From 03b4815105b9853b1665c8db23f026c49b042da4 Mon Sep 17 00:00:00 2001 From: Weston Steimel Date: Fri, 31 May 2024 11:23:14 +0100 Subject: [PATCH] latest wordfence records --- data/anchore/2024/CVE-2024-3190.json | 37 ++++++++++++++++++++++++++ data/anchore/2024/CVE-2024-3269.json | 38 +++++++++++++++++++++++++++ data/anchore/2024/CVE-2024-3583.json | 37 ++++++++++++++++++++++++++ data/anchore/2024/CVE-2024-3943.json | 37 ++++++++++++++++++++++++++ data/anchore/2024/CVE-2024-3945.json | 37 ++++++++++++++++++++++++++ data/anchore/2024/CVE-2024-3946.json | 37 ++++++++++++++++++++++++++ data/anchore/2024/CVE-2024-3947.json | 37 ++++++++++++++++++++++++++ data/anchore/2024/CVE-2024-4355.json | 39 ++++++++++++++++++++++++++++ data/anchore/2024/CVE-2024-5073.json | 39 ++++++++++++++++++++++++++++ data/anchore/2024/CVE-2024-5223.json | 38 +++++++++++++++++++++++++++ data/anchore/2024/CVE-2024-5326.json | 39 ++++++++++++++++++++++++++++ data/anchore/2024/CVE-2024-5327.json | 38 +++++++++++++++++++++++++++ data/anchore/2024/CVE-2024-5341.json | 34 ++++++++++++++++++++++++ 13 files changed, 487 insertions(+) create mode 100644 data/anchore/2024/CVE-2024-3190.json create mode 100644 data/anchore/2024/CVE-2024-3269.json create mode 100644 data/anchore/2024/CVE-2024-3583.json create mode 100644 data/anchore/2024/CVE-2024-3943.json create mode 100644 data/anchore/2024/CVE-2024-3945.json create mode 100644 data/anchore/2024/CVE-2024-3946.json create mode 100644 data/anchore/2024/CVE-2024-3947.json create mode 100644 data/anchore/2024/CVE-2024-4355.json create mode 100644 data/anchore/2024/CVE-2024-5073.json create mode 100644 data/anchore/2024/CVE-2024-5223.json create mode 100644 data/anchore/2024/CVE-2024-5326.json create mode 100644 data/anchore/2024/CVE-2024-5327.json create mode 100644 data/anchore/2024/CVE-2024-5341.json diff --git a/data/anchore/2024/CVE-2024-3190.json b/data/anchore/2024/CVE-2024-3190.json new file mode 100644 index 00000000..0b222576 --- /dev/null +++ b/data/anchore/2024/CVE-2024-3190.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-3190", + "needsReview": true, + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3090199%40unlimited-elements-for-elementor&new=3090199%40unlimited-elements-for-elementor&sfp_email=&sfph_mail=", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/78d8ddc9-69ad-4d69-ac23-5a31dfeafd54?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor_\\(free_widgets\\,_addons\\,_templates\\):*:*:*:*:*:wordpress:*:*" + ], + "packageName": "unlimited-elements-for-elementor", + "product": "Unlimited Elements For Elementor (Free Widgets, Addons, Templates)", + "vendor": "unitecms", + "versions": [ + { + "lessThan": "1.5.108", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-3269.json b/data/anchore/2024/CVE-2024-3269.json new file mode 100644 index 00000000..ca888666 --- /dev/null +++ b/data/anchore/2024/CVE-2024-3269.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-3269", + "needsReview": true, + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/changeset/3092928/download-monitor/trunk?contextall=1&old=3070504&old_path=%2Fdownload-monitor%2Ftrunk", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/c454a958-91c4-4847-91f6-dedebf857964?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:never5:download_monitor:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wpchill:download_monitor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "download-monitor", + "product": "Download Monitor", + "vendor": "wpchill", + "versions": [ + { + "lessThan": "4.9.14", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-3583.json b/data/anchore/2024/CVE-2024-3583.json new file mode 100644 index 00000000..c3c81091 --- /dev/null +++ b/data/anchore/2024/CVE-2024-3583.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-3583", + "needsReview": true, + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/changeset/3092346/simple-facebook-plugin/trunk?contextall=1&old=3051436&old_path=%2Fsimple-facebook-plugin%2Ftrunk", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/070f6820-e70c-4325-b5cb-d2010da34dce?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:illia:simple_like_page:*:*:*:*:*:*:*:*" + ], + "packageName": "simple-facebook-plugin", + "product": "Simple Like Page Plugin", + "vendor": "fornyhucker", + "versions": [ + { + "lessThan": "1.5.3", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-3943.json b/data/anchore/2024/CVE-2024-3943.json new file mode 100644 index 00000000..d0f1823b --- /dev/null +++ b/data/anchore/2024/CVE-2024-3943.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-3943", + "needsReview": true, + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L225", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/406f6bd7-f57f-4725-a36f-9846ac04f945?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-todo", + "product": "WP To Do", + "vendor": "delower186", + "versions": [ + { + "lessThanOrEqual": "1.3.0", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-3945.json b/data/anchore/2024/CVE-2024-3945.json new file mode 100644 index 00000000..8e36e64b --- /dev/null +++ b/data/anchore/2024/CVE-2024-3945.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-3945", + "needsReview": true, + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L273", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/69475bec-1f27-4793-8697-1132ac701c62?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-todo", + "product": "WP To Do", + "vendor": "delower186", + "versions": [ + { + "lessThanOrEqual": "1.3.0", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-3946.json b/data/anchore/2024/CVE-2024-3946.json new file mode 100644 index 00000000..5555e899 --- /dev/null +++ b/data/anchore/2024/CVE-2024-3946.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-3946", + "needsReview": true, + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L304", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/de648bea-35c5-4611-aa2f-79e37a0299bb?