Auto-Update: 2024-06-16T04:00:18.190371+00:00

This commit is contained in:
cad-safe-bot 2024-06-16 04:03:11 +00:00
parent 22bafe98ad
commit 798114e0fd
5 changed files with 697 additions and 667 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3049",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-06-06T06:15:09.550",
"lastModified": "2024-06-11T17:54:22.763",
"vulnStatus": "Analyzed",
"lastModified": "2024-06-16T03:15:08.520",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -247,6 +247,10 @@
"tags": [
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KPK5BHYOB7CFFRQAN55YV5LH44PWHMQD/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-38427",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-16T02:15:08.557",
"lastModified": "2024-06-16T02:15:08.557",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "In International Color Consortium DemoIccMAX before 85ce74e, a logic flaw in CIccTagXmlProfileSequenceId::ParseXml in IccXML/IccLibXML/IccTagXml.cpp results in unconditionally returning false."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/InternationalColorConsortium/DemoIccMAX/pull/66",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/InternationalColorConsortium/DemoIccMAX/pull/66/commits/85ce74ef19fb0751c7e188b06daed22fe74c332c",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2024-38428",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-16T03:15:08.430",
"lastModified": "2024-06-16T03:15:08.430",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "url.c in GNU Wget through 1.24.5 mishandles semicolons in the userinfo subcomponent of a URI, and thus there may be insecure behavior in which data that was supposed to be in the userinfo subcomponent is misinterpreted to be part of the host subcomponent."
}
],
"metrics": {},
"references": [
{
"url": "https://git.savannah.gnu.org/cgit/wget.git/commit/?id=ed0c7c7e0e8f7298352646b2fd6e06a11e242ace",
"source": "cve@mitre.org"
},
{
"url": "https://lists.gnu.org/archive/html/bug-wget/2024-06/msg00005.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-06-16T02:00:18.245901+00:00
2024-06-16T04:00:18.190371+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-06-16T01:15:48.537000+00:00
2024-06-16T03:15:08.520000+00:00
```
### Last Data Feed Release
@ -33,46 +33,22 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
254221
254223
```
### CVEs added in the last Commit
Recently added CVEs: `2`
- [CVE-2024-38394](CVE-2024/CVE-2024-383xx/CVE-2024-38394.json) (`2024-06-16T00:15:49.380`)
- [CVE-2024-38395](CVE-2024/CVE-2024-383xx/CVE-2024-38395.json) (`2024-06-16T01:15:48.537`)
- [CVE-2024-38427](CVE-2024/CVE-2024-384xx/CVE-2024-38427.json) (`2024-06-16T02:15:08.557`)
- [CVE-2024-38428](CVE-2024/CVE-2024-384xx/CVE-2024-38428.json) (`2024-06-16T03:15:08.430`)
### CVEs modified in the last Commit
Recently modified CVEs: `631`
Recently modified CVEs: `1`
- [CVE-2024-5834](CVE-2024/CVE-2024-58xx/CVE-2024-5834.json) (`2024-06-14T06:15:14.953`)
- [CVE-2024-5835](CVE-2024/CVE-2024-58xx/CVE-2024-5835.json) (`2024-06-14T06:15:15.090`)
- [CVE-2024-5836](CVE-2024/CVE-2024-58xx/CVE-2024-5836.json) (`2024-06-14T06:15:15.463`)
- [CVE-2024-5837](CVE-2024/CVE-2024-58xx/CVE-2024-5837.json) (`2024-06-14T06:15:15.683`)
- [CVE-2024-5838](CVE-2024/CVE-2024-58xx/CVE-2024-5838.json) (`2024-06-14T06:15:15.887`)
- [CVE-2024-5839](CVE-2024/CVE-2024-58xx/CVE-2024-5839.json) (`2024-06-14T06:15:16.180`)
- [CVE-2024-5840](CVE-2024/CVE-2024-58xx/CVE-2024-5840.json) (`2024-06-14T06:15:16.280`)
- [CVE-2024-5841](CVE-2024/CVE-2024-58xx/CVE-2024-5841.json) (`2024-06-14T06:15:16.640`)
- [CVE-2024-5842](CVE-2024/CVE-2024-58xx/CVE-2024-5842.json) (`2024-06-14T06:15:16.913`)
- [CVE-2024-5843](CVE-2024/CVE-2024-58xx/CVE-2024-5843.json) (`2024-06-14T06:15:17.170`)
- [CVE-2024-5844](CVE-2024/CVE-2024-58xx/CVE-2024-5844.json) (`2024-06-14T06:15:17.517`)
- [CVE-2024-5845](CVE-2024/CVE-2024-58xx/CVE-2024-5845.json) (`2024-06-14T06:15:17.790`)
- [CVE-2024-5846](CVE-2024/CVE-2024-58xx/CVE-2024-5846.json) (`2024-06-14T06:15:18.070`)
- [CVE-2024-5847](CVE-2024/CVE-2024-58xx/CVE-2024-5847.json) (`2024-06-14T06:15:18.340`)
- [CVE-2024-5924](CVE-2024/CVE-2024-59xx/CVE-2024-5924.json) (`2024-06-13T20:15:16.000`)
- [CVE-2024-5947](CVE-2024/CVE-2024-59xx/CVE-2024-5947.json) (`2024-06-13T20:15:16.277`)
- [CVE-2024-5948](CVE-2024/CVE-2024-59xx/CVE-2024-5948.json) (`2024-06-13T20:15:16.497`)
- [CVE-2024-5949](CVE-2024/CVE-2024-59xx/CVE-2024-5949.json) (`2024-06-13T20:15:16.710`)
- [CVE-2024-5950](CVE-2024/CVE-2024-59xx/CVE-2024-5950.json) (`2024-06-13T20:15:16.923`)
- [CVE-2024-5951](CVE-2024/CVE-2024-59xx/CVE-2024-5951.json) (`2024-06-13T20:15:17.140`)
- [CVE-2024-5952](CVE-2024/CVE-2024-59xx/CVE-2024-5952.json) (`2024-06-13T20:15:17.350`)
- [CVE-2024-5976](CVE-2024/CVE-2024-59xx/CVE-2024-5976.json) (`2024-06-14T03:15:15.327`)
- [CVE-2024-5985](CVE-2024/CVE-2024-59xx/CVE-2024-5985.json) (`2024-06-14T02:15:10.713`)
- [CVE-2024-5995](CVE-2024/CVE-2024-59xx/CVE-2024-5995.json) (`2024-06-14T08:15:43.097`)
- [CVE-2024-5996](CVE-2024/CVE-2024-59xx/CVE-2024-5996.json) (`2024-06-14T09:15:11.010`)
- [CVE-2024-3049](CVE-2024/CVE-2024-30xx/CVE-2024-3049.json) (`2024-06-16T03:15:08.520`)
## Download and Usage

1270
_state.csv

File diff suppressed because it is too large Load Diff