From 5559c5eef7ff10eae59f8cf3da3d5b14ee4cb112 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 7 Oct 2024 02:03:15 +0000 Subject: [PATCH] Auto-Update: 2024-10-07T02:00:17.015950+00:00 --- CVE-2024/CVE-2024-95xx/CVE-2024-9563.json | 141 ++++++++++++++++++++++ CVE-2024/CVE-2024-95xx/CVE-2024-9564.json | 141 ++++++++++++++++++++++ CVE-2024/CVE-2024-95xx/CVE-2024-9565.json | 141 ++++++++++++++++++++++ README.md | 14 +-- _state.csv | 9 +- 5 files changed, 436 insertions(+), 10 deletions(-) create mode 100644 CVE-2024/CVE-2024-95xx/CVE-2024-9563.json create mode 100644 CVE-2024/CVE-2024-95xx/CVE-2024-9564.json create mode 100644 CVE-2024/CVE-2024-95xx/CVE-2024-9565.json diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9563.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9563.json new file mode 100644 index 00000000000..97614c5a9dd --- /dev/null +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9563.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9563", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-07T00:15:02.813", + "lastModified": "2024-10-07T00:15:02.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in D-Link DIR-605L 2.13B01 BETA. This issue affects the function formWlanSetup_Wizard of the file /goform/formWlanSetup_Wizard. The manipulation of the argument webpage leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formWlanSetup_Wizard.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279371", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279371", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.413922", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9564.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9564.json new file mode 100644 index 00000000000..a56b06b221b --- /dev/null +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9564.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9564", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-07T01:15:14.697", + "lastModified": "2024-10-07T01:15:14.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in D-Link DIR-605L 2.13B01 BETA. Affected is the function formWlanWizardSetup of the file /goform/formWlanWizardSetup. The manipulation of the argument webpage leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formWlanWizardSetup.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279372", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279372", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.413923", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9565.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9565.json new file mode 100644 index 00000000000..cc6ac406cd8 --- /dev/null +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9565.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9565", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-07T01:15:14.970", + "lastModified": "2024-10-07T01:15:14.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in D-Link DIR-605L 2.13B01 BETA and classified as critical. Affected by this vulnerability is the function formSetPassword of the file /goform/formSetPassword. The manipulation of the argument curTime leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetPassword.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279373", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279373", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.413924", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 024e8df1eab..55b8edeb940 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-06T23:55:17.089523+00:00 +2024-10-07T02:00:17.015950+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-06T23:15:12.437000+00:00 +2024-10-07T01:15:14.970000+00:00 ``` ### Last Data Feed Release @@ -27,22 +27,22 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-10-06T00:00:08.670794+00:00 +2024-10-07T00:00:08.685888+00:00 ``` ### Total Number of included CVEs ```plain -264691 +264694 ``` ### CVEs added in the last Commit Recently added CVEs: `3` -- [CVE-2024-9560](CVE-2024/CVE-2024-95xx/CVE-2024-9560.json) (`2024-10-06T22:15:02.677`) -- [CVE-2024-9561](CVE-2024/CVE-2024-95xx/CVE-2024-9561.json) (`2024-10-06T23:15:12.150`) -- [CVE-2024-9562](CVE-2024/CVE-2024-95xx/CVE-2024-9562.json) (`2024-10-06T23:15:12.437`) +- [CVE-2024-9563](CVE-2024/CVE-2024-95xx/CVE-2024-9563.json) (`2024-10-07T00:15:02.813`) +- [CVE-2024-9564](CVE-2024/CVE-2024-95xx/CVE-2024-9564.json) (`2024-10-07T01:15:14.697`) +- [CVE-2024-9565](CVE-2024/CVE-2024-95xx/CVE-2024-9565.json) (`2024-10-07T01:15:14.970`) ### CVEs modified in the last Commit diff --git a/_state.csv b/_state.csv index 5ed9465e7ef..463241378c0 100644 --- a/_state.csv +++ b/_state.csv @@ -264687,6 +264687,9 @@ CVE-2024-9556,0,0,36be0b096150f2b9521c1ca824044baa212271841f7d4014e5aa0d29967798 CVE-2024-9557,0,0,4af18b01aa874521e00d90e79975dd8d813e522a33c8d9d21cc918c3ac94e1f0,2024-10-06T17:15:14.063000 CVE-2024-9558,0,0,8b3a566f0b9c624c9960de4004cac41b1e8dbdbf5e7e99845ff8a4cc27fb4993,2024-10-06T18:15:11.053000 CVE-2024-9559,0,0,14c71574e54d221dfd41d3891962eb44ce35b99736be50f06ee178248d7fcf9e,2024-10-06T19:15:23.547000 -CVE-2024-9560,1,1,1b359e75a1bdb1c0a062891b3467facb889f5369896509304157b00bfc95b262,2024-10-06T22:15:02.677000 -CVE-2024-9561,1,1,fb80df5bbb44f1db459d08375318f0da50fc17ac1f28184f098b2516f3b692cf,2024-10-06T23:15:12.150000 -CVE-2024-9562,1,1,4766621896d68d5ec09c83dd832c396be9eb1eb6e7926664ccf27962236d6054,2024-10-06T23:15:12.437000 +CVE-2024-9560,0,0,1b359e75a1bdb1c0a062891b3467facb889f5369896509304157b00bfc95b262,2024-10-06T22:15:02.677000 +CVE-2024-9561,0,0,fb80df5bbb44f1db459d08375318f0da50fc17ac1f28184f098b2516f3b692cf,2024-10-06T23:15:12.150000 +CVE-2024-9562,0,0,4766621896d68d5ec09c83dd832c396be9eb1eb6e7926664ccf27962236d6054,2024-10-06T23:15:12.437000 +CVE-2024-9563,1,1,248e7f96012d360f5ca1c8bd22f68a33f5cdb4f47d1ac28671bac89e513ac6e9,2024-10-07T00:15:02.813000 +CVE-2024-9564,1,1,cb620b0c4416c672d36b74953d03783bfa078e42257f95ad7c0855ccea27be4a,2024-10-07T01:15:14.697000 +CVE-2024-9565,1,1,d5d075c95d405fd6033b8c1125f9fc528a63da102e561b30dfda733635129fee,2024-10-07T01:15:14.970000