From 63515505600092dbfa806624227f1ea9989ad345 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 17 Dec 2024 15:00:59 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/12xxx/CVE-2024-12705.json | 18 +++++++++ 2024/12xxx/CVE-2024-12706.json | 18 +++++++++ 2024/36xxx/CVE-2024-36832.json | 71 +++++++++++++++++++++++++++++++--- 2024/37xxx/CVE-2024-37605.json | 71 +++++++++++++++++++++++++++++++--- 2024/37xxx/CVE-2024-37606.json | 71 +++++++++++++++++++++++++++++++--- 2024/37xxx/CVE-2024-37607.json | 71 +++++++++++++++++++++++++++++++--- 2024/45xxx/CVE-2024-45832.json | 18 +++++++++ 2024/53xxx/CVE-2024-53683.json | 18 +++++++++ 2024/54xxx/CVE-2024-54681.json | 18 +++++++++ 9 files changed, 350 insertions(+), 24 deletions(-) create mode 100644 2024/12xxx/CVE-2024-12705.json create mode 100644 2024/12xxx/CVE-2024-12706.json create mode 100644 2024/45xxx/CVE-2024-45832.json create mode 100644 2024/53xxx/CVE-2024-53683.json create mode 100644 2024/54xxx/CVE-2024-54681.json diff --git a/2024/12xxx/CVE-2024-12705.json b/2024/12xxx/CVE-2024-12705.json new file mode 100644 index 00000000000..93bc693c8cf --- /dev/null +++ b/2024/12xxx/CVE-2024-12705.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12705", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/12xxx/CVE-2024-12706.json b/2024/12xxx/CVE-2024-12706.json new file mode 100644 index 00000000000..c637f349763 --- /dev/null +++ b/2024/12xxx/CVE-2024-12706.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-12706", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/36xxx/CVE-2024-36832.json b/2024/36xxx/CVE-2024-36832.json index 07f550deb1e..94f4440234d 100644 --- a/2024/36xxx/CVE-2024-36832.json +++ b/2024/36xxx/CVE-2024-36832.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-36832", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-36832", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A NULL pointer dereference in D-Link DAP-1513 REVA_FIRMWARE_1.01 allows attackers to cause a Denial of Service (DoS) via a crafted web request without authentication. The vulnerability occurs in the /bin/webs binary of the firmware. When /bin/webs receives a carefully constructed HTTP request, it will crash and exit due to a null pointer reference, leading to a denial of service attack to the device." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.dlink.com/en/security-bulletin/", + "refsource": "MISC", + "name": "https://www.dlink.com/en/security-bulletin/" + }, + { + "url": "https://www.dlink.com/en", + "refsource": "MISC", + "name": "https://www.dlink.com/en" + }, + { + "url": "https://docs.google.com/document/d/1qTpwAg7B5E4mqkBzijjuoOWWnf3OE1HXIKBv7OcS8Mc/edit?usp=sharing", + "refsource": "MISC", + "name": "https://docs.google.com/document/d/1qTpwAg7B5E4mqkBzijjuoOWWnf3OE1HXIKBv7OcS8Mc/edit?usp=sharing" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10396", + "refsource": "MISC", + "name": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10396" } ] } diff --git a/2024/37xxx/CVE-2024-37605.json b/2024/37xxx/CVE-2024-37605.json index 4e10739b3ca..7b99b55c5f1 100644 --- a/2024/37xxx/CVE-2024-37605.json +++ b/2024/37xxx/CVE-2024-37605.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-37605", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-37605", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A NULL pointer dereference in D-Link DIR-860L REVB_FIRMWARE_2.04.B04_ic5b allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.dlink.com/en/security-bulletin/", + "refsource": "MISC", + "name": "https://www.dlink.com/en/security-bulletin/" + }, + { + "url": "https://www.dlink.com/en", + "refsource": "MISC", + "name": "https://www.dlink.com/en" + }, + { + "url": "https://docs.google.com/document/d/1cWlVLaVvr_xzkqbKIXY7EW89hNHE89SSlNtesv6lzl8/edit?usp=sharing", + "refsource": "MISC", + "name": "https://docs.google.com/document/d/1cWlVLaVvr_xzkqbKIXY7EW89hNHE89SSlNtesv6lzl8/edit?usp=sharing" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10397", + "refsource": "MISC", + "name": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10397" } ] } diff --git a/2024/37xxx/CVE-2024-37606.json b/2024/37xxx/CVE-2024-37606.json index 72a18cbabe3..e75268110a9 100644 --- a/2024/37xxx/CVE-2024-37606.json +++ b/2024/37xxx/CVE-2024-37606.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-37606", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-37606", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Stack overflow vulnerability in D-Link DCS-932L REVB_FIRMWARE_2.18.01 allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.dlink.com/en/security-bulletin/", + "refsource": "MISC", + "name": "https://www.dlink.com/en/security-bulletin/" + }, + { + "url": "https://www.dlink.com/en", + "refsource": "MISC", + "name": "https://www.dlink.com/en" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10247", + "refsource": "MISC", + "name": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10247" + }, + { + "url": "https://docs.google.com/document/d/1qWJh2jgEhmyeW3OefMQNsrlKdATMSU6Twjkk1p3qfAs/edit?usp=sharing", + "refsource": "MISC", + "name": "https://docs.google.com/document/d/1qWJh2jgEhmyeW3OefMQNsrlKdATMSU6Twjkk1p3qfAs/edit?usp=sharing" } ] } diff --git a/2024/37xxx/CVE-2024-37607.json b/2024/37xxx/CVE-2024-37607.json index ebffb8013db..33552f717e8 100644 --- a/2024/37xxx/CVE-2024-37607.json +++ b/2024/37xxx/CVE-2024-37607.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-37607", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-37607", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Buffer overflow vulnerability in D-Link DAP-2555 REVA_FIRMWARE_1.20 allows remote attackers to cause a Denial of Service (DoS) via a crafted HTTP request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.dlink.com/en/security-bulletin/", + "refsource": "MISC", + "name": "https://www.dlink.com/en/security-bulletin/" + }, + { + "url": "https://www.dlink.com/en", + "refsource": "MISC", + "name": "https://www.dlink.com/en" + }, + { + "url": "https://docs.google.com/document/d/1haRDAIN8SbAF8qKNHAm1awnI_LCAPauR8T_pbFREnMM/edit?usp=sharing", + "refsource": "MISC", + "name": "https://docs.google.com/document/d/1haRDAIN8SbAF8qKNHAm1awnI_LCAPauR8T_pbFREnMM/edit?usp=sharing" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10232", + "refsource": "MISC", + "name": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10232" } ] } diff --git a/2024/45xxx/CVE-2024-45832.json b/2024/45xxx/CVE-2024-45832.json new file mode 100644 index 00000000000..734ec4b6128 --- /dev/null +++ b/2024/45xxx/CVE-2024-45832.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-45832", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/53xxx/CVE-2024-53683.json b/2024/53xxx/CVE-2024-53683.json new file mode 100644 index 00000000000..78350c1a640 --- /dev/null +++ b/2024/53xxx/CVE-2024-53683.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-53683", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/54xxx/CVE-2024-54681.json b/2024/54xxx/CVE-2024-54681.json new file mode 100644 index 00000000000..81491c6b326 --- /dev/null +++ b/2024/54xxx/CVE-2024-54681.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-54681", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file