From 0c933d5ea456f0148e3aca0aedbcc9e1549fea7f Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 22 Mar 2024 07:03:30 +0000 Subject: [PATCH] Auto-Update: 2024-03-22T07:00:41.796339+00:00 --- CVE-2024/CVE-2024-28xx/CVE-2024-2806.json | 88 +++++++++++++++++++++ CVE-2024/CVE-2024-28xx/CVE-2024-2807.json | 88 +++++++++++++++++++++ CVE-2024/CVE-2024-28xx/CVE-2024-2808.json | 88 +++++++++++++++++++++ CVE-2024/CVE-2024-28xx/CVE-2024-2809.json | 88 +++++++++++++++++++++ CVE-2024/CVE-2024-28xx/CVE-2024-2810.json | 88 +++++++++++++++++++++ CVE-2024/CVE-2024-28xx/CVE-2024-2811.json | 88 +++++++++++++++++++++ CVE-2024/CVE-2024-292xx/CVE-2024-29275.json | 20 +++++ README.md | 24 +++--- _state.csv | 25 +++--- 9 files changed, 575 insertions(+), 22 deletions(-) create mode 100644 CVE-2024/CVE-2024-28xx/CVE-2024-2806.json create mode 100644 CVE-2024/CVE-2024-28xx/CVE-2024-2807.json create mode 100644 CVE-2024/CVE-2024-28xx/CVE-2024-2808.json create mode 100644 CVE-2024/CVE-2024-28xx/CVE-2024-2809.json create mode 100644 CVE-2024/CVE-2024-28xx/CVE-2024-2810.json create mode 100644 CVE-2024/CVE-2024-28xx/CVE-2024-2811.json create mode 100644 CVE-2024/CVE-2024-292xx/CVE-2024-29275.json diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2806.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2806.json new file mode 100644 index 00000000000..37e188d7976 --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2806.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2806", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-22T05:15:48.480", + "lastModified": "2024-03-22T05:15:48.480", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in Tenda AC15 15.03.05.18/15.03.20_multi. This affects the function addWifiMacFilter of the file /goform/addWifiMacFilter. The manipulation of the argument deviceId/deviceMac leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257661 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/addWifiMacFilter_deviceId.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.257661", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.257661", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2807.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2807.json new file mode 100644 index 00000000000..4573650231d --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2807.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2807", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-22T05:15:48.807", + "lastModified": "2024-03-22T05:15:48.807", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in Tenda AC15 15.03.05.18/15.03.20_multi. This vulnerability affects the function formExpandDlnaFile of the file /goform/expandDlnaFile. The manipulation of the argument filePath leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-257662 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formExpandDlnaFile.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.257662", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.257662", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2808.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2808.json new file mode 100644 index 00000000000..672fc00e720 --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2808.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2808", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-22T05:15:49.017", + "lastModified": "2024-03-22T05:15:49.017", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in Tenda AC15 15.03.05.18/15.03.20_multi. This issue affects the function formQuickIndex of the file /goform/QuickIndex. The manipulation of the argument PPPOEPassword leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-257663. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formQuickIndex.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.257663", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.257663", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2809.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2809.json new file mode 100644 index 00000000000..567b3b848d8 --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2809.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2809", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-22T06:15:08.747", + "lastModified": "2024-03-22T06:15:08.747", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in Tenda AC15 15.03.05.18/15.03.20_multi. Affected is the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257664. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formSetFirewallCfg.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.257664", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.257664", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2810.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2810.json new file mode 100644 index 00000000000..24412a23a12 --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2810.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2810", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-22T06:15:10.800", + "lastModified": "2024-03-22T06:15:10.800", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in Tenda AC15 15.03.05.18/15.03.20_multi and classified as critical. Affected by this vulnerability is the function formWifiWpsOOB of the file /goform/WifiWpsOOB. The manipulation of the argument index leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257665 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWifiWpsOOB.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.257665", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.257665", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2811.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2811.json new file mode 100644 index 00000000000..b390316c36a --- /dev/null +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2811.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-2811", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-03-22T06:15:11.803", + "lastModified": "2024-03-22T06:15:11.803", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Tenda AC15 15.03.20_multi and classified as critical. Affected by this issue is the function formWifiWpsStart of the file /goform/WifiWpsStart. The manipulation of the argument index leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257666 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/formWifiWpsStart.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.257666", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.257666", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json new file mode 100644 index 00000000000..a080bbc1605 --- /dev/null +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29275.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-29275", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-03-22T05:15:47.583", + "lastModified": "2024-03-22T05:15:47.583", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "SQL injection vulnerability in SeaCMS version 12.9, allows remote unauthenticated attackers to execute arbitrary code and obtain sensitive information via the id parameter in class.