diff --git a/2023/49xxx/CVE-2023-49780.json b/2023/49xxx/CVE-2023-49780.json
new file mode 100644
index 00000000000..18aa8e848ed
--- /dev/null
+++ b/2023/49xxx/CVE-2023-49780.json
@@ -0,0 +1,18 @@
+{
+ "data_type": "CVE",
+ "data_format": "MITRE",
+ "data_version": "4.0",
+ "CVE_data_meta": {
+ "ID": "CVE-2023-49780",
+ "ASSIGNER": "cve@mitre.org",
+ "STATE": "RESERVED"
+ },
+ "description": {
+ "description_data": [
+ {
+ "lang": "eng",
+ "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ }
+ ]
+ }
+}
\ No newline at end of file
diff --git a/2024/13xxx/CVE-2024-13841.json b/2024/13xxx/CVE-2024-13841.json
index 58ce8e7b993..59871970591 100644
--- a/2024/13xxx/CVE-2024-13841.json
+++ b/2024/13xxx/CVE-2024-13841.json
@@ -1,17 +1,85 @@
{
+ "data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
- "data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-13841",
- "ASSIGNER": "cve@mitre.org",
- "STATE": "RESERVED"
+ "ASSIGNER": "security@wordfence.com",
+ "STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
- "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
+ "value": "The Builder Shortcode Extras \u2013 WordPress Shortcodes Collection to Save You Time plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.0.0 via the 'bse-elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private and draft posts created with Elementor that they should not have access to."
+ }
+ ]
+ },
+ "problemtype": {
+ "problemtype_data": [
+ {
+ "description": [
+ {
+ "lang": "eng",
+ "value": "CWE-639 Authorization Bypass Through User-Controlled Key",
+ "cweId": "CWE-639"
+ }
+ ]
+ }
+ ]
+ },
+ "affects": {
+ "vendor": {
+ "vendor_data": [
+ {
+ "vendor_name": "daveshine",
+ "product": {
+ "product_data": [
+ {
+ "product_name": "Builder Shortcode Extras \u2013 WordPress Shortcodes Collection to Save You Time",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "*",
+ "version_value": "1.0.0"
+ }
+ ]
+ }
+ }
+ ]
+ }
+ }
+ ]
+ }
+ },
+ "references": {
+ "reference_data": [
+ {
+ "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/642dc1d3-a008-4af8-ba9e-dbdd37b93126?source=cve",
+ "refsource": "MISC",
+ "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/642dc1d3-a008-4af8-ba9e-dbdd37b93126?source=cve"
+ },
+ {
+ "url": "https://plugins.trac.wordpress.org/browser/builder-shortcode-extras/tags/1.0.0/includes/shortcodes/elementor.php#L116",
+ "refsource": "MISC",
+ "name": "https://plugins.trac.wordpress.org/browser/builder-shortcode-extras/tags/1.0.0/includes/shortcodes/elementor.php#L116"
+ }
+ ]
+ },
+ "credits": [
+ {
+ "lang": "en",
+ "value": "Francesco Carlucci"
+ }
+ ],
+ "impact": {
+ "cvss": [
+ {
+ "version": "3.1",
+ "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
+ "baseScore": 4.3,
+ "baseSeverity": "MEDIUM"
}
]
}
diff --git a/2024/7xxx/CVE-2024-7695.json b/2024/7xxx/CVE-2024-7695.json
index a27ed9bb203..690fd5485ab 100644
--- a/2024/7xxx/CVE-2024-7695.json
+++ b/2024/7xxx/CVE-2024-7695.json
@@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
- "value": "Multiple switches are affected by an out-of-bounds write vulnerability. This vulnerability is caused by insufficient input validation, which allows data to be written to memory outside the bounds of the buffer. Successful exploitation of this vulnerability could result in a denial-of-service attack. \n\nThis vulnerability poses a significant remote threat if the affected products are exposed to publicly accessible networks. Attackers could potentially disrupt operations by shutting down the affected systems. Due to the critical nature of this security risk, we strongly recommend taking immediate action to prevent its potential exploitation."
+ "value": "Multiple switches are affected by an out-of-bounds write vulnerability. This vulnerability is caused by insufficient input validation, which allows data to be written to memory outside the bounds of the buffer. Successful exploitation of this vulnerability could result in a denial-of-service attack."
}
]
},
@@ -106,6 +106,522 @@
}
]
}
+ },
+ {
+ "product_name": "EDS-608 Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.12"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-611 Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.12"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-616 Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.12"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-619 Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.12"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-405A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.14"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-408A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.12"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-505A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.11"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-508A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.11"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-510A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.12"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-516A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.11"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-518A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.11"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-G509 Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.10"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-P510 Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.11"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-P510A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.11"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-510E Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "5.5"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-518E Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "6.3"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-528E Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "6.3"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-G508E Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "6.4"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-G512E Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "6.4"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-G516E Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "6.4"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "EDS-P506E Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "5.8"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "ICS-G7526A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "5.10"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "ICS-G7528A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "5.10"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "ICS-G7748A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "5.9"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "ICS-G7750A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "5.9"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "ICS-G7752A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "5.9"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "ICS-G7826A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "5.10"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "ICS-G7828A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "5.10"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "ICS-G7848A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "5.9"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "ICS-G7850A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "5.9"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "ICS-G7852A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "5.9"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "IKS-G6524A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "5.10"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "IKS-6726A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "5.9"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "IKS-6728A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "5.9"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "IKS-G6824A Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "5.10"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "SDS-3006 Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.0"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "SDS-3008 Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.0"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "SDS-3010 Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.0"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "SDS-3016 Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.0"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "SDS-G3006 Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.0"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "SDS-G3008 Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.0"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "SDS-G3010 Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.0"
+ }
+ ]
+ }
+ },
+ {
+ "product_name": "SDS-G3016 Series",
+ "version": {
+ "version_data": [
+ {
+ "version_affected": "<=",
+ "version_name": "1.0",
+ "version_value": "3.0"
+ }
+ ]
+ }
}
]
}
@@ -119,6 +635,11 @@
"url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240162-cve-2024-7695-out-of-bounds-write-vulnerability-identified-in-multiple-pt-switches",
"refsource": "MISC",
"name": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240162-cve-2024-7695-out-of-bounds-write-vulnerability-identified-in-multiple-pt-switches"
+ },
+ {
+ "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240163-cve-2024-7695-out-of-bounds-write-vulnerability-in-multiple-eds,-ics,-iks,-and-sds-switches",
+ "refsource": "MISC",
+ "name": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240163-cve-2024-7695-out-of-bounds-write-vulnerability-in-multiple-eds,-ics,-iks,-and-sds-switches"
}
]
},
@@ -126,7 +647,7 @@
"engine": "Vulnogram 0.2.0"
},
"source": {
- "discovery": "EXTERNAL"
+ "discovery": "INTERNAL"
},
"work_around": [
{
@@ -148,10 +669,10 @@
{
"base64": false,
"type": "text/html",
- "value": "Moxa has developed appropriate solutions to address this vulnerability. The solutions for affected products are listed in the following:
To mitigate the risks\nassociated with this vulnerability, we recommend the following actions:
\n\nMoxa has developed appropriate solutions to address the identified vulnerability. For the VPort 07-3 Series, please upgrade to firmware version 1.1 or later. You can download the latest firmware from Moxa\u2019s official website.
" + "value": "Please refer to the security advisories: