diff --git a/data/anchore/2022/CVE-2022-40211.json b/data/anchore/2022/CVE-2022-40211.json new file mode 100644 index 00000000..616a6f59 --- /dev/null +++ b/data/anchore/2022/CVE-2022-40211.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2022-40211", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "give", + "product": "GiveWP", + "repo": "https://plugins.svn.wordpress.org/give", + "vendor": "GiveWP", + "versions": [ + { + "lessThan": "2.25.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b30261e0-1fa1-4794-98f6-851532b7615c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2022/CVE-2022-44595.json b/data/anchore/2022/CVE-2022-44595.json new file mode 100644 index 00000000..dcc315dc --- /dev/null +++ b/data/anchore/2022/CVE-2022-44595.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2022-44595", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpwhitesecurity:wp_2fa:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-2fa", + "product": "WP 2FA", + "repo": "https://plugins.svn.wordpress.org/wp-2fa", + "vendor": "Melapress", + "versions": [ + { + "lessThan": "2.2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c51a3f8-dee1-4744-8353-864312c89021?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2022/CVE-2022-44626.json b/data/anchore/2022/CVE-2022-44626.json new file mode 100644 index 00000000..6cba7e35 --- /dev/null +++ b/data/anchore/2022/CVE-2022-44626.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2022-44626", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:squirrly:seo_plugin_by_squirrly_seo:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "squirrly-seo", + "product": "SEO Plugin by Squirrly SEO", + "repo": "https://plugins.svn.wordpress.org/squirrly-seo", + "vendor": "Squirrly", + "versions": [ + { + "lessThan": "12.1.21", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9251afbb-1a6d-40c6-b62e-a8866742f669?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2022/CVE-2022-45349.json b/data/anchore/2022/CVE-2022-45349.json new file mode 100644 index 00000000..6dd30b9c --- /dev/null +++ b/data/anchore/2022/CVE-2022-45349.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2022-45349", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:muffingroup:betheme:*:*:*:*:*:wordpress:*:*" + ], + "product": "Betheme", + "vendor": "Muffingroup", + "versions": [ + { + "lessThan": "26.6.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ff3b35c-f7e3-4cae-b7f1-1a0930173ac5?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2022/CVE-2022-45351.json b/data/anchore/2022/CVE-2022-45351.json new file mode 100644 index 00000000..d0728a04 --- /dev/null +++ b/data/anchore/2022/CVE-2022-45351.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2022-45351", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:muffingroup:betheme:*:*:*:*:*:wordpress:*:*" + ], + "product": "Betheme", + "vendor": "Muffingroup", + "versions": [ + { + "lessThan": "26.6.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aa657530-7c85-4399-94bb-feaa7d21a47a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2022/CVE-2022-45352.json b/data/anchore/2022/CVE-2022-45352.json new file mode 100644 index 00000000..dc0d2e64 --- /dev/null +++ b/data/anchore/2022/CVE-2022-45352.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2022-45352", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:muffingroup:betheme:*:*:*:*:*:wordpress:*:*" + ], + "product": "Betheme", + "vendor": "Muffingroup", + "versions": [ + { + "lessThan": "26.6.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3ec44487-7529-46a8-b2eb-cc5fe0f8f062?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2022/CVE-2022-45356.json b/data/anchore/2022/CVE-2022-45356.json new file mode 100644 index 00000000..579b9ba8 --- /dev/null +++ b/data/anchore/2022/CVE-2022-45356.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2022-45356", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:muffingroup:betheme:*:*:*:*:*:wordpress:*:*" + ], + "product": "Betheme", + "vendor": "Muffingroup", + "versions": [ + { + "lessThan": "26.6.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b8eec2f0-1b6f-45cf-8291-019bc1d08f9b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2022/CVE-2022-45851.json b/data/anchore/2022/CVE-2022-45851.json new file mode 100644 index 00000000..871477d9 --- /dev/null +++ b/data/anchore/2022/CVE-2022-45851.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2022-45851", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:sharethis:dashboard_for_google_analytics:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "googleanalytics", + "product": "ShareThis Dashboard for Google Analytics", + "repo": "https://plugins.svn.wordpress.org/googleanalytics", + "vendor": "ShareThis", + "versions": [ + { + "lessThan": "3.1.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4e343489-4969-4a16-9741-34de93c8b06e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2022/CVE-2022-47151.json b/data/anchore/2022/CVE-2022-47151.json new file mode 100644 index 00000000..c1570798 --- /dev/null +++ b/data/anchore/2022/CVE-2022-47151.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2022-47151", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:jshelpdesk:jshelpdesk:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wiselyhub:js_help_desk:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "js-support-ticket", + "product": "JS Help Desk – Best Help Desk & Support Plugin", + "repo": "https://plugins.svn.wordpress.org/js-support-ticket", + "vendor": "JS Help Desk", + "versions": [ + { + "lessThan": "2.7.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/89f6f1cd-91ab-416b-b76b-162b3b29d752?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-23976.json b/data/anchore/2023/CVE-2023-23976.json new file mode 100644 index 00000000..69c06082 --- /dev/null +++ b/data/anchore/2023/CVE-2023-23976.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-23976", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "custom-registration-form-builder-with-submission-manager", + "product": "RegistrationMagic", + "repo": "https://plugins.svn.wordpress.org/custom-registration-form-builder-with-submission-manager", + "vendor": "Metagauss", + "versions": [ + { + "lessThan": "5.1.9.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/feeb70e4-b602-40ce-bdeb-d947c6b6784d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-23985.json b/data/anchore/2023/CVE-2023-23985.json new file mode 100644 index 00000000..142dd2bd --- /dev/null +++ b/data/anchore/2023/CVE-2023-23985.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-23985", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ays-pro:quiz_maker:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "quiz-maker", + "product": "Quiz Maker", + "repo": "https://plugins.svn.wordpress.org/quiz-maker", + "vendor": "Quiz Maker team", + "versions": [ + { + "lessThan": "6.3.9.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4e285ce1-0896-4eef-aa83-59fb6641960b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-23989.json b/data/anchore/2023/CVE-2023-23989.json new file mode 100644 index 00000000..5c660a35 --- /dev/null +++ b/data/anchore/2023/CVE-2023-23989.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-23989", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "custom-registration-form-builder-with-submission-manager", + "product": "RegistrationMagic", + "repo": "https://plugins.svn.wordpress.org/custom-registration-form-builder-with-submission-manager", + "vendor": "Metagauss", + "versions": [ + { + "lessThan": "5.1.9.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fde0ab44-a354-4cbe-8548-0e5c08529082?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-23991.json b/data/anchore/2023/CVE-2023-23991.json new file mode 100644 index 00000000..efa9c99a --- /dev/null +++ b/data/anchore/2023/CVE-2023-23991.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-23991", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpbookingcalendar:booking_calendar:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "booking", + "product": "Booking Calendar", + "repo": "https://plugins.svn.wordpress.org/booking", + "vendor": "WPdevelop / Oplugins", + "versions": [ + { + "lessThan": "9.4.3.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2a69576e-4796-421a-b6ee-08a3b40d4805?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-24416.json b/data/anchore/2023/CVE-2023-24416.json new file mode 100644 index 00000000..a6ef9b22 --- /dev/null +++ b/data/anchore/2023/CVE-2023-24416.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-24416", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:techotronic:all_in_one_favicon:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "all-in-one-favicon", + "product": "All In One Favicon", + "repo": "https://plugins.svn.wordpress.org/all-in-one-favicon", + "vendor": "Arne Franken", + "versions": [ + { + "lessThan": "4.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1a081788-007e-463b-b757-afefcf4c6e17?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-25043.json b/data/anchore/2023/CVE-2023-25043.json new file mode 100644 index 00000000..7eae6be4 --- /dev/null +++ b/data/anchore/2023/CVE-2023-25043.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-25043", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:supsystic:data_tables_generator:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "data-tables-generator-by-supsystic", + "product": "Data Tables Generator", + "repo": "https://plugins.svn.wordpress.org/data-tables-generator-by-supsystic", + "vendor": "Supsystic", + "versions": [ + { + "lessThan": "1.10.26", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ae98e3bd-f663-4609-92ed-ed0431047d85?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-25699.json b/data/anchore/2023/CVE-2023-25699.json new file mode 100644 index 00000000..2ad48acf --- /dev/null +++ b/data/anchore/2023/CVE-2023-25699.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-25699", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:videowhisper:videowhisper_live_streaming_integration:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "videowhisper-live-streaming-integration", + "product": "VideoWhisper Live Streaming Integration", + "repo": "https://plugins.svn.wordpress.org/videowhisper-live-streaming-integration", + "vendor": "VideoWhisper.com", + "versions": [ + { + "lessThan": "5.5.16", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/27180d98-223a-4d86-b8ea-e47da1d61bbf?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-25790.json b/data/anchore/2023/CVE-2023-25790.json new file mode 100644 index 00000000..a1f839a6 --- /dev/null +++ b/data/anchore/2023/CVE-2023-25790.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-25790", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:xtemos:woodmart:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:xtemos:woodmart_theme:*:*:*:*:*:wordpress:*:*" + ], + "product": "WoodMart", + "vendor": "xtemos", + "versions": [ + { + "lessThan": "7.1.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/73017e92-d95e-4b9c-a44a-779b498f58b7?source=cve" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cb1db880-0942-4fac-a548-8b6a28dce8c0?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-25965.json b/data/anchore/2023/CVE-2023-25965.json new file mode 100644 index 00000000..6db9b1ea --- /dev/null +++ b/data/anchore/2023/CVE-2023-25965.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-25965", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:upload_resume_project:upload_resume:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "resume-upload-form", + "product": "Upload Resume", + "repo": "https://plugins.svn.wordpress.org/resume-upload-form", + "vendor": "mbbhatti", + "versions": [ + { + "lessThanOrEqual": "1.2.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8246ea9f-3ccb-4448-bf32-135c8140b09b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-27459.json b/data/anchore/2023/CVE-2023-27459.json new file mode 100644 index 00000000..90777049 --- /dev/null +++ b/data/anchore/2023/CVE-2023-27459.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-27459", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpeverest:user_registration:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "user-registration", + "product": "User Registration", + "repo": "https://plugins.svn.wordpress.org/user-registration", + "vendor": "WPEverest", + "versions": [ + { + "lessThan": "2.3.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5835fed0-5b9d-47b5-82ae-f0f19830ae2a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-27630.json b/data/anchore/2023/CVE-2023-27630.json new file mode 100644 index 00000000..6a1f8e67 --- /dev/null +++ b/data/anchore/2023/CVE-2023-27630.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-27630", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:peepso:peepso:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "peepso-core", + "product": "Community by PeepSo", + "repo": "https://plugins.svn.wordpress.org/peepso-core", + "vendor": "PeepSo", + "versions": [ + { + "lessThan": "6.1.0.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3479e7a4-7719-4438-8bf5-bf9b9990f3f4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-28787.json b/data/anchore/2023/CVE-2023-28787.json new file mode 100644 index 00000000..b51e2ae8 --- /dev/null +++ b/data/anchore/2023/CVE-2023-28787.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-28787", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:quizandsurveymaster:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "quiz-master-next", + "product": "Quiz And Survey Master", + "repo": "https://plugins.svn.wordpress.org/quiz-master-next", + "vendor": "ExpressTech", + "versions": [ + { + "lessThan": "8.1.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b29dcd7a-a0bc-4983-85ba-6ebf2c405ceb?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-29386.json b/data/anchore/2023/CVE-2023-29386.json new file mode 100644 index 00000000..81ce389d --- /dev/null +++ b/data/anchore/2023/CVE-2023-29386.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-29386", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:juliencrego:manager_for_icomoon:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "manager-for-icomoon", + "product": "Manager for Icomoon", + "repo": "https://plugins.svn.wordpress.org/manager-for-icomoon", + "vendor": "Julien Crego", + "versions": [ + { + "lessThan": "2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/854ab1f3-5f7c-40a4-85a5-db4e20dc72cc?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-31090.json b/data/anchore/2023/CVE-2023-31090.json new file mode 100644 index 00000000..bc85bde0 --- /dev/null +++ b/data/anchore/2023/CVE-2023-31090.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-31090", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor_\\(free_widgets\\,_addons\\,_templates\\):*:*:*:*:*:wordpress:*:*" + ], + "packageName": "unlimited-elements-for-elementor", + "product": "Unlimited Elements For Elementor (Free Widgets, Addons, Templates)", + "repo": "https://plugins.svn.wordpress.org/unlimited-elements-for-elementor", + "vendor": "Unlimited Elements", + "versions": [ + { + "lessThan": "1.5.61", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9a09102c-391e-4057-b883-3d2eef1671ce?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-32127.json b/data/anchore/2023/CVE-2023-32127.json new file mode 100644 index 00000000..ab48a34e --- /dev/null +++ b/data/anchore/2023/CVE-2023-32127.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-32127", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:danielpowney:multi_rating:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:multi_rating_project:multi_rating:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "multi-rating", + "product": "Multi Rating", + "repo": "https://plugins.svn.wordpress.org/multi-rating", + "vendor": "Daniel Powney", + "versions": [ + { + "lessThanOrEqual": "5.0.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f3d00464-557f-4177-87aa-f5340b796dbb?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-32295.json b/data/anchore/2023/CVE-2023-32295.json new file mode 100644 index 00000000..2fe7bdc1 --- /dev/null +++ b/data/anchore/2023/CVE-2023-32295.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-32295", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:easyappointments:easy\\!appointments:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "easyappointments", + "product": "Easy!Appointments", + "repo": "https://plugins.svn.wordpress.org/easyappointments", + "vendor": "Alex Tselegidis", + "versions": [ + { + "lessThanOrEqual": "1.3.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/35fc9a16-3775-48c0-82af-692974f54c33?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-33322.json b/data/anchore/2023/CVE-2023-33322.json new file mode 100644 index 00000000..ef359c21 --- /dev/null +++ b/data/anchore/2023/CVE-2023-33322.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-33322", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:etoilewebdesign:front_end_users:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "front-end-only-users", + "product": "Front End Users", + "repo": "https://plugins.svn.wordpress.org/front-end-only-users", + "vendor": "Etoile Web Design", + "versions": [ + { + "lessThan": "3.2.25", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e076e054-6a0b-4c08-b0cc-bd3a5b0751e5?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-34020.json b/data/anchore/2023/CVE-2023-34020.json new file mode 100644 index 00000000..62dcd209 --- /dev/null +++ b/data/anchore/2023/CVE-2023-34020.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-34020", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:uncannyowl:uncanny_toolkit_for_learndash:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "uncanny-learndash-toolkit", + "product": "Uncanny Toolkit for LearnDash", + "repo": "https://plugins.svn.wordpress.org/uncanny-learndash-toolkit", + "vendor": "Uncanny Owl", + "versions": [ + { + "lessThan": "3.6.4.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/66e5a569-1dd5-40e9-8356-d7c82c8e30ed?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-36505.json b/data/anchore/2023/CVE-2023-36505.json new file mode 100644 index 00000000..dc514842 --- /dev/null +++ b/data/anchore/2023/CVE-2023-36505.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-36505", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ninjaforms:ninja_forms:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ninja-forms", + "product": "Ninja Forms Contact Form ", + "repo": "https://plugins.svn.wordpress.org/ninja-forms", + "vendor": "Saturday Drive", + "versions": [ + { + "lessThan": "3.6.25", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e97479b1-06a0-4e24-9d2b-005bdfec9eaf?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-36679.json b/data/anchore/2023/CVE-2023-36679.json new file mode 100644 index 00000000..f82a109e --- /dev/null +++ b/data/anchore/2023/CVE-2023-36679.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-36679", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:brainstormforce:spectra:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ultimate-addons-for-gutenberg", + "product": "Spectra", + "repo": "https://plugins.svn.wordpress.org/ultimate-addons-for-gutenberg", + "vendor": "Brainstorm Force", + "versions": [ + { + "lessThan": "2.6.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5886128e-e72f-4d84-8c17-1ed4a0fcc17e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-39306.json b/data/anchore/2023/CVE-2023-39306.json new file mode 100644 index 00000000..e4e85d0f --- /dev/null +++ b/data/anchore/2023/CVE-2023-39306.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-39306", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*" + ], + "product": "Fusion Builder", + "vendor": "ThemeFusion", + "versions": [ + { + "lessThan": "3.11.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b173523a-e79d-4d2d-af67-5372576df220?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-39309.json b/data/anchore/2023/CVE-2023-39309.json new file mode 100644 index 00000000..098c53a0 --- /dev/null +++ b/data/anchore/2023/CVE-2023-39309.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-39309", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*" + ], + "product": "Fusion Builder", + "vendor": "ThemeFusion", + "versions": [ + { + "lessThan": "3.11.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7c734aa9-ee9e-4605-a4b8-5075ce4b941f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-39311.json b/data/anchore/2023/CVE-2023-39311.json new file mode 100644 index 00000000..de4717e6 --- /dev/null +++ b/data/anchore/2023/CVE-2023-39311.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-39311", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "fusion-builder", + "product": "Fusion Builder", + "repo": "https://plugins.svn.wordpress.org/fusion-builder", + "vendor": "ThemeFusion", + "versions": [ + { + "lessThan": "3.11.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/05220967-dd42-4cb9-9c2f-9c7ac3c0926b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-40000.json b/data/anchore/2023/CVE-2023-40000.json new file mode 100644 index 00000000..98101ea3 --- /dev/null +++ b/data/anchore/2023/CVE-2023-40000.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-40000", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:litespeedtech:litespeed_cache:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "litespeed-cache", + "product": "LiteSpeed Cache", + "repo": "https://plugins.svn.wordpress.org/litespeed-cache", + "vendor": "LiteSpeed Technologies", + "versions": [ + { + "lessThan": "5.7.0.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4c27c06-214a-4c20-80d0-b6b4d18737c3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-41651.json b/data/anchore/2023/CVE-2023-41651.json new file mode 100644 index 00000000..1be829fd --- /dev/null +++ b/data/anchore/2023/CVE-2023-41651.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-41651", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:multi-column_tag_map_project:multi-column_tag_map:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "multi-column-tag-map", + "product": "Multi-column Tag Map", + "repo": "https://plugins.svn.wordpress.org/multi-column-tag-map", + "vendor": "Multi-column Tag Map", + "versions": [ + { + "lessThan": "17.0.27", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d2a60cb2-fe7d-4c51-9995-5cb4682d9d26?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-41864.json b/data/anchore/2023/CVE-2023-41864.json new file mode 100644 index 00000000..7425f640 --- /dev/null +++ b/data/anchore/2023/CVE-2023-41864.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-41864", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:peprodev:peprodev_cf7_database:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "pepro-cf7-database", + "product": "PeproDev CF7 Database", + "repo": "https://plugins.svn.wordpress.org/pepro-cf7-database", + "vendor": "Pepro Dev. Group", + "versions": [ + { + "lessThanOrEqual": "1.8.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e757ca2f-c4d9-4747-9f84-75ef8a54d485?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-44227.json b/data/anchore/2023/CVE-2023-44227.json new file mode 100644 index 00000000..743cac73 --- /dev/null +++ b/data/anchore/2023/CVE-2023-44227.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-44227", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:simplefilelist:simple_file_list:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "simple-file-list", + "product": "Simple File List", + "repo": "https://plugins.svn.wordpress.org/simple-file-list", + "vendor": "Mitchell Bennis", + "versions": [ + { + "lessThan": "6.1.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7eada9b7-8d53-4e95-858e-aa706f74b2a1?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-44472.json b/data/anchore/2023/CVE-2023-44472.json new file mode 100644 index 00000000..cacb8ea1 --- /dev/null +++ b/data/anchore/2023/CVE-2023-44472.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-44472", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:brizy:unyson:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "unyson", + "product": "Unyson", + "repo": "https://plugins.svn.wordpress.org/unyson", + "vendor": "ThemeFuse", + "versions": [ + { + "lessThanOrEqual": "2.7.28", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/35421b32-701a-4fc9-bcec-80684d874bab?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-44989.json b/data/anchore/2023/CVE-2023-44989.json new file mode 100644 index 00000000..aa93347e --- /dev/null +++ b/data/anchore/2023/CVE-2023-44989.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-44989", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:gsheetconnector:cf7_google_sheets_connector:*:*:*:*:free:wordpress:*:*" + ], + "packageName": "cf7-google-sheets-connector", + "product": "CF7 Google Sheets Connector", + "repo": "https://plugins.svn.wordpress.org/cf7-google-sheets-connector", + "vendor": "GSheetConnector", + "versions": [ + { + "lessThan": "5.0.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fad510b7-85f4-4cae-aaf0-eb68a32cf1b4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-44999.json b/data/anchore/2023/CVE-2023-44999.json new file mode 100644 index 00000000..9318b862 --- /dev/null +++ b/data/anchore/2023/CVE-2023-44999.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-44999", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:automattic:woocommerce_stripe:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:woocommerce:stripe_payment_gateway:*:*:*:*:*:wordpress:*:*" + ], + "product": "WooCommerce Stripe Payment Gateway", + "vendor": "WooCommerce", + "versions": [ + { + "lessThan": "7.6.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e4ad8fa-b04c-4821-aadb-3120f824557f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-45000.json b/data/anchore/2023/CVE-2023-45000.json new file mode 100644 index 00000000..c74ebe47 --- /dev/null +++ b/data/anchore/2023/CVE-2023-45000.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-45000", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:litespeedtech:litespeed_cache:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "litespeed-cache", + "product": "LiteSpeed Cache", + "repo": "https://plugins.svn.wordpress.org/litespeed-cache", + "vendor": "LiteSpeed Technologies", + "versions": [ + { + "lessThan": "5.7.0.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/56d0658c-b6b5-4e01-9f5b-a53dd4e380d8?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-45771.json b/data/anchore/2023/CVE-2023-45771.json new file mode 100644 index 00000000..5c783f7a --- /dev/null +++ b/data/anchore/2023/CVE-2023-45771.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-45771", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:contact_form_with_captcha_project:contact_form_with_captcha:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "contact-form-with-captcha", + "product": "Contact Form With Captcha", + "repo": "https://plugins.svn.wordpress.org/contact-form-with-captcha", + "vendor": "Contact Form With Captcha", + "versions": [ + { + "lessThanOrEqual": "1.6.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f618a350-e089-40f7-b731-7ffb9ece30b3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-47504.json b/data/anchore/2023/CVE-2023-47504.json new file mode 100644 index 00000000..03490ba9 --- /dev/null +++ b/data/anchore/2023/CVE-2023-47504.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-47504", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "elementor", + "product": "Elementor Website Builder", + "repo": "https://plugins.svn.wordpress.org/elementor", + "vendor": "Elementor", + "versions": [ + { + "lessThan": "3.16.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c873c76a-144e-4945-8fa2-c9ffe0e3c061?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-47774.json b/data/anchore/2023/CVE-2023-47774.json new file mode 100644 index 00000000..409771c6 --- /dev/null +++ b/data/anchore/2023/CVE-2023-47774.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-47774", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:automattic:jetpack:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "jetpack", + "product": "Jetpack", + "repo": "https://plugins.svn.wordpress.org/jetpack", + "vendor": "Automattic", + "versions": [ + { + "lessThan": "12.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/92a3e622-b3b2-450e-82a7-0a942711e8c0?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-47846.json b/data/anchore/2023/CVE-2023-47846.json new file mode 100644 index 00000000..b150a5fc --- /dev/null +++ b/data/anchore/2023/CVE-2023-47846.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-47846", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:terryl:wp_githuber_md:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-githuber-md", + "product": "WP Githuber MD", + "repo": "https://plugins.svn.wordpress.org/wp-githuber-md", + "vendor": "Terry Lin", + "versions": [ + { + "lessThan": "1.16.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a6fda35d-8b82-4a7a-8db6-21dc38a841f4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-47874.json b/data/anchore/2023/CVE-2023-47874.json new file mode 100644 index 00000000..298ca3c4 --- /dev/null +++ b/data/anchore/2023/CVE-2023-47874.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-47874", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:perfmatters:perfmatters:*:*:*:*:*:wordpress:*:*" + ], + "product": "Perfmatters", + "vendor": "Perfmatters", + "versions": [ + { + "lessThan": "2.1.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b078e446-61e7-4ce1-b9a9-480ccc388c72?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-48275.json b/data/anchore/2023/CVE-2023-48275.json new file mode 100644 index 00000000..4f9a9fee --- /dev/null +++ b/data/anchore/2023/CVE-2023-48275.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-48275", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:trustindex:widgets_for_google_reviews:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-reviews-plugin-for-google", + "product": "Widgets for Google Reviews", + "repo": "https://plugins.svn.wordpress.org/wp-reviews-plugin-for-google", + "vendor": "Trustindex.io", + "versions": [ + { + "lessThan": "11.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-48763.json b/data/anchore/2023/CVE-2023-48763.json new file mode 100644 index 00000000..d323d6df --- /dev/null +++ b/data/anchore/2023/CVE-2023-48763.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-48763", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:crocoblock:jetformbuilder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "jetformbuilder", + "product": "JetFormBuilder", + "repo": "https://plugins.svn.wordpress.org/jetformbuilder", + "vendor": "Crocoblock", + "versions": [ + { + "lessThan": "3.1.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f0343861-a376-43ea-826e-277c2a5ea635?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-48777.json b/data/anchore/2023/CVE-2023-48777.json new file mode 100644 index 00000000..115e1c74 --- /dev/null +++ b/data/anchore/2023/CVE-2023-48777.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-48777", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:elementor:website_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "elementor", + "product": "Elementor Website Builder", + "repo": "https://plugins.svn.wordpress.org/elementor", + "vendor": "Elementor.com", + "versions": [ + { + "lessThan": "3.18.2", + "status": "affected", + "version": "3.3.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-50374.json b/data/anchore/2023/CVE-2023-50374.json new file mode 100644 index 00000000..a67149c9 --- /dev/null +++ b/data/anchore/2023/CVE-2023-50374.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-50374", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:niteothemes:cmp:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "cmp-coming-soon-maintenance", + "product": "CMP – Coming Soon & Maintenance", + "repo": "https://plugins.svn.wordpress.org/cmp-coming-soon-maintenance", + "vendor": "NiteoThemes", + "versions": [ + { + "lessThan": "4.1.11", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0fdc2dac-b3ea-40bd-987b-e6c47e74aefc?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-50861.json b/data/anchore/2023/CVE-2023-50861.json new file mode 100644 index 00000000..7dd98ba7 --- /dev/null +++ b/data/anchore/2023/CVE-2023-50861.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-50861", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pluginus:husky_-_products_filter_professional_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woocommerce-products-filter", + "product": "HUSKY – Products Filter for WooCommerce (formerly WOOF)", + "repo": "https://plugins.svn.wordpress.org/woocommerce-products-filter", + "vendor": "realmag777", + "versions": [ + { + "lessThan": "1.3.4.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3d9179d2-2e90-4de7-8178-073a0ce5865b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-50885.json b/data/anchore/2023/CVE-2023-50885.json new file mode 100644 index 00000000..edd81a2b --- /dev/null +++ b/data/anchore/2023/CVE-2023-50885.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-50885", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:agilelogix:store_locator:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "agile-store-locator", + "product": "Store Locator WordPress", + "repo": "https://plugins.svn.wordpress.org/agile-store-locator", + "vendor": "AGILELOGIX", + "versions": [ + { + "lessThan": "1.4.15", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8cb5c386-eee3-4e88-a827-766a4901f432?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-50886.json b/data/anchore/2023/CVE-2023-50886.json new file mode 100644 index 00000000..f0918858 --- /dev/null +++ b/data/anchore/2023/CVE-2023-50886.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-50886", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpwax:legal_pages:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "legal-pages", + "product": "Legal Pages", + "repo": "https://plugins.svn.wordpress.org/legal-pages", + "vendor": "wpWax", + "versions": [ + { + "lessThan": "1.3.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3f87bd6-b432-4bf8-9046-8d66b45f6a85?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-50898.json b/data/anchore/2023/CVE-2023-50898.json new file mode 100644 index 00000000..81a8d413 --- /dev/null +++ b/data/anchore/2023/CVE-2023-50898.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-50898", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:sirv:sirv:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "sirv", + "product": "Sirv", + "repo": "https://plugins.svn.wordpress.org/sirv", + "vendor": "sirv.com", + "versions": [ + { + "lessThan": "7.1.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a4a67ec6-ee13-4532-8213-d17dbf5f2c55?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-50905.json b/data/anchore/2023/CVE-2023-50905.json new file mode 100644 index 00000000..f7f3179d --- /dev/null +++ b/data/anchore/2023/CVE-2023-50905.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-50905", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpsecurityauditlog:wp_security_audit_log:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-security-audit-log", + "product": "WP Activity Log", + "repo": "https://plugins.svn.wordpress.org/wp-security-audit-log", + "vendor": "Melapress", + "versions": [ + { + "lessThan": "4.6.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/63c6eca6-9b55-48b5-ada3-97dd20d60f31?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51403.json b/data/anchore/2023/CVE-2023-51403.json new file mode 100644 index 00000000..ddea1ce7 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51403.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51403", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:restaurant_reservations_project:restaurant_reservations:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "nd-restaurant-reservations", + "product": "Restaurant Reservations", + "repo": "https://plugins.svn.wordpress.org/nd-restaurant-reservations", + "vendor": "Nicdark", + "versions": [ + { + "lessThan": "1.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a4fa8aa9-0af8-4202-b219-863bbef8d02c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51405.json b/data/anchore/2023/CVE-2023-51405.json new file mode 100644 index 00000000..f97c8175 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51405.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51405", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "bookingpress-appointment-booking", + "product": "BookingPress", + "repo": "https://plugins.svn.wordpress.org/bookingpress-appointment-booking", + "vendor": "Repute Infosystems", + "versions": [ + { + "lessThan": "1.0.75", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/08f55882-d19f-43a3-a370-17d041493944?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51409.json b/data/anchore/2023/CVE-2023-51409.json new file mode 100644 index 00000000..f2ded6b5 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51409.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51409", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:meowapps:ai_engine:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ai-engine", + "product": "AI Engine: ChatGPT Chatbot", + "repo": "https://plugins.svn.wordpress.org/ai-engine", + "vendor": "Jordy Meow", + "versions": [ + { + "lessThan": "1.9.99", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a3fc4bac-9be0-4a1c-b4bb-4384d80e22f7?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51416.json b/data/anchore/2023/CVE-2023-51416.json new file mode 100644 index 00000000..e8c43d79 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51416.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51416", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:donweb:envialosimple\\:*:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "envialosimple-email-marketing-y-newsletters-gratis", + "product": "EnvíaloSimple", + "repo": "https://plugins.svn.wordpress.org/envialosimple-email-marketing-y-newsletters-gratis", + "vendor": "EnvialoSimple", + "versions": [ + { + "lessThanOrEqual": "2.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0c533277-5cea-419f-93ec-e510c0fbd75d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51418.json b/data/anchore/2023/CVE-2023-51418.json new file mode 100644 index 00000000..d22140c3 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51418.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51418", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:jorisvm:jvm_gutenberg_rich_text_icons:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "jvm-rich-text-icons", + "product": "JVM rich text icons", + "repo": "https://plugins.svn.wordpress.org/jvm-rich-text-icons", + "vendor": "Joris van Montfort", + "versions": [ + { + "lessThan": "1.2.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a3e54f9b-db12-42ef-a0fa-2d40c0f7908c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51425.json b/data/anchore/2023/CVE-2023-51425.json new file mode 100644 index 00000000..5871bd81 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51425.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51425", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:boiteasite:download_rencontre_-_dating_site:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:boiteasite:rencontre:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "rencontre", + "product": "Rencontre – Dating Site", + "repo": "https://plugins.svn.wordpress.org/rencontre", + "vendor": "Jacques Malgrange", + "versions": [ + { + "lessThan": "3.11", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b1278291-9fef-40f5-a432-d96f4bed31fe?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51471.json b/data/anchore/2023/CVE-2023-51471.json new file mode 100644 index 00000000..3dc33220 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51471.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51471", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mestresdowp:checkout_mestres_wp:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "checkout-mestres-wp", + "product": "Checkout Mestres WP", + "repo": "https://plugins.svn.wordpress.org/checkout-mestres-wp", + "vendor": "Mestres do WP", + "versions": [ + { + "lessThan": "7.1.9.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8a52bf70-667b-400f-8912-75fae20a3f5b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51472.json b/data/anchore/2023/CVE-2023-51472.json new file mode 100644 index 00000000..4082d6ed --- /dev/null +++ b/data/anchore/2023/CVE-2023-51472.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51472", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mestresdowp:checkout_mestres_wp:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "checkout-mestres-wp", + "product": "Checkout Mestres WP", + "repo": "https://plugins.svn.wordpress.org/checkout-mestres-wp", + "vendor": "Mestres do WP", + "versions": [ + { + "lessThan": "7.1.9.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ad16d1e-e778-4cb4-a15d-ddb906f27762?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51474.json b/data/anchore/2023/CVE-2023-51474.json new file mode 100644 index 00000000..fc7b21ec --- /dev/null +++ b/data/anchore/2023/CVE-2023-51474.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51474", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pixelemu:terraclassifieds:*:*:*:*:wordpress:*:*:*" + ], + "packageName": "terraclassifieds", + "product": "TerraClassifieds", + "repo": "https://plugins.svn.wordpress.org/terraclassifieds", + "vendor": "Pixelemu", + "versions": [ + { + "lessThanOrEqual": "2.0.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4a6e5f89-ebc0-413a-a76e-3cf4339430ba?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51478.json b/data/anchore/2023/CVE-2023-51478.json new file mode 100644 index 00000000..0c1e90e5 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51478.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51478", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:rahamsolutions:build_app_online:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "build-app-online", + "product": "Build App Online", + "repo": "https://plugins.svn.wordpress.org/build-app-online", + "vendor": "Abdul Hakeem", + "versions": [ + { + "lessThanOrEqual": "1.0.19", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/743e40f6-dde3-4d8f-938e-b2a0dcdfb901?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51484.json b/data/anchore/2023/CVE-2023-51484.json new file mode 100644 index 00000000..196aedb9 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51484.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51484", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wp-buy:login_as_user_or_customer_\\(user_switching\\):*:*:*:*:*:wordpress:*:*" + ], + "packageName": "login-as-customer-or-user", + "product": "Login as User or Customer (User Switching)", + "repo": "https://plugins.svn.wordpress.org/login-as-customer-or-user", + "vendor": "wp-buy", + "versions": [ + { + "lessThanOrEqual": "3.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5b07ea6a-511d-44ab-b0b7-5124702ad47d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51486.json b/data/anchore/2023/CVE-2023-51486.json new file mode 100644 index 00000000..b37fe9bf --- /dev/null +++ b/data/anchore/2023/CVE-2023-51486.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51486", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:rednao:woocommerce_pdf_invoice_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woo-pdf-invoice-builder", + "product": "WooCommerce PDF Invoice Builder", + "repo": "https://plugins.svn.wordpress.org/woo-pdf-invoice-builder", + "vendor": "RedNao", + "versions": [ + { + "lessThan": "1.2.102", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/652367a0-fca2-4313-8217-d8811ada0ab5?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51487.json b/data/anchore/2023/CVE-2023-51487.json new file mode 100644 index 00000000..94739e92 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51487.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51487", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ari-soft:ari_stream_quiz:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ari-stream-quiz", + "product": "ARI Stream Quiz", + "repo": "https://plugins.svn.wordpress.org/ari-stream-quiz", + "vendor": "ARI Soft", + "versions": [ + { + "lessThan": "1.3.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/45180c8e-0625-4a21-b3a1-673abe52d78f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51489.json b/data/anchore/2023/CVE-2023-51489.json new file mode 100644 index 00000000..69fc3384 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51489.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51489", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:automattic:crowdsignal_dashboard:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "polldaddy", + "product": "Crowdsignal Dashboard – Polls, Surveys & more", + "repo": "https://plugins.svn.wordpress.org/polldaddy", + "vendor": "Automattic, Inc.", + "versions": [ + { + "lessThan": "3.1.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e03390e5-5604-4b9d-ab1b-dac2b19270cd?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51491.json b/data/anchore/2023/CVE-2023-51491.json new file mode 100644 index 00000000..63b92574 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51491.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51491", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:averta:depicter_slider:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "depicter", + "product": "Depicter Slider", + "repo": "https://plugins.svn.wordpress.org/depicter", + "vendor": "Averta", + "versions": [ + { + "lessThan": "2.0.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51521.json b/data/anchore/2023/CVE-2023-51521.json new file mode 100644 index 00000000..4f67a8b2 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51521.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51521", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:quizandsurveymaster:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "quiz-master-next", + "product": "Quiz And Survey Master", + "repo": "https://plugins.svn.wordpress.org/quiz-master-next", + "vendor": "ExpressTech", + "versions": [ + { + "lessThan": "8.1.19", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4cfdbf80-3733-4d5c-9bc6-01e543ee08b1?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51522.json b/data/anchore/2023/CVE-2023-51522.json new file mode 100644 index 00000000..61bb767e --- /dev/null +++ b/data/anchore/2023/CVE-2023-51522.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51522", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:cozmoslabs:membership_\\&_content_restriction_-_paid_member_subscriptions:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "paid-member-subscriptions", + "product": "Paid Member Subscriptions", + "repo": "https://plugins.svn.wordpress.org/paid-member-subscriptions", + "vendor": "Cozmoslabs", + "versions": [ + { + "lessThan": "2.10.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/69ab17fc-8290-4230-8c44-25d12009c08a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51525.json b/data/anchore/2023/CVE-2023-51525.json new file mode 100644 index 00000000..a9e90bca --- /dev/null +++ b/data/anchore/2023/CVE-2023-51525.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51525", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpsimplebookingcalendar:wp_simple_booking_calendar:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-simple-booking-calendar", + "product": "WP Simple Booking Calendar", + "repo": "https://plugins.svn.wordpress.org/wp-simple-booking-calendar", + "vendor": "Veribo, Roland Murg", + "versions": [ + { + "lessThan": "2.0.8.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2f72e5bb-e076-4379-8699-e399761c043f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51528.json b/data/anchore/2023/CVE-2023-51528.json new file mode 100644 index 00000000..5da0b624 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51528.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51528", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:aipower:aipower:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "gpt3-ai-content-generator", + "product": "AI Power: Complete AI Pack – Powered by GPT-4", + "repo": "https://plugins.svn.wordpress.org/gpt3-ai-content-generator", + "vendor": "Senol Sahin", + "versions": [ + { + "lessThan": "1.8.13", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5511c5f4-b71c-484b-ab6f-2389a29809cd?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51529.json b/data/anchore/2023/CVE-2023-51529.json new file mode 100644 index 00000000..672e2635 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51529.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51529", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:hasthemes:ht_mega_-_absolute_addons_for_elementor_page_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ht-mega-for-elementor", + "product": "HT Mega – Absolute Addons For Elementor", + "repo": "https://plugins.svn.wordpress.org/ht-mega-for-elementor", + "vendor": "HasThemes", + "versions": [ + { + "lessThan": "2.3.