diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25748.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25748.json new file mode 100644 index 00000000000..ae343dab569 --- /dev/null +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25748.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25748", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-22T23:15:07.640", + "lastModified": "2024-02-22T23:15:07.640", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A Stack Based Buffer Overflow vulnerability in tenda AC9 AC9 v.3.0 with firmware version v.15.03.06.42_multi allows a remote attacker to execute arbitrary code via the fromSetIpMacBind function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/fromSetIpMacBind.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25753.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25753.json new file mode 100644 index 00000000000..77497de6dc8 --- /dev/null +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25753.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25753", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-22T23:15:07.703", + "lastModified": "2024-02-22T23:15:07.703", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Stack Based Buffer Overflow vulnerability in Tenda AC9 v.3.0 with firmware version v.15.03.06.42_multi allows a remote attacker to execute arbitrary code via the formSetDeviceName function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/formSetDeviceName.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25756.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25756.json new file mode 100644 index 00000000000..de989c10df5 --- /dev/null +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25756.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2024-25756", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-02-22T23:15:07.750", + "lastModified": "2024-02-22T23:15:07.750", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A Stack Based Buffer Overflow vulnerability in Tenda AC9 v.3.0 with firmware version v.15.03.06.42_multi allows a remote attacker to execute arbitrary code via the formWifiBasicSet function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TimeSeg/IOT_CVE/blob/main/tenda/AC9V3/0218/formWifiBasicSet.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 250deb82835..62742f3b4f8 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-02-22T23:00:24.156954+00:00 +2024-02-23T00:55:29.714492+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-02-22T22:15:47.310000+00:00 +2024-02-22T23:15:07.750000+00:00 ``` ### Last Data Feed Release @@ -29,16 +29,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -239265 +239268 ``` ### CVEs added in the last Commit Recently added CVEs: `3` -* [CVE-2022-25377](CVE-2022/CVE-2022-253xx/CVE-2022-25377.json) (`2024-02-22T22:15:47.170`) -* [CVE-2024-25746](CVE-2024/CVE-2024-257xx/CVE-2024-25746.json) (`2024-02-22T22:15:47.253`) -* [CVE-2024-26152](CVE-2024/CVE-2024-261xx/CVE-2024-26152.json) (`2024-02-22T22:15:47.310`) +* [CVE-2024-25748](CVE-2024/CVE-2024-257xx/CVE-2024-25748.json) (`2024-02-22T23:15:07.640`) +* [CVE-2024-25753](CVE-2024/CVE-2024-257xx/CVE-2024-25753.json) (`2024-02-22T23:15:07.703`) +* [CVE-2024-25756](CVE-2024/CVE-2024-257xx/CVE-2024-25756.json) (`2024-02-22T23:15:07.750`) ### CVEs modified in the last Commit