Skip to content

Commit

Permalink
Auto-Update: 2024-10-06T20:00:17.514726+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
cad-safe-bot committed Oct 6, 2024
1 parent b5edacc commit 706df8d
Show file tree
Hide file tree
Showing 4 changed files with 291 additions and 7 deletions.
141 changes: 141 additions & 0 deletions CVE-2024/CVE-2024-95xx/CVE-2024-9558.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,141 @@
{
"id": "CVE-2024-9558",
"sourceIdentifier": "[email protected]",
"published": "2024-10-06T18:15:11.053",
"lastModified": "2024-10-06T18:15:11.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in D-Link DIR-605L 2.13B01 BETA and classified as critical. This issue affects the function formSetWanPPTP of the file /goform/formSetWanPPTP. The manipulation of the argument webpage leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "[email protected]",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formSetWanPPTP.md",
"source": "[email protected]"
},
{
"url": "https://vuldb.com/?ctiid.279365",
"source": "[email protected]"
},
{
"url": "https://vuldb.com/?id.279365",
"source": "[email protected]"
},
{
"url": "https://vuldb.com/?submit.413917",
"source": "[email protected]"
},
{
"url": "https://www.dlink.com/",
"source": "[email protected]"
}
]
}
141 changes: 141 additions & 0 deletions CVE-2024/CVE-2024-95xx/CVE-2024-9559.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,141 @@
{
"id": "CVE-2024-9559",
"sourceIdentifier": "[email protected]",
"published": "2024-10-06T19:15:23.547",
"lastModified": "2024-10-06T19:15:23.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been classified as critical. Affected is the function formWlanSetup of the file /goform/formWlanSetup. The manipulation of the argument webpage leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "[email protected]",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-605L/formWlanSetup.md",
"source": "[email protected]"
},
{
"url": "https://vuldb.com/?ctiid.279366",
"source": "[email protected]"
},
{
"url": "https://vuldb.com/?id.279366",
"source": "[email protected]"
},
{
"url": "https://vuldb.com/?submit.413919",
"source": "[email protected]"
},
{
"url": "https://www.dlink.com/",
"source": "[email protected]"
}
]
}
10 changes: 5 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update

```plain
2024-10-06T18:00:16.636355+00:00
2024-10-06T20:00:17.514726+00:00
```

### Most recent CVE Modification Timestamp synchronized with NVD

```plain
2024-10-06T17:15:14.063000+00:00
2024-10-06T19:15:23.547000+00:00
```

### Last Data Feed Release
Expand All @@ -33,15 +33,15 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs

```plain
264686
264688
```

### CVEs added in the last Commit

Recently added CVEs: `2`

- [CVE-2024-9556](CVE-2024/CVE-2024-95xx/CVE-2024-9556.json) (`2024-10-06T16:15:02.843`)
- [CVE-2024-9557](CVE-2024/CVE-2024-95xx/CVE-2024-9557.json) (`2024-10-06T17:15:14.063`)
- [CVE-2024-9558](CVE-2024/CVE-2024-95xx/CVE-2024-9558.json) (`2024-10-06T18:15:11.053`)
- [CVE-2024-9559](CVE-2024/CVE-2024-95xx/CVE-2024-9559.json) (`2024-10-06T19:15:23.547`)


### CVEs modified in the last Commit
Expand Down
6 changes: 4 additions & 2 deletions _state.csv
Original file line number Diff line number Diff line change
Expand Up @@ -264683,5 +264683,7 @@ CVE-2024-9552,0,0,86ba100a9e9b09e2270a32ebdcb29267c1828d623f8b70241af3c768d021cb
CVE-2024-9553,0,0,64c444d94fc869f98cd0533846e7fdd6b8a8eb3d69df997ce010912c69eb5a17,2024-10-06T11:15:14.997000
CVE-2024-9554,0,0,9a35851ca1ee2f71357c3e70511db22487c93ed0f056b43d108cd2b56332db57,2024-10-06T12:15:08.117000
CVE-2024-9555,0,0,b05598c46b7cb505124babd0bdf479e39e4b3c077138497c99aa5f3656b8fb5a,2024-10-06T15:15:11.353000
CVE-2024-9556,1,1,36be0b096150f2b9521c1ca824044baa212271841f7d4014e5aa0d2996779816,2024-10-06T16:15:02.843000
CVE-2024-9557,1,1,4af18b01aa874521e00d90e79975dd8d813e522a33c8d9d21cc918c3ac94e1f0,2024-10-06T17:15:14.063000
CVE-2024-9556,0,0,36be0b096150f2b9521c1ca824044baa212271841f7d4014e5aa0d2996779816,2024-10-06T16:15:02.843000
CVE-2024-9557,0,0,4af18b01aa874521e00d90e79975dd8d813e522a33c8d9d21cc918c3ac94e1f0,2024-10-06T17:15:14.063000
CVE-2024-9558,1,1,8b3a566f0b9c624c9960de4004cac41b1e8dbdbf5e7e99845ff8a4cc27fb4993,2024-10-06T18:15:11.053000
CVE-2024-9559,1,1,14c71574e54d221dfd41d3891962eb44ce35b99736be50f06ee178248d7fcf9e,2024-10-06T19:15:23.547000

0 comments on commit 706df8d

Please sign in to comment.