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6f26b04f-2a25-40a6-9b2c-27d9970acb8f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51530.json b/data/anchore/2023/CVE-2023-51530.json new file mode 100644 index 00000000..63b18e19 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51530.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51530", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:gsplugins:gs_logo_slider:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "gs-logo-slider", + "product": "Logo Slider – Logo Showcase, Logo Carousel, Logo Gallery and Client Logo Presentation", + "repo": "https://plugins.svn.wordpress.org/gs-logo-slider", + "vendor": "GS Plugins", + "versions": [ + { + "lessThan": "3.5.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c89a8001-ab50-466c-aa51-62c0ff5f86dc?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51533.json b/data/anchore/2023/CVE-2023-51533.json new file mode 100644 index 00000000..479a4e02 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51533.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51533", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:lightspeedhq:ecwid_ecommerce_shopping_cart:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ecwid-shopping-cart", + "product": "Ecwid Ecommerce Shopping Cart", + "repo": "https://plugins.svn.wordpress.org/ecwid-shopping-cart", + "vendor": "Ecwid Ecommerce", + "versions": [ + { + "lessThan": "6.12.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/db5d6cc9-24d7-42bf-905e-4c3764c659ed?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51681.json b/data/anchore/2023/CVE-2023-51681.json new file mode 100644 index 00000000..a09270c8 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51681.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51681", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:awesomemotive:duplicator:*:*:*:*:-:wordpress:*:*", + "cpe:2.3:a:snapcreek:duplicator:*:*:*:*:lite:wordpress:*:*" + ], + "packageName": "duplicator", + "product": "Duplicator – WordPress Migration & Backup Plugin", + "repo": "https://plugins.svn.wordpress.org/duplicator", + "vendor": "Duplicator", + "versions": [ + { + "lessThan": "1.5.7.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/416da5d4-3d47-443b-a82c-c059c38f5218?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51683.json b/data/anchore/2023/CVE-2023-51683.json new file mode 100644 index 00000000..d61f3b9e --- /dev/null +++ b/data/anchore/2023/CVE-2023-51683.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51683", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpplugin:easy_paypal_buy_now_button:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-ecommerce-paypal", + "product": "Easy PayPal & Stripe Buy Now Button", + "repo": "https://plugins.svn.wordpress.org/wp-ecommerce-paypal", + "vendor": "Scott Paterson", + "versions": [ + { + "lessThan": "1.8.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8f6fd0bb-d37b-40b6-b84e-9b21aae891cc?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51692.json b/data/anchore/2023/CVE-2023-51692.json new file mode 100644 index 00000000..cd5b8c88 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51692.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51692", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:cusrev:customer_reviews_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "customer-reviews-woocommerce", + "product": "Customer Reviews for WooCommerce", + "repo": "https://plugins.svn.wordpress.org/customer-reviews-woocommerce", + "vendor": "CusRev", + "versions": [ + { + "lessThan": "5.38.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e093d1f-9c5a-44f8-bc27-9c320e220358?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51696.json b/data/anchore/2023/CVE-2023-51696.json new file mode 100644 index 00000000..0163d814 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51696.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-51696", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:cleantalk:spam_protection\\,_antispam\\,_firewall:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "cleantalk-spam-protect", + "product": "Spam protection, Anti-Spam, FireWall by CleanTalk", + "repo": "https://plugins.svn.wordpress.org/cleantalk-spam-protect", + "vendor": "СleanTalk - Anti-Spam Protection", + "versions": [ + { + "lessThan": "6.21", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/19dd6670-2813-4944-abcd-c26fb9b82092?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-52214.json b/data/anchore/2023/CVE-2023-52214.json new file mode 100644 index 00000000..8dfd0dcb --- /dev/null +++ b/data/anchore/2023/CVE-2023-52214.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-52214", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:voidcoders:void_contact_form_7_widget_for_elementor_page_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "cf7-widget-elementor", + "product": "Void Contact Form 7 Widget For Elementor Page Builder", + "repo": "https://plugins.svn.wordpress.org/cf7-widget-elementor", + "vendor": "voidCoders", + "versions": [ + { + "lessThan": "2.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/93784c84-93b3-4f43-84a0-5aeed3ba9cfd?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-52220.json b/data/anchore/2023/CVE-2023-52220.json new file mode 100644 index 00000000..277963cc --- /dev/null +++ b/data/anchore/2023/CVE-2023-52220.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-52220", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:monsterinsights:google_analytics_dashboard:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "google-analytics-for-wordpress", + "product": "Google Analytics by Monster Insights", + "repo": "https://plugins.svn.wordpress.org/google-analytics-for-wordpress", + "vendor": "MonsterInsights", + "versions": [ + { + "lessThan": "8.22.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/81099cdc-bce6-4ee6-b819-c3925acf96a8?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-52228.json b/data/anchore/2023/CVE-2023-52228.json new file mode 100644 index 00000000..4c4f688e --- /dev/null +++ b/data/anchore/2023/CVE-2023-52228.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-52228", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:beds24:online_booking:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "beds24-online-booking", + "product": "Beds24 Online Booking", + "repo": "https://plugins.svn.wordpress.org/beds24-online-booking", + "vendor": "Mark Kinchin", + "versions": [ + { + "lessThan": "2.0.25", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6fc2b2a5-00b0-424e-8678-c6b5cd76baec?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-52231.json b/data/anchore/2023/CVE-2023-52231.json new file mode 100644 index 00000000..d2548839 --- /dev/null +++ b/data/anchore/2023/CVE-2023-52231.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-52231", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:booster:booster_plus_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "product": "Booster Plus for WooCommerce", + "vendor": "Booster", + "versions": [ + { + "lessThan": "7.1.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/38a90190-569f-46d8-bef4-fe28caf5e2fc?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-52234.json b/data/anchore/2023/CVE-2023-52234.json new file mode 100644 index 00000000..297ab0f4 --- /dev/null +++ b/data/anchore/2023/CVE-2023-52234.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-52234", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:booster:booster_elite_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "product": "Booster Elite for WooCommerce", + "vendor": "Booster", + "versions": [ + { + "lessThan": "7.1.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f4afcb16-9c97-483f-be48-31b5156bcca3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-6091.json b/data/anchore/2023/CVE-2023-6091.json new file mode 100644 index 00000000..5127c275 --- /dev/null +++ b/data/anchore/2023/CVE-2023-6091.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-6091", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:themeeditor:theme_editor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "theme-editor", + "product": "Theme Editor", + "repo": "https://plugins.svn.wordpress.org/theme-editor", + "vendor": "mndpsingh287", + "versions": [ + { + "lessThan": "2.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a6ede290-a6c4-4c13-872b-60c9601d39db?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-7251.json b/data/anchore/2023/CVE-2023-7251.json new file mode 100644 index 00000000..c4914e12 --- /dev/null +++ b/data/anchore/2023/CVE-2023-7251.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-7251", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:plugin-planet:user_submitted_posts:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "user-submitted-posts", + "product": "User Submitted Posts", + "repo": "https://plugins.svn.wordpress.org/user-submitted-posts", + "vendor": "Jeff Starr", + "versions": [ + { + "lessThan": "20230902", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b7fca965-86f8-4ee4-a9d6-cb18fe5f098e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-1350.json b/data/anchore/2024/CVE-2024-1350.json new file mode 100644 index 00000000..8fb8f60a --- /dev/null +++ b/data/anchore/2024/CVE-2024-1350.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-1350", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:prasidhdamalla:honeypot_for_wp_comment:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "honeypot-for-wp-comment", + "product": "Honeypot for WP Comment", + "repo": "https://plugins.svn.wordpress.org/honeypot-for-wp-comment", + "vendor": "Prasidhda Malla", + "versions": [ + { + "lessThanOrEqual": "2.2.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b6b0bb48-eb61-4236-a03f-19d5d2084a75?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-1435.json b/data/anchore/2024/CVE-2024-1435.json new file mode 100644 index 00000000..9c8795e9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-1435.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-1435", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tainacan:tainacan:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "tainacan", + "product": "Tainacan", + "repo": "https://plugins.svn.wordpress.org/tainacan", + "vendor": "Tainacan.org", + "versions": [ + { + "lessThan": "0.20.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/db4b6c65-f6e2-46de-81d7-a31541d0a67a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-21752.json b/data/anchore/2024/CVE-2024-21752.json new file mode 100644 index 00000000..7997e382 --- /dev/null +++ b/data/anchore/2024/CVE-2024-21752.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-21752", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ajax_search_project:ajax_search:*:*:*:*:lite:wordpress:*:*" + ], + "packageName": "ajax-search-lite", + "product": "Ajax Search Lite", + "repo": "https://plugins.svn.wordpress.org/ajax-search-lite", + "vendor": "Ernest Marcinko", + "versions": [ + { + "lessThan": "4.11.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/19418da4-bef4-4cbc-901c-f2aeee39b3cf?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-22138.json b/data/anchore/2024/CVE-2024-22138.json new file mode 100644 index 00000000..e7d391fc --- /dev/null +++ b/data/anchore/2024/CVE-2024-22138.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-22138", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:seraphinitesolutions:seraphinite_accelerator:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "seraphinite-accelerator", + "product": "Seraphinite Accelerator", + "repo": "https://plugins.svn.wordpress.org/seraphinite-accelerator", + "vendor": "Seraphinite Solutions", + "versions": [ + { + "lessThan": "2.20.48", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a5991df2-1aab-4d07-9e30-1257aa9ec884?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-22144.json b/data/anchore/2024/CVE-2024-22144.json new file mode 100644 index 00000000..10c3ae61 --- /dev/null +++ b/data/anchore/2024/CVE-2024-22144.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-22144", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:anti-malware_security_and_brute-force_firewall_project:anti-malware_security_and_brute-force_firewall:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:download_anti-malware_security_and_brute-force_firewall_project:download_anti-malware_security_and_brute-force_firewall:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "gotmls", + "product": "Anti-Malware Security and Brute-Force Firewall", + "repo": "https://plugins.svn.wordpress.org/gotmls", + "vendor": "Eli Scheetz", + "versions": [ + { + "lessThan": "4.23.56", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d7e81331-0b39-4490-8624-38078b3d5420?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-22149.json b/data/anchore/2024/CVE-2024-22149.json new file mode 100644 index 00000000..4a1b2caf --- /dev/null +++ b/data/anchore/2024/CVE-2024-22149.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-22149", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:cformsii_project:cformsii:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "cforms2", + "product": "CformsII", + "repo": "https://plugins.svn.wordpress.org/cforms2", + "vendor": "Oliver Seidel, Bastian Germann", + "versions": [ + { + "lessThanOrEqual": "15.0.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/097fdc88-9424-4de9-9a03-d4ea724da13f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-22155.json b/data/anchore/2024/CVE-2024-22155.json new file mode 100644 index 00000000..543d2075 --- /dev/null +++ b/data/anchore/2024/CVE-2024-22155.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-22155", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:automattic:woocommerce:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:woocommerce:woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woocommerce", + "product": "WooCommerce", + "repo": "https://plugins.svn.wordpress.org/woocommerce", + "vendor": "Automattic", + "versions": [ + { + "lessThan": "8.6.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fa2258e4-f802-490b-8c10-4f008698a032?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-22156.json b/data/anchore/2024/CVE-2024-22156.json new file mode 100644 index 00000000..bad58347 --- /dev/null +++ b/data/anchore/2024/CVE-2024-22156.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-22156", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:snpdigital:salesking:*:*:*:*:*:wordpress:*:*" + ], + "product": "SalesKing", + "vendor": "SNP Digital", + "versions": [ + { + "lessThan": "1.6.30", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c86f157e-e7f2-4b00-977c-c4cc7c2b3b0b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-22288.json b/data/anchore/2024/CVE-2024-22288.json new file mode 100644 index 00000000..f61b1e76 --- /dev/null +++ b/data/anchore/2024/CVE-2024-22288.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-22288", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:webtoffee:woocommerce_pdf_invoices\\,_packing_slips\\,_delivery_notes_and_shipping_labels:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "print-invoices-packing-slip-labels-for-woocommerce", + "product": "WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels", + "repo": "https://plugins.svn.wordpress.org/print-invoices-packing-slip-labels-for-woocommerce", + "vendor": "WebToffee", + "versions": [ + { + "lessThan": "4.4.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5fdb8e77-1323-43a0-a012-04d983390de1?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-22299.json b/data/anchore/2024/CVE-2024-22299.json new file mode 100644 index 00000000..6b381fc0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-22299.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-22299", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:foliovision:fv_flowplayer_video_player:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "fv-wordpress-flowplayer", + "product": "FV Flowplayer Video Player", + "repo": "https://plugins.svn.wordpress.org/fv-wordpress-flowplayer", + "vendor": "Foliovision: Making the web work for you", + "versions": [ + { + "lessThan": "7.5.44.7212", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/616b34e8-d853-4176-9fda-427fc9900b97?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-22300.json b/data/anchore/2024/CVE-2024-22300.json new file mode 100644 index 00000000..e6257b5b --- /dev/null +++ b/data/anchore/2024/CVE-2024-22300.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-22300", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:icegram:icegram_express:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "email-subscribers", + "product": "Email Subscribers & Newsletters", + "repo": "https://plugins.svn.wordpress.org/email-subscribers", + "vendor": "Icegram", + "versions": [ + { + "lessThan": "5.7.12", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a84d6f64-9ebb-4773-a9c1-8f23fb2801a9?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-22311.json b/data/anchore/2024/CVE-2024-22311.json new file mode 100644 index 00000000..6305d9d8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-22311.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-22311", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:nsqua:simply_schedule_appointments:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "simply-schedule-appointments", + "product": "Simply Schedule Appointments", + "repo": "https://plugins.svn.wordpress.org/simply-schedule-appointments", + "vendor": "N Squared", + "versions": [ + { + "lessThan": "1.6.6.24", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4291b5c8-cce3-46ae-b9ff-a34a0f5bcdce?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23501.json b/data/anchore/2024/CVE-2024-23501.json new file mode 100644 index 00000000..c3db6bdb --- /dev/null +++ b/data/anchore/2024/CVE-2024-23501.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-23501", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:shopfiles:ebook_store:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ebook-store", + "product": "Ebook Store", + "repo": "https://plugins.svn.wordpress.org/ebook-store", + "vendor": "Shopfiles Ltd", + "versions": [ + { + "lessThan": "5.8002", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b0ad4949-b7e8-4c50-af64-c59e053cfd0e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23513.json b/data/anchore/2024/CVE-2024-23513.json new file mode 100644 index 00000000..6c92f675 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23513.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-23513", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wp-property-hive:propertyhive:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "propertyhive", + "product": "PropertyHive", + "repo": "https://plugins.svn.wordpress.org/propertyhive", + "vendor": "PropertyHive", + "versions": [ + { + "lessThan": "2.0.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d8ee82cf-916c-41e9-82d2-f25cc7a632ae?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23515.json b/data/anchore/2024/CVE-2024-23515.json new file mode 100644 index 00000000..99350792 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23515.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-23515", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:cincopa:video_and_media_plug-in:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "video-playlist-and-gallery-plugin", + "product": "Post Video Players", + "repo": "https://plugins.svn.wordpress.org/video-playlist-and-gallery-plugin", + "vendor": "Cincopa", + "versions": [ + { + "lessThan": "1.160", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/285d2b85-cdd0-4447-8cdc-b641751e4a5f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23519.json b/data/anchore/2024/CVE-2024-23519.json new file mode 100644 index 00000000..15aa5f76 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23519.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-23519", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mandsconsulting:email_before_download:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "email-before-download", + "product": "Email Before Download", + "repo": "https://plugins.svn.wordpress.org/email-before-download", + "vendor": "M&S Consulting", + "versions": [ + { + "lessThanOrEqual": "6.9.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fa918a65-0021-4c32-9f6d-d978926c3ef3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23523.json b/data/anchore/2024/CVE-2024-23523.json new file mode 100644 index 00000000..d7547f94 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23523.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-23523", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:elementor:elementor_pro:*:*:*:*:*:wordpress:*:*" + ], + "product": "Elementor Pro", + "vendor": "Elementor", + "versions": [ + { + "lessThan": "3.19.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ecc8996a-d95c-4711-ac7d-523f5100c7fc?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24700.json b/data/anchore/2024/CVE-2024-24700.json new file mode 100644 index 00000000..f23e1e3b --- /dev/null +++ b/data/anchore/2024/CVE-2024-24700.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24700", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:benjaminrojas:wp_editor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-editor", + "product": "WP Editor", + "repo": "https://plugins.svn.wordpress.org/wp-editor", + "vendor": "Benjamin Rojas", + "versions": [ + { + "lessThan": "1.2.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/50bbcfcb-7001-42e7-926c-ec4bf4ea35f6?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24705.json b/data/anchore/2024/CVE-2024-24705.json new file mode 100644 index 00000000..8fdb533a --- /dev/null +++ b/data/anchore/2024/CVE-2024-24705.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24705", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:accessibility_project:accessibility:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "accessibility", + "product": "Accessibility", + "repo": "https://plugins.svn.wordpress.org/accessibility", + "vendor": "Octa Code", + "versions": [ + { + "lessThan": "1.0.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/432effd4-5c94-4ef9-bc19-b4eacd082264?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24710.json b/data/anchore/2024/CVE-2024-24710.json new file mode 100644 index 00000000..d911a7df --- /dev/null +++ b/data/anchore/2024/CVE-2024-24710.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24710", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:slickremix:feed_them_social:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "feed-them-social", + "product": "Feed Them Social", + "repo": "https://plugins.svn.wordpress.org/feed-them-social", + "vendor": "SlickRemix", + "versions": [ + { + "lessThan": "4.2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e86152a6-cd8d-4466-bcc5-830413500e12?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24714.json b/data/anchore/2024/CVE-2024-24714.json new file mode 100644 index 00000000..f0d02e44 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24714.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24714", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:bplugins:icons_font_loader:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "icons-font-loader", + "product": "Icons Font Loader", + "repo": "https://plugins.svn.wordpress.org/icons-font-loader", + "vendor": "bPlugins LLC", + "versions": [ + { + "lessThan": "1.1.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/37426991-7778-4dc4-8cae-2725584fb8b8?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24718.json b/data/anchore/2024/CVE-2024-24718.json new file mode 100644 index 00000000..89f38e4e --- /dev/null +++ b/data/anchore/2024/CVE-2024-24718.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24718", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wp-property-hive:propertyhive:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "propertyhive", + "product": "PropertyHive", + "repo": "https://plugins.svn.wordpress.org/propertyhive", + "vendor": "PropertyHive", + "versions": [ + { + "lessThan": "2.0.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/84d55f24-c4de-4574-b0cc-cc1b4935d281?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24796.json b/data/anchore/2024/CVE-2024-24796.json new file mode 100644 index 00000000..7d624ddf --- /dev/null +++ b/data/anchore/2024/CVE-2024-24796.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24796", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mage-people:event_manager_and_tickets_selling_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:mage-people:event_manager_and_tickets_selling_plugin_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "mage-eventpress", + "product": "Event Manager and Tickets Selling Plugin for WooCommerce – WpEvently – WordPress Plugin", + "repo": "https://plugins.svn.wordpress.org/mage-eventpress", + "vendor": "MagePeople Team", + "versions": [ + { + "lessThan": "4.1.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/50812a8b-7d49-41fa-ba50-47d07a4b6caa?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24798.json b/data/anchore/2024/CVE-2024-24798.json new file mode 100644 index 00000000..cf2ec075 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24798.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24798", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:debug_project:debug:*:*:*:*:*:node.js:*:*" + ], + "packageName": "debug", + "product": "Debug", + "repo": "https://plugins.svn.wordpress.org/debug", + "vendor": "SoniNow Team", + "versions": [ + { + "lessThan": "1.11", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aa7276bb-6a9b-4cbd-8333-14c4dfac4108?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24799.json b/data/anchore/2024/CVE-2024-24799.json new file mode 100644 index 00000000..4c94a41f --- /dev/null +++ b/data/anchore/2024/CVE-2024-24799.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24799", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:woocommerce:woocommerce_box_office:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woocommerce-box-office", + "product": "WooCommerce Box Office", + "repo": "https://plugins.svn.wordpress.org/woocommerce-box-office", + "vendor": "WooCommerce", + "versions": [ + { + "lessThan": "1.2.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ff2097a9-fe7a-48f3-be9c-dc0caef74262?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24800.json b/data/anchore/2024/CVE-2024-24800.json new file mode 100644 index 00000000..d5b32b65 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24800.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24800", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:adtribes:product_feed_pro_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woo-product-feed-pro", + "product": "Product Feed PRO for WooCommerce", + "repo": "https://plugins.svn.wordpress.org/woo-product-feed-pro", + "vendor": "AdTribes.io", + "versions": [ + { + "lessThan": "13.2.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/42da00cf-5fda-4ad7-ad74-0328f492abcf?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24802.json b/data/anchore/2024/CVE-2024-24802.json new file mode 100644 index 00000000..188efad1 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24802.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24802", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:jtrt_responsive_tables_project:jtrt_responsive_tables:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "jtrt-responsive-tables", + "product": "JTRT Responsive Tables", + "repo": "https://plugins.svn.wordpress.org/jtrt-responsive-tables", + "vendor": "John Tendik", + "versions": [ + { + "lessThanOrEqual": "4.1.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/89ca9214-145e-43c6-a642-7c371f635332?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24805.json b/data/anchore/2024/CVE-2024-24805.json new file mode 100644 index 00000000..47ad0a2d --- /dev/null +++ b/data/anchore/2024/CVE-2024-24805.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24805", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wp_dummy_content_generator_project:wp_dummy_content_generator:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-dummy-content-generator", + "product": "WP Dummy Content Generator", + "repo": "https://plugins.svn.wordpress.org/wp-dummy-content-generator", + "vendor": "Deepak anand", + "versions": [ + { + "lessThan": "3.1.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3b44d23c-4872-491f-8a91-b0feb888ac54?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24832.json b/data/anchore/2024/CVE-2024-24832.json new file mode 100644 index 00000000..b454a949 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24832.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24832", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metagauss:eventprime:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "eventprime-event-calendar-management", + "product": "EventPrime", + "repo": "https://plugins.svn.wordpress.org/eventprime-event-calendar-management", + "vendor": "Metagauss", + "versions": [ + { + "lessThan": "3.4.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/17cbcf67-f10d-41bc-acf7-98e5d99b50af?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24833.json b/data/anchore/2024/CVE-2024-24833.json new file mode 100644 index 00000000..d01bde68 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24833.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24833", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wedevs:happy_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wedevs:happy_addons_for_elementor:*:*:*:*:-:wordpress:*:*" + ], + "packageName": "happy-elementor-addons", + "product": "Happy Addons for Elementor", + "repo": "https://plugins.svn.wordpress.org/happy-elementor-addons", + "vendor": "Leevio", + "versions": [ + { + "lessThan": "3.10.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1b25df18-dd9a-4b24-8187-283d5f3f334e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24835.json b/data/anchore/2024/CVE-2024-24835.json new file mode 100644 index 00000000..fc010285 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24835.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24835", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woo-bulk-editor", + "product": "BEAR", + "repo": "https://plugins.svn.wordpress.org/woo-bulk-editor", + "vendor": "realmag777", + "versions": [ + { + "lessThan": "1.1.4.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/411b7889-c2c6-48cb-967d-091585705e17?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24843.json b/data/anchore/2024/CVE-2024-24843.json new file mode 100644 index 00000000..017647b2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24843.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24843", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:ideabox:powerpack_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "product": "PowerPack Pro for Elementor", + "vendor": "PowerPack Addons for Elementor", + "versions": [ + { + "lessThan": "2.10.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e68bbee2-1c1a-4751-988e-dde423f8aab3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24867.json b/data/anchore/2024/CVE-2024-24867.json new file mode 100644 index 00000000..5bb0d24c --- /dev/null +++ b/data/anchore/2024/CVE-2024-24867.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24867", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:plugins-market:wp_visitor_statistics_\\(real_time_traffic\\):*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wp_visitor_statistics_\\(real_time_traffic\\)_project:wp_visitor_statistics_\\(real_time_traffic\\):*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-stats-manager", + "product": "WP Visitor Statistics (Real Time Traffic)", + "repo": "https://plugins.svn.wordpress.org/wp-stats-manager", + "vendor": "Osamaesh", + "versions": [ + { + "lessThan": "6.9.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f2d69d59-390d-4f3c-96ba-487707cac7a6?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24868.json b/data/anchore/2024/CVE-2024-24868.json new file mode 100644 index 00000000..ca5bbcd7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24868.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24868", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:smartypantsplugins:sp_project_\\&_document_manager:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "sp-client-document-manager", + "product": "SP Project & Document Manager", + "repo": "https://plugins.svn.wordpress.org/sp-client-document-manager", + "vendor": "Smartypants", + "versions": [ + { + "lessThan": "4.70", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fcdeba37-ba65-400d-9c07-36503a03e857?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24875.json b/data/anchore/2024/CVE-2024-24875.json new file mode 100644 index 00000000..6509e26f --- /dev/null +++ b/data/anchore/2024/CVE-2024-24875.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24875", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:link_library_project:link_library:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "link-library", + "product": "Link Library", + "repo": "https://plugins.svn.wordpress.org/link-library", + "vendor": "Yannick Lefebvre", + "versions": [ + { + "lessThan": "7.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fefe4499-8b03-4c07-b248-ae0ae5153b4f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24876.json b/data/anchore/2024/CVE-2024-24876.json new file mode 100644 index 00000000..9efeb1a3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24876.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24876", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:admin_menu_editor_project:admin_menu_editor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "admin-menu-editor", + "product": "Admin Menu Editor", + "repo": "https://plugins.svn.wordpress.org/admin-menu-editor", + "vendor": "Janis Elsts", + "versions": [ + { + "lessThan": "1.12.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/53fa9be4-a2b3-458c-af6e-d3ada639a622?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24879.json b/data/anchore/2024/CVE-2024-24879.json new file mode 100644 index 00000000..80c3767c --- /dev/null +++ b/data/anchore/2024/CVE-2024-24879.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24879", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:link_library_project:link_library:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "link-library", + "product": "Link Library", + "repo": "https://plugins.svn.wordpress.org/link-library", + "vendor": "Yannick Lefebvre", + "versions": [ + { + "lessThan": "7.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9d5f9d2e-6719-4ce7-bbdd-afaf437bd080?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24880.json b/data/anchore/2024/CVE-2024-24880.json new file mode 100644 index 00000000..6969d566 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24880.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24880", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:apollo13themes:apollo13_framework_extensions:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "apollo13-framework-extensions", + "product": "Apollo13 Framework Extensions", + "repo": "https://plugins.svn.wordpress.org/apollo13-framework-extensions", + "vendor": "Apollo13Themes", + "versions": [ + { + "lessThan": "1.9.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/33386b7b-fae3-42a4-96d3-df3cdc342317?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24881.json b/data/anchore/2024/CVE-2024-24881.json new file mode 100644 index 00000000..dd813e9c --- /dev/null +++ b/data/anchore/2024/CVE-2024-24881.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24881", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:veronalabs:wp_sms:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-sms", + "product": "WP SMS – Messaging & SMS Notification for WordPress, WooCommerce, GravityForms, etc", + "repo": "https://plugins.svn.wordpress.org/wp-sms", + "vendor": "VeronaLabs", + "versions": [ + { + "lessThan": "6.5.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/31f7dc1e-2008-4672-85ba-56fa35f4f0e1?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24884.json b/data/anchore/2024/CVE-2024-24884.json new file mode 100644 index 00000000..a7f38804 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24884.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24884", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ari-soft:contact_form_7_connector:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ari-cf7-connector", + "product": "Contact Form 7 Connector", + "repo": "https://plugins.svn.wordpress.org/ari-cf7-connector", + "vendor": "ARI Soft", + "versions": [ + { + "lessThan": "1.2.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b74a5a4c-250a-46bc-bf08-2dd720de41ae?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24885.json b/data/anchore/2024/CVE-2024-24885.json new file mode 100644 index 00000000..6d10f527 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24885.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24885", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:levantoan:woocommerce_vietnam_checkout:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woo-vietnam-checkout", + "product": "Woocommerce Vietnam Checkout", + "repo": "https://plugins.svn.wordpress.org/woo-vietnam-checkout", + "vendor": "Lê Văn Toản", + "versions": [ + { + "lessThan": "2.0.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/02402620-89db-448d-9028-379856735a2a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24887.json b/data/anchore/2024/CVE-2024-24887.json new file mode 100644 index 00000000..ec5b0851 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24887.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24887", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "contest-gallery", + "product": "Photos and Files Contest Gallery – Contact Form, Upload Form, Social Share and Voting Plugin for WordPress", + "repo": "https://plugins.svn.wordpress.org/contest-gallery", + "vendor": "Contest Gallery", + "versions": [ + { + "lessThan": "21.2.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4ed8c6e-5f80-4360-9478-fff49b1fee94?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24926.json b/data/anchore/2024/CVE-2024-24926.json new file mode 100644 index 00000000..5ef5f8a1 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24926.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-24926", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:unitedthemes:brooklyn:*:*:*:*:*:wordpress:*:*" + ], + "product": "Brooklyn | Creative Multi-Purpose Responsive WordPress Theme", + "vendor": "UnitedThemes", + "versions": [ + { + "lessThanOrEqual": "4.9.7.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5dd962a5-ec0e-415f-8efa-91e78bb80d16?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25093.json b/data/anchore/2024/CVE-2024-25093.json new file mode 100644 index 00000000..989db61c --- /dev/null +++ b/data/anchore/2024/CVE-2024-25093.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25093", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:gdragon:gd_rating_system:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "gd-rating-system", + "product": "GD Rating System", + "repo": "https://plugins.svn.wordpress.org/gd-rating-system", + "vendor": "Milan Petrovic", + "versions": [ + { + "lessThan": "3.5.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c0b3662d-e369-4978-aa7a-debbb3ee37e4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25096.json b/data/anchore/2024/CVE-2024-25096.json new file mode 100644 index 00000000..64b73390 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25096.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25096", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:canto:canto:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "canto", + "product": "Canto", + "repo": "https://plugins.svn.wordpress.org/canto", + "vendor": "Canto Inc.", + "versions": [ + { + "lessThan": "3.0.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aa080b36-01ce-496a-9938-9715f0131e29?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25099.json b/data/anchore/2024/CVE-2024-25099.json new file mode 100644 index 00000000..320656db --- /dev/null +++ b/data/anchore/2024/CVE-2024-25099.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25099", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:paytium:paytium:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "paytium", + "product": "Paytium: Mollie payment forms & donations", + "repo": "https://plugins.svn.wordpress.org/paytium", + "vendor": "David de Boer", + "versions": [ + { + "lessThan": "4.4.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e9e49406-a007-4c38-8e69-bf4b5438260e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25100.json b/data/anchore/2024/CVE-2024-25100.json new file mode 100644 index 00000000..4e8d7e51 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25100.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25100", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:wpswings:coupon_referral_program:*:*:*:*:*:wordpress:*:*" + ], + "product": "Coupon Referral Program", + "vendor": "WP Swings", + "versions": [ + { + "lessThanOrEqual": "1.7.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0e556ca2-1b83-4589-bff8-64323eb594e7?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25101.json b/data/anchore/2024/CVE-2024-25101.json new file mode 100644 index 00000000..4f9786a6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25101.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25101", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpmaspik:maspik:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "contact-forms-anti-spam", + "product": "Maspik – Spam Blacklist", + "repo": "https://plugins.svn.wordpress.org/contact-forms-anti-spam", + "vendor": "yonifre", + "versions": [ + { + "lessThan": "0.10.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b1703f90-17ad-4988-a60c-e56f88f3a317?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25591.json b/data/anchore/2024/CVE-2024-25591.json new file mode 100644 index 00000000..aba0d655 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25591.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25591", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:benjaminrojas:wp_editor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-editor", + "product": "WP Editor", + "repo": "https://plugins.svn.wordpress.org/wp-editor", + "vendor": "Benjamin Rojas", + "versions": [ + { + "lessThan": "1.2.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/66b1f539-9192-43f5-a77d-9763024e6b74?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25592.json b/data/anchore/2024/CVE-2024-25592.json new file mode 100644 index 00000000..c3177222 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25592.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25592", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:managewp:broken_link_checker:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "broken-link-checker", + "product": "Broken Link Checker", + "repo": "https://plugins.svn.wordpress.org/broken-link-checker", + "vendor": "WPMU DEV", + "versions": [ + { + "lessThan": "2.2.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1a374d8a-3754-4228-95ed-dc0ba1df40da?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25593.json b/data/anchore/2024/CVE-2024-25593.json new file mode 100644 index 00000000..86711bf3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25593.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25593", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:basixonline:nex-forms:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "nex-forms-express-wp-form-builder", + "product": "NEX-Forms – Ultimate Form Builder", + "repo": "https://plugins.svn.wordpress.org/nex-forms-express-wp-form-builder", + "vendor": "Basix", + "versions": [ + { + "lessThan": "8.5.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d6934c0e-7526-4de7-9478-3c953b3dc64f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25596.json b/data/anchore/2024/CVE-2024-25596.json new file mode 100644 index 00000000..f1d2a6a9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25596.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25596", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:doofinder:doofinder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "doofinder-for-woocommerce", + "product": "Doofinder for WooCommerce", + "repo": "https://plugins.svn.wordpress.org/doofinder-for-woocommerce", + "vendor": "Doofinder", + "versions": [ + { + "lessThan": "2.1.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/13159a71-c183-4fc2-98af-8b9e60508a1c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25597.json b/data/anchore/2024/CVE-2024-25597.json new file mode 100644 index 00000000..694b9c44 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25597.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25597", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:etoilewebdesign:ultimate_reviews:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ultimate-reviews", + "product": "Ultimate Reviews", + "repo": "https://plugins.svn.wordpress.org/ultimate-reviews", + "vendor": "Etoile Web Design", + "versions": [ + { + "lessThan": "3.2.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/69e15a1b-4984-4889-8c57-a731a0334963?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25598.json b/data/anchore/2024/CVE-2024-25598.json new file mode 100644 index 00000000..f0d23203 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25598.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25598", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "addons-for-elementor", + "product": "Livemesh Addons for Elementor", + "repo": "https://plugins.svn.wordpress.org/addons-for-elementor", + "vendor": "Livemesh", + "versions": [ + { + "lessThan": "8.3.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4397c99c-c37d-43da-9285-003ba91d4003?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25599.json b/data/anchore/2024/CVE-2024-25599.json new file mode 100644 index 00000000..85e2b1cc --- /dev/null +++ b/data/anchore/2024/CVE-2024-25599.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25599", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:castos:seriously_simple_podcasting:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "seriously-simple-podcasting", + "product": "Seriously Simple Podcasting", + "repo": "https://plugins.svn.wordpress.org/seriously-simple-podcasting", + "vendor": "Castos", + "versions": [ + { + "lessThan": "3.1.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eba81d49-7af5-4031-aa0e-43c2fa61cd38?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-2578.json b/data/anchore/2024/CVE-2024-2578.json new file mode 100644 index 00000000..8b691f77 --- /dev/null +++ b/data/anchore/2024/CVE-2024-2578.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-2578", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wow-company:wp_coder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-coder", + "product": "WP Coder", + "repo": "https://plugins.svn.wordpress.org/wp-coder", + "vendor": "WPCoder", + "versions": [ + { + "lessThan": "3.5.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7394f468-b1d6-477e-9213-e01c74e2e504?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-2580.json b/data/anchore/2024/CVE-2024-2580.json new file mode 100644 index 00000000..8c56f690 --- /dev/null +++ b/data/anchore/2024/CVE-2024-2580.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-2580", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:funnelkit:funnelkit_automations:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-marketing-automations", + "product": "Automation By Autonami", + "repo": "https://plugins.svn.wordpress.org/wp-marketing-automations", + "vendor": "FunnelKit", + "versions": [ + { + "lessThan": "2.8.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ec1d883-147f-4a15-89ab-bd9c41893589?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25902.json b/data/anchore/2024/CVE-2024-25902.json new file mode 100644 index 00000000..fffa7ae6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25902.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25902", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:miniorange:malware_scanner:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "miniorange-malware-protection", + "product": "Malware Scanner", + "repo": "https://plugins.svn.wordpress.org/miniorange-malware-protection", + "vendor": "miniorange", + "versions": [ + { + "lessThan": "4.7.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b26996cf-acea-41fb-ad2f-167f41d31cea?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25903.json b/data/anchore/2024/CVE-2024-25903.json new file mode 100644 index 00000000..8ab4288b --- /dev/null +++ b/data/anchore/2024/CVE-2024-25903.