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-todo", + "product": "WP To Do", + "vendor": "delower186", + "versions": [ + { + "lessThanOrEqual": "1.3.0", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-3947.json b/data/anchore/2024/CVE-2024-3947.json new file mode 100644 index 00000000..aee8b1e7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-3947.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-3947", + "needsReview": true, + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/browser/wp-todo/trunk/inc/Base/Model.php#L304", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/c132cfc1-03b3-4616-9a66-871e88c857cb?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:delower:wp_to_do:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-todo", + "product": "WP To Do", + "vendor": "delower186", + "versions": [ + { + "lessThanOrEqual": "1.3.0", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-4355.json b/data/anchore/2024/CVE-2024-4355.json new file mode 100644 index 00000000..01c6ef81 --- /dev/null +++ b/data/anchore/2024/CVE-2024-4355.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-4355", + "needsReview": true, + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://wordpress.org/plugins/stopbadbots/", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/c77d94ae-528d-4525-b16d-96529bee08c0?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:stopbadbots:block_and_stop_bad_bots:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:stopbadbots:block_bad_bots_and_stop_bad_bots_crawlers_and_spiders_and_anti_spam_protection:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:stopbadbots_project:stopbadbots:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "stopbadbots", + "product": "Block Bad Bots and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection", + "vendor": "sminozzi", + "versions": [ + { + "lessThanOrEqual": "10.24", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-5073.json b/data/anchore/2024/CVE-2024-5073.json new file mode 100644 index 00000000..706ef87f --- /dev/null +++ b/data/anchore/2024/CVE-2024-5073.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-5073", + "needsReview": true, + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/browser/essential-addons-for-elementor-lite/trunk/includes/Traits/Twitter_Feed.php#L210", + "https://plugins.trac.wordpress.org/changeset/3090746/", + "https://wordpress.org/plugins/essential-addons-for-elementor-lite/#developers", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8db80ef-5863-41dd-b33f-850984a72ee6?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "essential-addons-for-elementor-lite", + "product": "Essential Addons for Elementor – Best Elementor Templates, Widgets, Kits & WooCommerce Builders", + "vendor": "wpdevteam", + "versions": [ + { + "lessThan": "5.9.22", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-5223.json b/data/anchore/2024/CVE-2024-5223.json new file mode 100644 index 00000000..438705d2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-5223.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-5223", + "needsReview": true, + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/browser/ultimate-post/tags/4.0.4/addons/custom_font/Custom_Font.php#L13", + "https://plugins.trac.wordpress.org/changeset/3093051/ultimate-post/trunk/addons/custom_font/Custom_Font.php", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/7234d4b9-a575-428a-9d08-2dc62ba41c30?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpxpo:postx:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ultimate-post", + "product": "Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX", + "vendor": "wpxpo", + "versions": [ + { + "lessThan": "4.1.2", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-5326.json b/data/anchore/2024/CVE-2024-5326.json new file mode 100644 index 00000000..77dc21cf --- /dev/null +++ b/data/anchore/2024/CVE-2024-5326.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-5326", + "needsReview": true, + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/browser/ultimate-post/trunk/classes/Styles.php#L160", + "https://plugins.trac.wordpress.org/browser/ultimate-post/trunk/classes/Styles.php#L177", + "https://plugins.trac.wordpress.org/changeset/3093815/", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/07a3db33-3787-4b63-835d-8e3026206842?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpxpo:postx:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ultimate-post", + "product": "Post Grid Gutenberg Blocks and WordPress Blog Plugin – PostX", + "vendor": "wpxpo", + "versions": [ + { + "lessThan": "4.1.3", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-5327.json b/data/anchore/2024/CVE-2024-5327.json new file mode 100644 index 00000000..cdd2850f --- /dev/null +++ b/data/anchore/2024/CVE-2024-5327.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-5327", + "needsReview": true, + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/browser/powerpack-lite-for-elementor/tags/2.7.19/extensions/animated-gradient-background.php#L322", + "https://plugins.trac.wordpress.org/changeset/3094253/", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/5618fdfc-636f-452b-80e1-5182b068d1c6?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ideabox:powerpack_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "powerpack-lite-for-elementor", + "product": "PowerPack Addons for Elementor (Free Widgets, Extensions and Templates)", + "vendor": "ideaboxcreations", + "versions": [ + { + "lessThan": "2.7.20", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-5341.json b/data/anchore/2024/CVE-2024-5341.json new file mode 100644 index 00000000..14b046d4 --- /dev/null +++ b/data/anchore/2024/CVE-2024-5341.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-5341", + "needsReview": true, + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://roadmap.theplusaddons.com/updates/", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/39c8e951-8e8c-4a72-9ecf-1dd96392105d?source=cve" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "product": "The Plus Addons for Elementor Page Builder", + "versions": [ + { + "lessThan": "5.5.5", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file