{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T07:01:30.707","vulnerabilities":[{"cve":{"id":"CVE-2024-51979","sourceIdentifier":"cve@rapid7.com","published":"2025-06-25T08:15:31.590","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An authenticated attacker may trigger a stack based buffer overflow by performing a malformed request to either the HTTP service (TCP port 80), the HTTPS service (TCP port 443), or the IPP service (TCP port 631). The malformed request will contain an empty Origin header value and a malformed Referer header value. The Referer header value will trigger a stack based buffer overflow when the host value in the Referer header is processed and is greater than 64 bytes in length."},{"lang":"es","value":"Un atacante autenticado puede provocar un desbordamiento de búfer basado en la pila mediante una solicitud malformada al servicio HTTP (puerto TCP 80), al servicio HTTPS (puerto TCP 443) o al servicio IPP (puerto TCP 631). La solicitud malformada contendrá un valor de encabezado \"Origin\" vacío y un valor de encabezado \"Referer\" malformado. El valor de encabezado \"Referer\" provocará un desbordamiento de búfer basado en la pila cuando se procese el valor del host en el encabezado \"Referer\" y tenga una longitud superior a 64 bytes."}],"metrics":{"cvssMetricV31":[{"source":"cve@rapid7.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"cve@rapid7.com","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]}],"references":[{"url":"https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf","source":"cve@rapid7.com"},{"url":"https://github.com/sfewer-r7/BrotherVulnerabilities","source":"cve@rapid7.com"},{"url":"https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faq00100846_000","source":"cve@rapid7.com"},{"url":"https://support.brother.com/g/b/link.aspx?prod=group2&faqid=faq00100848_000","source":"cve@rapid7.com"},{"url":"https://support.brother.com/g/b/link.aspx?prod=lmgroup1&faqid=faqp00100620_000","source":"cve@rapid7.com"},{"url":"https://www.fujifilm.com/fbglobal/eng/company/news/notice/2025/0625_announce.html","source":"cve@rapid7.com"},{"url":"https://www.konicaminolta.com/global-en/security/advisory/pdf/km-2025-0001.pdf","source":"cve@rapid7.com"},{"url":"https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed","source":"cve@rapid7.com"},{"url":"https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2025-000007","source":"cve@rapid7.com"},{"url":"https://assets.contentstack.io/v3/assets/blte4f029e766e6b253/blt6495b3c6adf2867f/685aa980a26c5e2b1026969c/vulnerability-disclosure-whitepaper.pdf","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0"}]}}]}