diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29836.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29836.json new file mode 100644 index 00000000000..63e76369e05 --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29836.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29836", + "sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "published": "2024-04-15T00:15:12.847", + "lastModified": "2024-04-15T00:15:12.847", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control, allowing for an unauthenticated attacker to update and add user profiles within the application, and gain full access of the site." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html", + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29837.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29837.json new file mode 100644 index 00000000000..23ea48f05e0 --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29837.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-29837", + "sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "published": "2024-04-15T00:15:13.097", + "lastModified": "2024-04-15T00:15:13.097", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below uses poor session management, allowing for an unauthenticated attacker to access administrator functionality if any other user is already signed in." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1390" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html", + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29838.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29838.json new file mode 100644 index 00000000000..84232ad3ad9 --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29838.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-29838", + "sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "published": "2024-04-15T00:15:13.307", + "lastModified": "2024-04-15T00:15:13.307", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below does not proper sanitize user input, allowing for an unauthenticated attacker to crash the controller software" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-457" + } + ] + } + ], + "references": [ + { + "url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html", + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29839.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29839.json new file mode 100644 index 00000000000..9971977938b --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29839.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-29839", + "sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "published": "2024-04-15T00:15:13.533", + "lastModified": "2024-04-15T00:15:13.533", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_CARD, allowing for an unauthenticated attacker to return the card value data of any user\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html", + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29840.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29840.json new file mode 100644 index 00000000000..87b3a3b175d --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29840.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-29840", + "sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "published": "2024-04-15T00:15:13.753", + "lastModified": "2024-04-15T00:15:13.753", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_PIN_FIELDS, allowing for an unauthenticated attacker to return the pin value of any user\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html", + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29841.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29841.json new file mode 100644 index 00000000000..6a441f23620 --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29841.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-29841", + "sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "published": "2024-04-15T00:15:13.963", + "lastModified": "2024-04-15T00:15:13.963", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_KEYS_FIELDS, allowing for an unauthenticated attacker to return the keys value of any user" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html", + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29842.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29842.json new file mode 100644 index 00000000000..02d5f3df9ca --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29842.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-29842", + "sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "published": "2024-04-15T00:15:14.167", + "lastModified": "2024-04-15T00:15:14.167", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on DESKTOP_EDIT_USER_GET_ABACARD_FIELDS, allowing for an unauthenticated attacker to return the abacard field of any user" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html", + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29843.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29843.json new file mode 100644 index 00000000000..8d34cc21618 --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29843.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2024-29843", + "sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "published": "2024-04-15T00:15:14.373", + "lastModified": "2024-04-15T00:15:14.373", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control on MOBILE_GET_USERS_LIST, allowing for an unauthenticated attacker to enumerate all users and their access levels\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html", + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29844.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29844.json new file mode 100644 index 00000000000..f8d039f941f --- /dev/null +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29844.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2024-29844", + "sourceIdentifier": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "published": "2024-04-15T00:15:14.573", + "lastModified": "2024-04-15T00:15:14.573", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Default credentials on the Web Interface of Evolution Controller 2.x (123 and 123) allows anyone to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the password. There is no warning or prompt to ask the user to change the default password." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1392" + } + ] + } + ], + "references": [ + { + "url": "https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html", + "source": "430a6cef-dc26-47e3-9fa8-52fb7f19644e" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3766.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3766.json new file mode 100644 index 00000000000..f82b7c47eb2 --- /dev/null +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3766.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2024-3766", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-04-15T00:15:14.773", + "lastModified": "2024-04-15T00:15:14.773", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in slowlyo OwlAdmin up to 3.5.7. Affected by this issue is some unknown functionality of the file /admin-api/upload_image of the component Image File Upload. The manipulation of the argument file leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-260606 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 3.3 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/fubxx/CVE/blob/main/OwlAdmin-XSS.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.260606", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.260606", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.311886", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b7f861452b2..ae9b49f4809 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-04-14T23:55:29.351494+00:00 +2024-04-15T02:00:31.232180+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-04-14T23:15:46.650000+00:00 +2024-04-15T00:15:14.773000+00:00 ``` ### Last Data Feed Release @@ -27,24 +27,29 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-04-14T00:00:20.251311+00:00 +2024-04-15T00:00:20.253820+00:00 ``` ### Total Number of included CVEs ```plain -245423 +245433 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `10` -- [CVE-2024-27462](CVE-2024/CVE-2024-274xx/CVE-2024-27462.json) (`2024-04-14T23:15:45.830`) -- [CVE-2024-3762](CVE-2024/CVE-2024-37xx/CVE-2024-3762.json) (`2024-04-14T22:15:58.687`) -- [CVE-2024-3763](CVE-2024/CVE-2024-37xx/CVE-2024-3763.json) (`2024-04-14T23:15:46.110`) -- [CVE-2024-3764](CVE-2024/CVE-2024-37xx/CVE-2024-3764.json) (`2024-04-14T23:15:46.373`) -- [CVE-2024-3765](CVE-2024/CVE-2024-37xx/CVE-2024-3765.json) (`2024-04-14T23:15:46.650`) +- [CVE-2024-29836](CVE-2024/CVE-2024-298xx/CVE-2024-29836.json) (`2024-04-15T00:15:12.847`) +- [CVE-2024-29837](CVE-2024/CVE-2024-298xx/CVE-2024-29837.json) (`2024-04-15T00:15:13.097`) +- [CVE-2024-29838](CVE-2024/CVE-2024-298xx/CVE-2024-29838.json) (`2024-04-15T00:15:13.307`) +- [CVE-2024-29839](CVE-2024/CVE-2024-298xx/CVE-2024-29839.json) (`2024-04-15T00:15:13.533`) +- [CVE-2024-29840](CVE-2024/CVE-2024-298xx/CVE-2024-29840.json) (`2024-04-15T00:15:13.753`) +- [CVE-2024-29841](CVE-2024/CVE-2024-298xx/CVE-2024-29841.json) (`2024-04-15T00:15:13.963`) +- [CVE-2024-29842](CVE-2024/CVE-2024-298xx/CVE-2024-29842.json) (`2024-04-15T00:15:14.167`) +- [CVE-2024-29843](CVE-2024/CVE-2024-298xx/CVE-2024-29843.json) (`2024-04-15T00:15:14.373`) +- [CVE-2024-29844](CVE-2024/CVE-2024-298xx/CVE-2024-29844.json) (`2024-04-15T00:15:14.573`) +- [CVE-2024-3766](CVE-2024/CVE-2024-37xx/CVE-2024-3766.json) (`2024-04-15T00:15:14.773`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 2bf7c034b02..7ddc951557a 100644 --- a/_state.csv +++ b/_state.csv @@ -243378,7 +243378,7 @@ CVE-2024-2745,0,0,21dd83e50808577458b12385abb6a5e6bc2a585cd70ef551295012e31869f5 CVE-2024-27454,0,0,6d3a09532b89ef204254e66da503964dcbafd450b5bdda0990f449d144c8e54b,2024-02-26T16:32:25.577000 CVE-2024-27455,0,0,2d941179924c9f77cb732b35f1b7b9f5792b70ca51de1e84f09167eb77852176,2024-03-26T16:15:12.263000 CVE-2024-27456,0,0,3292722b93148b4ab52923fa8e4498babe5b306f79794afb1b6b9f9d803c4911,2024-02-26T16:32:25.577000 -CVE-2024-27462,1,1,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000 +CVE-2024-27462,0,0,ffc1613a8162349f9e85ee9ce86cbdc5073a2092a76bc9fd14c2d891290e403c,2024-04-14T23:15:45.830000 CVE-2024-27474,0,0,eedd7f52a8e754286d0994212e940bbab5a78ce0f631ba173f8be2320f55c67f,2024-04-10T19:49:51.183000 CVE-2024-27476,0,0,8cccfbd88a289b73ae2a82f1969e7e11b3256be620bf6a323e970ad5fee54963,2024-04-10T19:49:51.183000 CVE-2024-27477,0,0,475b0780b17016d259d91214e57785f69e50a4f85e3c7b3b34cb0c00dc852aa4,2024-04-10T19:49:51.183000 @@ -244356,7 +244356,16 @@ CVE-2024-2983,0,0,23d5f9d4638c65dc43b0706ddf09d53e64a3d415ebcd6885079f6fe9d10c5f CVE-2024-29832,0,0,9f165dd8af7b150aedd8ba0e648c487f081558a3943c83b1f6267f1670f3eb8a,2024-03-26T17:09:53.043000 CVE-2024-29833,0,0,425a7917efe73a1770fcefa4ce4ec7e1a0c1da408936ec3b87fe92c30b675f21,2024-03-26T17:09:53.043000 CVE-2024-29834,0,0,fcb2204bebc95a769cbfbc7fb2ab65826176bce82e40b2c7464bcb200fbaac1b,2024-04-02T20:31:58.463000 +CVE-2024-29836,1,1,37e4cbfbd0c62fd1e658a8e84b366928b44e312be64057cf7e2b4fe4abf6ffa1,2024-04-15T00:15:12.847000 +CVE-2024-29837,1,1,f17756fb522a9e39a5905d0c4c9a7248e53b5b5c923422cb93441052e18a639e,2024-04-15T00:15:13.097000 +CVE-2024-29838,1,1,24f1232d2cd448e0457658913ca8918f08ce3b3ab5c4de21cbbff97efcd84d58,2024-04-15T00:15:13.307000 +CVE-2024-29839,1,1,b682176657620433b340ec7cfe7e7687d1614406cb337baba237d351bc3bf298,2024-04-15T00:15:13.533000 CVE-2024-2984,0,0,4b5982b3c3e0e5e17ce3322c4c77f227ad9c5e510c9a2d4ef229246c4d0c5f67,2024-04-11T01:25:43.683000 +CVE-2024-29840,1,1,e0bf1336a8777f05d9ddff6cf61dfcb3c4a78e2ee7e7598df2b7d8f55e88ae24,2024-04-15T00:15:13.753000 +CVE-2024-29841,1,1,bf6d11f8ff0404b2beb5351f96a9cc308cffb274608eb7f51e441183d4b2ea09,2024-04-15T00:15:13.963000 +CVE-2024-29842,1,1,9fcd654a2b9c876cb5d73b31ac2983bb0f5f46f7812ffeaa12170dee8d6b58fd,2024-04-15T00:15:14.167000 +CVE-2024-29843,1,1,fe546397c94a00575ea363edd74f297119a8af5489577f632f47948f6fe7f2f2,2024-04-15T00:15:14.373000 +CVE-2024-29844,1,1,cc64152b8477f4266dbd6ddf7c24c949161e7a5b01c40ea0ed75920030365afd,2024-04-15T00:15:14.573000 CVE-2024-2985,0,0,eae3273dd06632fb9083734fb3ca3d6279482f4638135d81e5659988419ffe7f,2024-04-11T01:25:43.773000 CVE-2024-29858,0,0,ec21ad079a83cd076ada45f6eaa6cdca3318bb07ab260d892702dff1f9c09fde,2024-03-21T12:58:51.093000 CVE-2024-29859,0,0,1a3bc8759fdc8c10e013f96dddd14f2ff64d6c749aade8e9054f9e130df1726e,2024-03-21T12:58:51.093000 @@ -245418,7 +245427,8 @@ CVE-2024-3737,0,0,3ece3dc04e2a51c738908804fdc895437fedad772f68ffb6b51e1e486b0c00 CVE-2024-3738,0,0,09bc2e3a802ac8f6c70c5517ac81e7b57f06695f5612a81cd6c91a0a61213828,2024-04-13T18:15:07.390000 CVE-2024-3739,0,0,7ec4f828f90436048bb80fdf887bc8a60adc89dbf654d1396a79394bec55d21d,2024-04-13T19:15:53.757000 CVE-2024-3740,0,0,cad4660a05c482b6800e402dcb0a2b908ba4751bb8506078e808ef0aee3e4761,2024-04-13T21:15:48.353000 -CVE-2024-3762,1,1,b191d101f4a9d645c7e9f95afa47f2c207df5b4c70ecd3749179a783e15e08f0,2024-04-14T22:15:58.687000 -CVE-2024-3763,1,1,262909d0950c7a3228e8fed8ae6373f18cbf0c3e21f14cf96c53b24e96840fc4,2024-04-14T23:15:46.110000 -CVE-2024-3764,1,1,4d189903af3cfe6d7249ff59c89b78dd404f54d55b4d90a0597a6d48e963acf9,2024-04-14T23:15:46.373000 -CVE-2024-3765,1,1,b3d1b16d269cee243522ba0b3be107f044389782884d6822e375f86a69fc36c5,2024-04-14T23:15:46.650000 +CVE-2024-3762,0,0,b191d101f4a9d645c7e9f95afa47f2c207df5b4c70ecd3749179a783e15e08f0,2024-04-14T22:15:58.687000 +CVE-2024-3763,0,0,262909d0950c7a3228e8fed8ae6373f18cbf0c3e21f14cf96c53b24e96840fc4,2024-04-14T23:15:46.110000 +CVE-2024-3764,0,0,4d189903af3cfe6d7249ff59c89b78dd404f54d55b4d90a0597a6d48e963acf9,2024-04-14T23:15:46.373000 +CVE-2024-3765,0,0,b3d1b16d269cee243522ba0b3be107f044389782884d6822e375f86a69fc36c5,2024-04-14T23:15:46.650000 +CVE-2024-3766,1,1,28f42c457ae28605580e5cf8d3ddbf5c4178184dcd9c90284dd7756c20e9f53b,2024-04-15T00:15:14.773000