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/seacms-net/CMS/issues/15", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index d362d3413fc..a84211df905 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-03-22T05:00:38.060537+00:00 +2024-03-22T07:00:41.796339+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-03-22T04:15:11.857000+00:00 +2024-03-22T06:15:11.803000+00:00 ``` ### Last Data Feed Release @@ -29,28 +29,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -242412 +242419 ``` ### CVEs added in the last Commit Recently added CVEs: `7` -* [CVE-2024-25807](CVE-2024/CVE-2024-258xx/CVE-2024-25807.json) (`2024-03-22T03:15:07.763`) -* [CVE-2024-25808](CVE-2024/CVE-2024-258xx/CVE-2024-25808.json) (`2024-03-22T04:15:11.087`) -* [CVE-2024-26557](CVE-2024/CVE-2024-265xx/CVE-2024-26557.json) (`2024-03-22T03:15:07.877`) -* [CVE-2024-2805](CVE-2024/CVE-2024-28xx/CVE-2024-2805.json) (`2024-03-22T03:15:08.130`) -* [CVE-2024-29271](CVE-2024/CVE-2024-292xx/CVE-2024-29271.json) (`2024-03-22T04:15:11.573`) -* [CVE-2024-29272](CVE-2024/CVE-2024-292xx/CVE-2024-29272.json) (`2024-03-22T04:15:11.663`) -* [CVE-2024-29273](CVE-2024/CVE-2024-292xx/CVE-2024-29273.json) (`2024-03-22T04:15:11.857`) +* [CVE-2024-2806](CVE-2024/CVE-2024-28xx/CVE-2024-2806.json) (`2024-03-22T05:15:48.480`) +* [CVE-2024-2807](CVE-2024/CVE-2024-28xx/CVE-2024-2807.json) (`2024-03-22T05:15:48.807`) +* [CVE-2024-2808](CVE-2024/CVE-2024-28xx/CVE-2024-2808.json) (`2024-03-22T05:15:49.017`) +* [CVE-2024-2809](CVE-2024/CVE-2024-28xx/CVE-2024-2809.json) (`2024-03-22T06:15:08.747`) +* [CVE-2024-2810](CVE-2024/CVE-2024-28xx/CVE-2024-2810.json) (`2024-03-22T06:15:10.800`) +* [CVE-2024-2811](CVE-2024/CVE-2024-28xx/CVE-2024-2811.json) (`2024-03-22T06:15:11.803`) +* [CVE-2024-29275](CVE-2024/CVE-2024-292xx/CVE-2024-29275.json) (`2024-03-22T05:15:47.583`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `0` -* [CVE-2024-2182](CVE-2024/CVE-2024-21xx/CVE-2024-2182.json) (`2024-03-22T03:15:07.997`) -* [CVE-2024-27516](CVE-2024/CVE-2024-275xx/CVE-2024-27516.json) (`2024-03-22T03:15:07.923`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7043c74012a..fd5821bb32f 100644 --- a/_state.csv +++ b/_state.csv @@ -239756,7 +239756,7 @@ CVE-2024-21805,0,0,a52828f65b6509bde8b488130919a2fdb0ba808c102ed9f4fd4334d154ad0 CVE-2024-21812,0,0,e8811106b26eef69a6b44b9c940e0d21e06bed50f525e5b4df36936c24830bd9,2024-02-20T19:50:53.960000 CVE-2024-21815,0,0,77643bc01852fedba42660856307ea92e48bb3e3a61f220c84686194810010fe,2024-03-05T13:41:01.900000 CVE-2024-21816,0,0,1c59ad824873b45e692308f55039674fb26186a48eef31c5167e14b30ad2d48e,2024-03-04T13:58:23.447000 -CVE-2024-2182,0,1,66971398293306652cc8fb48ccd51a0db8756289e6518df65d3cb6ff96948bab,2024-03-22T03:15:07.997000 +CVE-2024-2182,0,0,66971398293306652cc8fb48ccd51a0db8756289e6518df65d3cb6ff96948bab,2024-03-22T03:15:07.997000 CVE-2024-21821,0,0,4c3f841f13791c81362ea564b3fbf92012289121b1ae208771ab4f8c8efda3a4,2024-01-18T17:08:35.830000 CVE-2024-21824,0,0,3bddb01433a875d84e1ff57d3fa88062c16a6aea3448fe5a7afcbbae2986da28,2024-03-18T12:38:25.490000 CVE-2024-21825,0,0,863f3bb0e32138d36771cc5631b2bee7f6404deacea520723a59336b368d85d0,2024-02-26T18:15:07.390000 @@ -241422,8 +241422,8 @@ CVE-2024-2579,0,0,82ab7736c7cd2bae37cca14333922f5ac036820dddbd265831a9ea551e48aa CVE-2024-2580,0,0,17c770530b9c88c0a0bc27203561d8211df9836f86fe3343fde81a78a162c0d5,2024-03-21T19:47:03.943000 CVE-2024-25801,0,0,86d0a2f88d637a38d728e68507deae5ad1ee66b74383784e4b403b33b5149a86,2024-02-22T19:07:27.197000 CVE-2024-25802,0,0,cb029cdbf03ee0051152f36415381bb55ee304fcb50819490e22f017c52403c6,2024-02-22T19:07:27.197000 -CVE-2024-25807,1,1,56c3bab355182029ade88aac3717c440569ae27a44867efe2bdd3a688e492e9d,2024-03-22T03:15:07.763000 -CVE-2024-25808,1,1,f869c05624ad59cef5cb90a8ad8c213b25b61084488336c2759597bc44972079,2024-03-22T04:15:11.087000 +CVE-2024-25807,0,0,56c3bab355182029ade88aac3717c440569ae27a44867efe2bdd3a688e492e9d,2024-03-22T03:15:07.763000 +CVE-2024-25808,0,0,f869c05624ad59cef5cb90a8ad8c213b25b61084488336c2759597bc44972079,2024-03-22T04:15:11.087000 CVE-2024-2581,0,0,6eca5564f5891085eb56e7f4cce8a941d50b5c5d945724a4654e0a645ab887e7,2024-03-21T02:52:39.600000 CVE-2024-25811,0,0,17589bbc78cc5e463e6c2e2c6ba06158f5e6effb7ffe3523769d8c6653c9997a,2024-03-21T12:58:51.093000 CVE-2024-25817,0,0,8244c17ffec667dd25976664571f96aed86930fb569e330976ea19223cb10648,2024-03-06T15:18:08.093000 @@ -241751,7 +241751,7 @@ CVE-2024-26529,0,0,ceb7dffe95e5cd49d7bba0e418c1f06e328c8386f0796095312ed90a87d2d CVE-2024-26540,0,0,617635ef0e8a400c648ca8f83ffa7f30619dec90da8a875f959e523aa0d1f776,2024-03-15T12:53:06.423000 CVE-2024-26542,0,0,84bcc676050237f7706e936cd8d9d490aa0a127cdccddbe7afe739c073267e25,2024-02-28T14:06:45.783000 CVE-2024-26548,0,0,7b31129407d10e539a4174451b23a0f83a48cdb246d6dd13af61036fdc95df1c,2024-03-01T14:04:26.010000 -CVE-2024-26557,1,1,db7ef20e8e7d8eb51e3dafa53d142f51469c2b3d28e39ac45b02948b59f64f01,2024-03-22T03:15:07.877000 +CVE-2024-26557,0,0,db7ef20e8e7d8eb51e3dafa53d142f51469c2b3d28e39ac45b02948b59f64f01,2024-03-22T03:15:07.877000 CVE-2024-26559,0,0,3b7b5127dd0e422a83fadfb79310bdd57e4fb71532d47a597a5aa1449637c0ce,2024-02-29T13:49:47.277000 CVE-2024-26566,0,0,c84607e263dfbb2bafdffa5f1605a228a50fe6eb3d5c21b9f493cf56aab5c61a,2024-03-07T13:52:27.110000 CVE-2024-26578,0,0,631d617cd0985d9923eed32b0cb4b9e9025809830b6a3ca2ef1a468d4f2a7124,2024-02-22T19:07:27.197000 @@ -241979,7 +241979,7 @@ CVE-2024-27499,0,0,2b5f4a1f9b18ceffc8606355dc4fd2934849f1f56bb5cf7799320a576c6c2 CVE-2024-27507,0,0,38774793c327b7b0161189b1707b6bfcc10d8d33e882e9c59caf6979390f0dbc,2024-03-13T03:15:06.537000 CVE-2024-27508,0,0,040c763fe5f3ce1aa685f7456be4b1599a5d1d348a6a3ea3969c861bb92ef9ee,2024-02-28T14:07:00.563000 CVE-2024-27515,0,0,f99f7250526320b1e7250419a5b3dff4ee674d7e75fbaa06a1a665327078fcdc,2024-02-28T14:06:45.783000 -CVE-2024-27516,0,1,bc77d943dca3237cfc969969b912fe04cfc9a7bb141bbb351e6e03a84319d787,2024-03-22T03:15:07.923000 +CVE-2024-27516,0,0,bc77d943dca3237cfc969969b912fe04cfc9a7bb141bbb351e6e03a84319d787,2024-03-22T03:15:07.923000 CVE-2024-27517,0,0,97c5c6df0e60dd69b6d0aac6af969ac4b47e672031be447025dad2dd6eb96394,2024-02-29T13:49:29.390000 CVE-2024-2754,0,0,085e82c1a95661c61fef6d127ca8d427c59ef0abe344921cba5cdafc9ab6e1f3,2024-03-21T12:58:51.093000 CVE-2024-27558,0,0,9eb3609e180b0082ba997e86c85d07a5ab4b31705e8b33d9a86b38769d49fa33,2024-03-01T22:22:25.913000 @@ -242111,22 +242111,28 @@ CVE-2024-28029,0,0,9e484b8439861147fdb6b933336d3af06d5e28282f7bbd62426d313102246 CVE-2024-28039,0,0,9ef35c96ff38e007b2fd4f37c3f1f5b6d35461c4eaa69f2b36faccd438b26411,2024-03-18T12:38:25.490000 CVE-2024-28040,0,0,4720f9e7e303f29d5b0ca1b313b08051167d79c82107eceb24ad5f16e327583c,2024-03-21T23:15:10.250000 CVE-2024-28045,0,0,6792565e45071cf20a10fab80a7ba7b229853f3cfe3132fa4d97b62afe40eaa5,2024-03-21T23:15:10.467000 -CVE-2024-2805,1,1,c1663a5680443d2b4a3923fd2fef5475c632f7bc73f63d8c15ce5ffd55d89828,2024-03-22T03:15:08.130000 +CVE-2024-2805,0,0,c1663a5680443d2b4a3923fd2fef5475c632f7bc73f63d8c15ce5ffd55d89828,2024-03-22T03:15:08.130000 CVE-2024-28053,0,0,e281ed045d826247c32c0ccef204d2c431b80f755e75c928bfd444d7e8497772,2024-03-15T12:53:06.423000 CVE-2024-28054,0,0,fd5e34ddafff629285a62ddb2d3b6251633211261857e076506fc9aaf016b6b2,2024-03-18T19:40:00.173000 +CVE-2024-2806,1,1,56b2d554ca397a7f98b95597823883fe293fb830f3c5c465bb255f69f294d583,2024-03-22T05:15:48.480000 CVE-2024-28069,0,0,bc55065fc354d40d7b16dc028d30e9ac9c120daebe64d1e74cc55e5aec96ab01,2024-03-17T22:38:29.433000 +CVE-2024-2807,1,1,61e2187fa5a2ba1a43313042e40c262f681f059db45d28e95c31839aae932ca8,2024-03-22T05:15:48.807000 