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25903", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:najeebmedia:frontend_file_manager_plugin:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "nmedia-user-file-uploader", + "product": "Frontend File Manager", + "repo": "https://plugins.svn.wordpress.org/nmedia-user-file-uploader", + "vendor": "N-Media", + "versions": [ + { + "lessThan": "22.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bbade634-cd81-41c0-8976-f5cb251da3f2?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25905.json b/data/anchore/2024/CVE-2024-25905.json new file mode 100644 index 00000000..7b05f68d --- /dev/null +++ b/data/anchore/2024/CVE-2024-25905.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25905", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mondula:multi_step_form:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "multi-step-form", + "product": "Multi Step Form", + "repo": "https://plugins.svn.wordpress.org/multi-step-form", + "vendor": "Mondula GmbH", + "versions": [ + { + "lessThan": "1.7.19", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3f904fd6-c937-4676-8e6e-6e94d3c42b0d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25914.json b/data/anchore/2024/CVE-2024-25914.json new file mode 100644 index 00000000..bf677b1b --- /dev/null +++ b/data/anchore/2024/CVE-2024-25914.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25914", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:photoboxone:smtp_mail:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "smtp-mail", + "product": "SMTP Mail", + "repo": "https://plugins.svn.wordpress.org/smtp-mail", + "vendor": "Photoboxone", + "versions": [ + { + "lessThan": "1.3.21", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/60379757-fe43-4a76-a65a-ee09163dab0a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25916.json b/data/anchore/2024/CVE-2024-25916.json new file mode 100644 index 00000000..5c3795b3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25916.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25916", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:joedolson:my_calendar:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:my_calendar_project:my_calendar:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "my-calendar", + "product": "My Calendar", + "repo": "https://plugins.svn.wordpress.org/my-calendar", + "vendor": "Joseph C Dolson", + "versions": [ + { + "lessThan": "3.4.24", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d039ba8f-0452-4c14-a655-7f6880c1f1b4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25918.json b/data/anchore/2024/CVE-2024-25918.json new file mode 100644 index 00000000..a00fb51d --- /dev/null +++ b/data/anchore/2024/CVE-2024-25918.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25918", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:instawp:instawp_connect:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "instawp-connect", + "product": "InstaWP Connect", + "repo": "https://plugins.svn.wordpress.org/instawp-connect", + "vendor": "InstaWP Team", + "versions": [ + { + "lessThan": "0.1.0.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2a681cef-649f-4342-beb6-914674bbf6d6?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25919.json b/data/anchore/2024/CVE-2024-25919.json new file mode 100644 index 00000000..1d031d93 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25919.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25919", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpgogo:custom_field_template:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "custom-field-template", + "product": "Custom Field Template", + "repo": "https://plugins.svn.wordpress.org/custom-field-template", + "vendor": "Hiroaki Miyashita", + "versions": [ + { + "lessThan": "2.6.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec47ffee-0599-4f16-a71d-d17dcfe9b183?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25920.json b/data/anchore/2024/CVE-2024-25920.json new file mode 100644 index 00000000..070f240f --- /dev/null +++ b/data/anchore/2024/CVE-2024-25920.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25920", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:veronalabs:wp_sms:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-sms", + "product": "WP SMS", + "repo": "https://plugins.svn.wordpress.org/wp-sms", + "vendor": "VeronaLabs", + "versions": [ + { + "lessThan": "6.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b6d874a2-f0cd-49d2-b531-5d780db7d25d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25923.json b/data/anchore/2024/CVE-2024-25923.json new file mode 100644 index 00000000..4459ee4a --- /dev/null +++ b/data/anchore/2024/CVE-2024-25923.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25923", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:peepso:peepso:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "peepso-core", + "product": "Community by PeepSo", + "repo": "https://plugins.svn.wordpress.org/peepso-core", + "vendor": "PeepSo", + "versions": [ + { + "lessThan": "6.2.7.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/af3c8ea5-0af8-492b-920d-858bf23ca6f0?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25924.json b/data/anchore/2024/CVE-2024-25924.json new file mode 100644 index 00000000..396dfd30 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25924.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25924", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:trustindex:wp_testimonials:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "testimonial-widgets", + "product": "WP Testimonials", + "repo": "https://plugins.svn.wordpress.org/testimonial-widgets", + "vendor": "Trustindex.io", + "versions": [ + { + "lessThan": "1.4.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4da18aad-3c82-4bc6-8dad-523643c12d5b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25935.json b/data/anchore/2024/CVE-2024-25935.json new file mode 100644 index 00000000..53d80cc1 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25935.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25935", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "custom-registration-form-builder-with-submission-manager", + "product": "RegistrationMagic", + "repo": "https://plugins.svn.wordpress.org/custom-registration-form-builder-with-submission-manager", + "vendor": "Metagauss", + "versions": [ + { + "lessThan": "5.2.6.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/26d70dee-c098-40f1-962a-db56791ae221?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25936.json b/data/anchore/2024/CVE-2024-25936.json new file mode 100644 index 00000000..3fdf3025 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25936.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-25936", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:soundcloud:soundcloud_shortcode:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "soundcloud-shortcode", + "product": "SoundCloud Shortcode", + "repo": "https://plugins.svn.wordpress.org/soundcloud-shortcode", + "vendor": "SoundCloud Inc., Lawrie Malen", + "versions": [ + { + "lessThan": "4.0.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9f2ae1ff-c76e-4997-b860-f1e0b94a437d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-2702.json b/data/anchore/2024/CVE-2024-2702.json new file mode 100644 index 00000000..23847a48 --- /dev/null +++ b/data/anchore/2024/CVE-2024-2702.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-2702", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:olivethemes:olive_one_click_demo_import:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "olive-one-click-demo-import", + "product": "Olive One Click Demo Import", + "repo": "https://plugins.svn.wordpress.org/olive-one-click-demo-import", + "vendor": "Olive Themes", + "versions": [ + { + "lessThan": "1.1.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/11b8c13b-2167-4fca-a981-a331fadc0439?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27188.json b/data/anchore/2024/CVE-2024-27188.json new file mode 100644 index 00000000..6d05d3d7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27188.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27188", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:cloudways:breeze:*:*:*:*:*:*:*:*" + ], + "packageName": "breeze", + "product": "Breeze", + "repo": "https://plugins.svn.wordpress.org/breeze", + "vendor": "Cloudways", + "versions": [ + { + "lessThan": "2.1.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c56b1dca-3841-48df-837e-7973940e74e3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27189.json b/data/anchore/2024/CVE-2024-27189.json new file mode 100644 index 00000000..73ca9735 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27189.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27189", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:catchsquare:wp_social_widget:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-social-widget", + "product": "WP Social Widget", + "repo": "https://plugins.svn.wordpress.org/wp-social-widget", + "vendor": "catchsquare", + "versions": [ + { + "lessThan": "2.2.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1df421ac-c8fc-4505-989e-1d822ca6de7a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27948.json b/data/anchore/2024/CVE-2024-27948.json new file mode 100644 index 00000000..d63133b5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27948.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27948", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/themes", + "cpes": [ + "cpe:2.3:a:bytesforall:atahualpa:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "atahualpa", + "product": "Atahualpa", + "repo": "https://themes.svn.wordpress.org/atahualpa", + "vendor": "bytesforall", + "versions": [ + { + "lessThanOrEqual": "3.7.24", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fb2fffb1-cc8c-46a4-b3ea-2b1aac684fbd?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27949.json b/data/anchore/2024/CVE-2024-27949.json new file mode 100644 index 00000000..a0308ee3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27949.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27949", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:sirv:sirv:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "sirv", + "product": "Image Optimizer, Resizer and CDN – Sirv", + "repo": "https://plugins.svn.wordpress.org/sirv", + "vendor": "sirv.com", + "versions": [ + { + "lessThan": "7.2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d30cc136-ebde-4c76-9831-ffde79bf3c4a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27950.json b/data/anchore/2024/CVE-2024-27950.json new file mode 100644 index 00000000..c0e883a8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27950.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27950", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:sirv:sirv:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "sirv", + "product": "Image Optimizer, Resizer and CDN – Sirv", + "repo": "https://plugins.svn.wordpress.org/sirv", + "vendor": "sirv.com", + "versions": [ + { + "lessThan": "7.2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/46030da6-6d9f-4934-a93c-4cd564510f36?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27951.json b/data/anchore/2024/CVE-2024-27951.json new file mode 100644 index 00000000..295254f2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27951.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27951", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:themeisle:multiple_page_generator:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "multiple-pages-generator-by-porthas", + "product": "Multiple Page Generator Plugin – MPG", + "repo": "https://plugins.svn.wordpress.org/multiple-pages-generator-by-porthas", + "vendor": "Themeisle", + "versions": [ + { + "lessThan": "3.4.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/155f765c-65ab-443a-a4b7-50d916e2903c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27953.json b/data/anchore/2024/CVE-2024-27953.json new file mode 100644 index 00000000..6fa6ad61 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27953.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27953", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:coolplugins:cryptocurrency_widgets:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "cryptocurrency-price-ticker-widget", + "product": "Cryptocurrency Widgets – Price Ticker & Coins List", + "repo": "https://plugins.svn.wordpress.org/cryptocurrency-price-ticker-widget", + "vendor": "Cool Plugins", + "versions": [ + { + "lessThan": "2.6.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e3c371fc-4cf0-478e-b6ae-3bb258c5062e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27957.json b/data/anchore/2024/CVE-2024-27957.json new file mode 100644 index 00000000..cc82be7c --- /dev/null +++ b/data/anchore/2024/CVE-2024-27957.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27957", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:genetechsolutions:pie_register:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "pie-register", + "product": "Pie Register", + "repo": "https://plugins.svn.wordpress.org/pie-register", + "vendor": "Pie Register", + "versions": [ + { + "lessThanOrEqual": "3.8.3.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/89586fcc-f0f6-4f44-841b-04eee64c0ab3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27958.json b/data/anchore/2024/CVE-2024-27958.json new file mode 100644 index 00000000..1355ef99 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27958.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27958", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:themeisle:visualizer:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "visualizer", + "product": "Visualizer", + "repo": "https://plugins.svn.wordpress.org/visualizer", + "vendor": "Themeisle", + "versions": [ + { + "lessThan": "3.10.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a97f74bf-c3a5-4bb3-a7fd-d3f43af6ec42?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27960.json b/data/anchore/2024/CVE-2024-27960.json new file mode 100644 index 00000000..edcea131 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27960.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27960", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:i13websolution:email_subscription_popup:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "email-subscribe", + "product": "Email Subscription Popup", + "repo": "https://plugins.svn.wordpress.org/email-subscribe", + "vendor": "I Thirteen Web Solution", + "versions": [ + { + "lessThan": "1.2.21", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce2a438c-8506-4f07-ac1d-b682ad5a038b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27962.json b/data/anchore/2024/CVE-2024-27962.json new file mode 100644 index 00000000..c9843f7b --- /dev/null +++ b/data/anchore/2024/CVE-2024-27962.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27962", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wp-mpdf_project:wp-mpdf:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-mpdf", + "product": "wp-mpdf", + "repo": "https://plugins.svn.wordpress.org/wp-mpdf", + "vendor": "Florian 'fkrauthan' Krauthan", + "versions": [ + { + "lessThan": "3.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dc26fef6-58e8-441c-ae72-19a3822903a5?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27963.json b/data/anchore/2024/CVE-2024-27963.json new file mode 100644 index 00000000..cdbd391c --- /dev/null +++ b/data/anchore/2024/CVE-2024-27963.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27963", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:crisp:live_chat:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "crisp", + "product": "Crisp", + "repo": "https://plugins.svn.wordpress.org/crisp", + "vendor": "Crisp", + "versions": [ + { + "lessThan": "0.45", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7e97d9dd-7d4a-4862-abba-6e8816bbbe9b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27964.json b/data/anchore/2024/CVE-2024-27964.json new file mode 100644 index 00000000..db7ef840 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27964.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27964", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:gesundheit-bewegt:zippy:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "zippy", + "product": "Zippy", + "repo": "https://plugins.svn.wordpress.org/zippy", + "vendor": "Gesundheit Bewegt GmbH", + "versions": [ + { + "lessThan": "1.6.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d8c5b14-6a4c-4d66-85cc-b6ab3b886ff7?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27965.json b/data/anchore/2024/CVE-2024-27965.json new file mode 100644 index 00000000..87532bf6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27965.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27965", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:coderex:wpfunnels:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wpfunnels", + "product": "WPFunnels", + "repo": "https://plugins.svn.wordpress.org/wpfunnels", + "vendor": "WPFunnels Team", + "versions": [ + { + "lessThan": "3.0.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6b028923-82fe-4dd6-af77-69d7744f2812?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27966.json b/data/anchore/2024/CVE-2024-27966.json new file mode 100644 index 00000000..8aabd440 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27966.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27966", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:quizandsurveymaster:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "quiz-master-next", + "product": "Quiz And Survey Master", + "repo": "https://plugins.svn.wordpress.org/quiz-master-next", + "vendor": "ExpressTech", + "versions": [ + { + "lessThan": "8.2.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e31d8218-5e04-44a1-89aa-f93e9677680b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27967.json b/data/anchore/2024/CVE-2024-27967.json new file mode 100644 index 00000000..f4f79a3d --- /dev/null +++ b/data/anchore/2024/CVE-2024-27967.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27967", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mlfactory:dsgvo_all_in_one_for_wp:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "dsgvo-all-in-one-for-wp", + "product": "DSGVO All in one for WP", + "repo": "https://plugins.svn.wordpress.org/dsgvo-all-in-one-for-wp", + "vendor": "Michael Leithold", + "versions": [ + { + "lessThan": "4.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f31a42c1-afb7-4a44-b4e8-f68c622bc43e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27972.json b/data/anchore/2024/CVE-2024-27972.json new file mode 100644 index 00000000..545cf768 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27972.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27972", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:verygoodplugins:wp_fusion:*:*:*:*:lite:wordpress:*:*" + ], + "packageName": "wp-fusion-lite", + "product": "WP Fusion Lite", + "repo": "https://plugins.svn.wordpress.org/wp-fusion-lite", + "vendor": "Very Good Plugins", + "versions": [ + { + "lessThan": "3.42.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d22013e5-896a-4dcb-bbe4-e6be7d697816?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27985.json b/data/anchore/2024/CVE-2024-27985.json new file mode 100644 index 00000000..7a812098 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27985.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27985", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wp-property-hive:propertyhive:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "propertyhive", + "product": "PropertyHive", + "repo": "https://plugins.svn.wordpress.org/propertyhive", + "vendor": "PropertyHive", + "versions": [ + { + "lessThan": "2.0.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f7b24b7c-1a15-4b38-b59e-bcad39cc4340?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27986.json b/data/anchore/2024/CVE-2024-27986.json new file mode 100644 index 00000000..22f3d010 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27986.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27986", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:livemesh:elementor_addons:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "addons-for-elementor", + "product": "Elementor Addons by Livemesh", + "repo": "https://plugins.svn.wordpress.org/addons-for-elementor", + "vendor": "Livemesh", + "versions": [ + { + "lessThan": "8.3.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27989.json b/data/anchore/2024/CVE-2024-27989.json new file mode 100644 index 00000000..7c2838bb --- /dev/null +++ b/data/anchore/2024/CVE-2024-27989.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27989", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:i13websolution:wp_responsive_tabs_horizontal_vertical_and_accordion_tabs:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "responsive-horizontal-vertical-and-accordion-tabs", + "product": "WP Responsive Tabs horizontal vertical and accordion Tabs", + "repo": "https://plugins.svn.wordpress.org/responsive-horizontal-vertical-and-accordion-tabs", + "vendor": "I Thirteen Web Solution", + "versions": [ + { + "lessThan": "1.1.18", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/96a7ebcb-3420-497c-80e6-54e42afe41a3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27991.json b/data/anchore/2024/CVE-2024-27991.json new file mode 100644 index 00000000..2b317886 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27991.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27991", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:supportcandy:supportcandy:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "supportcandy", + "product": "SupportCandy", + "repo": "https://plugins.svn.wordpress.org/supportcandy", + "vendor": "SupportCandy", + "versions": [ + { + "lessThan": "3.2.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/663c54f4-4ca5-4916-b2a5-de3cabe77f38?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27992.json b/data/anchore/2024/CVE-2024-27992.json new file mode 100644 index 00000000..3f7d3d82 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27992.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27992", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:linkwhisper:link_whisper_free:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "link-whisper", + "product": "Link Whisper Free", + "repo": "https://plugins.svn.wordpress.org/link-whisper", + "vendor": "Link Whisper", + "versions": [ + { + "lessThan": "0.6.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7d567665-543c-4a6b-bb07-9388fea09ee9?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27994.json b/data/anchore/2024/CVE-2024-27994.json new file mode 100644 index 00000000..b30b1b1c --- /dev/null +++ b/data/anchore/2024/CVE-2024-27994.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27994", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:yithemes:yith_woocommerce_product_add-ons:*:*:*:*:free:wordpress:*:*" + ], + "packageName": "yith-woocommerce-product-add-ons", + "product": "YITH WooCommerce Product Add-Ons", + "repo": "https://plugins.svn.wordpress.org/yith-woocommerce-product-add-ons", + "vendor": "YITH", + "versions": [ + { + "lessThan": "4.6.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c3efb7b1-5230-40f9-a8a0-3712916284be?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27995.json b/data/anchore/2024/CVE-2024-27995.json new file mode 100644 index 00000000..1d6f6eb2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27995.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27995", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:armemberplugin:armember:*:*:*:*:-:wordpress:*:*", + "cpe:2.3:a:armemberplugin:armember:*:*:*:*:premium:wordpress:*:*", + "cpe:2.3:a:reputeinfosystems:armember:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "armember-membership", + "product": "ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup", + "repo": "https://plugins.svn.wordpress.org/armember-membership", + "vendor": "Repute Infosystems", + "versions": [ + { + "lessThan": "4.0.24", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d55b210f-bbed-4206-a109-99f217a2eb67?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27996.json b/data/anchore/2024/CVE-2024-27996.json new file mode 100644 index 00000000..24891c0f --- /dev/null +++ b/data/anchore/2024/CVE-2024-27996.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27996", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ays-pro:survey_maker:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "survey-maker", + "product": "Survey Maker", + "repo": "https://plugins.svn.wordpress.org/survey-maker", + "vendor": "Survey Maker team", + "versions": [ + { + "lessThan": "4.0.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bcf6a12e-969b-4627-80c8-b51bb9b710cf?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27997.json b/data/anchore/2024/CVE-2024-27997.json new file mode 100644 index 00000000..d968c1fe --- /dev/null +++ b/data/anchore/2024/CVE-2024-27997.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27997", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:visualcomposer:visual_composer_website_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "visualcomposer", + "product": "Visual Composer Website Builder", + "repo": "https://plugins.svn.wordpress.org/visualcomposer", + "vendor": "Visualcomposer", + "versions": [ + { + "lessThan": "45.7.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f3042586-dd23-487f-a79c-7ad5b5e38677?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27998.json b/data/anchore/2024/CVE-2024-27998.json new file mode 100644 index 00000000..ad4439bd --- /dev/null +++ b/data/anchore/2024/CVE-2024-27998.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27998", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ukrsolution:barcode_scanner_and_inventory_manager:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "barcode-scanner-lite-pos-to-manage-products-inventory-and-orders", + "product": "Barcode Scanner with Inventory & Order Manager", + "repo": "https://plugins.svn.wordpress.org/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders", + "vendor": "UkrSolution", + "versions": [ + { + "lessThan": "1.5.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e268dfa-7761-4e52-9e97-288c58d2e5c3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27999.json b/data/anchore/2024/CVE-2024-27999.json new file mode 100644 index 00000000..24ba815b --- /dev/null +++ b/data/anchore/2024/CVE-2024-27999.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-27999", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:preview_e-mails_for_woocommerce_project:preview_e-mails_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woo-preview-emails", + "product": "Preview E-mails for WooCommerce", + "repo": "https://plugins.svn.wordpress.org/woo-preview-emails", + "vendor": "Digamber Pradhan", + "versions": [ + { + "lessThan": "2.2.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d9e80da-4cc6-425c-892f-1ff34b07583f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28003.json b/data/anchore/2024/CVE-2024-28003.json new file mode 100644 index 00000000..553b41f8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28003.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-28003", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:megamenu:max_mega_menu:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "megamenu", + "product": "Max Mega Menu", + "repo": "https://plugins.svn.wordpress.org/megamenu", + "vendor": "Megamenu", + "versions": [ + { + "lessThan": "3.3.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/35a75451-f0ae-4630-b415-394c76868e93?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28004.json b/data/anchore/2024/CVE-2024-28004.json new file mode 100644 index 00000000..0a5665a5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28004.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-28004", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:extendthemes:colibri_page_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "colibri-page-builder", + "product": "Colibri Page Builder", + "repo": "https://plugins.svn.wordpress.org/colibri-page-builder", + "vendor": "ExtendThemes", + "versions": [ + { + "lessThan": "1.0.249", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9759e1f0-e134-4c7f-88aa-63dbae7067f1?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-2888.json b/data/anchore/2024/CVE-2024-2888.json new file mode 100644 index 00000000..2efad725 --- /dev/null +++ b/data/anchore/2024/CVE-2024-2888.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-2888", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:boldgrid:post_and_page_builder_by_boldgrid_-_visual_drag_and_drop_editor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "post-and-page-builder", + "product": "Post and Page Builder by BoldGrid – Visual Drag and Drop Editor", + "repo": "https://plugins.svn.wordpress.org/post-and-page-builder", + "vendor": "BoldGrid", + "versions": [ + { + "lessThan": "1.26.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4dbb0ca4-169a-4f51-a196-5f138744c54d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-2889.json b/data/anchore/2024/CVE-2024-2889.json new file mode 100644 index 00000000..48796ad8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-2889.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-2889", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wplite:wp-lister_lite_for_amazon:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-lister-for-amazon", + "product": "WP-Lister Lite for Amazon", + "repo": "https://plugins.svn.wordpress.org/wp-lister-for-amazon", + "vendor": "WP Lab", + "versions": [ + { + "lessThan": "2.6.12", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/36f37875-69fe-41cb-a68d-ad73d53d1a83?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29089.json b/data/anchore/2024/CVE-2024-29089.json new file mode 100644 index 00000000..b7fee6f8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29089.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29089", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:fivestarplugins:five_star_restaurant_menu:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "food-and-drink-menu", + "product": "Five Star Restaurant Menu", + "repo": "https://plugins.svn.wordpress.org/food-and-drink-menu", + "vendor": "Five Star Plugins", + "versions": [ + { + "lessThan": "2.4.15", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d1769ed5-5f56-4b70-af36-c60119f0a356?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29090.json b/data/anchore/2024/CVE-2024-29090.json new file mode 100644 index 00000000..d5a67412 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29090.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29090", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:meowapps:ai_engine:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ai-engine", + "product": "AI Engine: ChatGPT Chatbot", + "repo": "https://plugins.svn.wordpress.org/ai-engine", + "vendor": "Jordy Meow", + "versions": [ + { + "lessThan": "2.1.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/206d343d-6ed6-461c-bf7d-cf5011ed956f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29092.json b/data/anchore/2024/CVE-2024-29092.json new file mode 100644 index 00000000..3f6610e8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29092.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29092", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:permalink_manager_lite_project:permalink_manager_lite:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "permalink-manager", + "product": "Permalink Manager Lite", + "repo": "https://plugins.svn.wordpress.org/permalink-manager", + "vendor": "Maciej Bis", + "versions": [ + { + "lessThan": "2.4.3.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8fefda27-aa3c-4fdf-beea-aaf0cdaaeb77?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29094.json b/data/anchore/2024/CVE-2024-29094.json new file mode 100644 index 00000000..9b172e62 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29094.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29094", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:hasthemes:ht_easy_ga4_\\(google_analytics_4\\):*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ht-easy-google-analytics", + "product": "HT Easy GA4 ( Google Analytics 4 )", + "repo": "https://plugins.svn.wordpress.org/ht-easy-google-analytics", + "vendor": "HasThemes", + "versions": [ + { + "lessThan": "1.1.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/39d69a5e-4265-4898-9fd8-736dc2297b91?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29095.json b/data/anchore/2024/CVE-2024-29095.json new file mode 100644 index 00000000..083b8660 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29095.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29095", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:geminilabs:site_reviews:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "site-reviews", + "product": "Site Reviews", + "repo": "https://plugins.svn.wordpress.org/site-reviews", + "vendor": "Paul Ryley", + "versions": [ + { + "lessThan": "6.11.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2003cef3-06b0-4012-9629-19c0765553dd?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29099.json b/data/anchore/2024/CVE-2024-29099.json new file mode 100644 index 00000000..60f67b49 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29099.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29099", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:evergreencontentposter:evergreen_content_poster:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "evergreen-content-poster", + "product": "Evergreen Content Poster", + "repo": "https://plugins.svn.wordpress.org/evergreen-content-poster", + "vendor": "Evergreen Content Poster", + "versions": [ + { + "lessThan": "1.4.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fa31e932-7fbf-4933-9747-bd7427db7f5d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29100.json b/data/anchore/2024/CVE-2024-29100.json new file mode 100644 index 00000000..c2ab3248 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29100.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29100", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:meowapps:ai_engine:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ai-engine", + "product": "AI Engine: ChatGPT Chatbot", + "repo": "https://plugins.svn.wordpress.org/ai-engine", + "vendor": "Jordy Meow", + "versions": [ + { + "lessThan": "2.1.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29101.json b/data/anchore/2024/CVE-2024-29101.json new file mode 100644 index 00000000..4b860fa0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29101.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29101", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:jegtheme:jeg_elementor_kit:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "jeg-elementor-kit", + "product": "Jeg Elementor Kit", + "repo": "https://plugins.svn.wordpress.org/jeg-elementor-kit", + "vendor": "Jegtheme", + "versions": [ + { + "lessThan": "2.6.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29102.json b/data/anchore/2024/CVE-2024-29102.json new file mode 100644 index 00000000..c13f650b --- /dev/null +++ b/data/anchore/2024/CVE-2024-29102.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29102", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:hasthemes:extensions_for_cf7:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "extensions-for-cf7", + "product": "Extensions For CF7", + "repo": "https://plugins.svn.wordpress.org/extensions-for-cf7", + "vendor": "HasThemes", + "versions": [ + { + "lessThan": "3.0.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bad00612-d98e-4b5e-88e8-664064588bdd?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29105.json b/data/anchore/2024/CVE-2024-29105.json new file mode 100644 index 00000000..f0ea1665 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29105.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29105", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:timersys:wp_popups:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-popups-lite", + "product": "WP Popups", + "repo": "https://plugins.svn.wordpress.org/wp-popups-lite", + "vendor": "Timersys", + "versions": [ + { + "lessThan": "2.1.5.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8810d237-06d5-45a0-8402-a2e7e15418d0?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29106.json b/data/anchore/2024/CVE-2024-29106.json new file mode 100644 index 00000000..0f58c735 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29106.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29106", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "premium-addons-for-elementor", + "product": "Premium Addons for Elementor", + "repo": "https://plugins.svn.wordpress.org/premium-addons-for-elementor", + "vendor": "Leap13", + "versions": [ + { + "lessThan": "4.10.17", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29107.json b/data/anchore/2024/CVE-2024-29107.json new file mode 100644 index 00000000..38e26c52 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29107.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29107", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:webtechstreet:elementor_addon_elements:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "addon-elements-for-elementor-page-builder", + "product": "Elementor Addon Elements", + "repo": "https://plugins.svn.wordpress.org/addon-elements-for-elementor-page-builder", + "vendor": "WPVibes", + "versions": [ + { + "lessThan": "1.12.11", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8cb6639d-06ba-4bad-af73-d387a7e3f6b5?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29108.json b/data/anchore/2024/CVE-2024-29108.json new file mode 100644 index 00000000..e7a7adcc --- /dev/null +++ b/data/anchore/2024/CVE-2024-29108.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29108", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wedevs:happy_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "happy-elementor-addons", + "product": "Happy Addons for Elementor", + "repo": "https://plugins.svn.wordpress.org/happy-elementor-addons", + "vendor": "Leevio", + "versions": [ + { + "lessThan": "3.10.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29110.json b/data/anchore/2024/CVE-2024-29110.json new file mode 100644 index 00000000..5e9a0423 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29110.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29110", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pauple:tablesome:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "tablesome", + "product": "Table & Contact Form 7 Database – Tablesome", + "repo": "https://plugins.svn.wordpress.org/tablesome", + "vendor": "Pauple", + "versions": [ + { + "lessThan": "1.0.28", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/49cba28f-43dc-4947-b4bb-8556cc0409ee?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29111.json b/data/anchore/2024/CVE-2024-29111.json new file mode 100644 index 00000000..57d3852a --- /dev/null +++ b/data/anchore/2024/CVE-2024-29111.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29111", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:sitekit_project:sitekit:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "sitekit", + "product": "Sitekit", + "repo": "https://plugins.svn.wordpress.org/sitekit", + "vendor": "Webvitaly", + "versions": [ + { + "lessThan": "1.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/55797931-e2eb-4cd7-8de6-ded7e1a382a0?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29113.json b/data/anchore/2024/CVE-2024-29113.json new file mode 100644 index 00000000..72f4f67d --- /dev/null +++ b/data/anchore/2024/CVE-2024-29113.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29113", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "custom-registration-form-builder-with-submission-manager", + "product": "RegistrationMagic", + "repo": "https://plugins.svn.wordpress.org/custom-registration-form-builder-with-submission-manager", + "vendor": "Metagauss", + "versions": [ + { + "lessThan": "5.2.6.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9396c350-d72e-472b-8cbc-44edce557256?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29114.json b/data/anchore/2024/CVE-2024-29114.json new file mode 100644 index 00000000..ac1bf431 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29114.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29114", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpdownloadmanager:download_manager:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "download-manager", + "product": "Download Manager", + "repo": "https://plugins.svn.wordpress.org/download-manager", + "vendor": "W3 Eden, Inc.", + "versions": [ + { + "lessThan": "3.2.85", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dfb0da20-99f1-4bf1-8b30-3c8d15bf9679?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29115.json b/data/anchore/2024/CVE-2024-29115.json new file mode 100644 index 00000000..02968b5e --- /dev/null +++ b/data/anchore/2024/CVE-2024-29115.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29115", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:zaytech:smart_online_order_for_clover:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "clover-online-orders", + "product": "Smart Online Order for Clover", + "repo": "https://plugins.svn.wordpress.org/clover-online-orders", + "vendor": "Zaytech", + "versions": [ + { + "lessThan": "1.5.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bfa62776-0502-49b4-8beb-74bbf7f20633?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29117.json b/data/anchore/2024/CVE-2024-29117.json new file mode 100644 index 00000000..6f2e589a --- /dev/null +++ b/data/anchore/2024/CVE-2024-29117.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29117", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:cimatti:wordpress_contact_forms:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "contact-forms", + "product": "Contact Forms by Cimatti", + "repo": "https://plugins.svn.wordpress.org/contact-forms", + "vendor": "Cimatti Consulting", + "versions": [ + { + "lessThan": "1.8.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5ef2196d-3617-44ba-a8c5-dc1b45408293?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29122.json b/data/anchore/2024/CVE-2024-29122.json new file mode 100644 index 00000000..b4b8d561 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29122.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29122", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:foliovision:fv_flowplayer_video_player:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "fv-wordpress-flowplayer", + "product": "FV Flowplayer Video Player", + "repo": "https://plugins.svn.wordpress.org/fv-wordpress-flowplayer", + "vendor": "Foliovision: Making the web work for you", + "versions": [ + { + "lessThan": "7.5.44.7212", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/24ebaf12-cf7c-4bc3-b028-27ee4b6b2a45?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29123.json b/data/anchore/2024/CVE-2024-29123.json new file mode 100644 index 00000000..deab9b1a --- /dev/null +++ b/data/anchore/2024/CVE-2024-29123.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29123", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:link_library_project:link_library:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "link-library", + "product": "Link Library", + "repo": "https://plugins.svn.wordpress.org/link-library", + "vendor": "Yannick Lefebvre", + "versions": [ + { + "lessThan": "7.6.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bf0bbd5e-0fec-445e-9baa-e383524da648?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29124.json b/data/anchore/2024/CVE-2024-29124.json new file mode 100644 index 00000000..3a936444 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29124.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29124", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:vasyltech:advanced_access_manager:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "advanced-access-manager", + "product": "Advanced Access Manager", + "repo": "https://plugins.svn.wordpress.org/advanced-access-manager", + "vendor": "AAM", + "versions": [ + { + "lessThan": "6.9.21", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e96e94f8-f61c-4458-9ede-53bab30502b6?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29125.json b/data/anchore/2024/CVE-2024-29125.json new file mode 100644 index 00000000..106a8241 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29125.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29125", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:couponaffiliates:woocommerce_affiliate:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:relywp:coupon_affiliates:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woo-coupon-usage", + "product": "Coupon Affiliates", + "repo": "https://plugins.svn.wordpress.org/woo-coupon-usage", + "vendor": "Elliot Sowersby, RelyWP", + "versions": [ + { + "lessThan": "5.12.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/17cb080f-83f5-4917-af76-bfcc741ae053?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29127.json b/data/anchore/2024/CVE-2024-29127.json new file mode 100644 index 00000000..9fb87326 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29127.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29127", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:vasyltech:advanced_access_manager:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "advanced-access-manager", + "product": "Advanced Access Manager", + "repo": "https://plugins.svn.wordpress.org/advanced-access-manager", + "vendor": "AAM", + "versions": [ + { + "lessThan": "6.9.21", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a752e211-5ae2-4b85-ac01-872dc829d84c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29128.json b/data/anchore/2024/CVE-2024-29128.json new file mode 100644 index 00000000..6114da8e --- /dev/null +++ b/data/anchore/2024/CVE-2024-29128.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29128", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "post-smtp", + "product": "POST SMTP", + "repo": "https://plugins.svn.wordpress.org/post-smtp", + "vendor": "Post SMTP", + "versions": [ + { + "lessThan": "2.8.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29130.json b/data/anchore/2024/CVE-2024-29130.json new file mode 100644 index 00000000..25b1e638 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29130.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29130", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpplugin:paypal_\\&_stripe_add-on:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "contact-form-7-paypal-add-on", + "product": "Contact Form 7 – PayPal & Stripe Add-on", + "repo": "https://plugins.svn.wordpress.org/contact-form-7-paypal-add-on", + "vendor": "Scott Paterson", + "versions": [ + { + "lessThan": "2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/99be8703-b462-4589-9918-76c0ebbb3bcf?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29139.json b/data/anchore/2024/CVE-2024-29139.json new file mode 100644 index 00000000..95059848 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29139.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29139", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mycurator_content_curation_project:mycurator_content_curation:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "mycurator", + "product": "MyCurator Content Curation", + "repo": "https://plugins.svn.wordpress.org/mycurator", + "vendor": "Mark Tilly", + "versions": [ + { + "lessThan": "3.77", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6dbc64eb-1da6-4086-9fe1-3d9080bef12e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29141.json b/data/anchore/2024/CVE-2024-29141.json new file mode 100644 index 00000000..52b7ebcd --- /dev/null +++ b/data/anchore/2024/CVE-2024-29141.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29141", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wp-pdf:pdf_embedder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "pdf-embedder", + "product": "PDF Embedder", + "repo": "https://plugins.svn.wordpress.org/pdf-embedder", + "vendor": "PDF Embedder", + "versions": [ + { + "lessThan": "4.7.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b63f0862-d817-49c6-8ac2-6143d21abc32?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29142.json b/data/anchore/2024/CVE-2024-29142.json new file mode 100644 index 00000000..cce7c433 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29142.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29142", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:webberzone:better_search:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "better-search", + "product": "Better Search – Relevant search results for WordPress", + "repo": "https://plugins.svn.wordpress.org/better-search", + "vendor": "WebberZone", + "versions": [ + { + "lessThan": "3.3.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b4e1638a-ddfb-44e5-951e-3e779971a3a7?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-2951.json b/data/anchore/2024/CVE-2024-2951.json new file mode 100644 index 00000000..4d5ce9c0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-2951.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-2951", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "custom-registration-form-builder-with-submission-manager", + "product": "RegistrationMagic", + "repo": "https://plugins.svn.wordpress.org/custom-registration-form-builder-with-submission-manager", + "vendor": "Metagauss", + "versions": [ + { + "lessThan": "5.3.1.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b6da046f-a16f-4a93-b3c6-04270538b7a9?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29759.json b/data/anchore/2024/CVE-2024-29759.json new file mode 100644 index 00000000..9bad3256 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29759.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29759", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:codepeople:calculated_fields_form:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "calculated-fields-form", + "product": "Calculated Fields Form", + "repo": "https://plugins.svn.wordpress.org/calculated-fields-form", + "vendor": "CodePeople", + "versions": [ + { + "lessThan": "1.2.55", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6a76116a-1e84-4114-9baa-3986be92d051?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29760.json b/data/anchore/2024/CVE-2024-29760.json new file mode 100644 index 00000000..332b4e19 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29760.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29760", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woocommerce-jetpack", + "product": "Booster for WooCommerce", + "repo": "https://plugins.svn.wordpress.org/woocommerce-jetpack", + "vendor": "Pluggabl LLC", + "versions": [ + { + "lessThan": "7.1.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/819f93ae-cfbd-4ba5-979f-18adc7b9c8fe?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29763.json b/data/anchore/2024/CVE-2024-29763.json new file mode 100644 index 00000000..7f9acc6a --- /dev/null +++ b/data/anchore/2024/CVE-2024-29763.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29763", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pluginus:wordpress_meta_data_and_taxonomies_filter:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-meta-data-filter-and-taxonomy-filter", + "product": "WordPress Meta Data and Taxonomies Filter (MDTF)", + "repo": "https://plugins.svn.wordpress.org/wp-meta-data-filter-and-taxonomy-filter", + "vendor": "realmag777", + "versions": [ + { + "lessThan": "1.3.3.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b1f482d3-d2f6-4161-8bcf-3d43d5ac10ee?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29764.json b/data/anchore/2024/CVE-2024-29764.json new file mode 100644 index 00000000..ec3883f3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29764.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29764", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:amitzy:molongui:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "molongui-authorship", + "product": "Molongui", + "repo": "https://plugins.svn.wordpress.org/molongui-authorship", + "vendor": "Molongui", + "versions": [ + { + "lessThan": "4.7.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/13f33422-13ba-4696-a473-cf8ca00d4b0c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29770.json b/data/anchore/2024/CVE-2024-29770.json new file mode 100644 index 00000000..4666315a --- /dev/null +++ b/data/anchore/2024/CVE-2024-29770.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29770", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:upress:enable_accessibility:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "pretty-link", + "product": "Shortlinks by Pretty Links", + "repo": "https://plugins.svn.wordpress.org/pretty-link", + "vendor": "Pretty Links", + "versions": [ + { + "lessThan": "3.6.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a53291f9-632c-4b0b-b5f9-d247134f2a5c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29772.json b/data/anchore/2024/CVE-2024-29772.json new file mode 100644 index 00000000..12c1a8a3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29772.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29772", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:stormhillmedia:mybook_table_bookstore:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "mybooktable", + "product": "MyBookTable Bookstore", + "repo": "https://plugins.svn.wordpress.org/mybooktable", + "vendor": "Stormhill Media", + "versions": [ + { + "lessThan": "3.3.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a15f8a5a-dccf-476e-9a40-e9ea11dc46f6?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29774.json b/data/anchore/2024/CVE-2024-29774.json new file mode 100644 index 00000000..67da1e19 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29774.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29774", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpdirectorykit:wp_directory_kit:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wpdirectorykit", + "product": "WP Directory Kit", + "repo": "https://plugins.svn.wordpress.org/wpdirectorykit", + "vendor": "WpDirectoryKit", + "versions": [ + { + "lessThan": "1.3.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b40070af-3f2c-4bd1-bd33-1a0aa37c6e62?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29776.json b/data/anchore/2024/CVE-2024-29776.json new file mode 100644 index 00000000..0230abbc --- /dev/null +++ b/data/anchore/2024/CVE-2024-29776.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29776", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metagauss:eventprime:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "eventprime-event-calendar-management", + "product": "EventPrime", + "repo": "https://plugins.svn.wordpress.org/eventprime-event-calendar-management", + "vendor": "Metagauss", + "versions": [ + { + "lessThan": "3.4.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3d71289-e5a3-4145-817f-c2cac8405202?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29777.json b/data/anchore/2024/CVE-2024-29777.json new file mode 100644 index 00000000..ff88e306 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29777.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29777", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:incsub:forminator:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "forminator", + "product": "Forminator", + "repo": "https://plugins.svn.wordpress.org/forminator", + "vendor": "WPMU DEV", + "versions": [ + { + "lessThan": "1.29.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1a6fbb60-811a-4763-b301-694bc8d387e7?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29789.json b/data/anchore/2024/CVE-2024-29789.json new file mode 100644 index 00000000..05f88f25 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29789.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29789", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:walterpinem:oneclick_chat_to_order:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "oneclick-whatsapp-order", + "product": "OneClick Chat to Order", + "repo": "https://plugins.svn.wordpress.org/oneclick-whatsapp-order", + "vendor": "Walter Pinem", + "versions": [ + { + "lessThan": "1.0.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cbc3fa27-630d-4048-b727-903da09ad644?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29790.json b/data/anchore/2024/CVE-2024-29790.json new file mode 100644 index 00000000..d4f91173 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29790.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29790", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:squirrly:seo_plugin_by_squirrly_seo:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "squirrly-seo", + "product": "SEO Plugin by Squirrly SEO", + "repo": "https://plugins.svn.wordpress.org/squirrly-seo", + "vendor": "Squirrly", + "versions": [ + { + "lessThan": "12.3.17", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c874c643-ceb6-4646-adfa-6cd7393bb4f5?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29791.json b/data/anchore/2024/CVE-2024-29791.json new file mode 100644 index 00000000..159fffa0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29791.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29791", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:madfishdigital:bulk_noindex_\\&_nofollow_toolkit:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "bulk-noindex-nofollow-toolkit-by-mad-fish", + "product": "Bulk NoIndex & NoFollow Toolkit", + "repo": "https://plugins.svn.wordpress.org/bulk-noindex-nofollow-toolkit-by-mad-fish", + "vendor": "Mad Fish Digital", + "versions": [ + { + "lessThan": "2.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/451d4ecd-f3d7-4029-8d39-85d2a7ed459c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29792.json b/data/anchore/2024/CVE-2024-29792.json new file mode 100644 index 00000000..aba3a3d8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29792.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29792", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor_\\(free_widgets\\,_addons\\,_templates\\):*:*:*:*:*:wordpress:*:*" + ], + "packageName": "unlimited-elements-for-elementor", + "product": "Unlimited Elements For Elementor (Free Widgets, Addons, Templates)", + "repo": "https://plugins.svn.wordpress.org/unlimited-elements-for-elementor", + "vendor": "Unlimited Elements", + "versions": [ + { + "lessThan": "1.5.94", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6b3fc000-57e7-4be4-959f-27dac9717b9e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29793.json b/data/anchore/2024/CVE-2024-29793.json new file mode 100644 index 00000000..9522c914 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29793.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29793", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mailmunch:mailchimp_forms:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "mailchimp-forms-by-mailmunch", + "product": "MailChimp Forms by MailMunch", + "repo": "https://plugins.svn.wordpress.org/mailchimp-forms-by-mailmunch", + "vendor": "MailMunch", + "versions": [ + { + "lessThan": "3.2.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac87819d-0ba3-4c30-ae35-e933f7e250a4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29794.json b/data/anchore/2024/CVE-2024-29794.json new file mode 100644 index 00000000..2f43df24 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29794.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29794", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tatvic:conversios.io:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "enhanced-e-commerce-for-woocommerce-store", + "product": "Conversios.io", + "repo": "https://plugins.svn.wordpress.org/enhanced-e-commerce-for-woocommerce-store", + "vendor": "Conversios", + "versions": [ + { + "lessThan": "7.0.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b7d1c57c-7aa2-4317-94ac-3fc48f87b98c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29802.json b/data/anchore/2024/CVE-2024-29802.json new file mode 100644 index 00000000..a7f9601a --- /dev/null +++ b/data/anchore/2024/CVE-2024-29802.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29802", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:football_pool_project:football_pool:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "football-pool", + "product": "Football Pool", + "repo": "https://plugins.svn.wordpress.org/football-pool", + "vendor": "Antoine Hurkmans", + "versions": [ + { + "lessThan": "2.11.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ff150706-5fbf-4881-976b-89fdaf637fb1?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29803.json b/data/anchore/2024/CVE-2024-29803.json new file mode 100644 index 00000000..04484b26 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29803.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29803", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mehanoid:flat_pm:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "flatpm-wp", + "product": "FlatPM", + "repo": "https://plugins.svn.wordpress.org/flatpm-wp", + "vendor": "Mehanoid.pro", + "versions": [ + { + "lessThan": "3.1.05", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ae9640f-b088-4d9f-9ced-6bf7940345a3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29804.json b/data/anchore/2024/CVE-2024-29804.json new file mode 100644 index 00000000..ecbfbd36 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29804.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29804", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:heateor:fancy_comments:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "fancy-facebook-comments", + "product": "Fancy Comments WordPress", + "repo": "https://plugins.svn.wordpress.org/fancy-facebook-comments", + "vendor": "Team Heateor", + "versions": [ + { + "lessThan": "1.2.15", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/21597f22-2690-4a3d-965f-bc99326b7e64?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29806.json b/data/anchore/2024/CVE-2024-29806.json new file mode 100644 index 00000000..b2af8c3b --- /dev/null +++ b/data/anchore/2024/CVE-2024-29806.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29806", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:catzsoft:redi_restaurant_reservation:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "redi-restaurant-reservation", + "product": "ReDi Restaurant Reservation", + "repo": "https://plugins.svn.wordpress.org/redi-restaurant-reservation", + "vendor": "Reservation Diary", + "versions": [ + { + "lessThan": "24.0303", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5811e36d-9457-4460-af92-046ddef41114?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29807.json b/data/anchore/2024/CVE-2024-29807.json new file mode 100644 index 00000000..2f94d7c3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29807.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29807", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:dearhive:dearflip:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "3d-flipbook-dflip-lite", + "product": "DearFlip", + "repo": "https://plugins.svn.wordpress.org/3d-flipbook-dflip-lite", + "vendor": "DearHive", + "versions": [ + { + "lessThan": "2.2.27", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a10cf70e-bc66-4888-b88d-c1c4847389c9?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29812.json b/data/anchore/2024/CVE-2024-29812.json new file mode 100644 index 00000000..b5b78dd9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29812.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29812", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpdeveloper:reviewx:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "reviewx", + "product": "ReviewX", + "repo": "https://plugins.svn.wordpress.org/reviewx", + "vendor": "ReviewX", + "versions": [ + { + "lessThan": "1.6.23", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/15c1d7e1-e510-4cba-8da1-79e18b2eed22?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29813.json b/data/anchore/2024/CVE-2024-29813.json new file mode 100644 index 00000000..4ac64ee5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29813.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29813", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:cartflows:cartflows:*:*:*:*:-:wordpress:*:*", + "cpe:2.3:a:cartflows:cartflows:*:*:*:*:pro:wordpress:*:*" + ], + "packageName": "cartflows", + "product": "Funnel Builder by CartFlows", + "repo": "https://plugins.svn.wordpress.org/cartflows", + "vendor": "CartFlows Inc.", + "versions": [ + { + "lessThan": "2.0.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f75e37d-a94e-4103-b706-5fead24f1f73?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29817.json b/data/anchore/2024/CVE-2024-29817.json new file mode 100644 index 00000000..8857090f --- /dev/null +++ b/data/anchore/2024/CVE-2024-29817.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29817", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:servit:affiliate-toolkit:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "affiliate-toolkit-starter", + "product": "affiliate-toolkit", + "repo": "https://plugins.svn.wordpress.org/affiliate-toolkit-starter", + "vendor": "SERVIT Software Solutions", + "versions": [ + { + "lessThan": "3.4.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ecae113c-c66a-4f27-bf81-6679a4717ff8?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29819.json b/data/anchore/2024/CVE-2024-29819.json new file mode 100644 index 00000000..0e32b146 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29819.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29819", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpfront:notification_bar:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wpfront:wpfront_notification_bar:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wpfront-notification-bar", + "product": "WPFront Notification Bar", + "repo": "https://plugins.svn.wordpress.org/wpfront-notification-bar", + "vendor": "Syam Mohan", + "versions": [ + { + "lessThan": "3.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/16b37992-a87e-42bb-ab0f-cb32506874e9?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29906.json b/data/anchore/2024/CVE-2024-29906.json new file mode 100644 index 00000000..5598ac51 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29906.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29906", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pluginus:wordpress_meta_data_and_taxonomies_filter:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-meta-data-filter-and-taxonomy-filter", + "product": "WordPress Meta Data and Taxonomies Filter (MDTF)", + "repo": "https://plugins.svn.wordpress.org/wp-meta-data-filter-and-taxonomy-filter", + "vendor": "realmag777", + "versions": [ + { + "lessThan": "1.3.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c33b51bb-d368-4056-97f2-03543c4e9f8c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29911.json b/data/anchore/2024/CVE-2024-29911.json new file mode 100644 index 00000000..e974f0b9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29911.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29911", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:jeweltheme:master_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "master-addons", + "product": "Master Addons for Elementor", + "repo": "https://plugins.svn.wordpress.org/master-addons", + "vendor": "Jewel Theme", + "versions": [ + { + "lessThan": "2.0.5.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a362e60d-e4ab-4f19-9e18-5473d8e13d80?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29915.json b/data/anchore/2024/CVE-2024-29915.json new file mode 100644 index 00000000..e6ed5814 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29915.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29915", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "podlove-podcasting-plugin-for-wordpress", + "product": "Podlove Podcast Publisher", + "repo": "https://plugins.svn.wordpress.org/podlove-podcasting-plugin-for-wordpress", + "vendor": "Podlove", + "versions": [ + { + "lessThan": "4.0.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b19af06d-7262-4d21-ac39-7d4ce8e75d71?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29917.json b/data/anchore/2024/CVE-2024-29917.json new file mode 100644 index 00000000..19a36f13 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29917.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29917", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tipsandtricks-hq:compact_wp_audio_player:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "compact-wp-audio-player", + "product": "Compact WP Audio Player", + "repo": "https://plugins.svn.wordpress.org/compact-wp-audio-player", + "versions": [ + { + "lessThan": "1.9.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f4505b5a-de80-41e2-852f-d2290c1e42e4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29918.json b/data/anchore/2024/CVE-2024-29918.json new file mode 100644 index 00000000..810de42e --- /dev/null +++ b/data/anchore/2024/CVE-2024-29918.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29918", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ays-pro:survey_maker:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "survey-maker", + "product": "Survey Maker", + "repo": "https://plugins.svn.wordpress.org/survey-maker", + "vendor": "Survey Maker team", + "versions": [ + { + "lessThan": "4.0.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/75aadbf5-763b-48cb-9d9e-fb8edb894d08?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29919.json b/data/anchore/2024/CVE-2024-29919.json new file mode 100644 index 00000000..b1b81621 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29919.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29919", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ays-pro:photo_gallery:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "gallery-photo-gallery", + "product": "Photo Gallery by Ays", + "repo": "https://plugins.svn.wordpress.org/gallery-photo-gallery", + "vendor": "Photo Gallery Team", + "versions": [ + { + "lessThan": "5.5.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eb35b27f-e938-4a51-b441-887d23b7082a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29921.json b/data/anchore/2024/CVE-2024-29921.json new file mode 100644 index 00000000..2f79cab6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29921.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29921", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:supsystic:photo_gallery:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "gallery-by-supsystic", + "product": "Photo Gallery by Supsystic", + "repo": "https://plugins.svn.wordpress.org/gallery-by-supsystic", + "vendor": "Supsystic", + "versions": [ + { + "lessThan": "1.15.17", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/185c9962-aa4a-4049-acdb-3f439c420c5a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29922.json b/data/anchore/2024/CVE-2024-29922.json new file mode 100644 index 00000000..153c8230 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29922.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29922", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:quantumcloud:slider_hero:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "slider-hero", + "product": "Slider Hero", + "repo": "https://plugins.svn.wordpress.org/slider-hero", + "vendor": "Quantum Cloud", + "versions": [ + { + "lessThan": "8.7.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/41428fa7-455b-44be-8ec1-977e8cf8a303?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29923.json b/data/anchore/2024/CVE-2024-29923.json new file mode 100644 index 00000000..0e889fec --- /dev/null +++ b/data/anchore/2024/CVE-2024-29923.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29923", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wp-property-hive:propertyhive:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "propertyhive", + "product": "PropertyHive", + "repo": "https://plugins.svn.wordpress.org/propertyhive", + "vendor": "PropertyHive", + "versions": [ + { + "lessThan": "2.0.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e10fc7e4-11ec-409b-9f16-b38adceaf622?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29924.json b/data/anchore/2024/CVE-2024-29924.json new file mode 100644 index 00000000..9861bdaa --- /dev/null +++ b/data/anchore/2024/CVE-2024-29924.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29924", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpdownloadmanager:premium_packages_-_sell_digital_products_securely:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wpdm-premium-packages", + "product": "Premium Packages", + "repo": "https://plugins.svn.wordpress.org/wpdm-premium-packages", + "vendor": "W3 Eden, Inc.", + "versions": [ + { + "lessThan": "5.8.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7df2996f-bc0e-4608-a80e-6167ac26469a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29925.json b/data/anchore/2024/CVE-2024-29925.json new file mode 100644 index 00000000..573abe5f --- /dev/null +++ b/data/anchore/2024/CVE-2024-29925.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29925", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpwax:post_grid\\,_slider_\\&_carousel_ultimate:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "post-grid-carousel-ultimate", + "product": "Post Grid, Slider & Carousel Ultimate", + "repo": "https://plugins.svn.wordpress.org/post-grid-carousel-ultimate", + "vendor": "wpWax", + "versions": [ + { + "lessThan": "1.6.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/063224fe-3cf8-40b6-8645-86c8e8dc876e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29927.json b/data/anchore/2024/CVE-2024-29927.json new file mode 100644 index 00000000..3d296286 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29927.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29927", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:hasthemes:wishsuite:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wishsuite", + "product": "WishSuite", + "repo": "https://plugins.svn.wordpress.org/wishsuite", + "vendor": "HasTheme", + "versions": [ + { + "lessThan": "1.3.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a7d13d78-4d3f-476a-ba67-b47d0195a1ed?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29929.json b/data/anchore/2024/CVE-2024-29929.json new file mode 100644 index 00000000..ca1cad86 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29929.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29929", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wclovers:frontend_manager_for_woocommerce_along_with_bookings_subscription_listings_compatible:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wc-frontend-manager", + "product": "WCFM – Frontend Manager for WooCommerce", + "repo": "https://plugins.svn.wordpress.org/wc-frontend-manager", + "vendor": "WC Lovers", + "versions": [ + { + "lessThan": "6.7.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e30e4615-f9b6-4ff6-a227-82cace868f93?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29930.json b/data/anchore/2024/CVE-2024-29930.json new file mode 100644 index 00000000..ec82a3eb --- /dev/null +++ b/data/anchore/2024/CVE-2024-29930.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29930", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:currencyratetoday:crypto_converter_widget:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "crypto-converter-widget", + "product": "Crypto Converter Widget", + "repo": "https://plugins.svn.wordpress.org/crypto-converter-widget", + "vendor": "CurrencyRate.today", + "versions": [ + { + "lessThan": "1.9.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/04d9c206-b40d-436a-93f3-bd7e3bb49892?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29931.json b/data/anchore/2024/CVE-2024-29931.json new file mode 100644 index 00000000..c8fdcdb9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29931.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29931", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:codecabin:wp_go_maps:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-google-maps", + "product": "WP Google Maps", + "repo": "https://plugins.svn.wordpress.org/wp-google-maps", + "vendor": "WP Go Maps (formerly WP Google Maps)", + "versions": [ + { + "lessThan": "9.0.30", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/89dec659-5427-46bb-8250-1e4a132611df?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29932.json b/data/anchore/2024/CVE-2024-29932.json new file mode 100644 index 00000000..5ff86479 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29932.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29932", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pluginus:wordpress_meta_data_and_taxonomies_filter:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-meta-data-filter-and-taxonomy-filter", + "product": "WordPress Meta Data and Taxonomies Filter (MDTF)", + "repo": "https://plugins.svn.wordpress.org/wp-meta-data-filter-and-taxonomy-filter", + "vendor": "realmag777", + "versions": [ + { + "lessThan": "1.3.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d338b583-4587-4b8d-b78e-a1b9a1054435?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29935.json b/data/anchore/2024/CVE-2024-29935.json new file mode 100644 index 00000000..b6bc8dac --- /dev/null +++ b/data/anchore/2024/CVE-2024-29935.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29935", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:sinaextra:sina_extension_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "sina-extension-for-elementor", + "product": "Sina Extension for Elementor", + "repo": "https://plugins.svn.wordpress.org/sina-extension-for-elementor", + "vendor": "SinaExtra", + "versions": [ + { + "lessThan": "3.5.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d3905ebe-334c-4c6f-a430-4c25cd15c61f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29936.json b/data/anchore/2024/CVE-2024-29936.json new file mode 100644 index 00000000..a34ab8f3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29936.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-29936", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:blocksera:image_hover_effects:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "image-hover-effects-addon-for-elementor", + "product": "Image Hover Effects – Elementor Addon", + "repo": "https://plugins.svn.wordpress.org/image-hover-effects-addon-for-elementor", + "vendor": "Blocksera", + "versions": [ + { + "lessThan": "1.4.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/05d26003-ae7e-480a-bd63-1c5f5e9c3cab?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30177.json b/data/anchore/2024/CVE-2024-30177.json new file mode 100644 index 00000000..643b705c --- /dev/null +++ b/data/anchore/2024/CVE-2024-30177.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30177", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:devscred:exclusive_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "exclusive-addons-for-elementor", + "product": "Exclusive Addons Elementor", + "repo": "https://plugins.svn.wordpress.org/exclusive-addons-for-elementor", + "vendor": "Exclusive Addons", + "versions": [ + { + "lessThan": "2.6.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/75da181d-3162-448f-afb8-dc05748184f6?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30179.json b/data/anchore/2024/CVE-2024-30179.json new file mode 100644 index 00000000..ea612bee --- /dev/null +++ b/data/anchore/2024/CVE-2024-30179.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30179", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "bold-page-builder", + "product": "Bold Page Builder", + "repo": "https://plugins.svn.wordpress.org/bold-page-builder", + "vendor": "BoldThemes", + "versions": [ + { + "lessThan": "4.7.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/46e53bf4-49af-45d8-b672-1f9b2f2dd91f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30180.json b/data/anchore/2024/CVE-2024-30180.json new file mode 100644 index 00000000..31f0434e --- /dev/null +++ b/data/anchore/2024/CVE-2024-30180.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30180", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:easysocialfeed:easy_social_feed:*:*:*:*:free:wordpress:*:*" + ], + "packageName": "easy-facebook-likebox", + "product": "Easy Social Feed", + "repo": "https://plugins.svn.wordpress.org/easy-facebook-likebox", + "vendor": "Easy Social Feed", + "versions": [ + { + "lessThan": "6.5.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6ce726da-4860-4809-b579-9ec0d31a2fb1?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30181.json b/data/anchore/2024/CVE-2024-30181.json new file mode 100644 index 00000000..51ee5e3d --- /dev/null +++ b/data/anchore/2024/CVE-2024-30181.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30181", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:plainwaire:locatoraid_store_locator:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:plainware:locatoraid:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "locatoraid", + "product": "Locatoraid Store Locator", + "repo": "https://plugins.svn.wordpress.org/locatoraid", + "vendor": "Plainware", + "versions": [ + { + "lessThan": "3.9.31", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f328b938-355d-426f-a9cf-646929a7c155?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30182.json b/data/anchore/2024/CVE-2024-30182.json new file mode 100644 index 00000000..6c6e72f2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30182.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30182", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:hasthemes:ht_mega_-_absolute_addons_for_elementor_page_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ht-mega-for-elementor", + "product": "HT Mega", + "repo": "https://plugins.svn.wordpress.org/ht-mega-for-elementor", + "vendor": "HasThemes", + "versions": [ + { + "lessThan": "2.4.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/316a1ca9-e5fd-463f-ba1e-32589740270a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30183.json b/data/anchore/2024/CVE-2024-30183.json new file mode 100644 index 00000000..da6d6606 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30183.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30183", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:livemeshthemes:wpbakery_page_builder_addons:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "addons-for-visual-composer", + "product": "Livemesh Addons for WPBakery Page Builder", + "repo": "https://plugins.svn.wordpress.org/addons-for-visual-composer", + "vendor": "Livemesh", + "versions": [ + { + "lessThan": "3.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d581a38-736a-497f-aaf7-6da0b2421618?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30184.json b/data/anchore/2024/CVE-2024-30184.json new file mode 100644 index 00000000..4687be46 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30184.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30184", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:sygnoos:popup_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "popup-builder", + "product": "Popup Builder", + "repo": "https://plugins.svn.wordpress.org/popup-builder", + "vendor": "Looking Forward Software Incorporated.", + "versions": [ + { + "lessThan": "4.2.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d0d61395-3434-460f-8821-79e7676eff17?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30193.json b/data/anchore/2024/CVE-2024-30193.json new file mode 100644 index 00000000..0a807ae2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30193.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30193", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:church_admin_project:church_admin:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:churchadminplugin:church_admin:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "church-admin", + "product": "Church Admin", + "repo": "https://plugins.svn.wordpress.org/church-admin", + "vendor": "Andy Moyle", + "versions": [ + { + "lessThan": "4.1.18", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/379825e2-61bf-4d11-8eea-05ad08200e9e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30194.json b/data/anchore/2024/CVE-2024-30194.json new file mode 100644 index 00000000..a5cc8e93 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30194.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30194", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:sunshinephotocart:sunshine_photo_cart:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "sunshine-photo-cart", + "product": "Sunshine Photo Cart", + "repo": "https://plugins.svn.wordpress.org/sunshine-photo-cart", + "vendor": "WP Sunshine", + "versions": [ + { + "lessThan": "3.1.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/27e0b9e8-b6b7-45fe-8c9e-5e49c4feccac?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30197.json b/data/anchore/2024/CVE-2024-30197.json new file mode 100644 index 00000000..8a37f4b3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30197.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30197", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:church_admin_project:church_admin:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:churchadminplugin:church_admin:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "church-admin", + "product": "Church Admin", + "repo": "https://plugins.svn.wordpress.org/church-admin", + "vendor": "Andy Moyle", + "versions": [ + { + "lessThan": "4.0.27", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4429eb0-2b9a-4366-9f93-90484872c48e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30198.json b/data/anchore/2024/CVE-2024-30198.json new file mode 100644 index 00000000..04fb9288 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30198.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30198", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:themekraft:buddyforms:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "buddyforms", + "product": "BuddyForms", + "repo": "https://plugins.svn.wordpress.org/buddyforms", + "vendor": "ThemeKraft", + "versions": [ + { + "lessThan": "2.8.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/701d6bee-6eb2-4497-bf54-fbc384d9d2e5?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30199.json b/data/anchore/2024/CVE-2024-30199.json new file mode 100644 index 00000000..d98ab841 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30199.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30199", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wplite:wp-lister_lite_for_amazon:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-lister-for-amazon", + "product": "WP-Lister Lite for Amazon", + "repo": "https://plugins.svn.wordpress.org/wp-lister-for-amazon", + "vendor": "WP Lab", + "versions": [ + { + "lessThan": "2.6.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0814c64e-f786-4cc3-85ee-c8cfbebf7e2c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30200.json b/data/anchore/2024/CVE-2024-30200.json new file mode 100644 index 00000000..f7237ce3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30200.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30200", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woo-bulk-editor", + "product": "BEAR", + "repo": "https://plugins.svn.wordpress.org/woo-bulk-editor", + "vendor": "realmag777", + "versions": [ + { + "lessThan": "1.1.4.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2f14b0b9-6ccd-4f53-b015-e8537127b909?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30201.json b/data/anchore/2024/CVE-2024-30201.json new file mode 100644 index 00000000..8d4294c6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30201.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30201", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:xylusthemes:wp_smart_import:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-smart-import", + "product": "WordPress Importer", + "repo": "https://plugins.svn.wordpress.org/wp-smart-import", + "vendor": "Xylus Themes", + "versions": [ + { + "lessThan": "1.0.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f86e1ef-c898-4a54-8204-a9ec4caab586?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30221.json b/data/anchore/2024/CVE-2024-30221.json new file mode 100644 index 00000000..32310449 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30221.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30221", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:sunshinephotocart:sunshine_photo_cart:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "sunshine-photo-cart", + "product": "Sunshine Photo Cart", + "repo": "https://plugins.svn.wordpress.org/sunshine-photo-cart", + "vendor": "WP Sunshine", + "versions": [ + { + "lessThan": "3.1.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6ca0ce12-4759-4182-b69e-665e189b92f7?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30222.json b/data/anchore/2024/CVE-2024-30222.json new file mode 100644 index 00000000..3b2b05b0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30222.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30222", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:armemberplugin:armember:*:*:*:*:premium:wordpress:*:*", + "cpe:2.3:a:reputeinfosystems:armember:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "armember-membership", + "product": "ARMember", + "repo": "https://plugins.svn.wordpress.org/armember-membership", + "vendor": "Repute Infosystems", + "versions": [ + { + "lessThan": "4.0.27", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a59f7a1b-ae58-4015-bb77-814707579847?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30223.json b/data/anchore/2024/CVE-2024-30223.json new file mode 100644 index 00000000..fac7f1d1 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30223.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30223", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:armemberplugin:armember:*:*:*:*:premium:wordpress:*:*", + "cpe:2.3:a:reputeinfosystems:armember:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "armember-membership", + "product": "ARMember", + "repo": "https://plugins.svn.wordpress.org/armember-membership", + "vendor": "Repute Infosystems", + "versions": [ + { + "lessThan": "4.0.27", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4252c092-1276-4f69-88f9-cf78799c725c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30229.json b/data/anchore/2024/CVE-2024-30229.json new file mode 100644 index 00000000..86ad666a --- /dev/null +++ b/data/anchore/2024/CVE-2024-30229.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30229", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "give", + "product": "GiveWP", + "repo": "https://plugins.svn.wordpress.org/give", + "vendor": "GiveWP", + "versions": [ + { + "lessThan": "3.5.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3dc7bc0a-b209-431f-a9f1-f850b1a1d1b4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30231.json b/data/anchore/2024/CVE-2024-30231.json new file mode 100644 index 00000000..29ae7ba0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30231.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30231", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:webtoffee:product_import_export_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "product-import-export-for-woo", + "product": "Product Import Export for WooCommerce", + "repo": "https://plugins.svn.wordpress.org/product-import-export-for-woo", + "vendor": "WebToffee", + "versions": [ + { + "lessThan": "2.4.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c495ac39-c99b-423d-a601-d0bfcc514ebe?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30232.json b/data/anchore/2024/CVE-2024-30232.json new file mode 100644 index 00000000..9e6f242a --- /dev/null +++ b/data/anchore/2024/CVE-2024-30232.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30232", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:devscred:exclusive_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "exclusive-addons-for-elementor", + "product": "Exclusive Addons Elementor", + "repo": "https://plugins.svn.wordpress.org/exclusive-addons-for-elementor", + "vendor": "Exclusive Addons", + "versions": [ + { + "lessThan": "2.6.9.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b6ba3ce1-7c50-4e9d-b9e0-bcefc9ca74fe?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30235.json b/data/anchore/2024/CVE-2024-30235.json new file mode 100644 index 00000000..5c7331c5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30235.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30235", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:themeisle:multiple_page_generator:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "multiple-pages-generator-by-porthas", + "product": "Multiple Page Generator Plugin – MPG", + "repo": "https://plugins.svn.wordpress.org/multiple-pages-generator-by-porthas", + "vendor": "Themeisle", + "versions": [ + { + "lessThan": "3.4.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fa1d2fac-6e66-46b8-aa0a-1f6b5746b18b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30236.json b/data/anchore/2024/CVE-2024-30236.json new file mode 100644 index 00000000..6b0eb84b --- /dev/null +++ b/data/anchore/2024/CVE-2024-30236.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30236", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "contest-gallery", + "product": "Contest Gallery", + "repo": "https://plugins.svn.wordpress.org/contest-gallery", + "vendor": "Contest Gallery", + "versions": [ + { + "lessThan": "21.3.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/79fb4f24-8a59-4e57-b583-c87ee2493cdb?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30237.json b/data/anchore/2024/CVE-2024-30237.json new file mode 100644 index 00000000..6fda00e5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30237.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30237", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:supsystic:slider:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "slider-by-supsystic", + "product": "Slider by Supsystic", + "repo": "https://plugins.svn.wordpress.org/slider-by-supsystic", + "vendor": "Supsystic", + "versions": [ + { + "lessThan": "1.8.11", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/14ff5609-2345-4073-8239-0ce27fa0957c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30238.json b/data/anchore/2024/CVE-2024-30238.json new file mode 100644 index 00000000..18d88b64 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30238.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30238", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "contest-gallery", + "product": "Contest Gallery", + "repo": "https://plugins.svn.wordpress.org/contest-gallery", + "vendor": "Contest Gallery", + "versions": [ + { + "lessThan": "21.3.2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d3150b3-fba1-4e89-8f4e-b6c605227395?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30241.json b/data/anchore/2024/CVE-2024-30241.json new file mode 100644 index 00000000..e7e94955 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30241.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30241", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "profilegrid-user-profiles-groups-and-communities", + "product": "ProfileGrid ", + "repo": "https://plugins.svn.wordpress.org/profilegrid-user-profiles-groups-and-communities", + "vendor": "Metagauss", + "versions": [ + { + "lessThan": "5.7.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e6eea2cb-a2a9-4f65-9aea-b88565e47503?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30242.json b/data/anchore/2024/CVE-2024-30242.json new file mode 100644 index 00000000..0ee0465d --- /dev/null +++ b/data/anchore/2024/CVE-2024-30242.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30242", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:itpathsolutions:contact_form_to_any_api:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "contact-form-to-any-api", + "product": "Contact Form to Any API", + "repo": "https://plugins.svn.wordpress.org/contact-form-to-any-api", + "vendor": "IT Path Solutions", + "versions": [ + { + "lessThan": "1.1.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2912f693-c8fd-48f7-8030-5e1f0edd715f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30243.json b/data/anchore/2024/CVE-2024-30243.json new file mode 100644 index 00000000..16d348c3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30243.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30243", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tooltips:wordpress_tooltips:*:*:*:*:free:wordpress:*:*" + ], + "packageName": "wordpress-tooltips", + "product": "WordPress Tooltips", + "repo": "https://plugins.svn.wordpress.org/wordpress-tooltips", + "vendor": "Tomas", + "versions": [ + { + "lessThan": "9.4.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/83189c51-2605-4808-a0fa-3e5245cc0806?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30244.json b/data/anchore/2024/CVE-2024-30244.json new file mode 100644 index 00000000..b3f82ae4 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30244.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30244", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:church_admin_project:church_admin:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:churchadminplugin:church_admin:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "church-admin", + "product": "Church Admin", + "repo": "https://plugins.svn.wordpress.org/church-admin", + "vendor": "Andy Moyle", + "versions": [ + { + "lessThan": "4.0.28", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/07693689-2f61-41dc-9fa1-b6e5f0073dc5?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30245.json b/data/anchore/2024/CVE-2024-30245.json new file mode 100644 index 00000000..dfb870ed --- /dev/null +++ b/data/anchore/2024/CVE-2024-30245.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30245", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:perfops:decalog:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "decalog", + "product": "DecaLog", + "repo": "https://plugins.svn.wordpress.org/decalog", + "vendor": "DecaLog", + "versions": [ + { + "lessThan": "3.9.