Auto-Update: 2024-02-17T05:00:25.131770+00:00

This commit is contained in:
cad-safe-bot 2024-02-17 05:00:28 +00:00
parent 81dfba7a94
commit 2ca7bc53b6
3 changed files with 51 additions and 37 deletions

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-31728",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-17T04:15:07.503",
"lastModified": "2024-02-17T04:15:07.503",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Teltonika RUT240 devices with firmware before 07.04.2, when bridge mode is used, sometimes make SSH and HTTP services available on the IPv6 WAN interface even though the UI shows that they are only available on the LAN interface."
}
],
"metrics": {},
"references": [
{
"url": "https://research.exoticsilicon.com/articles/lte_ethernet_bridge_bug_followup",
"source": "cve@mitre.org"
},
{
"url": "https://research.exoticsilicon.com/news",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2024-22727",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-17T04:15:07.573",
"lastModified": "2024-02-17T04:15:07.573",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Teltonika TRB1-series devices with firmware before TRB1_R_00.07.05.2 allow attackers to exploit a firmware vulnerability via Ethernet LAN or USB."
}
],
"metrics": {},
"references": [
{
"url": "https://teltonika-networks.com/newsroom/critical-security-update-for-trb1-series-gateways",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-02-17T03:00:24.762073+00:00
2024-02-17T05:00:25.131770+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-02-17T02:15:52.700000+00:00
2024-02-17T04:15:07.573000+00:00
```
### Last Data Feed Release
@ -29,51 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
238813
238815
```
### CVEs added in the last Commit
Recently added CVEs: `43`
Recently added CVEs: `2`
* [CVE-2024-20937](CVE-2024/CVE-2024-209xx/CVE-2024-20937.json) (`2024-02-17T02:15:48.227`)
* [CVE-2024-20939](CVE-2024/CVE-2024-209xx/CVE-2024-20939.json) (`2024-02-17T02:15:48.390`)
* [CVE-2024-20941](CVE-2024/CVE-2024-209xx/CVE-2024-20941.json) (`2024-02-17T02:15:48.560`)
* [CVE-2024-20943](CVE-2024/CVE-2024-209xx/CVE-2024-20943.json) (`2024-02-17T02:15:48.720`)
* [CVE-2024-20945](CVE-2024/CVE-2024-209xx/CVE-2024-20945.json) (`2024-02-17T02:15:48.880`)
* [CVE-2024-20947](CVE-2024/CVE-2024-209xx/CVE-2024-20947.json) (`2024-02-17T02:15:49.040`)
* [CVE-2024-20949](CVE-2024/CVE-2024-209xx/CVE-2024-20949.json) (`2024-02-17T02:15:49.200`)
* [CVE-2024-20951](CVE-2024/CVE-2024-209xx/CVE-2024-20951.json) (`2024-02-17T02:15:49.357`)
* [CVE-2024-20953](CVE-2024/CVE-2024-209xx/CVE-2024-20953.json) (`2024-02-17T02:15:49.520`)
* [CVE-2024-20956](CVE-2024/CVE-2024-209xx/CVE-2024-20956.json) (`2024-02-17T02:15:49.680`)
* [CVE-2024-20958](CVE-2024/CVE-2024-209xx/CVE-2024-20958.json) (`2024-02-17T02:15:49.853`)
* [CVE-2024-20960](CVE-2024/CVE-2024-209xx/CVE-2024-20960.json) (`2024-02-17T02:15:50.037`)
* [CVE-2024-20962](CVE-2024/CVE-2024-209xx/CVE-2024-20962.json) (`2024-02-17T02:15:50.207`)
* [CVE-2024-20964](CVE-2024/CVE-2024-209xx/CVE-2024-20964.json) (`2024-02-17T02:15:50.363`)
* [CVE-2024-20966](CVE-2024/CVE-2024-209xx/CVE-2024-20966.json) (`2024-02-17T02:15:50.517`)
* [CVE-2024-20968](CVE-2024/CVE-2024-209xx/CVE-2024-20968.json) (`2024-02-17T02:15:50.670`)
* [CVE-2024-20970](CVE-2024/CVE-2024-209xx/CVE-2024-20970.json) (`2024-02-17T02:15:50.833`)
* [CVE-2024-20972](CVE-2024/CVE-2024-209xx/CVE-2024-20972.json) (`2024-02-17T02:15:50.993`)
* [CVE-2024-20974](CVE-2024/CVE-2024-209xx/CVE-2024-20974.json) (`2024-02-17T02:15:51.157`)
* [CVE-2024-20976](CVE-2024/CVE-2024-209xx/CVE-2024-20976.json) (`2024-02-17T02:15:51.310`)
* [CVE-2024-20978](CVE-2024/CVE-2024-209xx/CVE-2024-20978.json) (`2024-02-17T02:15:51.470`)
* [CVE-2024-20980](CVE-2024/CVE-2024-209xx/CVE-2024-20980.json) (`2024-02-17T02:15:51.620`)
* [CVE-2024-20982](CVE-2024/CVE-2024-209xx/CVE-2024-20982.json) (`2024-02-17T02:15:51.780`)
* [CVE-2024-20984](CVE-2024/CVE-2024-209xx/CVE-2024-20984.json) (`2024-02-17T02:15:51.937`)
* [CVE-2024-20986](CVE-2024/CVE-2024-209xx/CVE-2024-20986.json) (`2024-02-17T02:15:52.097`)
* [CVE-2023-31728](CVE-2023/CVE-2023-317xx/CVE-2023-31728.json) (`2024-02-17T04:15:07.503`)
* [CVE-2024-22727](CVE-2024/CVE-2024-227xx/CVE-2024-22727.json) (`2024-02-17T04:15:07.573`)
### CVEs modified in the last Commit
Recently modified CVEs: `7`
Recently modified CVEs: `0`
* [CVE-2023-49083](CVE-2023/CVE-2023-490xx/CVE-2023-49083.json) (`2024-02-17T02:15:45.350`)
* [CVE-2024-22211](CVE-2024/CVE-2024-222xx/CVE-2024-22211.json) (`2024-02-17T02:15:52.253`)
* [CVE-2024-23170](CVE-2024/CVE-2024-231xx/CVE-2024-23170.json) (`2024-02-17T02:15:52.373`)
* [CVE-2024-23775](CVE-2024/CVE-2024-237xx/CVE-2024-23775.json) (`2024-02-17T02:15:52.443`)
* [CVE-2024-24575](CVE-2024/CVE-2024-245xx/CVE-2024-24575.json) (`2024-02-17T02:15:52.507`)
* [CVE-2024-24577](CVE-2024/CVE-2024-245xx/CVE-2024-24577.json) (`2024-02-17T02:15:52.607`)
* [CVE-2024-24762](CVE-2024/CVE-2024-247xx/CVE-2024-24762.json) (`2024-02-17T02:15:52.700`)
## Download and Usage