CVE-2024-28070,0,0,d9b3309fdc4db05937449ae85d6df93a299898f40c2c79f5bb7988f4ebb25838,2024-03-17T22:38:29.433000 +CVE-2024-2808,1,1,2291c74755d14464570db6ed94722cb6d7c1f14bb4f2a6865a9b551657a4ff55,2024-03-22T05:15:49.017000 CVE-2024-28084,0,0,82d4f9747e3f13eb0c41724a23d451f171722689bff23fc05fa8397eb3709338,2024-03-16T02:15:09.157000 CVE-2024-28088,0,0,d2f20b1069b24ba10d21e8bf3b61c2c6a1c6b345ff59786676752b80abbde7a4,2024-03-13T21:16:00.380000 CVE-2024-28089,0,0,830991c1dd5898b6a817a3f8bb8784922af3636f20b8b62ba1c918d5d83f6f10,2024-03-11T01:32:29.610000 +CVE-2024-2809,1,1,d51c1cadaa372964aa25c478d7da8595c3faeaa216103db1ea38d8e91303309d,2024-03-22T06:15:08.747000 CVE-2024-28092,0,0,67823fb0fbf08abafb7c7a38f47eac7c626c2d2412f357d855f86b0f67fb9779,2024-03-20T13:00:16.367000 CVE-2024-28094,0,0,45821c38270b8552e50f50b73436d99164a20d22d9b4b8876276d92b2a0a88d9,2024-03-07T13:52:27.110000 CVE-2024-28095,0,0,cc359d20cf58cf4c4e6a4bc345ac1d1135a557dfb7920f405bfe639456bcfe46,2024-03-07T13:52:27.110000 CVE-2024-28096,0,0,bd233bb77c2105c8f9ae41f3196895f407f421cf037a91cc0eb753e3f00e4372,2024-03-07T13:52:27.110000 CVE-2024-28097,0,0,ad0a3d7a6b96970687d28d32c41921c3200422c4265f25f269de512c4cb8079e,2024-03-07T13:52:27.110000 CVE-2024-28098,0,0,e6bafc5c1852b134e115137ad3427dd38b064af4ce40b8aa45bfc1cdd7573337,2024-03-13T12:33:51.697000 +CVE-2024-2810,1,1,87ceb22a094d1fdca9175871006b8c1490b53fe12a1729683d2ae76fc2bccdac,2024-03-22T06:15:10.800000 CVE-2024-28101,0,0,e11a50d18e90b930590d2818b294820a502a44e40046d3b082407cc261fb1fa1,2024-03-21T12:58:51.093000 CVE-2024-28102,0,0,5173038e442300ac4f9841553f79acc51f599800474c7e2979929429acf935f8,2024-03-21T12:58:51.093000 +CVE-2024-2811,1,1,c6a56c4335428b7bee83a7278f7da8368a2606c3c085082dd0debf7f14d724d1,2024-03-22T06:15:11.803000 CVE-2024-28110,0,0,0aa63c709bee34101fee09332c67840fa8b7d5aea01ed58b7f238cd7f26f2f87,2024-03-07T13:52:27.110000 CVE-2024-28111,0,0,ef109000cb681b8950a504435d888106cd334990070bd9ca1f33bba165c1974a,2024-03-07T13:52:27.110000 CVE-2024-28112,0,0,13394bf321439a7b80b31ae63012fb69faf271f01573bdf4d69e6f1d90267eaa,2024-03-13T12:33:51.697000 @@ -242382,9 +242388,10 @@ CVE-2024-29156,0,0,98cbc37d07cb77607ab83580cc50ba5a01141613b7a3bb770966a3d6831e2 CVE-2024-29180,0,0,e32bebc90fbd05fe3a3edfae9506df906c8ca56e295fcb3cc3f3f384d12528c8,2024-03-21T19:47:03.943000 CVE-2024-29243,0,0,80b3eab65af2d9fbeb7b6048e074697688a19de63e1138c377d0b826523dd7db,2024-03-21T15:24:35.093000 CVE-2024-29244,0,0,ab4dadc4ff7b45a2c285edb922de956bae0828f007627c62339f15145e95a7b7,2024-03-21T15:24:35.093000 -CVE-2024-29271,1,1,8f3f4c2f095342ce5006c5dd915025eb52c99aac668772b964c6ccc6ea7b6f54,2024-03-22T04:15:11.573000 -CVE-2024-29272,1,1,286d057b92faa2c0f98e79bf55ed6de88858aea974d2cff95dcf053fb5e59b85,2024-03-22T04:15:11.663000 -CVE-2024-29273,1,1,fe87872c57210783e357d837999b1453ec44efdd22c90150313e35d8399de8c6,2024-03-22T04:15:11.857000 +CVE-2024-29271,0,0,8f3f4c2f095342ce5006c5dd915025eb52c99aac668772b964c6ccc6ea7b6f54,2024-03-22T04:15:11.573000 +CVE-2024-29272,0,0,286d057b92faa2c0f98e79bf55ed6de88858aea974d2cff95dcf053fb5e59b85,2024-03-22T04:15:11.663000 +CVE-2024-29273,0,0,fe87872c57210783e357d837999b1453ec44efdd22c90150313e35d8399de8c6,2024-03-22T04:15:11.857000 +CVE-2024-29275,1,1,7485e8e2cdbf7b9794a165ec8d3b30a10093f40cdcf5e44c74bca400aa7984c5,2024-03-22T05:15:47.583000 CVE-2024-29374,0,0,f8a146770d52182e0c10b15b21ebc5da7e22091690385e976078b28de6736be7,2024-03-21T19:47:03.943000 CVE-2024-29419,0,0,1f113c646466febbefbd1317ecc5036f9bdf6e219db156971cfdda70e05f32f0,2024-03-20T17:18:21.343000 CVE-2024-29469,0,0,acf93e04574e9669a29498319a75720c9b5a03ff4de2c06070b1f52ac9f365b7,2024-03-21T12:58:51.093000