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c458e6d6-28ba-4465-ace2-5da9e99ca2c7?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30421.json b/data/anchore/2024/CVE-2024-30421.json new file mode 100644 index 00000000..fa25ed67 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30421.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30421", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wp-events-plugin:events_manager:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "events-manager", + "product": "Events Manager", + "repo": "https://plugins.svn.wordpress.org/events-manager", + "vendor": "Pixelite", + "versions": [ + { + "lessThan": "6.4.7.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/86351e2c-8c5a-4d71-bd73-d5ae1f03038f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30422.json b/data/anchore/2024/CVE-2024-30422.json new file mode 100644 index 00000000..eb8c464e --- /dev/null +++ b/data/anchore/2024/CVE-2024-30422.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30422", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:webtechstreet:elementor_addon_elements:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "addon-elements-for-elementor-page-builder", + "product": "Elementor Addon Elements", + "repo": "https://plugins.svn.wordpress.org/addon-elements-for-elementor-page-builder", + "vendor": "WPVibes", + "versions": [ + { + "lessThan": "1.13.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/abe3cedb-53f3-48ff-a731-df6a83f0da1a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30425.json b/data/anchore/2024/CVE-2024-30425.json new file mode 100644 index 00000000..c5e5c385 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30425.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30425", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:fastlinemedia:beaver_builder:*:*:*:*:lite:wordpress:*:*" + ], + "packageName": "beaver-builder-lite-version", + "product": "Beaver Builder", + "repo": "https://plugins.svn.wordpress.org/beaver-builder-lite-version", + "vendor": "The Beaver Builder Team", + "versions": [ + { + "lessThan": "2.7.4.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30427.json b/data/anchore/2024/CVE-2024-30427.json new file mode 100644 index 00000000..0404b591 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30427.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30427", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:spiffyplugins:spiffy_calendar:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "spiffy-calendar", + "product": "Spiffy Calendar", + "repo": "https://plugins.svn.wordpress.org/spiffy-calendar", + "vendor": "Spiffy Plugins", + "versions": [ + { + "lessThan": "4.9.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4b4369f8-d3d2-4018-a262-3294b5865086?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30428.json b/data/anchore/2024/CVE-2024-30428.json new file mode 100644 index 00000000..c3bd4947 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30428.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30428", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "contest-gallery", + "product": "Contest Gallery", + "repo": "https://plugins.svn.wordpress.org/contest-gallery", + "vendor": "Contest Gallery", + "versions": [ + { + "lessThan": "21.3.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8b0c54f2-3942-48bd-b821-b66a57fd1506?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30430.json b/data/anchore/2024/CVE-2024-30430.json new file mode 100644 index 00000000..115cd89f --- /dev/null +++ b/data/anchore/2024/CVE-2024-30430.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30430", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpmanageninja:fluentcrm:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "fluent-crm", + "product": "Fluent CRM", + "repo": "https://plugins.svn.wordpress.org/fluent-crm", + "vendor": "WP Email Newsletter Team - FluentCRM", + "versions": [ + { + "lessThan": "2.8.45", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/35b1853f-0c19-4fc8-8878-9e8a9330f76a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30431.json b/data/anchore/2024/CVE-2024-30431.json new file mode 100644 index 00000000..241cfa8c --- /dev/null +++ b/data/anchore/2024/CVE-2024-30431.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30431", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mangboard:mang_board:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "mangboard", + "product": "Mang Board WP", + "repo": "https://plugins.svn.wordpress.org/mangboard", + "vendor": "Hometory", + "versions": [ + { + "lessThan": "1.8.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5a85e1e9-ef40-40f6-a652-17acf0a2d33d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30433.json b/data/anchore/2024/CVE-2024-30433.json new file mode 100644 index 00000000..b382c73d --- /dev/null +++ b/data/anchore/2024/CVE-2024-30433.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30433", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:multivendorx:multivendorx:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wc-marketplace:multivendor_marketplace_solution_for_woocommerce_-_wc_marketplace:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "dc-woocommerce-multi-vendor", + "product": "WC Marketplace", + "repo": "https://plugins.svn.wordpress.org/dc-woocommerce-multi-vendor", + "vendor": "MultiVendorX", + "versions": [ + { + "lessThan": "4.1.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4b42ba6a-b618-4633-9372-879c3253a956?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30439.json b/data/anchore/2024/CVE-2024-30439.json new file mode 100644 index 00000000..95a8bb17 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30439.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30439", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:bestwebsoft:limit_attempts:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "limit-attempts", + "product": "Limit Attempts by BestWebSoft", + "repo": "https://plugins.svn.wordpress.org/limit-attempts", + "vendor": "BestWebSoft", + "versions": [ + { + "lessThan": "1.3.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b2ca965b-0d0c-4785-9666-69829e4cb1a4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30441.json b/data/anchore/2024/CVE-2024-30441.json new file mode 100644 index 00000000..df103d19 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30441.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30441", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pickplugins:post_grid_combo:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "post-grid", + "product": "Post Grid", + "repo": "https://plugins.svn.wordpress.org/post-grid", + "vendor": "PickPlugins", + "versions": [ + { + "lessThan": "2.2.76", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/19d394d8-bdc5-4cb5-b210-269197294020?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30442.json b/data/anchore/2024/CVE-2024-30442.json new file mode 100644 index 00000000..b1fc556d --- /dev/null +++ b/data/anchore/2024/CVE-2024-30442.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30442", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "bold-page-builder", + "product": "Bold Page Builder", + "repo": "https://plugins.svn.wordpress.org/bold-page-builder", + "vendor": "BoldThemes", + "versions": [ + { + "lessThan": "4.8.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30443.json b/data/anchore/2024/CVE-2024-30443.json new file mode 100644 index 00000000..097bd094 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30443.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30443", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:gsplugins:gs_testimonial_slider:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "gs-testimonial", + "product": "GS Testimonial Slider", + "repo": "https://plugins.svn.wordpress.org/gs-testimonial", + "vendor": "GS Plugins", + "versions": [ + { + "lessThan": "3.1.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/266507cf-f458-47f8-b18a-81860e6cce3e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30446.json b/data/anchore/2024/CVE-2024-30446.json new file mode 100644 index 00000000..e842db91 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30446.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30446", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:crmperks:crm_perks_forms:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "crm-perks-forms", + "product": "CRM Perks Forms", + "repo": "https://plugins.svn.wordpress.org/crm-perks-forms", + "vendor": "CRM Perks", + "versions": [ + { + "lessThan": "1.1.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22e09431-dd71-4a90-84ba-4b676ec8ccb3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30448.json b/data/anchore/2024/CVE-2024-30448.json new file mode 100644 index 00000000..4e0980ab --- /dev/null +++ b/data/anchore/2024/CVE-2024-30448.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30448", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:supsystic:slider:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "slider-by-supsystic", + "product": "Slider by Supsystic", + "repo": "https://plugins.svn.wordpress.org/slider-by-supsystic", + "vendor": "Supsystic", + "versions": [ + { + "lessThan": "1.8.11", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/717e77b7-8b42-4fca-b288-2415db2d68e6?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30452.json b/data/anchore/2024/CVE-2024-30452.json new file mode 100644 index 00000000..34e763f7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30452.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30452", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pluginops:landing_page_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "page-builder-add", + "product": "Landing Page Builder", + "repo": "https://plugins.svn.wordpress.org/page-builder-add", + "vendor": "PluginOps", + "versions": [ + { + "lessThan": "1.5.1.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9b409e3f-51e0-4d66-a04c-a0d54259bd2e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30453.json b/data/anchore/2024/CVE-2024-30453.json new file mode 100644 index 00000000..712c3c9a --- /dev/null +++ b/data/anchore/2024/CVE-2024-30453.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30453", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:getbrave:brave:*:*:*:*:wordpress:*:*:*" + ], + "packageName": "brave-popup-builder", + "product": "Brave Popup Builder", + "repo": "https://plugins.svn.wordpress.org/brave-popup-builder", + "vendor": "Brave", + "versions": [ + { + "lessThan": "0.6.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a9511f60-b07d-4601-aa2f-25083b24d9aa?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30454.json b/data/anchore/2024/CVE-2024-30454.json new file mode 100644 index 00000000..5c8f1a48 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30454.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30454", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:veronalabs:wp_sms:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-sms", + "product": "WP SMS", + "repo": "https://plugins.svn.wordpress.org/wp-sms", + "vendor": "VeronaLabs", + "versions": [ + { + "lessThan": "6.6.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1e07e570-e4c0-472c-b582-40a87a6507bf?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30455.json b/data/anchore/2024/CVE-2024-30455.json new file mode 100644 index 00000000..7b0f8929 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30455.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30455", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:gamipress:gamipress:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "gamipress", + "product": "GamiPress", + "repo": "https://plugins.svn.wordpress.org/gamipress", + "vendor": "GamiPress", + "versions": [ + { + "lessThan": "6.8.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b68b6736-6552-4115-9702-bd178846544c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30456.json b/data/anchore/2024/CVE-2024-30456.json new file mode 100644 index 00000000..3f2366d9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30456.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30456", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pluginus:wordpress_currency_switcher:*:*:*:*:professional:wordpress:*:*" + ], + "packageName": "currency-switcher", + "product": "WPCS", + "repo": "https://plugins.svn.wordpress.org/currency-switcher", + "vendor": "realmag777", + "versions": [ + { + "lessThan": "1.2.0.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2227cde8-5ed6-44dd-80cc-2a85aaa172c1?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30457.json b/data/anchore/2024/CVE-2024-30457.json new file mode 100644 index 00000000..147dc650 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30457.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30457", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pluginus:wordpress_meta_data_and_taxonomies_filter:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-meta-data-filter-and-taxonomy-filter", + "product": "WordPress Meta Data and Taxonomies Filter (MDTF)", + "repo": "https://plugins.svn.wordpress.org/wp-meta-data-filter-and-taxonomy-filter", + "vendor": "realmag777", + "versions": [ + { + "lessThan": "1.3.3.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/325298a6-954b-4cf7-a96a-9571cdb0b5a5?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30458.json b/data/anchore/2024/CVE-2024-30458.json new file mode 100644 index 00000000..2cf771bb --- /dev/null +++ b/data/anchore/2024/CVE-2024-30458.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30458", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pluginus:fox_-_currency_switcher_professional_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woocommerce-currency-switcher", + "product": "WOOCS – WooCommerce Currency Switcher", + "repo": "https://plugins.svn.wordpress.org/woocommerce-currency-switcher", + "vendor": "realmag777", + "versions": [ + { + "lessThan": "1.4.1.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6db5f214-ba1a-4528-9bb6-0592822bf8bb?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30462.json b/data/anchore/2024/CVE-2024-30462.json new file mode 100644 index 00000000..7e3e6f21 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30462.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30462", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pluginus:husky_-_products_filter_professional_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woocommerce-products-filter", + "product": "HUSKY – Products Filter for WooCommerce (formerly WOOF)", + "repo": "https://plugins.svn.wordpress.org/woocommerce-products-filter", + "vendor": "realmag777", + "versions": [ + { + "lessThan": "1.3.5.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/86e3eae3-21bb-4695-8650-4c6ba6ababe3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30463.json b/data/anchore/2024/CVE-2024-30463.json new file mode 100644 index 00000000..cfa09945 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30463.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30463", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woo-bulk-editor", + "product": "BEAR", + "repo": "https://plugins.svn.wordpress.org/woo-bulk-editor", + "vendor": "realmag777", + "versions": [ + { + "lessThan": "1.1.4.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2df8570b-c1a2-4a1b-b4d4-fe7a75eb05b6?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30468.json b/data/anchore/2024/CVE-2024-30468.json new file mode 100644 index 00000000..c95bdd61 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30468.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30468", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tipsandtricks-hq:all_in_one_wp_security_\\&_firewall:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "all-in-one-wp-security-and-firewall", + "product": "All In One WP Security & Firewall", + "repo": "https://plugins.svn.wordpress.org/all-in-one-wp-security-and-firewall", + "vendor": "All In One WP Security & Firewall Team", + "versions": [ + { + "lessThan": "5.2.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/05991bf2-ee61-4bf7-89df-c2f66db7caec?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30478.json b/data/anchore/2024/CVE-2024-30478.json new file mode 100644 index 00000000..51ef9d39 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30478.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30478", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:bulletin:announcement_\\&_notification_banner_-_bulletin:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "bulletin-announcements", + "product": "WordPress Announcement & Notification Banner Plugin – Bulletin", + "repo": "https://plugins.svn.wordpress.org/bulletin-announcements", + "vendor": "Bulletin", + "versions": [ + { + "lessThan": "3.9.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/66cd0ed5-070a-4408-9faa-b3d840279f77?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30483.json b/data/anchore/2024/CVE-2024-30483.json new file mode 100644 index 00000000..afeb44e0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30483.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30483", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpsimplesponsorships:sponsors:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-sponsors", + "product": "Sponsors", + "repo": "https://plugins.svn.wordpress.org/wp-sponsors", + "vendor": "Simple Sponsorships", + "versions": [ + { + "lessThanOrEqual": "3.5.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3235ecfb-8aac-4e0c-b11e-77727c362194?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30486.json b/data/anchore/2024/CVE-2024-30486.json new file mode 100644 index 00000000..3f478e5b --- /dev/null +++ b/data/anchore/2024/CVE-2024-30486.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30486", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:maxfoundry:media_library_folders:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "media-library-plus", + "product": "Media Library Folders", + "repo": "https://plugins.svn.wordpress.org/media-library-plus", + "vendor": "Max Foundry", + "versions": [ + { + "lessThan": "8.1.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/198ad1bf-7ce1-4367-bef7-1f58113c0719?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30487.json b/data/anchore/2024/CVE-2024-30487.json new file mode 100644 index 00000000..7de1f71b --- /dev/null +++ b/data/anchore/2024/CVE-2024-30487.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30487", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:sonaar:mp3_audio_player_for_music\\,_radio_\\&_podcast:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "mp3-music-player-by-sonaar", + "product": "MP3 Audio Player for Music, Radio & Podcast by Sonaar", + "repo": "https://plugins.svn.wordpress.org/mp3-music-player-by-sonaar", + "vendor": "Sonaar Music", + "versions": [ + { + "lessThan": "5.1.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e722b30-f136-4f57-a248-cf9cdd499552?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30488.json b/data/anchore/2024/CVE-2024-30488.json new file mode 100644 index 00000000..c6c07e4b --- /dev/null +++ b/data/anchore/2024/CVE-2024-30488.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30488", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:katieseaborn:zotpress:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:zotpress_project:zotpress:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "zotpress", + "product": "Zotpress", + "repo": "https://plugins.svn.wordpress.org/zotpress", + "vendor": "Katie Seaborn", + "versions": [ + { + "lessThan": "7.3.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/29a2cb14-bf70-4936-a7c9-bf417a403de8?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30490.json b/data/anchore/2024/CVE-2024-30490.json new file mode 100644 index 00000000..df0e768b --- /dev/null +++ b/data/anchore/2024/CVE-2024-30490.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30490", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "profilegrid-user-profiles-groups-and-communities", + "product": "ProfileGrid ", + "repo": "https://plugins.svn.wordpress.org/profilegrid-user-profiles-groups-and-communities", + "vendor": "Metagauss", + "versions": [ + { + "lessThan": "5.7.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2c4c13c9-6f43-4a4d-b825-e246bf9a1e9c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30491.json b/data/anchore/2024/CVE-2024-30491.json new file mode 100644 index 00000000..f59310df --- /dev/null +++ b/data/anchore/2024/CVE-2024-30491.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30491", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "profilegrid-user-profiles-groups-and-communities", + "product": "ProfileGrid ", + "repo": "https://plugins.svn.wordpress.org/profilegrid-user-profiles-groups-and-communities", + "vendor": "Metagauss", + "versions": [ + { + "lessThan": "5.7.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9476b41d-a9a2-46a7-8cf1-62de5d1703b1?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30492.json b/data/anchore/2024/CVE-2024-30492.json new file mode 100644 index 00000000..a3446fa3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30492.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30492", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:webtoffee:import_export_wordpress_users:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "users-customers-import-export-for-wp-woocommerce", + "product": "Import Export WordPress Users", + "repo": "https://plugins.svn.wordpress.org/users-customers-import-export-for-wp-woocommerce", + "vendor": "WebToffee", + "versions": [ + { + "lessThan": "2.5.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6a8d0f86-73fe-43a6-a03a-38bf815dd30b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30493.json b/data/anchore/2024/CVE-2024-30493.json new file mode 100644 index 00000000..8e8e1f22 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30493.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30493", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:church_admin_project:church_admin:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:churchadminplugin:church_admin:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "church-admin", + "product": "Church Admin", + "repo": "https://plugins.svn.wordpress.org/church-admin", + "vendor": "Andy Moyle", + "versions": [ + { + "lessThan": "4.1.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/473eab06-67c8-4143-9d00-eb2866f101c7?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30495.json b/data/anchore/2024/CVE-2024-30495.json new file mode 100644 index 00000000..39e5492e --- /dev/null +++ b/data/anchore/2024/CVE-2024-30495.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30495", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:faboba:falang:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "falang", + "product": "Falang multilanguage", + "repo": "https://plugins.svn.wordpress.org/falang", + "vendor": "Faboba", + "versions": [ + { + "lessThan": "1.3.48", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/03c8a13e-7484-40f1-907f-f3a5ace9f7e9?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30497.json b/data/anchore/2024/CVE-2024-30497.json new file mode 100644 index 00000000..6fd12a31 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30497.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30497", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:i13websolution:wp_responsive_tabs_horizontal_vertical_and_accordion_tabs:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "responsive-horizontal-vertical-and-accordion-tabs", + "product": "WP Responsive Tabs horizontal vertical and accordion Tabs", + "repo": "https://plugins.svn.wordpress.org/responsive-horizontal-vertical-and-accordion-tabs", + "vendor": "I Thirteen Web Solution", + "versions": [ + { + "lessThan": "1.1.18", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8647005a-23ce-417f-9bdb-c54ac506942b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30498.json b/data/anchore/2024/CVE-2024-30498.json new file mode 100644 index 00000000..628a7580 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30498.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30498", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:crmperks:crm_perks_forms:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "crm-perks-forms", + "product": "CRM Perks Forms", + "repo": "https://plugins.svn.wordpress.org/crm-perks-forms", + "vendor": "CRM Perks", + "versions": [ + { + "lessThan": "1.1.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e84d50e1-65fe-4323-981f-e2ae6da0ddab?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30499.json b/data/anchore/2024/CVE-2024-30499.json new file mode 100644 index 00000000..6273f738 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30499.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30499", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:crmperks:crm_perks_forms:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "crm-perks-forms", + "product": "CRM Perks Forms", + "repo": "https://plugins.svn.wordpress.org/crm-perks-forms", + "vendor": "CRM Perks", + "versions": [ + { + "lessThan": "1.1.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f3abba90-9503-484e-bc2b-c6105bec698b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30501.json b/data/anchore/2024/CVE-2024-30501.json new file mode 100644 index 00000000..1766c30e --- /dev/null +++ b/data/anchore/2024/CVE-2024-30501.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30501", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpchill:download_monitor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "download-monitor", + "product": "Download Monitor", + "repo": "https://plugins.svn.wordpress.org/download-monitor", + "vendor": "WPChill", + "versions": [ + { + "lessThan": "4.9.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/105ae6be-2cb7-4ab2-8e4c-5d3ff84c5b9f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30502.json b/data/anchore/2024/CVE-2024-30502.json new file mode 100644 index 00000000..9b2abe05 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30502.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30502", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wptravelengine:wp_travel_engine:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-travel-engine", + "product": "WP Travel Engine", + "repo": "https://plugins.svn.wordpress.org/wp-travel-engine", + "vendor": "WP Travel Engine", + "versions": [ + { + "lessThan": "5.8.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/659fcb95-9041-443e-9b75-0d2f8c6108aa?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30504.json b/data/anchore/2024/CVE-2024-30504.json new file mode 100644 index 00000000..1c0edddc --- /dev/null +++ b/data/anchore/2024/CVE-2024-30504.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30504", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wptravelengine:wp_travel_engine:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-travel-engine", + "product": "WP Travel Engine", + "repo": "https://plugins.svn.wordpress.org/wp-travel-engine", + "vendor": "WP Travel Engine", + "versions": [ + { + "lessThan": "5.8.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ed053a6b-4163-4e82-a180-619a7841899a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30505.json b/data/anchore/2024/CVE-2024-30505.json new file mode 100644 index 00000000..4cdf8527 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30505.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30505", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:church_admin_project:church_admin:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:churchadminplugin:church_admin:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "church-admin", + "product": "Church Admin", + "repo": "https://plugins.svn.wordpress.org/church-admin", + "vendor": "Andy Moyle", + "versions": [ + { + "lessThan": "4.1.19", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9a268550-af65-405a-a16a-9083533e4acc?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30506.json b/data/anchore/2024/CVE-2024-30506.json new file mode 100644 index 00000000..4bc38dc9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30506.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30506", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:vsourz:all_in_one_redirection:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "all-in-one-redirection-404-pages-list", + "product": "All In One Redirection", + "repo": "https://plugins.svn.wordpress.org/all-in-one-redirection-404-pages-list", + "vendor": "Vsourz Digital", + "versions": [ + { + "lessThanOrEqual": "2.2.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b5a07a44-98f9-4795-8615-c73a9b161c74?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30507.json b/data/anchore/2024/CVE-2024-30507.json new file mode 100644 index 00000000..53531a4d --- /dev/null +++ b/data/anchore/2024/CVE-2024-30507.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30507", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:amitzy:molongui:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "molongui-authorship", + "product": "Molongui", + "repo": "https://plugins.svn.wordpress.org/molongui-authorship", + "vendor": "Molongui", + "versions": [ + { + "lessThan": "4.7.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/62aa0cc4-ef8e-4727-ac07-3481c0464b05?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30508.json b/data/anchore/2024/CVE-2024-30508.json new file mode 100644 index 00000000..19851d8a --- /dev/null +++ b/data/anchore/2024/CVE-2024-30508.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30508", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:thimpress:wp_hotel_booking:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-hotel-booking", + "product": "WP Hotel Booking", + "repo": "https://plugins.svn.wordpress.org/wp-hotel-booking", + "vendor": "ThimPress", + "versions": [ + { + "lessThan": "2.0.9.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/489256a8-e28f-4d7c-895a-928e9463bb1b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30510.json b/data/anchore/2024/CVE-2024-30510.json new file mode 100644 index 00000000..1e8f7714 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30510.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30510", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:salonbookingsystem:salon_booking_system:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "salon-booking-system", + "product": "Salon booking system", + "repo": "https://plugins.svn.wordpress.org/salon-booking-system", + "vendor": "Salon Booking System", + "versions": [ + { + "lessThan": "9.5.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/929fd4e6-9040-41cb-98f0-0cfdd80caf42?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30513.json b/data/anchore/2024/CVE-2024-30513.json new file mode 100644 index 00000000..563d97b0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30513.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30513", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "profilegrid-user-profiles-groups-and-communities", + "product": "ProfileGrid ", + "repo": "https://plugins.svn.wordpress.org/profilegrid-user-profiles-groups-and-communities", + "vendor": "Metagauss", + "versions": [ + { + "lessThan": "5.7.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b2436028-9ac2-4232-bccf-26019a26e186?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30526.json b/data/anchore/2024/CVE-2024-30526.json new file mode 100644 index 00000000..a636bfd1 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30526.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30526", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:easysocialfeed:easy_social_feed:*:*:*:*:free:wordpress:*:*" + ], + "packageName": "easy-facebook-likebox", + "product": "Easy Social Feed", + "repo": "https://plugins.svn.wordpress.org/easy-facebook-likebox", + "vendor": "Easy Social Feed", + "versions": [ + { + "lessThanOrEqual": "6.5.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9381244-5ab9-4927-8e18-d6030a399d7c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30530.json b/data/anchore/2024/CVE-2024-30530.json new file mode 100644 index 00000000..6ba53638 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30530.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30530", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:sonaar:mp3_audio_player_for_music\\,_radio_\\&_podcast:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "mp3-music-player-by-sonaar", + "product": "MP3 Audio Player for Music, Radio & Podcast by Sonaar", + "repo": "https://plugins.svn.wordpress.org/mp3-music-player-by-sonaar", + "vendor": "Sonaar Music", + "versions": [ + { + "lessThan": "5.1.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bcdbd108-5e17-4e67-a2a2-0f1464c1ba6c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30535.json b/data/anchore/2024/CVE-2024-30535.json new file mode 100644 index 00000000..79753659 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30535.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30535", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:whitestudio:easy_form_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "easy-form-builder", + "product": "Easy Form Builder", + "repo": "https://plugins.svn.wordpress.org/easy-form-builder", + "vendor": "WhiteStudio", + "versions": [ + { + "lessThan": "3.7.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4257d4ca-0e92-4d2f-b65b-dff9d7d48cb8?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30548.json b/data/anchore/2024/CVE-2024-30548.json new file mode 100644 index 00000000..c34333be --- /dev/null +++ b/data/anchore/2024/CVE-2024-30548.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30548", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:underconstruction_project:underconstruction:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "underconstruction", + "product": "underConstruction", + "repo": "https://plugins.svn.wordpress.org/underconstruction", + "vendor": "Noah Kagan", + "versions": [ + { + "lessThan": "1.22", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/177f7111-b487-4e52-9106-54e0095a5dd4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30549.json b/data/anchore/2024/CVE-2024-30549.json new file mode 100644 index 00000000..abecdb7b --- /dev/null +++ b/data/anchore/2024/CVE-2024-30549.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30549", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:cimatti:wordpress_contact_forms:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "contact-forms", + "product": "Contact Forms by Cimatti", + "repo": "https://plugins.svn.wordpress.org/contact-forms", + "vendor": "Cimatti Consulting", + "versions": [ + { + "lessThan": "1.9.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/41c71f86-a2f7-4e0e-9145-ba50830f6dba?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30550.json b/data/anchore/2024/CVE-2024-30550.json new file mode 100644 index 00000000..9bd78740 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30550.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30550", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpdevart:gallery:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wpdevart:gallery_-_image_and_video_gallery_with_thumbnails:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wpdevart:image_and_video_gallery_with_thumbnails:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "gallery-album", + "product": "Responsive Image Gallery, Gallery Album", + "repo": "https://plugins.svn.wordpress.org/gallery-album", + "vendor": "wpdevart", + "versions": [ + { + "lessThanOrEqual": "2.0.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1e07593a-3d12-4afe-a21e-fc85bd6d4bef?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30558.json b/data/anchore/2024/CVE-2024-30558.json new file mode 100644 index 00000000..2be26673 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30558.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30558", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:add_shortcodes_actions_and_filters_project:add_shortcodes_actions_and_filters:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:msimpson:add_shortcodes_actions_and_filters:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "add-actions-and-filters", + "product": "Add Shortcodes Actions And Filters", + "repo": "https://plugins.svn.wordpress.org/add-actions-and-filters", + "vendor": "Michael Simpson", + "versions": [ + { + "lessThanOrEqual": "2.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/228de538-90c7-4f7d-a076-dd0a01458e38?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30561.json b/data/anchore/2024/CVE-2024-30561.json new file mode 100644 index 00000000..ebb54899 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30561.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-30561", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:apointzilla:appointment_calendar:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "appointment-calendar", + "product": "Appointment Calendar", + "repo": "https://plugins.svn.wordpress.org/appointment-calendar", + "vendor": "Scientech It Solution", + "versions": [ + { + "lessThanOrEqual": "2.9.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/baebd08b-1f40-4cb2-8158-c4421af68c06?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31095.json b/data/anchore/2024/CVE-2024-31095.json new file mode 100644 index 00000000..18a74f1d --- /dev/null +++ b/data/anchore/2024/CVE-2024-31095.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31095", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:quicoto:thumbs_rating:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "thumbs-rating", + "product": "Thumbs Rating", + "repo": "https://plugins.svn.wordpress.org/thumbs-rating", + "vendor": "Ricard Torres", + "versions": [ + { + "lessThanOrEqual": "5.1.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e98b0a3a-6c14-45f1-a6b2-9911ba34ce0d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31099.json b/data/anchore/2024/CVE-2024-31099.json new file mode 100644 index 00000000..9a0f4df6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31099.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31099", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:averta:shortcodes_and_extra_features_for_phlox_theme:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "auxin-elements", + "product": "Shortcodes and extra features for Phlox theme", + "repo": "https://plugins.svn.wordpress.org/auxin-elements", + "vendor": "Averta", + "versions": [ + { + "lessThanOrEqual": "2.15.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9b3c7359-4de3-485f-b1b4-9e83b95c7f7c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31103.json b/data/anchore/2024/CVE-2024-31103.json new file mode 100644 index 00000000..5cf37b4d --- /dev/null +++ b/data/anchore/2024/CVE-2024-31103.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31103", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:kanbanwp:kanban_boards:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:kanbanwp:kanban_boards_for_wordpress:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "kanban", + "product": "Kanban Boards for WordPress", + "repo": "https://plugins.svn.wordpress.org/kanban", + "vendor": "Kanban for WordPress", + "versions": [ + { + "lessThanOrEqual": "2.5.21", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/365808af-5ed1-4265-88bd-ca8a49bdf424?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31104.json b/data/anchore/2024/CVE-2024-31104.json new file mode 100644 index 00000000..2a2a3cdd --- /dev/null +++ b/data/anchore/2024/CVE-2024-31104.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31104", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:getresponse:getresponse:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "getresponse-integration", + "product": "GetResponse for WordPress", + "repo": "https://plugins.svn.wordpress.org/getresponse-integration", + "vendor": "GetResponse", + "versions": [ + { + "lessThanOrEqual": "5.5.33", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/680219f5-631e-4318-bf1b-598947bec7d6?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31106.json b/data/anchore/2024/CVE-2024-31106.json new file mode 100644 index 00000000..0a1a7e1b --- /dev/null +++ b/data/anchore/2024/CVE-2024-31106.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31106", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:yooslider:yoo_slider:*:*:*:*:*:*:*:*", + "cpe:2.3:a:yooslider:yoo_slider:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "yoo-slider", + "product": "Yoo Slider", + "repo": "https://plugins.svn.wordpress.org/yoo-slider", + "vendor": "Yooslider", + "versions": [ + { + "lessThanOrEqual": "2.1.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4852bd93-032f-4e11-ac30-7268684f08e2?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31107.json b/data/anchore/2024/CVE-2024-31107.json new file mode 100644 index 00000000..0b4f99ef --- /dev/null +++ b/data/anchore/2024/CVE-2024-31107.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31107", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:diso:openid:*:*:*:*:*:*:*:*" + ], + "packageName": "openid", + "product": "OpenID", + "repo": "https://plugins.svn.wordpress.org/openid", + "vendor": "DiSo Development Team", + "versions": [ + { + "lessThanOrEqual": "3.6.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6aa2be6c-299e-4769-9070-a3c337bce990?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31108.json b/data/anchore/2024/CVE-2024-31108.json new file mode 100644 index 00000000..d237981f --- /dev/null +++ b/data/anchore/2024/CVE-2024-31108.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31108", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:iflychat:iflychat:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "iflychat", + "product": "iFlyChat – WordPress Chat", + "repo": "https://plugins.svn.wordpress.org/iflychat", + "vendor": "iFlyChat Team", + "versions": [ + { + "lessThanOrEqual": "4.7.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/78797c97-a5b8-4d2d-acd2-ebd508f2f836?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31114.json b/data/anchore/2024/CVE-2024-31114.json new file mode 100644 index 00000000..e1a90919 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31114.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31114", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:oxilab:shortcode_addons:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "shortcode-addons", + "product": "Shortcode Addons", + "repo": "https://plugins.svn.wordpress.org/shortcode-addons", + "vendor": "biplob018", + "versions": [ + { + "lessThanOrEqual": "3.2.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9addaa26-46b3-4fbf-8986-0b8c8f2dd286?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31116.json b/data/anchore/2024/CVE-2024-31116.json new file mode 100644 index 00000000..efbc97cf --- /dev/null +++ b/data/anchore/2024/CVE-2024-31116.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31116", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:10web:map_builder_for_google_maps:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wd-google-maps", + "product": "10Web Map Builder for Google Maps", + "repo": "https://plugins.svn.wordpress.org/wd-google-maps", + "vendor": "10Web", + "versions": [ + { + "lessThanOrEqual": "1.0.74", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9e20afee-9336-458e-ab5c-b320c6887b83?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31120.json b/data/anchore/2024/CVE-2024-31120.json new file mode 100644 index 00000000..202ace4c --- /dev/null +++ b/data/anchore/2024/CVE-2024-31120.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31120", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpdevart:gallery:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wpdevart:gallery_-_image_and_video_gallery_with_thumbnails:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wpdevart:image_and_video_gallery_with_thumbnails:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "gallery-album", + "product": "Responsive Image Gallery, Gallery Album", + "repo": "https://plugins.svn.wordpress.org/gallery-album", + "vendor": "wpdevart", + "versions": [ + { + "lessThanOrEqual": "2.0.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/21322495-a709-45a9-b8df-c3a3aeb1f260?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31230.json b/data/anchore/2024/CVE-2024-31230.json new file mode 100644 index 00000000..97bd6418 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31230.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31230", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:shortpixel:shortpixel_adaptive_images:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "shortpixel-adaptive-images", + "product": "ShortPixel Adaptive Images", + "repo": "https://plugins.svn.wordpress.org/shortpixel-adaptive-images", + "vendor": "ShortPixel", + "versions": [ + { + "lessThan": "3.8.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1e3110ae-5e82-4176-bf9d-6c56b13f9c27?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31235.json b/data/anchore/2024/CVE-2024-31235.json new file mode 100644 index 00000000..22308efb --- /dev/null +++ b/data/anchore/2024/CVE-2024-31235.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31235", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:webtoffee:wordpress_comments_import_and_export:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "comments-import-export-woocommerce", + "product": "WordPress Comments Import & Export", + "repo": "https://plugins.svn.wordpress.org/comments-import-export-woocommerce", + "vendor": "WebToffee", + "versions": [ + { + "lessThan": "2.3.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9269c3e7-2495-4665-ad08-d6dcf659db21?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31236.json b/data/anchore/2024/CVE-2024-31236.json new file mode 100644 index 00000000..8c9b4a04 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31236.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31236", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "royal-elementor-addons", + "product": "Royal Elementor Addons", + "repo": "https://plugins.svn.wordpress.org/royal-elementor-addons", + "vendor": "WP Royal", + "versions": [ + { + "lessThan": "1.3.95", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c3e47d14-4c00-4b10-9e4d-7f1d7946a2b4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31238.json b/data/anchore/2024/CVE-2024-31238.json new file mode 100644 index 00000000..bf333f96 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31238.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31238", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:zaytech:smart_online_order_for_clover:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "clover-online-orders", + "product": "Smart Online Order for Clover", + "repo": "https://plugins.svn.wordpress.org/clover-online-orders", + "vendor": "Zaytech", + "versions": [ + { + "lessThan": "1.5.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31241.json b/data/anchore/2024/CVE-2024-31241.json new file mode 100644 index 00000000..fd9a075e --- /dev/null +++ b/data/anchore/2024/CVE-2024-31241.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31241", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "learnpress-import-export", + "product": "LearnPress Export Import", + "repo": "https://plugins.svn.wordpress.org/learnpress-import-export", + "vendor": "ThimPress", + "versions": [ + { + "lessThan": "4.0.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/98a274eb-036f-44f1-861d-1cfea0b34d7f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31245.json b/data/anchore/2024/CVE-2024-31245.json new file mode 100644 index 00000000..1b6e8a48 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31245.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31245", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:convertkit:convertkit_-_email_marketing\\,_email_newsletter_and_landing_pages:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "convertkit", + "product": "ConvertKit", + "repo": "https://plugins.svn.wordpress.org/convertkit", + "vendor": "ConvertKit", + "versions": [ + { + "lessThan": "2.4.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4dd3c146-534f-41be-b805-7eef2483614e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31249.json b/data/anchore/2024/CVE-2024-31249.json new file mode 100644 index 00000000..02676482 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31249.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31249", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpkube:subscribe_to_comments_reloaded:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "subscribe-to-comments-reloaded", + "product": "Subscribe To Comments Reloaded", + "repo": "https://plugins.svn.wordpress.org/subscribe-to-comments-reloaded", + "vendor": "WPKube", + "versions": [ + { + "lessThan": "240119", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c64956c3-b6f5-419e-82f3-3c9e90e1d677?