diff --git a/cves/2024/50xxx/CVE-2024-50624.json b/cves/2024/50xxx/CVE-2024-50624.json new file mode 100644 index 000000000000..e5cef5c4adb0 --- /dev/null +++ b/cves/2024/50xxx/CVE-2024-50624.json @@ -0,0 +1,65 @@ +{ + "dataType": "CVE_RECORD", + "cveMetadata": { + "state": "PUBLISHED", + "cveId": "CVE-2024-50624", + "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "assignerShortName": "mitre", + "dateUpdated": "2024-10-27T23:51:54.818450", + "dateReserved": "2024-10-27T00:00:00", + "datePublished": "2024-10-27T00:00:00" + }, + "containers": { + "cna": { + "providerMetadata": { + "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", + "shortName": "mitre", + "dateUpdated": "2024-10-27T23:51:54.818450" + }, + "descriptions": [ + { + "lang": "en", + "value": "ispdbservice.cpp in KDE Kmail before 6.2.0 allows man-in-the-middle attackers to trigger use of an attacker-controlled mail server because cleartext HTTP is used for a URL such as http://autoconfig.example.com or http://example.com/.well-known/autoconfig for retrieving the configuration. This is related to kmail-account-wizard." + } + ], + "affected": [ + { + "vendor": "n/a", + "product": "n/a", + "versions": [ + { + "version": "n/a", + "status": "affected" + } + ] + } + ], + "references": [ + { + "url": "https://bugs.kde.org/show_bug.cgi?id=487882" + }, + { + "url": "https://kde.org/announcements/megarelease/6/" + }, + { + "url": "https://invent.kde.org/pim/kmail/-/tags" + }, + { + "url": "https://invent.kde.org/pim/kmail-account-wizard/-/commit/9784f5ab41c3aff435d4a88afb25585180a62ee4" + } + ], + "problemTypes": [ + { + "descriptions": [ + { + "type": "text", + "lang": "en", + "description": "n/a" + } + ] + } + ] + } + }, + "dataVersion": "5.1" +} \ No newline at end of file diff --git a/cves/delta.json b/cves/delta.json index 2ed1ae23ddfc..9ceed9e05ab2 100644 --- a/cves/delta.json +++ b/cves/delta.json @@ -1,12 +1,12 @@ { - "fetchTime": "2024-10-27T23:31:29.341Z", + "fetchTime": "2024-10-27T23:54:55.384Z", "numberOfChanges": 1, "new": [ { - "cveId": "CVE-2024-10432", - "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-10432", - "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/10xxx/CVE-2024-10432.json", - "dateUpdated": "2024-10-27T23:31:04.374Z" + "cveId": "CVE-2024-50624", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50624", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50624.json", + "dateUpdated": "2024-10-27T23:51:54.818450" } ], "updated": [], diff --git a/cves/deltaLog.json b/cves/deltaLog.json index d220b9218c8f..6c56835c2f80 100644 --- a/cves/deltaLog.json +++ b/cves/deltaLog.json @@ -1,4 +1,18 @@ [ + { + "fetchTime": "2024-10-27T23:54:55.384Z", + "numberOfChanges": 1, + "new": [ + { + "cveId": "CVE-2024-50624", + "cveOrgLink": "https://www.cve.org/CVERecord?id=CVE-2024-50624", + "githubLink": "https://raw.githubusercontent.com/CVEProject/cvelistV5/main/cves/2024/50xxx/CVE-2024-50624.json", + "dateUpdated": "2024-10-27T23:51:54.818450" + } + ], + "updated": [], + "error": [] + }, { "fetchTime": "2024-10-27T23:31:29.341Z", "numberOfChanges": 1,