVE-2024-9990.json) (`2024-11-06T23:11:42.037`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
41579
_state.csv
41579
_state.csv
File diff suppressed because it is too large
Load Diff
Loading…
x
Reference in New Issue
Block a user