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31250.json b/data/anchore/2024/CVE-2024-31250.json new file mode 100644 index 00000000..66e31905 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31250.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31250", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:acnam:wp_server_health_stats:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-server-stats", + "product": "WP Server Health Stats", + "repo": "https://plugins.svn.wordpress.org/wp-server-stats", + "vendor": "Saumya Majumder", + "versions": [ + { + "lessThan": "1.7.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/68fc0a8b-b667-49fd-b015-ced27f5ccce8?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31251.json b/data/anchore/2024/CVE-2024-31251.json new file mode 100644 index 00000000..d1f86e35 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31251.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31251", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:peepso:peepso:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "peepso-core", + "product": "Community by PeepSo", + "repo": "https://plugins.svn.wordpress.org/peepso-core", + "vendor": "PeepSo", + "versions": [ + { + "lessThan": "6.3.1.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31253.json b/data/anchore/2024/CVE-2024-31253.json new file mode 100644 index 00000000..64f176d9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31253.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31253", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:dash10:oauth_server:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wp-oauth:wp_oauth_server:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "oauth2-provider", + "product": "OAuth Server", + "repo": "https://plugins.svn.wordpress.org/oauth2-provider", + "vendor": "WP OAuth Server", + "versions": [ + { + "lessThan": "4.4.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4d425843-a68e-40fd-93de-04c1c46af88f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31254.json b/data/anchore/2024/CVE-2024-31254.json new file mode 100644 index 00000000..744a5c1d --- /dev/null +++ b/data/anchore/2024/CVE-2024-31254.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31254", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:webtoffee:backup_and_migration:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-migration-duplicator", + "product": "WordPress Backup & Migration", + "repo": "https://plugins.svn.wordpress.org/wp-migration-duplicator", + "vendor": "WebToffee", + "versions": [ + { + "lessThan": "1.4.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/40570bb7-1638-4305-876e-86ad4c336944?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31259.json b/data/anchore/2024/CVE-2024-31259.json new file mode 100644 index 00000000..055176f4 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31259.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31259", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:searchiq:searchiq:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "searchiq", + "product": "SearchIQ", + "repo": "https://plugins.svn.wordpress.org/searchiq", + "vendor": "Searchiq", + "versions": [ + { + "lessThan": "4.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6c728fa3-e917-40ca-84ca-e907c22b0a3f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31260.json b/data/anchore/2024/CVE-2024-31260.json new file mode 100644 index 00000000..ff309de7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31260.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31260", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:edwiser:bridge:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "edwiser-bridge", + "product": "Edwiser Bridge", + "repo": "https://plugins.svn.wordpress.org/edwiser-bridge", + "vendor": "WisdmLabs", + "versions": [ + { + "lessThan": "3.0.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4fc23cb-e443-4c8e-b1a0-b8eefbb25dae?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31263.json b/data/anchore/2024/CVE-2024-31263.json new file mode 100644 index 00000000..c246aef4 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31263.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31263", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:quick-plugins:loan_repayment_calculator_and_application_form:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "quick-interest-slider", + "product": "Loan Repayment Calculator and Application Form", + "repo": "https://plugins.svn.wordpress.org/quick-interest-slider", + "vendor": "aerin", + "versions": [ + { + "lessThan": "2.9.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/08b8f1ad-f616-4ceb-9c53-9d53aac370c9?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31264.json b/data/anchore/2024/CVE-2024-31264.json new file mode 100644 index 00000000..4294df91 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31264.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31264", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:dfactory:post_views_counter:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "post-views-counter", + "product": "Post Views Counter", + "repo": "https://plugins.svn.wordpress.org/post-views-counter", + "vendor": "dFactory", + "versions": [ + { + "lessThan": "1.4.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2cee1253-52e5-4676-8a7a-ac71df0786ed?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31266.json b/data/anchore/2024/CVE-2024-31266.json new file mode 100644 index 00000000..645e731f --- /dev/null +++ b/data/anchore/2024/CVE-2024-31266.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31266", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:algolplus:advanced_order_export:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woo-order-export-lite", + "product": "Advanced Order Export For WooCommerce", + "repo": "https://plugins.svn.wordpress.org/woo-order-export-lite", + "vendor": "AlgolPlus", + "versions": [ + { + "lessThan": "3.4.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/86d5af9f-ffe9-4d22-885d-e117da7687de?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31268.json b/data/anchore/2024/CVE-2024-31268.json new file mode 100644 index 00000000..6c673273 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31268.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31268", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:apppresser:apppresser:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "apppresser", + "product": "AppPresser", + "repo": "https://plugins.svn.wordpress.org/apppresser", + "vendor": "AppPresser Team", + "versions": [ + { + "lessThan": "4.3.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/16c7813c-7814-43f1-b051-e7e8690de21e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31269.json b/data/anchore/2024/CVE-2024-31269.json new file mode 100644 index 00000000..651276fd --- /dev/null +++ b/data/anchore/2024/CVE-2024-31269.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31269", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:supsystic:easy_google_maps:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "google-maps-easy", + "product": "Easy Google Maps", + "repo": "https://plugins.svn.wordpress.org/google-maps-easy", + "vendor": "Supsystic", + "versions": [ + { + "lessThan": "1.11.12", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5ca7b7c0-a94e-47ff-996d-4c7bbd62f0de?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31270.json b/data/anchore/2024/CVE-2024-31270.json new file mode 100644 index 00000000..22aa6e2d --- /dev/null +++ b/data/anchore/2024/CVE-2024-31270.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31270", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:reputeinfosystems:arforms_form_builder:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:reputeinfosystems:contact_form\\,_survey_\\&_popup_form_plugin_for_wordpress_-_arforms_form_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "arforms-form-builder", + "product": "ARForms Form Builder", + "repo": "https://plugins.svn.wordpress.org/arforms-form-builder", + "vendor": "Repute InfoSystems", + "versions": [ + { + "lessThan": "1.6.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/92bdf5c9-37ef-450a-874c-e21a60b03baa?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31271.json b/data/anchore/2024/CVE-2024-31271.json new file mode 100644 index 00000000..2771fe44 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31271.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31271", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:supsystic:ultimate_maps:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ultimate-maps-by-supsystic", + "product": "Ultimate Maps by Supsystic", + "repo": "https://plugins.svn.wordpress.org/ultimate-maps-by-supsystic", + "vendor": "Supsystic", + "versions": [ + { + "lessThan": "1.2.17", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3b4108b7-fa78-4f1f-9eee-0e2383b4988c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31272.json b/data/anchore/2024/CVE-2024-31272.json new file mode 100644 index 00000000..232d86ad --- /dev/null +++ b/data/anchore/2024/CVE-2024-31272.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31272", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:reputeinfosystems:arforms_form_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "arforms-form-builder", + "product": "ARForms Form Builder", + "repo": "https://plugins.svn.wordpress.org/arforms-form-builder", + "vendor": "Repute InfoSystems", + "versions": [ + { + "lessThan": "1.6.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/20d5ff9e-9920-47c7-aa8d-e4f9f1646080?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31277.json b/data/anchore/2024/CVE-2024-31277.json new file mode 100644 index 00000000..137a4298 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31277.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31277", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pickplugins:product_designer:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "product-designer", + "product": "Product Designer", + "repo": "https://plugins.svn.wordpress.org/product-designer", + "vendor": "PickPlugins", + "versions": [ + { + "lessThan": "1.0.33", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c28e2aba-73eb-43f9-bae9-a78a67e6207c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31278.json b/data/anchore/2024/CVE-2024-31278.json new file mode 100644 index 00000000..ccd10843 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31278.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31278", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "premium-addons-for-elementor", + "product": "Premium Addons for Elementor", + "repo": "https://plugins.svn.wordpress.org/premium-addons-for-elementor", + "vendor": "Leap13", + "versions": [ + { + "lessThan": "4.10.23", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a78fced7-8c8c-4e98-8f06-2eea845cfb26?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31279.json b/data/anchore/2024/CVE-2024-31279.json new file mode 100644 index 00000000..d3c6a278 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31279.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31279", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:catchplugins:generate_child_theme:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "generate-child-theme", + "product": "Generate Child Theme", + "repo": "https://plugins.svn.wordpress.org/generate-child-theme", + "vendor": "Catch Plugins", + "versions": [ + { + "lessThan": "2.0.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d67b1a6c-001d-452e-861c-0e5c7ab465dd?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31280.json b/data/anchore/2024/CVE-2024-31280.json new file mode 100644 index 00000000..ce32d921 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31280.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31280", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:church_admin_project:church_admin:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:churchadminplugin:church_admin:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "church-admin", + "product": "Church Admin", + "repo": "https://plugins.svn.wordpress.org/church-admin", + "vendor": "Andy Moyle", + "versions": [ + { + "lessThan": "4.1.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8cc178d7-da99-4fbc-9277-52c6299f0417?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31285.json b/data/anchore/2024/CVE-2024-31285.json new file mode 100644 index 00000000..8897fc0b --- /dev/null +++ b/data/anchore/2024/CVE-2024-31285.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31285", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tooltips:wordpress_tooltips:*:*:*:*:free:wordpress:*:*" + ], + "packageName": "wordpress-tooltips", + "product": "WordPress Tooltips", + "repo": "https://plugins.svn.wordpress.org/wordpress-tooltips", + "vendor": "Tooltip", + "versions": [ + { + "lessThan": "9.5.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31286.json b/data/anchore/2024/CVE-2024-31286.json new file mode 100644 index 00000000..b45ee6f7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31286.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31286", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wp_photo_album_plus_project:wp_photo_album_plus:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wppa:wp_photo_album_plus:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-photo-album-plus", + "product": "WP Photo Album Plus", + "repo": "https://plugins.svn.wordpress.org/wp-photo-album-plus", + "vendor": "J.N. Breetvelt a.k.a. OpaJaap", + "versions": [ + { + "lessThan": "8.6.03.005", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/80f7e161-b071-4cb1-8080-ff0ad926a5ca?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31287.json b/data/anchore/2024/CVE-2024-31287.json new file mode 100644 index 00000000..021f55b3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31287.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31287", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:maxfoundry:media_library_folders:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "media-library-plus", + "product": "Media Library Folders", + "repo": "https://plugins.svn.wordpress.org/media-library-plus", + "vendor": "Max Foundry", + "versions": [ + { + "lessThan": "8.1.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4534efd4-0e6b-4784-8f81-4a643f657c66?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31288.json b/data/anchore/2024/CVE-2024-31288.json new file mode 100644 index 00000000..d8364e6c --- /dev/null +++ b/data/anchore/2024/CVE-2024-31288.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31288", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:rapidload:rapidload_power-up_for_autoptimize:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "unusedcss", + "product": "RapidLoad Power-Up for Autoptimize", + "repo": "https://plugins.svn.wordpress.org/unusedcss", + "vendor": "RapidLoad", + "versions": [ + { + "lessThan": "2.2.12", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3ebdb591-4fd4-4ea3-a0db-b934c67176de?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31291.json b/data/anchore/2024/CVE-2024-31291.json new file mode 100644 index 00000000..4737b6d0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31291.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31291", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "profilegrid-user-profiles-groups-and-communities", + "product": "ProfileGrid ", + "repo": "https://plugins.svn.wordpress.org/profilegrid-user-profiles-groups-and-communities", + "vendor": "Metagauss", + "versions": [ + { + "lessThan": "5.7.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/de495201-669c-4483-b30d-bb2abf6fe6c6?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31292.json b/data/anchore/2024/CVE-2024-31292.json new file mode 100644 index 00000000..fe046e73 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31292.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31292", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mooveagency:import_xml_and_rss_feeds:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "import-xml-feed", + "product": "Import XML and RSS Feeds", + "repo": "https://plugins.svn.wordpress.org/import-xml-feed", + "vendor": "Moove Agency", + "versions": [ + { + "lessThan": "2.1.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cecf1bcc-ed3e-430c-80d4-d940416eed9a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31293.json b/data/anchore/2024/CVE-2024-31293.json new file mode 100644 index 00000000..e4231e0c --- /dev/null +++ b/data/anchore/2024/CVE-2024-31293.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31293", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:sandhillsdev:easy_digital_downloads:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "easy-digital-downloads", + "product": "Easy Digital Downloads", + "repo": "https://plugins.svn.wordpress.org/easy-digital-downloads", + "vendor": "Easy Digital Downloads", + "versions": [ + { + "lessThan": "3.2.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/44777529-660f-4038-bbee-566ca3a8d24e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31296.json b/data/anchore/2024/CVE-2024-31296.json new file mode 100644 index 00000000..d830bab8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31296.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31296", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:reputeinfosystems:bookingpress:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "bookingpress-appointment-booking", + "product": "BookingPress", + "repo": "https://plugins.svn.wordpress.org/bookingpress-appointment-booking", + "vendor": "Repute Infosystems", + "versions": [ + { + "lessThan": "1.0.82", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a86fc949-6caf-48b7-beda-ca0c653c9b29?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31299.json b/data/anchore/2024/CVE-2024-31299.json new file mode 100644 index 00000000..d8f3c2fa --- /dev/null +++ b/data/anchore/2024/CVE-2024-31299.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31299", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:catzsoft:redi_restaurant_reservation:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "redi-restaurant-reservation", + "product": "ReDi Restaurant Reservation", + "repo": "https://plugins.svn.wordpress.org/redi-restaurant-reservation", + "vendor": "Reservation Diary", + "versions": [ + { + "lessThan": "24.0303", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4f2c3819-2247-4ef7-b177-cc98cbf5eae3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31301.json b/data/anchore/2024/CVE-2024-31301.json new file mode 100644 index 00000000..da86732c --- /dev/null +++ b/data/anchore/2024/CVE-2024-31301.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31301", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:themeisle:multiple_page_generator:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "multiple-pages-generator-by-porthas", + "product": "Multiple Page Generator Plugin – MPG", + "repo": "https://plugins.svn.wordpress.org/multiple-pages-generator-by-porthas", + "vendor": "Themeisle", + "versions": [ + { + "lessThan": "3.4.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aa15df6a-3411-4d69-8337-a3944ceae9ee?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31302.json b/data/anchore/2024/CVE-2024-31302.json new file mode 100644 index 00000000..a1e4bff1 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31302.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31302", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:codepeople:contact_form_email:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "contact-form-to-email", + "product": "Contact Form Email", + "repo": "https://plugins.svn.wordpress.org/contact-form-to-email", + "vendor": "CodePeople", + "versions": [ + { + "lessThan": "1.3.45", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1daaab1a-ce0e-461d-940e-27b5b3f60e32?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31303.json b/data/anchore/2024/CVE-2024-31303.json new file mode 100644 index 00000000..7f3917e5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31303.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31303", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:fetchdesigns:sign-up_sheets:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "sign-up-sheets", + "product": "Sign-up Sheets", + "repo": "https://plugins.svn.wordpress.org/sign-up-sheets", + "vendor": "Fetch Designs", + "versions": [ + { + "lessThan": "2.2.12", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a38e649d-00ad-4198-a96a-e280bc810cff?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31306.json b/data/anchore/2024/CVE-2024-31306.json new file mode 100644 index 00000000..35adc05d --- /dev/null +++ b/data/anchore/2024/CVE-2024-31306.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31306", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "essential-blocks", + "product": "Essential Blocks for Gutenberg", + "repo": "https://plugins.svn.wordpress.org/essential-blocks", + "vendor": "WPDeveloper", + "versions": [ + { + "lessThan": "4.5.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8aa0eada-dc6c-4cd5-9ced-f162416ec439?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31308.json b/data/anchore/2024/CVE-2024-31308.json new file mode 100644 index 00000000..9414c9d9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31308.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31308", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:vjinfotech:wp_import_export:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:vjinfotech:wp_import_export_lite:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-import-export-lite", + "product": "WP Import Export Lite", + "repo": "https://plugins.svn.wordpress.org/wp-import-export-lite", + "vendor": "VJInfotech", + "versions": [ + { + "lessThan": "3.9.27", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cfc6b4a5-ff13-457f-9e06-de15e8cb5510?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31343.json b/data/anchore/2024/CVE-2024-31343.json new file mode 100644 index 00000000..c490b068 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31343.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31343", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:sonaar:mp3_audio_player_for_music\\,_radio_\\&_podcast:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "mp3-music-player-by-sonaar", + "product": "MP3 Audio Player for Music, Radio & Podcast by Sonaar", + "repo": "https://plugins.svn.wordpress.org/mp3-music-player-by-sonaar", + "vendor": "Sonaar Music", + "versions": [ + { + "lessThan": "5.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9576408b-d048-4e36-bc1a-c01c9f586365?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31348.json b/data/anchore/2024/CVE-2024-31348.json new file mode 100644 index 00000000..e802632e --- /dev/null +++ b/data/anchore/2024/CVE-2024-31348.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31348", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:themepoints:testimonials:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "super-testimonial", + "product": "Testimonials", + "repo": "https://plugins.svn.wordpress.org/super-testimonial", + "vendor": "Themepoints", + "versions": [ + { + "lessThan": "3.0.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/066dfb01-4f3c-4d5a-8fbf-7e58dfc7ac91?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31349.json b/data/anchore/2024/CVE-2024-31349.json new file mode 100644 index 00000000..0705704d --- /dev/null +++ b/data/anchore/2024/CVE-2024-31349.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31349", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mailmunch:mailmunch:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "mailmunch", + "product": "MailMunch – Grow your Email List", + "repo": "https://plugins.svn.wordpress.org/mailmunch", + "vendor": "MailMunch", + "versions": [ + { + "lessThan": "3.1.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b27201c7-453b-4953-b364-42ca7bf012f0?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31353.json b/data/anchore/2024/CVE-2024-31353.json new file mode 100644 index 00000000..92dc553e --- /dev/null +++ b/data/anchore/2024/CVE-2024-31353.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31353", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tribulant:slideshow_gallery:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "slideshow-gallery", + "product": "Slideshow Gallery", + "repo": "https://plugins.svn.wordpress.org/slideshow-gallery", + "vendor": "Tribulant", + "versions": [ + { + "lessThanOrEqual": "1.7.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/23d5e2ba-3a8a-4ded-aba9-fa0a7228a398?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31354.json b/data/anchore/2024/CVE-2024-31354.json new file mode 100644 index 00000000..09f9a445 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31354.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31354", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tribulant:slideshow_gallery:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "slideshow-gallery", + "product": "Slideshow Gallery", + "repo": "https://plugins.svn.wordpress.org/slideshow-gallery", + "vendor": "Tribulant", + "versions": [ + { + "lessThanOrEqual": "1.7.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4aec0bf3-82d7-4479-8bd6-941404b6bd03?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31355.json b/data/anchore/2024/CVE-2024-31355.json new file mode 100644 index 00000000..baa25bf6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31355.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31355", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tribulant:slideshow_gallery:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "slideshow-gallery", + "product": "Slideshow Gallery", + "repo": "https://plugins.svn.wordpress.org/slideshow-gallery", + "vendor": "Tribulant", + "versions": [ + { + "lessThanOrEqual": "1.7.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d6ebb590-1291-45dc-818a-258143a2d9a2?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31356.json b/data/anchore/2024/CVE-2024-31356.json new file mode 100644 index 00000000..dc518436 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31356.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31356", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:solwininfotech:user_activity_log:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "user-activity-log", + "product": "User Activity Log", + "repo": "https://plugins.svn.wordpress.org/user-activity-log", + "vendor": "Solwin Infotech", + "versions": [ + { + "lessThanOrEqual": "1.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9df788e-a92e-4519-9e23-8aed08479b68?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31362.json b/data/anchore/2024/CVE-2024-31362.json new file mode 100644 index 00000000..c8e4e0a3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31362.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31362", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "profilegrid-user-profiles-groups-and-communities", + "product": "ProfileGrid ", + "repo": "https://plugins.svn.wordpress.org/profilegrid-user-profiles-groups-and-communities", + "vendor": "Metagauss", + "versions": [ + { + "lessThan": "5.7.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/134a3615-a9fa-48b5-8cd1-4c3fb24a777a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31363.json b/data/anchore/2024/CVE-2024-31363.json new file mode 100644 index 00000000..eb685855 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31363.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31363", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:lifterlms:lifterlms:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "lifterlms", + "product": "LifterLMS", + "repo": "https://plugins.svn.wordpress.org/lifterlms", + "vendor": "LifterLMS", + "versions": [ + { + "lessThan": "7.5.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/22842e7a-9cbb-4b29-b4cb-7d9b8d6b7b1a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31367.json b/data/anchore/2024/CVE-2024-31367.json new file mode 100644 index 00000000..9a70b56d --- /dev/null +++ b/data/anchore/2024/CVE-2024-31367.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31367", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:pencidesign:soledad:*:*:*:*:*:wordpress:*:*" + ], + "product": "Soledad", + "vendor": "PenciDesign", + "versions": [ + { + "lessThan": "8.4.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/30881bed-9a5c-4a7f-9065-f11a1b336892?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31368.json b/data/anchore/2024/CVE-2024-31368.json new file mode 100644 index 00000000..1a7b6922 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31368.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31368", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:pencidesign:soledad:*:*:*:*:*:wordpress:*:*" + ], + "product": "Soledad", + "vendor": "PenciDesign", + "versions": [ + { + "lessThan": "8.4.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3f6412bf-65ec-445f-a1fe-27aeb8330712?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31369.json b/data/anchore/2024/CVE-2024-31369.json new file mode 100644 index 00000000..d2fa5a46 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31369.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31369", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:pencidesign:soledad:*:*:*:*:*:wordpress:*:*" + ], + "product": "Soledad", + "vendor": "PenciDesign", + "versions": [ + { + "lessThan": "8.4.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f9454765-f70b-4d8d-a5cc-28bc34375216?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31373.json b/data/anchore/2024/CVE-2024-31373.json new file mode 100644 index 00000000..5f3cf4d4 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31373.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31373", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:e2pdf:e2pdf:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "e2pdf", + "product": "e2pdf", + "repo": "https://plugins.svn.wordpress.org/e2pdf", + "vendor": "E2Pdf", + "versions": [ + { + "lessThan": "1.23.00", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/56f146e8-ec70-45c4-9ff2-94cb44fef5c2?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31374.json b/data/anchore/2024/CVE-2024-31374.json new file mode 100644 index 00000000..39412a4d --- /dev/null +++ b/data/anchore/2024/CVE-2024-31374.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31374", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:apppresser:apppresser:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "apppresser", + "product": "AppPresser", + "repo": "https://plugins.svn.wordpress.org/apppresser", + "vendor": "AppPresser Team", + "versions": [ + { + "lessThan": "4.3.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1417fad0-51a0-4091-8f7b-4e8925fd71a0?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31378.json b/data/anchore/2024/CVE-2024-31378.json new file mode 100644 index 00000000..9a2a80df --- /dev/null +++ b/data/anchore/2024/CVE-2024-31378.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31378", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mailmunch:mailchimp_forms:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "mailchimp-forms-by-mailmunch", + "product": "MailChimp Forms by MailMunch", + "repo": "https://plugins.svn.wordpress.org/mailchimp-forms-by-mailmunch", + "vendor": "MailMunch", + "versions": [ + { + "lessThan": "3.2.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7e069678-0c0a-4e4a-b0ee-404f488f9d01?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31379.json b/data/anchore/2024/CVE-2024-31379.json new file mode 100644 index 00000000..b8a76a9f --- /dev/null +++ b/data/anchore/2024/CVE-2024-31379.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31379", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:smashballoon:smash_balloon_social_post_feed:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "custom-facebook-feed", + "product": "Smash Balloon Social Post Feed", + "repo": "https://plugins.svn.wordpress.org/custom-facebook-feed", + "vendor": "Smash Balloon", + "versions": [ + { + "lessThan": "4.2.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/623b139e-c5a1-4d2e-b05c-72707f421ef8?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31380.json b/data/anchore/2024/CVE-2024-31380.json new file mode 100644 index 00000000..e3ae5070 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31380.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31380", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:soflyy:oxygen:*:*:*:*:*:wordpress:*:*" + ], + "product": "Oxygen Builder", + "vendor": "Soflyy", + "versions": [ + { + "lessThanOrEqual": "4.8.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://snicco.io/vulnerability-disclosure/oxygen/client-control-remote-code-execution-oxygen-4-8-1?_s_id=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31381.json b/data/anchore/2024/CVE-2024-31381.json new file mode 100644 index 00000000..af8140f8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31381.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31381", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:rebelcode:spotlight_social_feeds:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "spotlight-social-photo-feeds", + "product": "Spotlight Social Media Feeds", + "repo": "https://plugins.svn.wordpress.org/spotlight-social-photo-feeds", + "vendor": "RebelCode", + "versions": [ + { + "lessThan": "1.6.11", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/21e49adb-01a7-41d9-bb51-bac60d49e293?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31382.json b/data/anchore/2024/CVE-2024-31382.json new file mode 100644 index 00000000..81e6d063 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31382.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31382", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/themes", + "cpes": [ + "cpe:2.3:a:creativethemes:blocksy:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "blocksy", + "product": "Blocksy", + "repo": "https://themes.svn.wordpress.org/blocksy", + "vendor": "Creative Themes HQ", + "versions": [ + { + "lessThan": "2.0.23", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f86dd96-fc87-4dc8-8435-f279a8def021?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31385.json b/data/anchore/2024/CVE-2024-31385.json new file mode 100644 index 00000000..069abb21 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31385.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31385", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:catzsoft:redi_restaurant_reservation:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "redi-restaurant-reservation", + "product": "ReDi Restaurant Reservation", + "repo": "https://plugins.svn.wordpress.org/redi-restaurant-reservation", + "vendor": "Reservation Diary", + "versions": [ + { + "lessThan": "24.0303", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4945931f-764d-45cf-9157-5dddfb264086?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31387.json b/data/anchore/2024/CVE-2024-31387.json new file mode 100644 index 00000000..f489c117 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31387.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31387", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ays-pro:popup_box:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:aysproextensions:popup_like:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ays-facebook-popup-likebox", + "product": "Popup Like box", + "repo": "https://plugins.svn.wordpress.org/ays-facebook-popup-likebox", + "vendor": "Popup LikeBox Team", + "versions": [ + { + "lessThan": "3.7.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/87b49bae-05e6-44cd-86a1-8df3249a25f9?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31388.json b/data/anchore/2024/CVE-2024-31388.json new file mode 100644 index 00000000..b439f1af --- /dev/null +++ b/data/anchore/2024/CVE-2024-31388.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31388", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pauple:tablesome:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "tablesome", + "product": "Table & Contact Form 7 Database – Tablesome", + "repo": "https://plugins.svn.wordpress.org/tablesome", + "vendor": "Pauple", + "versions": [ + { + "lessThan": "1.0.26", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9efb88e2-381f-4e26-80bb-1b034ffc1c91?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31421.json b/data/anchore/2024/CVE-2024-31421.json new file mode 100644 index 00000000..49c6e8b3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31421.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31421", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:supsystic:popup:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "popup-by-supsystic", + "product": "Popup by Supsystic", + "repo": "https://plugins.svn.wordpress.org/popup-by-supsystic", + "vendor": "Supsystic", + "versions": [ + { + "lessThan": "1.10.28", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/73b99342-65ca-4f63-b1ea-638255821265?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31422.json b/data/anchore/2024/CVE-2024-31422.json new file mode 100644 index 00000000..02dff58d --- /dev/null +++ b/data/anchore/2024/CVE-2024-31422.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31422", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:realfavicongenerator:favicon_by_realfavicongenerator:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "favicon-by-realfavicongenerator", + "product": "Favicon", + "repo": "https://plugins.svn.wordpress.org/favicon-by-realfavicongenerator", + "vendor": "Philippe Bernard", + "versions": [ + { + "lessThan": "1.3.30", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4a5d59da-dcac-44b4-a697-38eef650c6de?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31424.json b/data/anchore/2024/CVE-2024-31424.json new file mode 100644 index 00000000..b6bf5105 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31424.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31424", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:idehweb:login_with_phone_number:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "login-with-phone-number", + "product": "Login with phone number", + "repo": "https://plugins.svn.wordpress.org/login-with-phone-number", + "vendor": "Hamid Alinia - idehweb", + "versions": [ + { + "lessThan": "1.6.94", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2dfe5dd0-0dc9-4c64-8972-045325e5a54f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31425.json b/data/anchore/2024/CVE-2024-31425.json new file mode 100644 index 00000000..799c8278 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31425.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31425", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tms-outsource:amelia:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ameliabooking", + "product": "Amelia", + "repo": "https://plugins.svn.wordpress.org/ameliabooking", + "vendor": "TMS", + "versions": [ + { + "lessThan": "1.0.96", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ea984974-2835-4bad-b7ca-975ad21c80e5?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31432.json b/data/anchore/2024/CVE-2024-31432.json new file mode 100644 index 00000000..bc53b702 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31432.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31432", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:liquidweb:restrict_content:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "restrict-content", + "product": "Restrict Content", + "repo": "https://plugins.svn.wordpress.org/restrict-content", + "vendor": "StellarWP", + "versions": [ + { + "lessThan": "3.2.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3e5f3eac-d2da-43ea-9303-731d78102372?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31433.json b/data/anchore/2024/CVE-2024-31433.json new file mode 100644 index 00000000..2b353905 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31433.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31433", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tri:the_events_calendar:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "the-events-calendar", + "product": "The Events Calendar", + "repo": "https://plugins.svn.wordpress.org/the-events-calendar", + "vendor": "The Events Calendar", + "versions": [ + { + "lessThan": "6.3.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/30e0289c-b893-41bd-aad9-d7ec62bf2b23?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31434.json b/data/anchore/2024/CVE-2024-31434.json new file mode 100644 index 00000000..2cf295bb --- /dev/null +++ b/data/anchore/2024/CVE-2024-31434.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31434", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:thenewsletterplugin:newsletter:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "newsletter", + "product": "Newsletter", + "repo": "https://plugins.svn.wordpress.org/newsletter", + "vendor": "Stefano Lissa & The Newsletter Team", + "versions": [ + { + "lessThan": "8.0.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/54bdcae1-28af-4d30-9204-e67b27271042?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31921.json b/data/anchore/2024/CVE-2024-31921.json new file mode 100644 index 00000000..0b6ecbf3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31921.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31921", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:etoilewebdesign:ultimate_product_catalog:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ultimate-product-catalogue", + "product": "Ultimate Product Catalogue", + "repo": "https://plugins.svn.wordpress.org/ultimate-product-catalogue", + "vendor": "Etoile Web Design", + "versions": [ + { + "lessThan": "5.2.16", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/68721ded-0a80-4cff-aaf0-59b2fcf67456?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31923.json b/data/anchore/2024/CVE-2024-31923.json new file mode 100644 index 00000000..c54a8a99 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31923.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31923", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:featherplugins:custom_login_page_\\|_temporary_users_\\|_rebrand_login_\\|_login_captcha:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "feather-login-page", + "product": "Feather Login Page", + "repo": "https://plugins.svn.wordpress.org/feather-login-page", + "vendor": "PluginOps", + "versions": [ + { + "lessThan": "1.1.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/89d42a87-6adc-43e6-868f-b9b2c51ed8e0?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31924.json b/data/anchore/2024/CVE-2024-31924.json new file mode 100644 index 00000000..4af23d3b --- /dev/null +++ b/data/anchore/2024/CVE-2024-31924.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31924", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ewww:image_optimizer:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ewww-image-optimizer", + "product": "EWWW Image Optimizer", + "repo": "https://plugins.svn.wordpress.org/ewww-image-optimizer", + "vendor": "Exactly WWW", + "versions": [ + { + "lessThan": "7.3.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/074d7b46-60e0-4d4a-904a-696ac7948a35?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31926.json b/data/anchore/2024/CVE-2024-31926.json new file mode 100644 index 00000000..146a9c45 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31926.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31926", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:bracketspace:advanced_cron_manager:*:*:*:*:-:wordpress:*:*" + ], + "packageName": "advanced-cron-manager", + "product": "Advanced Cron Manager – debug & control", + "repo": "https://plugins.svn.wordpress.org/advanced-cron-manager", + "vendor": "BracketSpace", + "versions": [ + { + "lessThan": "2.5.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7c8faa22-ff1f-4267-b690-a2c51c4807f5?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31928.json b/data/anchore/2024/CVE-2024-31928.json new file mode 100644 index 00000000..5b2fd1b9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31928.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31928", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpdarko:top_bar:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "top-bar", + "product": "Top Bar", + "repo": "https://plugins.svn.wordpress.org/top-bar", + "vendor": "WP Darko", + "versions": [ + { + "lessThan": "3.0.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31930.json b/data/anchore/2024/CVE-2024-31930.json new file mode 100644 index 00000000..7c5c2fc2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31930.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31930", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pdfcrowd:save_as_pdf:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "save-as-pdf-by-pdfcrowd", + "product": "Save as PDF plugin by Pdfcrowd", + "repo": "https://plugins.svn.wordpress.org/save-as-pdf-by-pdfcrowd", + "vendor": "Pdfcrowd", + "versions": [ + { + "lessThan": "3.2.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/92484681-e677-4a7b-b2df-40aad49baf44?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31931.json b/data/anchore/2024/CVE-2024-31931.json new file mode 100644 index 00000000..5d5bd3d7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31931.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31931", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pdfcrowd:save_as_image:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "save-as-image-by-pdfcrowd", + "product": "Save as Image plugin by Pdfcrowd", + "repo": "https://plugins.svn.wordpress.org/save-as-image-by-pdfcrowd", + "versions": [ + { + "lessThan": "3.2.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fb1693c7-4c38-4723-868a-9f105dac1561?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31932.json b/data/anchore/2024/CVE-2024-31932.json new file mode 100644 index 00000000..9b32e677 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31932.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31932", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:creativethemes:blocksy_companion:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "blocksy-companion", + "product": "Blocksy Companion", + "repo": "https://plugins.svn.wordpress.org/blocksy-companion", + "vendor": "CreativeThemes", + "versions": [ + { + "lessThan": "2.0.29", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3bb15611-85a4-4efb-81e5-7352c348c4a9?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31933.json b/data/anchore/2024/CVE-2024-31933.json new file mode 100644 index 00000000..e776731a --- /dev/null +++ b/data/anchore/2024/CVE-2024-31933.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31933", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:blueastral:page_builder\\:*:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:livecomposerplugin:live-composer-page-builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "live-composer-page-builder", + "product": "Page Builder: Live Composer", + "repo": "https://plugins.svn.wordpress.org/live-composer-page-builder", + "vendor": "Live Composer Team", + "versions": [ + { + "lessThan": "1.5.36", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c5d96be2-b89a-46b0-a4f1-da44f9b54b2d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31934.json b/data/anchore/2024/CVE-2024-31934.json new file mode 100644 index 00000000..975a9238 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31934.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31934", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:linkwhisper:link_whisper_free:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "link-whisper", + "product": "Link Whisper Free", + "repo": "https://plugins.svn.wordpress.org/link-whisper", + "vendor": "Link Whisper", + "versions": [ + { + "lessThan": "0.7.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8155585e-c29c-484c-ab2e-371b5723539e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31935.json b/data/anchore/2024/CVE-2024-31935.json new file mode 100644 index 00000000..5ee873c9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31935.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31935", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:bracketspace:simple_post_notes:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "simple-post-notes", + "product": "Simple Post Notes", + "repo": "https://plugins.svn.wordpress.org/simple-post-notes", + "vendor": "BracketSpace", + "versions": [ + { + "lessThan": "1.7.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5a7bb428-dd65-47f7-aaf6-ecdad4ae3049?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31936.json b/data/anchore/2024/CVE-2024-31936.json new file mode 100644 index 00000000..8a9f2f98 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31936.