diff --git a/2013/6xxx/CVE-2013-6040.json b/2013/6xxx/CVE-2013-6040.json
index 64ddae08d09..04e2297ef7d 100644
--- a/2013/6xxx/CVE-2013-6040.json
+++ b/2013/6xxx/CVE-2013-6040.json
@@ -1,40 +1,17 @@
{
+ "data_version": "4.0",
+ "data_type": "CVE",
+ "data_format": "MITRE",
"CVE_data_meta": {
- "ASSIGNER": "cert@cert.org",
"ID": "CVE-2013-6040",
+ "ASSIGNER": "cert@cert.org",
"STATE": "PUBLIC"
},
- "affects": {
- "vendor": {
- "vendor_data": [
- {
- "product": {
- "product_data": [
- {
- "product_name": "n/a",
- "version": {
- "version_data": [
- {
- "version_value": "n/a"
- }
- ]
- }
- }
- ]
- },
- "vendor_name": "n/a"
- }
- ]
- }
- },
- "data_format": "MITRE",
- "data_type": "CVE",
- "data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
- "value": "Multiple unspecified vulnerabilities in the MW6 Aztec, DataMatrix, and MaxiCode ActiveX controls allow remote attackers to execute arbitrary code via a crafted HTML document."
+ "value": "MW6 Aztec, DataMatrix, and MaxiCode ActiveX controls before version 4.0 vulnerable to arbitrary code via a crafted HTML document. Latest versions (4.0) of MW6 Aztec, DataMatrix, and MaxiCode ActiveX controls have resolved the issue"
}
]
},
@@ -44,29 +21,86 @@
"description": [
{
"lang": "eng",
- "value": "n/a"
+ "value": "CWE-94: Improper Control of Generation of Code"
}
]
}
]
},
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "vendor_name": "MW6 Tech",
+ "product": {
+ "product_data": [
+ {
+ "product_name": "MW6 Aztec ActiveX Controls",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<",
+ "version_name": "0.0",
+ "version_value": "4.0"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "MW6 DataMatrix ActiveX Controls",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<",
+ "version_name": "0.0",
+ "version_value": "4.0"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "MW6 MaxiCode ActiveX Controls",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<",
+ "version_name": "0.0",
+ "version_value": "4.0"
+ }
+ ]
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ },
"references": {
"reference_data": [
{
- "name": "31176",
- "refsource": "EXPLOIT-DB",
- "url": "http://www.exploit-db.com/exploits/31176"
+ "url": "http://www.exploit-db.com/exploits/31176",
+ "refsource": "MISC",
+ "name": "http://www.exploit-db.com/exploits/31176"
},
{
- "name": "VU#219470",
- "refsource": "CERT-VN",
- "url": "http://www.kb.cert.org/vuls/id/219470"
+ "url": "http://www.kb.cert.org/vuls/id/219470",
+ "refsource": "MISC",
+ "name": "http://www.kb.cert.org/vuls/id/219470"
},
{
- "name": "31177",
- "refsource": "EXPLOIT-DB",
- "url": "http://www.exploit-db.com/exploits/31177"
+ "url": "http://www.exploit-db.com/exploits/31177",
+ "refsource": "MISC",
+ "name": "http://www.exploit-db.com/exploits/31177"
+ },
+ {
+ "url": "https://www.mw6tech.com",
+ "refsource": "MISC",
+ "name": "https://www.mw6tech.com"
}
]
+ },
+ "generator": {
+ "engine": "cveClient/1.0.15"
}
}
\ No newline at end of file
diff --git a/2024/43xxx/CVE-2024-43788.json b/2024/43xxx/CVE-2024-43788.json
index 90943df727f..e92113a5e87 100644
--- a/2024/43xxx/CVE-2024-43788.json
+++ b/2024/43xxx/CVE-2024-43788.json
@@ -41,7 +41,7 @@
"version_data": [
{
"version_affected": "=",
- "version_value": "< 5.94.0"
+ "version_value": ">= 5.0.0-alpha.0, < 5.94.0"
}
]
}
@@ -59,6 +59,11 @@
"refsource": "MISC",
"name": "https://github.com/webpack/webpack/security/advisories/GHSA-4vvj-4cpr-p986"
},
+ {
+ "url": "https://github.com/webpack/webpack/issues/18718#issuecomment-2326296270",
+ "refsource": "MISC",
+ "name": "https://github.com/webpack/webpack/issues/18718#issuecomment-2326296270"
+ },
{
"url": "https://github.com/webpack/webpack/commit/955e057abc6cc83cbc3fa1e1ef67a49758bf5a61",
"refsource": "MISC",
diff --git a/2024/7xxx/CVE-2024-7345.json b/2024/7xxx/CVE-2024-7345.json
index ee34ead6b1d..a8e1a84e72e 100644
--- a/2024/7xxx/CVE-2024-7345.json
+++ b/2024/7xxx/CVE-2024-7345.json
@@ -1,17 +1,202 @@
{
+ "data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
- "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-7345",
- "ASSIGNER": "cve@mitre.org",
- "STATE": "RESERVED"
+ "ASSIGNER": "security@progress.com",
+ "STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
- "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ "value": "Local ABL Client bypass of the required PASOE security checks may allow an attacker to commit unauthorized code injection into Multi-Session Agents on supported OpenEdge LTS platforms up to OpenEdge LTS 11.7.18 and LTS 12.2.13 on all supported release platforms"
+ }
+ ]
+ },
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "CWE-94 Improper Control of Generation of Code ('Code Injection')",
+ "cweId": "CWE-94"
+ }
+ ]
+ }
+ ]
+ },
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "vendor_name": "Progress",
+ "product": {
+ "product_data": [
+ {
+ "product_name": "OpenEdge",
+ "version": {
+ "version_data": [
+ {
+ "version_value": "not down converted",
+ "x_cve_json_5_version_data": {
+ "versions": [
+ {
+ "lessThanOrEqual": "11.7.19",
+ "status": "affected",
+ "version": "11.7.0",
+ "versionType": "custom"
+ },
+ {
+ "lessThanOrEqual": "12.2.14",
+ "status": "affected",
+ "version": "12.2.0",
+ "versionType": "custom"
+ },
+ {
+ "status": "unaffected",
+ "version": "12.8.0",
+ "versionType": "custom"
+ }
+ ],
+ "defaultStatus": "affected"
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ },
+ "references": {
+ "reference_data": [
+ {
+ "url": "https://community.progress.com/s/article/Direct-local-client-connections-to-MS-Agents-can-bypass-authentication",
+ "refsource": "MISC",
+ "name": "https://community.progress.com/s/article/Direct-local-client-connections-to-MS-Agents-can-bypass-authentication"
+ }
+ ]
+ },
+ "generator": {
+ "engine": "Vulnogram 0.2.0"
+ },
+ "source": {
+ "discovery": "UNKNOWN"
+ },
+ "configuration": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "An active instance of OpenEdge PASOE's Tomcat Webserver and local or system adjacent access to an ABL client on the Webserver host
"
+ }
+ ],
+ "value": "An active instance of OpenEdge PASOE's Tomcat Webserver and local or system adjacent access to an ABL client on the Webserver host"
+ }
+ ],
+ "work_around": [
+ {
+ "lang": "en",
+ "supportingMedia": [
+ {
+ "base64": false,
+ "type": "text/html",
+ "value": "