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31936", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ayecode:userswp:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "userswp", + "product": "UsersWP", + "repo": "https://plugins.svn.wordpress.org/userswp", + "vendor": "AyeCode Ltd", + "versions": [ + { + "lessThan": "1.2.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4a308056-aadc-4fc3-8133-2b05f3d9aabe?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31939.json b/data/anchore/2024/CVE-2024-31939.json new file mode 100644 index 00000000..d6381414 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31939.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31939", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:soflyy:wp_all_import:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-all-import", + "product": "Import any XML or CSV File to WordPress", + "repo": "https://plugins.svn.wordpress.org/wp-all-import", + "vendor": "Soflyy", + "versions": [ + { + "lessThan": "3.7.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/121cad41-d3cd-4042-b568-3d91909a38d3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32078.json b/data/anchore/2024/CVE-2024-32078.json new file mode 100644 index 00000000..a45cbd77 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32078.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32078", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:foliovision:fv_flowplayer_video_player:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "fv-wordpress-flowplayer", + "product": "FV Flowplayer Video Player", + "repo": "https://plugins.svn.wordpress.org/fv-wordpress-flowplayer", + "vendor": "Foliovision", + "versions": [ + { + "lessThan": "7.5.45.7212", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/360010f3-9053-4c69-a4e8-12f0c77ba746?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32079.json b/data/anchore/2024/CVE-2024-32079.json new file mode 100644 index 00000000..9f260d9e --- /dev/null +++ b/data/anchore/2024/CVE-2024-32079.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32079", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tinywebgallery:advanced_iframe:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "advanced-iframe", + "product": "Advanced iFrame", + "repo": "https://plugins.svn.wordpress.org/advanced-iframe", + "vendor": "Michael Dempfle", + "versions": [ + { + "lessThan": "2024.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/808ef87d-298c-4622-9fcd-cf879e7157bd?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32087.json b/data/anchore/2024/CVE-2024-32087.json new file mode 100644 index 00000000..80a6fa36 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32087.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32087", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:dpl:product_feed_on_woocommerce_for_google\\,_awin\\,_shareasale\\,_bing\\,_and_more:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "purple-xmls-google-product-feed-for-woocommerce", + "product": "Product Feed on WooCommerce for Google", + "repo": "https://plugins.svn.wordpress.org/purple-xmls-google-product-feed-for-woocommerce", + "vendor": "ExportFeed.com", + "versions": [ + { + "lessThanOrEqual": "3.5.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/46ab2615-a1eb-4740-836c-781e961252e7?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32088.json b/data/anchore/2024/CVE-2024-32088.json new file mode 100644 index 00000000..23ea251e --- /dev/null +++ b/data/anchore/2024/CVE-2024-32088.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32088", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:seedprod:coming_soon_page\\,_under_construction_\\&_maintenance_mode:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:seedprod:website_builder_by_seedprod:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "coming-soon", + "product": "Coming Soon Page, Under Construction & Maintenance Mode by SeedProd", + "repo": "https://plugins.svn.wordpress.org/coming-soon", + "vendor": "SeedProd", + "versions": [ + { + "lessThan": "6.15.21", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/60c6c9a8-e04d-49e2-96e8-16d7580a3e2c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32089.json b/data/anchore/2024/CVE-2024-32089.json new file mode 100644 index 00000000..75e8111e --- /dev/null +++ b/data/anchore/2024/CVE-2024-32089.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32089", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:supsystic:digital_publications_by_supsystic:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "digital-publications-by-supsystic", + "product": "Digital Publications by Supsystic", + "repo": "https://plugins.svn.wordpress.org/digital-publications-by-supsystic", + "vendor": "Supsystic", + "versions": [ + { + "lessThan": "1.7.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fdea1999-a282-4374-a093-5cbd5b05497a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32090.json b/data/anchore/2024/CVE-2024-32090.json new file mode 100644 index 00000000..edabd3a7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32090.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32090", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:church_admin_project:church_admin:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:churchadminplugin:church_admin:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "church-admin", + "product": "Church Admin", + "repo": "https://plugins.svn.wordpress.org/church-admin", + "vendor": "Andy Moyle", + "versions": [ + { + "lessThan": "4.0.28", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/97312cf2-dcff-466f-a27c-25686216ed04?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32093.json b/data/anchore/2024/CVE-2024-32093.json new file mode 100644 index 00000000..592418ab --- /dev/null +++ b/data/anchore/2024/CVE-2024-32093.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32093", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:nosegraze:novelist:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "novelist", + "product": "Novelist", + "repo": "https://plugins.svn.wordpress.org/novelist", + "vendor": "Nose Graze", + "versions": [ + { + "lessThan": "1.2.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/00f33681-7edb-40a8-a1b4-433765ef7585?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32095.json b/data/anchore/2024/CVE-2024-32095.json new file mode 100644 index 00000000..22158fd9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32095.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32095", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:multiparcels:multiparcels_shipping_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "multiparcels-shipping-for-woocommerce", + "product": "MultiParcels Shipping For WooCommerce", + "repo": "https://plugins.svn.wordpress.org/multiparcels-shipping-for-woocommerce", + "vendor": "MultiParcels", + "versions": [ + { + "lessThan": "1.16.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0c676a46-3e3f-4dc0-ba7f-acf1f100fb4a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32096.json b/data/anchore/2024/CVE-2024-32096.json new file mode 100644 index 00000000..f7c352fc --- /dev/null +++ b/data/anchore/2024/CVE-2024-32096.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32096", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpsynchro:wp_synchro:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wpsynchro", + "product": "WP Migration Plugin DB & Files – WP Synchro", + "repo": "https://plugins.svn.wordpress.org/wpsynchro", + "vendor": "DAEV.tech", + "versions": [ + { + "lessThan": "1.11.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fe9659ff-7233-44d4-aaff-ad3089511a67?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32097.json b/data/anchore/2024/CVE-2024-32097.json new file mode 100644 index 00000000..fbfb9e9c --- /dev/null +++ b/data/anchore/2024/CVE-2024-32097.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32097", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:geomywp:geo_my_wordpress:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "geo-my-wp", + "product": "GEO my WordPress", + "repo": "https://plugins.svn.wordpress.org/geo-my-wp", + "vendor": "Eyal Fitoussi", + "versions": [ + { + "lessThan": "4.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7d9d7cab-c840-469f-ba2d-f81c785ffb8f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32098.json b/data/anchore/2024/CVE-2024-32098.json new file mode 100644 index 00000000..611fe4eb --- /dev/null +++ b/data/anchore/2024/CVE-2024-32098.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32098", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pagevisitcounter:advanced_page_visit_counter:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "advanced-page-visit-counter", + "product": "Advanced Page Visit Counter", + "repo": "https://plugins.svn.wordpress.org/advanced-page-visit-counter", + "vendor": "Page Visit Counter", + "versions": [ + { + "lessThanOrEqual": "8.0.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/511f64df-4389-4ad7-b2a4-12dc57714631?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32099.json b/data/anchore/2024/CVE-2024-32099.json new file mode 100644 index 00000000..66b16cf7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32099.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32099", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:jamesward:wp_mail_catcher:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-mail-catcher", + "product": "WP Mail Catcher", + "repo": "https://plugins.svn.wordpress.org/wp-mail-catcher", + "vendor": "James Ward", + "versions": [ + { + "lessThan": "2.1.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cfb45af3-c22a-4045-b564-22f7081868d7?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32101.json b/data/anchore/2024/CVE-2024-32101.json new file mode 100644 index 00000000..1fd0843f --- /dev/null +++ b/data/anchore/2024/CVE-2024-32101.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32101", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:omnisend:email_marketing_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "omnisend-connect", + "product": "Email Marketing for WooCommerce by Omnisend", + "repo": "https://plugins.svn.wordpress.org/omnisend-connect", + "vendor": "Omnisend", + "versions": [ + { + "lessThan": "1.14.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f54f1e41-788b-45e5-b84f-06e664f5c597?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32102.json b/data/anchore/2024/CVE-2024-32102.json new file mode 100644 index 00000000..db472202 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32102.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32102", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:crony_cronjob_manager_project:crony_cronjob_manager:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "crony", + "product": "Crony Cronjob Manager", + "repo": "https://plugins.svn.wordpress.org/crony", + "vendor": "Scott Kingsley Clark", + "versions": [ + { + "lessThanOrEqual": "0.5.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/29b81e96-d950-405a-abcb-c457e104b86b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32109.json b/data/anchore/2024/CVE-2024-32109.json new file mode 100644 index 00000000..ca98c82f --- /dev/null +++ b/data/anchore/2024/CVE-2024-32109.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32109", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mpembed:wp_matterport_shortcode:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "shortcode-gallery-for-matterport-showcase", + "product": "WP Matterport Shortcode", + "repo": "https://plugins.svn.wordpress.org/shortcode-gallery-for-matterport-showcase", + "vendor": "Julien Berthelot / MPEmbed.com", + "versions": [ + { + "lessThan": "2.2.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0e03aeed-abb3-4ac8-8ff5-72ddc2430b94?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32129.json b/data/anchore/2024/CVE-2024-32129.json new file mode 100644 index 00000000..85c47d39 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32129.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32129", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:freshworks:freshdesk:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "freshdesk-support", + "product": "Freshdesk (official)", + "repo": "https://plugins.svn.wordpress.org/freshdesk-support", + "vendor": "Freshworks", + "versions": [ + { + "lessThan": "2.4.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/36d2fbbf-ea0e-4785-9b83-b642e59c713d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32130.json b/data/anchore/2024/CVE-2024-32130.json new file mode 100644 index 00000000..69c8c1e3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32130.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32130", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:paystack:payment_forms_for_paystack:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "payment-forms-for-paystack", + "product": "Payment Forms for Paystack", + "repo": "https://plugins.svn.wordpress.org/payment-forms-for-paystack", + "vendor": "Paystack", + "versions": [ + { + "lessThanOrEqual": "3.4.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32132.json b/data/anchore/2024/CVE-2024-32132.json new file mode 100644 index 00000000..20cb2782 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32132.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32132", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:codeboxr:cbx_bookmark_\\&_favorite:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "cbxwpbookmark", + "product": "CBX Bookmark & Favorite", + "repo": "https://plugins.svn.wordpress.org/cbxwpbookmark", + "vendor": "Codeboxr Team", + "versions": [ + { + "lessThanOrEqual": "1.7.20", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9affd2b9-9576-435e-931d-f60816af0b91?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32137.json b/data/anchore/2024/CVE-2024-32137.json new file mode 100644 index 00000000..a9e6ea0a --- /dev/null +++ b/data/anchore/2024/CVE-2024-32137.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32137", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:solwininfotech:user_activity_log:*:*:*:*:pro:wordpress:*:*" + ], + "product": "User Activity Log Pro", + "vendor": "Solwin", + "versions": [ + { + "lessThanOrEqual": "2.3.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c2054dcd-1a65-48bc-9dcf-824fa448921d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32138.json b/data/anchore/2024/CVE-2024-32138.json new file mode 100644 index 00000000..54317f29 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32138.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32138", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:kaizencoders:short_url:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "shorten-url", + "product": "Short URL", + "repo": "https://plugins.svn.wordpress.org/shorten-url", + "vendor": "KaizenCoders", + "versions": [ + { + "lessThanOrEqual": "1.6.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4e6d4ad1-0fcc-43d9-b997-126782718c28?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32139.json b/data/anchore/2024/CVE-2024-32139.json new file mode 100644 index 00000000..f5a7ee03 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32139.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32139", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "podlove-podcasting-plugin-for-wordpress", + "product": "Podlove Podcast Publisher", + "repo": "https://plugins.svn.wordpress.org/podlove-podcasting-plugin-for-wordpress", + "vendor": "Podlove", + "versions": [ + { + "lessThan": "4.0.14", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c6f4ee5d-819d-4125-8cff-acf9811e2919?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32140.json b/data/anchore/2024/CVE-2024-32140.json new file mode 100644 index 00000000..42746663 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32140.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32140", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:libsyn:libsyn_publisher_hub:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "libsyn-podcasting", + "product": "Libsyn Publisher Hub", + "repo": "https://plugins.svn.wordpress.org/libsyn-podcasting", + "vendor": "Libsyn", + "versions": [ + { + "lessThanOrEqual": "1.4.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b581c4d-a95f-4922-95bb-15f24010ca34?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32141.json b/data/anchore/2024/CVE-2024-32141.json new file mode 100644 index 00000000..482e420a --- /dev/null +++ b/data/anchore/2024/CVE-2024-32141.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32141", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:libsyn:libsyn_publisher_hub:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "libsyn-podcasting", + "product": "Libsyn Publisher Hub", + "repo": "https://plugins.svn.wordpress.org/libsyn-podcasting", + "vendor": "Libsyn", + "versions": [ + { + "lessThanOrEqual": "1.4.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/24be03a7-4632-4bb1-beb9-d83abdd363b9?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32142.json b/data/anchore/2024/CVE-2024-32142.json new file mode 100644 index 00000000..f9a8c374 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32142.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32142", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:kutethemes:ovic_responsive_wpbakery:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ovic-vc-addon", + "product": "Ovic Responsive WPBakery", + "repo": "https://plugins.svn.wordpress.org/ovic-vc-addon", + "vendor": "Ovic Team", + "versions": [ + { + "lessThanOrEqual": "1.3.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a06147c7-a96e-4f12-9a67-23ca82b09942?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32149.json b/data/anchore/2024/CVE-2024-32149.json new file mode 100644 index 00000000..83162a44 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32149.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32149", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:blueglass:jobs_for_wordpress:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "job-postings", + "product": "Jobs for WordPress", + "repo": "https://plugins.svn.wordpress.org/job-postings", + "vendor": "BlueGlass", + "versions": [ + { + "lessThan": "2.7.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7fe412b3-038b-4cc7-88e9-d30f719273ab?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32429.json b/data/anchore/2024/CVE-2024-32429.json new file mode 100644 index 00000000..0a074a94 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32429.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32429", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpchill:remove_footer_credit:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "remove-footer-credit", + "product": "Remove Footer Credit", + "repo": "https://plugins.svn.wordpress.org/remove-footer-credit", + "vendor": "WPChill", + "versions": [ + { + "lessThan": "1.0.14", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d97ba75a-278d-4239-bfcf-53b5396fe321?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32430.json b/data/anchore/2024/CVE-2024-32430.json new file mode 100644 index 00000000..45e18b6a --- /dev/null +++ b/data/anchore/2024/CVE-2024-32430.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32430", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:activecampaign:activecampaign:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "activecampaign-subscription-forms", + "product": "ActiveCampaign", + "repo": "https://plugins.svn.wordpress.org/activecampaign-subscription-forms", + "vendor": "ActiveCampaign", + "versions": [ + { + "lessThan": "8.1.15", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a3232aaa-189d-42cd-8eec-c167c6aa65f4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32434.json b/data/anchore/2024/CVE-2024-32434.json new file mode 100644 index 00000000..efefb20a --- /dev/null +++ b/data/anchore/2024/CVE-2024-32434.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32434", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tychesoftwares:order_delivery_date_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "order-delivery-date-for-woocommerce", + "product": "Order Delivery Date for WooCommerce", + "repo": "https://plugins.svn.wordpress.org/order-delivery-date-for-woocommerce", + "vendor": "Tyche Softwares", + "versions": [ + { + "lessThan": "3.21.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32436.json b/data/anchore/2024/CVE-2024-32436.json new file mode 100644 index 00000000..731871de --- /dev/null +++ b/data/anchore/2024/CVE-2024-32436.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32436", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:codemenschen:gift_vouchers:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "gift-voucher", + "product": "Gift Vouchers", + "repo": "https://plugins.svn.wordpress.org/gift-voucher", + "vendor": "Codemenschen", + "versions": [ + { + "lessThan": "4.4.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d86c720b-ede6-4789-ba83-2d035e1641bf?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32437.json b/data/anchore/2024/CVE-2024-32437.json new file mode 100644 index 00000000..7311c794 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32437.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32437", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:implecode:ecommerce_product_catalog:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ecommerce-product-catalog", + "product": "eCommerce Product Catalog", + "repo": "https://plugins.svn.wordpress.org/ecommerce-product-catalog", + "vendor": "impleCode", + "versions": [ + { + "lessThan": "3.3.29", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e5c0ff52-57c2-447f-bb22-2079607c3217?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32438.json b/data/anchore/2024/CVE-2024-32438.json new file mode 100644 index 00000000..8c80732e --- /dev/null +++ b/data/anchore/2024/CVE-2024-32438.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32438", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:cleverplugins:seo_booster:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "seo-booster", + "product": "SEO Booster", + "repo": "https://plugins.svn.wordpress.org/seo-booster", + "vendor": "cleverplugins.com", + "versions": [ + { + "lessThan": "3.8.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4a87c261-5452-48c9-ab4a-2cf6af0fef56?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32439.json b/data/anchore/2024/CVE-2024-32439.json new file mode 100644 index 00000000..56d2e61c --- /dev/null +++ b/data/anchore/2024/CVE-2024-32439.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32439", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:switchwp:wp_client_reports:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-client-reports", + "product": "WP Client Reports", + "repo": "https://plugins.svn.wordpress.org/wp-client-reports", + "vendor": "SwitchWP", + "versions": [ + { + "lessThan": "1.0.23", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd95f517-baf6-4feb-a9a5-f73008634dd4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32440.json b/data/anchore/2024/CVE-2024-32440.json new file mode 100644 index 00000000..e33a1e24 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32440.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32440", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:asgaros:asgaros_forum:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "asgaros-forum", + "product": "Asgaros Forum", + "repo": "https://plugins.svn.wordpress.org/asgaros-forum", + "vendor": "Thomas Belser", + "versions": [ + { + "lessThan": "2.9.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/146b4d69-70bc-4843-b76c-d91de0cefc9d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32443.json b/data/anchore/2024/CVE-2024-32443.json new file mode 100644 index 00000000..68b56c73 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32443.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32443", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ip2location:country_blocker:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ip2location-country-blocker", + "product": "Download IP2Location Country Blocker", + "repo": "https://plugins.svn.wordpress.org/ip2location-country-blocker", + "vendor": "IP2Location", + "versions": [ + { + "lessThan": "2.34.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e8d038d-8e2d-442d-932d-0fd31a8c501c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32445.json b/data/anchore/2024/CVE-2024-32445.json new file mode 100644 index 00000000..36075fb0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32445.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32445", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:saleswonder:webinar_ignition:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:saleswonder:webinarignition:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "webinar-ignition", + "product": "WebinarIgnition", + "repo": "https://plugins.svn.wordpress.org/webinar-ignition", + "vendor": "Saleswonder Team", + "versions": [ + { + "lessThan": "3.06.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0cef43a2-7917-4abd-b8f5-4a7604eadb70?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32447.json b/data/anchore/2024/CVE-2024-32447.json new file mode 100644 index 00000000..5aac3d1e --- /dev/null +++ b/data/anchore/2024/CVE-2024-32447.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32447", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:awpcp:another_wordpress_classifieds_plugin:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "another-wordpress-classifieds-plugin", + "product": "AWP Classifieds", + "repo": "https://plugins.svn.wordpress.org/another-wordpress-classifieds-plugin", + "vendor": "AWP Classifieds Team", + "versions": [ + { + "lessThan": "4.3.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec395e79-b82a-45c3-a704-a15a5efaf26d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32451.json b/data/anchore/2024/CVE-2024-32451.json new file mode 100644 index 00000000..c4d57158 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32451.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32451", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpwax:legal_pages:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "legal-pages", + "product": "Legal Pages", + "repo": "https://plugins.svn.wordpress.org/legal-pages", + "vendor": "wpWax", + "versions": [ + { + "lessThan": "1.4.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9b8dc6f3-0ffc-4317-a32f-14dd7c301d30?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32452.json b/data/anchore/2024/CVE-2024-32452.json new file mode 100644 index 00000000..41f782f5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32452.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32452", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpeasycart:wp_easycart:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-easycart", + "product": "WP EasyCart", + "repo": "https://plugins.svn.wordpress.org/wp-easycart", + "vendor": "WP EasyCart", + "versions": [ + { + "lessThan": "5.6.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6f21955b-1fd2-4d92-acfd-07fc1ff194fa?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32453.json b/data/anchore/2024/CVE-2024-32453.json new file mode 100644 index 00000000..d1494618 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32453.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32453", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:poeditor:poeditor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "poeditor", + "product": "POEditor", + "repo": "https://plugins.svn.wordpress.org/poeditor", + "vendor": "POEditor", + "versions": [ + { + "lessThan": "0.9.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7b848b66-1dcd-4357-b472-4b7a27d2682f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32505.json b/data/anchore/2024/CVE-2024-32505.json new file mode 100644 index 00000000..49c2a856 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32505.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32505", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpmet:elements_kit_elementor_addons:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "elementskit-lite", + "product": "Elements kit Elementor addons", + "repo": "https://plugins.svn.wordpress.org/elementskit-lite", + "vendor": "Wpmet", + "versions": [ + { + "lessThan": "3.0.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32508.json b/data/anchore/2024/CVE-2024-32508.json new file mode 100644 index 00000000..abc2cb28 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32508.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32508", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:dethemekit_for_elementor_project:dethemekit_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "dethemekit-for-elementor", + "product": "DethemeKit For Elementor", + "repo": "https://plugins.svn.wordpress.org/dethemekit-for-elementor", + "vendor": "deTheme", + "versions": [ + { + "lessThan": "2.1.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2132d5b4-583d-46c0-be5e-6664bee9cad2?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32513.json b/data/anchore/2024/CVE-2024-32513.json new file mode 100644 index 00000000..a3872cb2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32513.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32513", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:adtribes:product_feed_pro_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woo-product-feed-pro", + "product": "Product Feed PRO for WooCommerce", + "repo": "https://plugins.svn.wordpress.org/woo-product-feed-pro", + "vendor": "AdTribes.io", + "versions": [ + { + "lessThan": "13.3.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c6edff9f-9876-4824-b057-8acbda861ffa?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32516.json b/data/anchore/2024/CVE-2024-32516.json new file mode 100644 index 00000000..36578064 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32516.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32516", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:palscode:multi_currency_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wc-multi-currency", + "product": "Multi Currency For WooCommerce", + "repo": "https://plugins.svn.wordpress.org/wc-multi-currency", + "vendor": "Palscode", + "versions": [ + { + "lessThan": "1.5.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e97bc3a8-ce82-47c2-9ff1-174b2656a296?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32519.json b/data/anchore/2024/CVE-2024-32519.json new file mode 100644 index 00000000..cff2cafd --- /dev/null +++ b/data/anchore/2024/CVE-2024-32519.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32519", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:gutengeek:gg_woo_feed:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "gg-woo-feed", + "product": "GG Woo Feed for WooCommerce", + "repo": "https://plugins.svn.wordpress.org/gg-woo-feed", + "vendor": "GutenGeek", + "versions": [ + { + "lessThan": "1.2.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e65bafd-471a-498a-a6ac-1bc87d25de67?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32528.json b/data/anchore/2024/CVE-2024-32528.json new file mode 100644 index 00000000..976bb9b3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32528.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32528", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:seerox:wp_dynamic_keywords_injector:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-dynamic-keywords-injector", + "product": "WP Dynamic Keywords Injector", + "repo": "https://plugins.svn.wordpress.org/wp-dynamic-keywords-injector", + "vendor": "Seerox", + "versions": [ + { + "lessThan": "2.3.22", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/992f9f08-82c1-4bbd-bbd2-543ad8affe53?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32530.json b/data/anchore/2024/CVE-2024-32530.json new file mode 100644 index 00000000..9365bc1f --- /dev/null +++ b/data/anchore/2024/CVE-2024-32530.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32530", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:presstigers:simple_testimonials_showcase:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "simple-testimonials-showcase", + "product": "Simple Testimonials Showcase", + "repo": "https://plugins.svn.wordpress.org/simple-testimonials-showcase", + "vendor": "PressTigers", + "versions": [ + { + "lessThanOrEqual": "1.1.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/717dfceb-dc0b-45ef-bc06-72658486d1f1?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32534.json b/data/anchore/2024/CVE-2024-32534.json new file mode 100644 index 00000000..9817e6dd --- /dev/null +++ b/data/anchore/2024/CVE-2024-32534.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32534", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:10web:form_maker:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "form-maker", + "product": "Form Maker by 10Web", + "repo": "https://plugins.svn.wordpress.org/form-maker", + "vendor": "10Web Form Builder Team", + "versions": [ + { + "lessThan": "1.15.24", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8921ea7f-5e27-4f05-b338-1c16366a8c8e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32549.json b/data/anchore/2024/CVE-2024-32549.json new file mode 100644 index 00000000..80c6ad6c --- /dev/null +++ b/data/anchore/2024/CVE-2024-32549.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32549", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:never5:related_posts:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "microkids-related-posts", + "product": "Related Posts for WordPress", + "repo": "https://plugins.svn.wordpress.org/microkids-related-posts", + "vendor": "Microkid", + "versions": [ + { + "lessThanOrEqual": "4.0.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/308c9d72-4739-4fcd-8e04-b24edc19ec06?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32551.json b/data/anchore/2024/CVE-2024-32551.json new file mode 100644 index 00000000..6477212e --- /dev/null +++ b/data/anchore/2024/CVE-2024-32551.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32551", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:smartypantsplugins:sp_project_\\&_document_manager:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "sp-client-document-manager", + "product": "SP Project & Document Manager ", + "repo": "https://plugins.svn.wordpress.org/sp-client-document-manager", + "vendor": "Smartypants", + "versions": [ + { + "lessThanOrEqual": "4.71", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5d8e3832-b3ed-4687-94d8-8ba2c832584c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32552.json b/data/anchore/2024/CVE-2024-32552.json new file mode 100644 index 00000000..7e38f36b --- /dev/null +++ b/data/anchore/2024/CVE-2024-32552.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32552", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:taggbox:taggbox:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "taggbox-widget", + "product": "Taggbox", + "repo": "https://plugins.svn.wordpress.org/taggbox-widget", + "vendor": "Tagbox", + "versions": [ + { + "lessThan": "3.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/237fcdb7-aef9-4d35-baf4-7d382e8b7f3c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32557.json b/data/anchore/2024/CVE-2024-32557.json new file mode 100644 index 00000000..0ba992b5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32557.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32557", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:devscred:exclusive_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "exclusive-addons-for-elementor", + "product": "Exclusive Addons Elementor", + "repo": "https://plugins.svn.wordpress.org/exclusive-addons-for-elementor", + "vendor": "Exclusive Addons", + "versions": [ + { + "lessThan": "2.6.9.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32558.json b/data/anchore/2024/CVE-2024-32558.json new file mode 100644 index 00000000..ebccf795 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32558.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32558", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:implecode:ecommerce_product_catalog:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ecommerce-product-catalog", + "product": "eCommerce Product Catalog", + "repo": "https://plugins.svn.wordpress.org/ecommerce-product-catalog", + "vendor": "impleCode", + "versions": [ + { + "lessThan": "3.3.33", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dc15bc48-31f6-4829-8f9b-cd2d1c7c5280?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32559.json b/data/anchore/2024/CVE-2024-32559.json new file mode 100644 index 00000000..7175f197 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32559.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32559", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:hwk:wp_404_auto_redirect_to_similar_post:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-404-auto-redirect-to-similar-post", + "product": "WP 404 Auto Redirect to Similar Post", + "repo": "https://plugins.svn.wordpress.org/wp-404-auto-redirect-to-similar-post", + "vendor": "hwk-fr", + "versions": [ + { + "lessThan": "1.0.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/297b9605-602f-458f-8b36-a184cdbd20df?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32563.json b/data/anchore/2024/CVE-2024-32563.json new file mode 100644 index 00000000..0167dd2b --- /dev/null +++ b/data/anchore/2024/CVE-2024-32563.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32563", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:vikwp:vikbooking_hotel_booking_engine_\\&_pms:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "vikbooking", + "product": "VikBooking Hotel Booking Engine & PMS", + "repo": "https://plugins.svn.wordpress.org/vikbooking", + "vendor": "VikBooking Hotel Booking Engine & PMS", + "versions": [ + { + "lessThan": "1.6.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/364c8488-dab2-46bd-84b6-adfa59e2b013?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32564.json b/data/anchore/2024/CVE-2024-32564.json new file mode 100644 index 00000000..18a7746e --- /dev/null +++ b/data/anchore/2024/CVE-2024-32564.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32564", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpxpo:postx:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ultimate-post", + "product": "PostX – Gutenberg Blocks for Post Grid", + "repo": "https://plugins.svn.wordpress.org/ultimate-post", + "vendor": "Post Grid Team by WPXPO", + "versions": [ + { + "lessThan": "4.0.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cce4d44a-4613-4230-ace1-2d26c7c487b3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32566.json b/data/anchore/2024/CVE-2024-32566.json new file mode 100644 index 00000000..6848d1cd --- /dev/null +++ b/data/anchore/2024/CVE-2024-32566.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32566", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpclubmanager:wp_club_manager:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-club-manager", + "product": "WP Club Manager", + "repo": "https://plugins.svn.wordpress.org/wp-club-manager", + "vendor": "WP Club Manager", + "versions": [ + { + "lessThan": "2.2.12", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fb364d54-bd44-426f-8f11-8ee5a7527c5d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32568.json b/data/anchore/2024/CVE-2024-32568.json new file mode 100644 index 00000000..5f04fbf0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32568.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32568", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpwhitesecurity:wp_2fa:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-2fa", + "product": "WP 2FA", + "repo": "https://plugins.svn.wordpress.org/wp-2fa", + "vendor": "Melapress", + "versions": [ + { + "lessThan": "2.6.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8620d181-22f9-4054-9d5c-1b26a315d10c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32569.json b/data/anchore/2024/CVE-2024-32569.json new file mode 100644 index 00000000..586a99e3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32569.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32569", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metaphorcreations:ditty:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ditty-news-ticker", + "product": "Ditty", + "repo": "https://plugins.svn.wordpress.org/ditty-news-ticker", + "vendor": "Metaphor Creations", + "versions": [ + { + "lessThan": "3.1.32", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a3233f6f-7488-43ed-a626-b2150c5516fc?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32571.json b/data/anchore/2024/CVE-2024-32571.json new file mode 100644 index 00000000..591270d3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32571.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32571", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:noorsplugin:wp_stripe_checkout:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-stripe-checkout", + "product": "WP Stripe Checkout", + "repo": "https://plugins.svn.wordpress.org/wp-stripe-checkout", + "vendor": "naa986", + "versions": [ + { + "lessThan": "1.2.2.42", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fe5227f0-3f7f-4d31-8d46-de2eec44b514?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32573.json b/data/anchore/2024/CVE-2024-32573.json new file mode 100644 index 00000000..0c524c4c --- /dev/null +++ b/data/anchore/2024/CVE-2024-32573.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32573", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wplab:wp-lister_lite_for_ebay:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-lister-for-ebay", + "product": "WP-Lister Lite for eBay", + "repo": "https://plugins.svn.wordpress.org/wp-lister-for-ebay", + "vendor": "WP Lab", + "versions": [ + { + "lessThan": "3.6.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/613b4ad3-9aea-4c1c-9d73-1fb51da26477?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32574.json b/data/anchore/2024/CVE-2024-32574.json new file mode 100644 index 00000000..95be6320 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32574.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32574", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:freelancer-coder:wordpress_simple_html_sitemap:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-simple-html-sitemap", + "product": "WP Simple HTML Sitemap", + "repo": "https://plugins.svn.wordpress.org/wp-simple-html-sitemap", + "vendor": "Ashish Ajani", + "versions": [ + { + "lessThan": "2.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9a0bc461-d4fa-46d5-8725-9ab4c540b80e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32577.json b/data/anchore/2024/CVE-2024-32577.json new file mode 100644 index 00000000..7c09b941 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32577.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32577", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:codeboxr:cbx_bookmark_\\&_favorite:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "cbxwpbookmark", + "product": "CBX Bookmark & Favorite", + "repo": "https://plugins.svn.wordpress.org/cbxwpbookmark", + "vendor": "Codeboxr Team", + "versions": [ + { + "lessThan": "1.7.22", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/04a6f9f1-1a59-482c-8a42-6f41e4c41cb4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32578.json b/data/anchore/2024/CVE-2024-32578.json new file mode 100644 index 00000000..c6061834 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32578.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32578", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:10web:slider:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "slider-wd", + "product": "Slider by 10Web", + "repo": "https://plugins.svn.wordpress.org/slider-wd", + "vendor": "10Web", + "versions": [ + { + "lessThan": "1.2.55", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d24c65b6-20da-4f17-be9f-b8fbf5e721e3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32579.json b/data/anchore/2024/CVE-2024-32579.json new file mode 100644 index 00000000..b8fabb88 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32579.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32579", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:oracle:restaurant_menu_-_food_ordering_system_-_table_reservation:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "menu-ordering-reservations", + "product": "Restaurant Menu – Food Ordering System – Table Reservation", + "repo": "https://plugins.svn.wordpress.org/menu-ordering-reservations", + "vendor": "GloriaFood", + "versions": [ + { + "lessThan": "2.4.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/19202eb5-9a04-4484-8ca2-746610c31fe6?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32580.json b/data/anchore/2024/CVE-2024-32580.json new file mode 100644 index 00000000..57ae0150 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32580.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32580", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:averta:master_slider:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "master-slider", + "product": "Master Slider", + "repo": "https://plugins.svn.wordpress.org/master-slider", + "vendor": "Averta", + "versions": [ + { + "lessThan": "3.9.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cc4d09e3-487a-4f12-818a-72ae9a6f33c0?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32581.json b/data/anchore/2024/CVE-2024-32581.json new file mode 100644 index 00000000..b1ab5937 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32581.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32581", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:lenderd:mortgage_calculators_wp:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "mortgage-calculators-wp", + "product": "Mortgage Calculators WP", + "repo": "https://plugins.svn.wordpress.org/mortgage-calculators-wp", + "vendor": "Lenderd", + "versions": [ + { + "lessThan": "1.60", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f5a37df3-001b-4acd-91b1-7961896fb71f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32582.json b/data/anchore/2024/CVE-2024-32582.json new file mode 100644 index 00000000..fb56581d --- /dev/null +++ b/data/anchore/2024/CVE-2024-32582.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32582", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:bowo:debug_log_manager:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "debug-log-manager", + "product": "Debug Log Manager", + "repo": "https://plugins.svn.wordpress.org/debug-log-manager", + "vendor": "Bowo", + "versions": [ + { + "lessThan": "2.3.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/16d1eb4a-c68a-43b9-a514-d8751687709a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32583.json b/data/anchore/2024/CVE-2024-32583.json new file mode 100644 index 00000000..a87608ee --- /dev/null +++ b/data/anchore/2024/CVE-2024-32583.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32583", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "photo-gallery", + "product": "Photo Gallery by 10Web", + "repo": "https://plugins.svn.wordpress.org/photo-gallery", + "vendor": "Photo Gallery Team", + "versions": [ + { + "lessThan": "1.8.22", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32584.json b/data/anchore/2024/CVE-2024-32584.json new file mode 100644 index 00000000..375c1ce9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32584.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32584", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:standalonetech:terawallet:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "woo-wallet", + "product": "TeraWallet – For WooCommerce", + "repo": "https://plugins.svn.wordpress.org/woo-wallet", + "vendor": "StandaloneTech", + "versions": [ + { + "lessThan": "1.5.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1e35b077-8bb4-49fb-bd79-d9086d9a26dc?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32586.json b/data/anchore/2024/CVE-2024-32586.json new file mode 100644 index 00000000..3aedc46c --- /dev/null +++ b/data/anchore/2024/CVE-2024-32586.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32586", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:extendify:editorskit:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "block-options", + "product": "Gutenberg Block Editor Toolkit", + "repo": "https://plugins.svn.wordpress.org/block-options", + "vendor": "Munir Kamal", + "versions": [ + { + "lessThan": "1.40.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32587.json b/data/anchore/2024/CVE-2024-32587.json new file mode 100644 index 00000000..a736c1fa --- /dev/null +++ b/data/anchore/2024/CVE-2024-32587.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32587", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:donweb:envialosimple\\:*:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "envialosimple-email-marketing-y-newsletters-gratis", + "product": "EnvíaloSimple", + "repo": "https://plugins.svn.wordpress.org/envialosimple-email-marketing-y-newsletters-gratis", + "vendor": "EnvialoSimple", + "versions": [ + { + "lessThan": "2.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4dee07a1-9f48-4e8f-89dc-99270f55f17c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32588.json b/data/anchore/2024/CVE-2024-32588.json new file mode 100644 index 00000000..bebf9cbe --- /dev/null +++ b/data/anchore/2024/CVE-2024-32588.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32588", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "learnpress-import-export", + "product": "LearnPress Export Import", + "repo": "https://plugins.svn.wordpress.org/learnpress-import-export", + "vendor": "ThimPress", + "versions": [ + { + "lessThan": "4.0.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/096ea1e3-a6c3-43c7-94f0-6c5617dd3fa9?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32595.json b/data/anchore/2024/CVE-2024-32595.json new file mode 100644 index 00000000..4c88db25 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32595.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32595", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:matbao:wp_helper_premium:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-helper-lite", + "product": "WP Helper Premium", + "repo": "https://plugins.svn.wordpress.org/wp-helper-lite", + "vendor": "Mat Bao Corp", + "versions": [ + { + "lessThan": "4.6.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/faa3eb51-fdee-443e-aacb-04900f609efd?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32597.json b/data/anchore/2024/CVE-2024-32597.json new file mode 100644 index 00000000..f95d61d2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32597.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32597", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:xylusthemes:wp_smart_import:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-smart-import", + "product": "WordPress Importer", + "repo": "https://plugins.svn.wordpress.org/wp-smart-import", + "vendor": "Xylus Themes", + "versions": [ + { + "lessThan": "1.1.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/28bc0672-3469-4f58-860d-9e13da46804e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32599.json b/data/anchore/2024/CVE-2024-32599.json new file mode 100644 index 00000000..2368a9ca --- /dev/null +++ b/data/anchore/2024/CVE-2024-32599.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32599", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wp_dummy_content_generator_project:wp_dummy_content_generator:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-dummy-content-generator", + "product": "WP Dummy Content Generator", + "repo": "https://plugins.svn.wordpress.org/wp-dummy-content-generator", + "vendor": "Deepak anand", + "versions": [ + { + "lessThan": "3.3.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a2bda5d0-9589-4925-baa6-6e207e6fc978?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32600.json b/data/anchore/2024/CVE-2024-32600.json new file mode 100644 index 00000000..76018554 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32600.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32600", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:averta:master_slider:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "master-slider", + "product": "Master Slider", + "repo": "https://plugins.svn.wordpress.org/master-slider", + "vendor": "Averta", + "versions": [ + { + "lessThan": "3.9.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c1b93229-55ef-4216-8d48-35e8b6506c19?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32601.json b/data/anchore/2024/CVE-2024-32601.json new file mode 100644 index 00000000..7b2dff8f --- /dev/null +++ b/data/anchore/2024/CVE-2024-32601.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32601", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:essentialplugin:popup_anything:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "popup-anything-on-click", + "product": "Popup Anything", + "repo": "https://plugins.svn.wordpress.org/popup-anything-on-click", + "vendor": "WP OnlineSupport, Essential Plugin", + "versions": [ + { + "lessThan": "2.8.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/012b5334-afdc-47bd-8eaf-967b40fef59b?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32679.json b/data/anchore/2024/CVE-2024-32679.json new file mode 100644 index 00000000..d122e905 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32679.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32679", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tammersoft:shared_files:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "shared-files", + "product": "Shared Files", + "repo": "https://plugins.svn.wordpress.org/shared-files", + "vendor": "Shared Files PRO", + "versions": [ + { + "lessThan": "1.7.17", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/560cd314-e442-4284-948f-e654445e0765?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32683.json b/data/anchore/2024/CVE-2024-32683.json new file mode 100644 index 00000000..51dffae9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32683.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32683", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpmet:wp_ultimate_review:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-ultimate-review", + "product": "Wp Ultimate Review", + "repo": "https://plugins.svn.wordpress.org/wp-ultimate-review", + "vendor": "Wpmet", + "versions": [ + { + "lessThan": "2.3.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b813f3d8-b765-4cf5-aec0-786140e2a0ce?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32684.json b/data/anchore/2024/CVE-2024-32684.json new file mode 100644 index 00000000..77bc1635 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32684.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32684", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpmet:wp_ultimate_review:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-ultimate-review", + "product": "Wp Ultimate Review", + "repo": "https://plugins.svn.wordpress.org/wp-ultimate-review", + "vendor": "Wpmet", + "versions": [ + { + "lessThan": "2.3.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/15349295-4ee7-4746-ae34-200ffd24aa82?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32686.json b/data/anchore/2024/CVE-2024-32686.json new file mode 100644 index 00000000..2be6210e --- /dev/null +++ b/data/anchore/2024/CVE-2024-32686.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32686", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:backupbliss:backup_migration:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "backup-backup", + "product": "Backup Migration", + "repo": "https://plugins.svn.wordpress.org/backup-backup", + "vendor": "Inisev", + "versions": [ + { + "lessThan": "1.4.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/af870e80-ad9e-4f45-952f-9ffb07ceca9c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32690.json b/data/anchore/2024/CVE-2024-32690.json new file mode 100644 index 00000000..4607bfc5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32690.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32690", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:rss_feed_widget_project:rss_feed_widget:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "rss-feed-widget", + "product": "RSS Feed Widget", + "repo": "https://plugins.svn.wordpress.org/rss-feed-widget", + "vendor": "Fahad Mahmood", + "versions": [ + { + "lessThan": "2.9.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c468a56c-4411-49fc-8014-fc9b71a645c3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32691.json b/data/anchore/2024/CVE-2024-32691.json new file mode 100644 index 00000000..e2988803 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32691.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32691", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pluginus:woot:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "profit-products-tables-for-woocommerce", + "product": "Active Products Tables for WooCommerce", + "repo": "https://plugins.svn.wordpress.org/profit-products-tables-for-woocommerce", + "vendor": "realmag777", + "versions": [ + { + "lessThan": "1.0.6.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1813aaca-3d5a-4650-8a8d-6b54311670f4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32694.json b/data/anchore/2024/CVE-2024-32694.json new file mode 100644 index 00000000..e6ac4943 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32694.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32694", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:creativeinteractivemedia:real3d_flipbook:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "real3d-flipbook-lite", + "product": "3D FlipBook, PDF Viewer, PDF Embedder – Real 3D FlipBook WordPress Plugin", + "repo": "https://plugins.svn.wordpress.org/real3d-flipbook-lite", + "vendor": "Creative interactive media", + "versions": [ + { + "lessThan": "3.63", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c496a5f8-9cfc-49b3-b360-d942d554b860?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32696.json b/data/anchore/2024/CVE-2024-32696.json new file mode 100644 index 00000000..64078b62 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32696.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32696", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:quantumcloud:infographic_maker:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "infographic-and-list-builder-ilist", + "product": "Infographic Maker – iList", + "repo": "https://plugins.svn.wordpress.org/infographic-and-list-builder-ilist", + "vendor": "QuantumCloud", + "versions": [ + { + "lessThan": "4.6.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/918c418a-9d86-461d-91cb-33d04010c577?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32698.json b/data/anchore/2024/CVE-2024-32698.json new file mode 100644 index 00000000..8582e7ca --- /dev/null +++ b/data/anchore/2024/CVE-2024-32698.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32698", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wedevs:happy_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "happy-elementor-addons", + "product": "Happy Addons for Elementor", + "repo": "https://plugins.svn.wordpress.org/happy-elementor-addons", + "vendor": "Leevio", + "versions": [ + { + "lessThan": "3.10.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32707.json b/data/anchore/2024/CVE-2024-32707.json new file mode 100644 index 00000000..da3c44f8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32707.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32707", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ghozylab:image_slider:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "image-slider-widget", + "product": "Image Slider Widget", + "repo": "https://plugins.svn.wordpress.org/image-slider-widget", + "vendor": "GhozyLab", + "versions": [ + { + "lessThan": "1.1.127", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a7826d47-8799-446f-af3c-df2724fb26ef?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32711.json b/data/anchore/2024/CVE-2024-32711.json new file mode 100644 index 00000000..e00fe28a --- /dev/null +++ b/data/anchore/2024/CVE-2024-32711.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32711", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mycred:mycred:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "mycred", + "product": "myCred", + "repo": "https://plugins.svn.wordpress.org/mycred", + "vendor": "myCred", + "versions": [ + { + "lessThan": "2.6.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f3d4283e-ea57-41e1-baeb-f8f70cad3020?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32721.json b/data/anchore/2024/CVE-2024-32721.json new file mode 100644 index 00000000..6e225fcf --- /dev/null +++ b/data/anchore/2024/CVE-2024-32721.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32721", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:jegtheme:jeg_elementor_kit:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "jeg-elementor-kit", + "product": "Jeg Elementor Kit", + "repo": "https://plugins.svn.wordpress.org/jeg-elementor-kit", + "vendor": "Jegtheme", + "versions": [ + { + "lessThan": "2.6.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32723.json b/data/anchore/2024/CVE-2024-32723.json new file mode 100644 index 00000000..5da2e8e6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32723.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32723", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:codetides:advanced_floating_content:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "advanced-floating-content-lite", + "product": "Advanced Floating Content", + "repo": "https://plugins.svn.wordpress.org/advanced-floating-content-lite", + "vendor": "Code Tides", + "versions": [ + { + "lessThan": "1.2.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a798ffe0-b81d-4c5f-a864-ed72a5312a16?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32728.json b/data/anchore/2024/CVE-2024-32728.json new file mode 100644 index 00000000..334be9eb --- /dev/null +++ b/data/anchore/2024/CVE-2024-32728.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32728", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:cozmoslabs:membership_\\&_content_restriction_-_paid_member_subscriptions:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "paid-member-subscriptions", + "product": "Paid Member Subscriptions", + "repo": "https://plugins.svn.wordpress.org/paid-member-subscriptions", + "vendor": "Cozmoslabs", + "versions": [ + { + "lessThan": "2.11.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce4ac97d-7eb3-4005-b75a-0fe32e31fa92?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32772.json b/data/anchore/2024/CVE-2024-32772.json new file mode 100644 index 00000000..4c9cf637 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32772.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32772", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "profilegrid-user-profiles-groups-and-communities", + "product": "ProfileGrid ", + "repo": "https://plugins.svn.wordpress.org/profilegrid-user-profiles-groups-and-communities", + "vendor": "Metagauss", + "versions": [ + { + "lessThan": "5.8.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a5be103f-e174-47f9-8a1b-bb0d073c54e4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32773.json b/data/anchore/2024/CVE-2024-32773.json new file mode 100644 index 00000000..96938077 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32773.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32773", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/themes", + "cpes": [ + "cpe:2.3:a:royal-elementor-addons:royal_elementor_kit:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "royal-elementor-kit", + "product": "Royal Elementor Kit", + "repo": "https://themes.svn.wordpress.org/royal-elementor-kit", + "vendor": "WP Royal", + "versions": [ + { + "lessThan": "1.0.117", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/90863334-9464-466b-bb32-870c78095ca4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32780.json b/data/anchore/2024/CVE-2024-32780.json new file mode 100644 index 00000000..ee5ebf98 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32780.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32780", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:e4jconnect:vikrentcar:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "vikrentcar", + "product": "VikRentCar", + "repo": "https://plugins.svn.wordpress.org/vikrentcar", + "vendor": "E4J s.r.l.", + "versions": [ + { + "lessThan": "1.3.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c01a8fbc-c16a-40e2-b628-f874cd3b21e4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32782.json b/data/anchore/2024/CVE-2024-32782.json new file mode 100644 index 00000000..aa58c923 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32782.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32782", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:hasthemes:ht_mega_-_absolute_addons_for_elementor_page_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ht-mega-for-elementor", + "product": "HT Mega", + "repo": "https://plugins.svn.wordpress.org/ht-mega-for-elementor", + "vendor": "HasThemes", + "versions": [ + { + "lessThan": "2.4.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/249ad768-3706-47c6-ad1d-f11900b87608?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32791.json b/data/anchore/2024/CVE-2024-32791.json new file mode 100644 index 00000000..2ced0413 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32791.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32791", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:leap13:premium_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "premium-addons-for-elementor", + "product": "Premium Addons for Elementor", + "repo": "https://plugins.svn.wordpress.org/premium-addons-for-elementor", + "vendor": "Leap13", + "versions": [ + { + "lessThan": "4.10.26", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2ce0e587-0312-4484-8f03-c82db67aba44?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32793.json b/data/anchore/2024/CVE-2024-32793.json new file mode 100644 index 00000000..cf6dddf4 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32793.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32793", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:strangerstudios:paid_memberships_pro:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "paid-memberships-pro", + "product": "Paid Memberships Pro", + "repo": "https://plugins.svn.wordpress.org/paid-memberships-pro", + "vendor": "Paid Memberships Pro", + "versions": [ + { + "lessThan": "3.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32794.json b/data/anchore/2024/CVE-2024-32794.json new file mode 100644 index 00000000..de0f8c65 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32794.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32794", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:strangerstudios:paid_memberships_pro:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "paid-memberships-pro", + "product": "Paid Memberships Pro", + "repo": "https://plugins.svn.wordpress.org/paid-memberships-pro", + "vendor": "Paid Memberships Pro", + "versions": [ + { + "lessThan": "3.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32796.json b/data/anchore/2024/CVE-2024-32796.json new file mode 100644 index 00000000..30d897a0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32796.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32796", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:verygoodplugins:wp_fusion:*:*:*:*:lite:wordpress:*:*" + ], + "packageName": "wp-fusion-lite", + "product": "WP Fusion Lite", + "repo": "https://plugins.svn.wordpress.org/wp-fusion-lite", + "vendor": "Very Good Plugins", + "versions": [ + { + "lessThan": "3.43.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1b245791-6aac-4ee3-9278-5b7c01f13263?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32808.json b/data/anchore/2024/CVE-2024-32808.json new file mode 100644 index 00000000..0517905f --- /dev/null +++ b/data/anchore/2024/CVE-2024-32808.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32808", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "profilegrid-user-profiles-groups-and-communities", + "product": "ProfileGrid ", + "repo": "https://plugins.svn.wordpress.org/profilegrid-user-profiles-groups-and-communities", + "vendor": "Metagauss", + "versions": [ + { + "lessThan": "5.8.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/09b26b78-b587-42f6-a9e3-c2945e91d29e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32812.json b/data/anchore/2024/CVE-2024-32812.json new file mode 100644 index 00000000..70db1d20 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32812.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32812", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "podlove-podcasting-plugin-for-wordpress", + "product": "Podlove Podcast Publisher", + "repo": "https://plugins.svn.wordpress.org/podlove-podcasting-plugin-for-wordpress", + "vendor": "Podlove", + "versions": [ + { + "lessThan": "4.0.12", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/35f82406-f75d-4510-81c0-14af3d944bf0?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32816.json b/data/anchore/2024/CVE-2024-32816.json new file mode 100644 index 00000000..ee27007c --- /dev/null +++ b/data/anchore/2024/CVE-2024-32816.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32816", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pickplugins:post_grid_combo:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "post-grid", + "product": "Post Grid", + "repo": "https://plugins.svn.wordpress.org/post-grid", + "vendor": "PickPlugins", + "versions": [ + { + "lessThan": "2.2.79", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fb057a32-0027-4ca6-b65e-8634509c9a81?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32817.json b/data/anchore/2024/CVE-2024-32817.json new file mode 100644 index 00000000..955c85ed --- /dev/null +++ b/data/anchore/2024/CVE-2024-32817.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32817", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:codection:import_and_export_users_and_customers:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "import-users-from-csv-with-meta", + "product": "Import and export users and customers", + "repo": "https://plugins.svn.wordpress.org/import-users-from-csv-with-meta", + "versions": [ + { + "lessThan": "1.26.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f56494b7-0552-42d3-b3c6-fe26096f6cf5?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32822.json b/data/anchore/2024/CVE-2024-32822.json new file mode 100644 index 00000000..00fcb59e --- /dev/null +++ b/data/anchore/2024/CVE-2024-32822.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32822", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:implecode:reviews_plus:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "reviews-plus", + "product": "Reviews Plus", + "repo": "https://plugins.svn.wordpress.org/reviews-plus", + "vendor": "impleCode", + "versions": [ + { + "lessThan": "1.3.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6c3fe739-eed0-432c-8608-50dc08ef1456?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32823.json b/data/anchore/2024/CVE-2024-32823.json new file mode 100644 index 00000000..ced1686c --- /dev/null +++ b/data/anchore/2024/CVE-2024-32823.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32823", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:blazzdev:rate_my_post:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "rate-my-post", + "product": "Rate my Post – WP Rating System", + "repo": "https://plugins.svn.wordpress.org/rate-my-post", + "vendor": "FeedbackWP", + "versions": [ + { + "lessThan": "3.4.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e679b853-3207-47c9-9cbe-d3ce3826cd00?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32826.json b/data/anchore/2024/CVE-2024-32826.json new file mode 100644 index 00000000..e61f8cf1 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32826.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32826", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:vektor-inc:vk_block_patterns:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "vk-block-patterns", + "product": "VK Block Patterns", + "repo": "https://plugins.svn.wordpress.org/vk-block-patterns", + "vendor": "Vektor,Inc.", + "versions": [ + { + "lessThan": "1.31.1.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/90c0be4a-1146-4a17-918e-ed5362bde022?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32829.json b/data/anchore/2024/CVE-2024-32829.json new file mode 100644 index 00000000..57ee523f --- /dev/null +++ b/data/anchore/2024/CVE-2024-32829.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32829", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:supsystic:data_tables_generator:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "data-tables-generator-by-supsystic", + "product": "Data Tables Generator by Supsystic", + "repo": "https://plugins.svn.wordpress.org/data-tables-generator-by-supsystic", + "vendor": "Supsystic", + "versions": [ + { + "lessThan": "1.10.32", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c61b3a7-25a9-4890-a294-378883ebe11d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32835.json b/data/anchore/2024/CVE-2024-32835.json new file mode 100644 index 00000000..0a603aff --- /dev/null +++ b/data/anchore/2024/CVE-2024-32835.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32835", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:webtoffee:import_export_wordpress_users:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "users-customers-import-export-for-wp-woocommerce", + "product": "Import Export WordPress Users", + "repo": "https://plugins.svn.wordpress.org/users-customers-import-export-for-wp-woocommerce", + "vendor": "WebToffee", + "versions": [ + { + "lessThan": "2.5.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3f7a5e27-af7e-4e32-be9b-08e1133bb323?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32836.json b/data/anchore/2024/CVE-2024-32836.json new file mode 100644 index 00000000..da447c99 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32836.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32836", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wplab:wp-lister_lite_for_ebay:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-lister-for-ebay", + "product": "WP-Lister Lite for eBay", + "repo": "https://plugins.svn.wordpress.org/wp-lister-for-ebay", + "vendor": "WP Lab", + "versions": [ + { + "lessThan": "3.6.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7179fe0d-8cfa-4b43-82d6-5523d65ff780?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32948.json b/data/anchore/2024/CVE-2024-32948.json new file mode 100644 index 00000000..e674ecc0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32948.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32948", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:armemberplugin:armember:*:*:*:*:-:wordpress:*:*", + "cpe:2.3:a:armemberplugin:armember:*:*:*:*:premium:wordpress:*:*", + "cpe:2.3:a:reputeinfosystems:armember:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "armember-membership", + "product": "ARMember", + "repo": "https://plugins.svn.wordpress.org/armember-membership", + "vendor": "Repute Infosystems", + "versions": [ + { + "lessThan": "4.0.29", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eb4487e3-4276-4a7e-bf6f-e8ec49bb29f2?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32953.json b/data/anchore/2024/CVE-2024-32953.json new file mode 100644 index 00000000..917e8244 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32953.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32953", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tribulant:newsletters:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "newsletters-lite", + "product": "Newsletters", + "repo": "https://plugins.svn.wordpress.org/newsletters-lite", + "versions": [ + { + "lessThan": "4.9.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/867f374c-633f-4384-aa2b-5bb8daa5b7a2?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32954.json b/data/anchore/2024/CVE-2024-32954.json new file mode 100644 index 00000000..b2e27fd4 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32954.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32954", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tribulant:newsletters:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "newsletters-lite", + "product": "Newsletters", + "repo": "https://plugins.svn.wordpress.org/newsletters-lite", + "vendor": "Tribulant", + "versions": [ + { + "lessThan": "4.9.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ead5b943-731d-484a-a6b0-ca4f27eccff0?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32955.json b/data/anchore/2024/CVE-2024-32955.json new file mode 100644 index 00000000..45265078 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32955.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32955", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:foliovision:fv_flowplayer_video_player:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "fv-wordpress-flowplayer", + "product": "FV Flowplayer Video Player", + "repo": "https://plugins.svn.wordpress.org/fv-wordpress-flowplayer", + "vendor": "Foliovision", + "versions": [ + { + "lessThan": "7.5.45.7212", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e3eec839-9009-48de-80c8-911dc9b545ba?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32957.json b/data/anchore/2024/CVE-2024-32957.json new file mode 100644 index 00000000..7bcffcb2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32957.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32957", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:blueastral:page_builder\\:*:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:livecomposerplugin:live-composer-page-builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "live-composer-page-builder", + "product": "Page Builder: Live Composer", + "repo": "https://plugins.svn.wordpress.org/live-composer-page-builder", + "vendor": "Live Composer Team", + "versions": [ + { + "lessThan": "1.5.39", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4e8b8689-ab6a-426b-9aba-4fa14c455ff1?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32961.json b/data/anchore/2024/CVE-2024-32961.json new file mode 100644 index 00000000..30ac06fc --- /dev/null +++ b/data/anchore/2024/CVE-2024-32961.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-32961", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/themes", + "cpes": [ + "cpe:2.3:a:creativethemes:blocksy:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "blocksy", + "product": "Blocksy", + "repo": "https://themes.svn.wordpress.org/blocksy", + "vendor": "Creative Themes HQ", + "versions": [ + { + "lessThan": "2.0.34", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/030ec6bb-f19d-4145-b3fb-bd647c154666?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33538.json b/data/anchore/2024/CVE-2024-33538.json new file mode 100644 index 00000000..749d6e17 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33538.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33538", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:fastlinemedia:assistant:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "assistant", + "product": "Assistant – Every Day Productivity Apps", + "repo": "https://plugins.svn.wordpress.org/assistant", + "vendor": "Fastline Media LLC", + "versions": [ + { + "lessThan": "1.4.9.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4b5a3655-067f-4ef1-baf5-2bbc9719a8cd?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33542.json b/data/anchore/2024/CVE-2024-33542.json new file mode 100644 index 00000000..22b2e2f1 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33542.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33542", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:crelly_slider_project:crelly_slider:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "crelly-slider", + "product": "Crelly Slider", + "repo": "https://plugins.svn.wordpress.org/crelly-slider", + "vendor": "Fabio Rinaldi", + "versions": [ + { + "lessThanOrEqual": "1.4.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4acc1fd2-0024-4c35-b8c6-94203b91e985?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33570.json b/data/anchore/2024/CVE-2024-33570.json new file mode 100644 index 00000000..60d4e3ae --- /dev/null +++ b/data/anchore/2024/CVE-2024-33570.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33570", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpmet:metform_elementor_contact_form_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "metform", + "product": "Metform Elementor Contact Form Builder", + "repo": "https://plugins.svn.wordpress.org/metform", + "vendor": "Wpmet", + "versions": [ + { + "lessThan": "3.8.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/996d1514-2c1f-4888-ac2f-bc58e926d3ef?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33575.json b/data/anchore/2024/CVE-2024-33575.json new file mode 100644 index 00000000..0ae12ed2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33575.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33575", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:user-meta:user_meta_user_profile_builder_and_user_management:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "user-meta", + "product": "User Meta", + "repo": "https://plugins.svn.wordpress.org/user-meta", + "vendor": "User Meta", + "versions": [ + { + "lessThan": "3.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/662fcf6c-1095-4cea-949f-91af8fba1e47?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33576.json b/data/anchore/2024/CVE-2024-33576.json new file mode 100644 index 00000000..c01d1a86 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33576.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33576", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wp-pizza:wppizza:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wppizza", + "product": "WPPizza", + "repo": "https://plugins.svn.wordpress.org/wppizza", + "vendor": "Ollybach", + "versions": [ + { + "lessThan": "3.18.11", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ecc00cbc-ec65-4664-8ec6-8cfb47196ec1?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33584.json b/data/anchore/2024/CVE-2024-33584.json new file mode 100644 index 00000000..bd939176 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33584.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33584", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:imdpen:video_conferencing_with_zoom:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:video_conferencing_with_zoom_project:video_conferencing_with_zoom:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "video-conferencing-with-zoom-api", + "product": "Video Conferencing with Zoom", + "repo": "https://plugins.svn.wordpress.org/video-conferencing-with-zoom-api", + "vendor": "Deepen Bajracharya", + "versions": [ + { + "lessThan": "4.4.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/14da4735-894e-408a-864b-cdc76feacde9?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33586.json b/data/anchore/2024/CVE-2024-33586.json new file mode 100644 index 00000000..744130ad --- /dev/null +++ b/data/anchore/2024/CVE-2024-33586.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33586", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "photo-gallery", + "product": "Photo Gallery by 10Web", + "repo": "https://plugins.svn.wordpress.org/photo-gallery", + "vendor": "Photo Gallery Team", + "versions": [ + { + "lessThan": "1.8.21", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7897ebc7-3ede-465e-b037-86096eb4435a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33587.json b/data/anchore/2024/CVE-2024-33587.json new file mode 100644 index 00000000..7daf0d99 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33587.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33587", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ays-pro:secure_copy_content_protection_and_content_locking:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "secure-copy-content-protection", + "product": "Secure Copy Content Protection and Content Locking", + "repo": "https://plugins.svn.wordpress.org/secure-copy-content-protection", + "vendor": "Copy Content Protection Team", + "versions": [ + { + "lessThan": "3.9.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0afc98b1-e1ee-4c77-89fc-9ccb045c6733?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33589.json b/data/anchore/2024/CVE-2024-33589.json new file mode 100644 index 00000000..0d84d96c --- /dev/null +++ b/data/anchore/2024/CVE-2024-33589.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33589", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:liquidweb:kb_support:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wpchill:kb_support:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "kb-support", + "product": "KB Support", + "repo": "https://plugins.svn.wordpress.org/kb-support", + "vendor": "WPOmnia", + "versions": [ + { + "lessThan": "1.6.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9148268a-1179-4bc5-b388-309cf08510d7?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33591.json b/data/anchore/2024/CVE-2024-33591.json new file mode 100644 index 00000000..c678cec6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33591.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33591", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:tipsandtricks-hq:easy_accept_payments_for_paypal:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wordpress-easy-paypal-payment-or-donation-accept-plugin", + "product": "Easy Accept Payments", + "repo": "https://plugins.svn.wordpress.org/wordpress-easy-paypal-payment-or-donation-accept-plugin", + "vendor": "Tips and Tricks HQ", + "versions": [ + { + "lessThan": "5.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd340ecc-d698-43e1-a15c-479088fb8cf4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33593.json b/data/anchore/2024/CVE-2024-33593.json new file mode 100644 index 00000000..043956bb --- /dev/null +++ b/data/anchore/2024/CVE-2024-33593.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33593", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:rednao:smart_forms:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "smart-forms", + "product": "Smart Forms", + "repo": "https://plugins.svn.wordpress.org/smart-forms", + "vendor": "RedNao", + "versions": [ + { + "lessThan": "2.6.92", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8a643fa1-afdb-4710-ba1c-3b226b4098bd?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33594.json b/data/anchore/2024/CVE-2024-33594.json new file mode 100644 index 00000000..51f283bf --- /dev/null +++ b/data/anchore/2024/CVE-2024-33594.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33594", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:zeen101:leaky_paywall:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "leaky-paywall", + "product": "Leaky Paywall", + "repo": "https://plugins.svn.wordpress.org/leaky-paywall", + "vendor": "Leaky Paywall", + "versions": [ + { + "lessThan": "4.20.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b9f627f0-779c-4d57-a471-ce742e3a5dd5?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33595.json b/data/anchore/2024/CVE-2024-33595.json new file mode 100644 index 00000000..a93a5475 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33595.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33595", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:jeweltheme:master_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "master-addons", + "product": "Master Addons for Elementor", + "repo": "https://plugins.svn.wordpress.org/master-addons", + "vendor": "Jewel Theme", + "versions": [ + { + "lessThan": "2.0.5.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e5c3d74-1240-4501-856f-18a1c6369d1c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33596.json b/data/anchore/2024/CVE-2024-33596.json new file mode 100644 index 00000000..d24bb7b5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33596.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33596", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:fivestarplugins:five_star_restaurant_menu:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "restaurant-reservations", + "product": "Five Star Restaurant Reservations", + "repo": "https://plugins.svn.wordpress.org/restaurant-reservations", + "vendor": "Five Star Plugins", + "versions": [ + { + "lessThan": "2.6.17", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/62a79a8e-905c-4bed-b24d-84e56d7bb850?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33598.json b/data/anchore/2024/CVE-2024-33598.json new file mode 100644 index 00000000..2cb18037 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33598.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33598", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:twinpictures:annual_archive:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "anual-archive", + "product": "Annual Archive", + "repo": "https://plugins.svn.wordpress.org/anual-archive", + "vendor": "Twinpictures", + "versions": [ + { + "lessThanOrEqual": "1.6.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/78f4709b-0560-48c6-a26c-d806311758a3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33627.json b/data/anchore/2024/CVE-2024-33627.json new file mode 100644 index 00000000..01dede27 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33627.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33627", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:cusmin:absolutely_glamorous_custom_admin:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ag-custom-admin", + "product": "Absolutely Glamorous Custom Admin", + "repo": "https://plugins.svn.wordpress.org/ag-custom-admin", + "vendor": "Cusmin", + "versions": [ + { + "lessThan": "7.2.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9fae8288-898a-4acd-bbdf-c2fd4f1be1c6?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33629.json b/data/anchore/2024/CVE-2024-33629.json new file mode 100644 index 00000000..8338e3ee --- /dev/null +++ b/data/anchore/2024/CVE-2024-33629.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33629", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:cm-wp:auto_featured_image:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "auto-post-thumbnail", + "product": "Auto Featured Image (Auto Post Thumbnail)", + "repo": "https://plugins.svn.wordpress.org/auto-post-thumbnail", + "vendor": "Creative Motion", + "versions": [ + { + "lessThanOrEqual": "4.0.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/309eb1df-728f-404d-a20d-a83a0ab8ed0c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33651.json b/data/anchore/2024/CVE-2024-33651.json new file mode 100644 index 00000000..5e408035 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33651.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33651", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mf_gig_calendar_project:mf_gig_calendar:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "mf-gig-calendar", + "product": "MF Gig Calendar ", + "repo": "https://plugins.svn.wordpress.org/mf-gig-calendar", + "vendor": "Matthew Fries", + "versions": [ + { + "lessThanOrEqual": "1.2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ae17154-bd68-4260-9b3a-bb73f2a70694?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33652.json b/data/anchore/2024/CVE-2024-33652.json new file mode 100644 index 00000000..b85ed364 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33652.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33652", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:realbigplugins:client_dash:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "client-dash", + "product": "Client Dash", + "repo": "https://plugins.svn.wordpress.org/client-dash", + "vendor": "Real Big Plugins", + "versions": [ + { + "lessThanOrEqual": "2.2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/af3105ed-d383-4ce6-9317-5762f97b14e3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33677.json b/data/anchore/2024/CVE-2024-33677.json new file mode 100644 index 00000000..0aa19d8f --- /dev/null +++ b/data/anchore/2024/CVE-2024-33677.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33677", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:renzojohnson:contact_form_7_extension_for_mailchimp:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "contact-form-7-mailchimp-extension", + "product": "Contact Form 7 Extension For Mailchimp", + "repo": "https://plugins.svn.wordpress.org/contact-form-7-mailchimp-extension", + "vendor": "Renzo Johnson", + "versions": [ + { + "lessThanOrEqual": "0.5.70", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f9f5be49-e099-4862-af9d-4ddbb6decfc5?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33680.json b/data/anchore/2024/CVE-2024-33680.json new file mode 100644 index 00000000..dd7f8384 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33680.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33680", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mainwp:mainwp_child_reports:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "mainwp-child-reports", + "product": "MainWP Child Reports", + "repo": "https://plugins.svn.wordpress.org/mainwp-child-reports", + "vendor": "MainWP", + "versions": [ + { + "lessThan": "2.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2edd9774-753b-49a4-9f7b-281829a1030e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33682.json b/data/anchore/2024/CVE-2024-33682.json new file mode 100644 index 00000000..da118c37 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33682.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33682", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:cookieinformation:wp-gdpr-compliance:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:van-ons:wp-gdpr-compliance:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-gdpr-compliance", + "product": "WP GDPR Compliance", + "repo": "https://plugins.svn.wordpress.org/wp-gdpr-compliance", + "vendor": "Cookie Information A/S", + "versions": [ + { + "lessThanOrEqual": "2.0.23", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/46fccb4e-8dd9-414d-bd65-e62acffee18d?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33684.json b/data/anchore/2024/CVE-2024-33684.json new file mode 100644 index 00000000..4d050bbf --- /dev/null +++ b/data/anchore/2024/CVE-2024-33684.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33684", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pdfcrowd:save_as_pdf:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "save-as-pdf-by-pdfcrowd", + "product": "Save as PDF plugin by Pdfcrowd", + "repo": "https://plugins.svn.wordpress.org/save-as-pdf-by-pdfcrowd", + "vendor": "Pdfcrowd", + "versions": [ + { + "lessThan": "3.2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d7e18997-90be-4fa4-aa4f-3b79544e00f5?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33689.json b/data/anchore/2024/CVE-2024-33689.json new file mode 100644 index 00000000..76d15349 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33689.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33689", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:netmix:radio_station:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "radio-station", + "product": "Radio Station", + "repo": "https://plugins.svn.wordpress.org/radio-station", + "vendor": "Tony Zeoli, Tony Hayes", + "versions": [ + { + "lessThan": "2.5.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8464a63f-db39-4a2c-b408-d7fd7539d6dc?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33691.json b/data/anchore/2024/CVE-2024-33691.json new file mode 100644 index 00000000..61b50511 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33691.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33691", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:optinmonster:optinmonster:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "optinmonster", + "product": "OptinMonster", + "repo": "https://plugins.svn.wordpress.org/optinmonster", + "vendor": "OptinMonster Popup Builder Team", + "versions": [ + { + "lessThan": "2.16.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f7ed53bd-08de-4ec9-a8dd-eef72b788359?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33693.json b/data/anchore/2024/CVE-2024-33693.json new file mode 100644 index 00000000..d746eca3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33693.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33693", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mekshq:meks_smart_social_widget:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "meks-smart-social-widget", + "product": "Meks Smart Social Widget", + "repo": "https://plugins.svn.wordpress.org/meks-smart-social-widget", + "vendor": "Meks", + "versions": [ + { + "lessThanOrEqual": "1.6.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/578ed437-98b7-495b-91fd-45b882f39d95?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33694.json b/data/anchore/2024/CVE-2024-33694.json new file mode 100644 index 00000000..84d7cf33 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33694.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33694", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mekshq:meks_themeforest_smart_widget:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "meks-themeforest-smart-widget", + "product": "Meks ThemeForest Smart Widget", + "repo": "https://plugins.svn.wordpress.org/meks-themeforest-smart-widget", + "vendor": "Meks", + "versions": [ + { + "lessThanOrEqual": "1.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/72eb1cd3-47cb-4d9b-9bfd-87fef7859974?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33907.json b/data/anchore/2024/CVE-2024-33907.json new file mode 100644 index 00000000..25f24b01 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33907.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33907", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:print_my_blog_project:print_my_blog:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "print-my-blog", + "product": "Print My Blog", + "repo": "https://plugins.svn.wordpress.org/print-my-blog", + "vendor": "Michael Nelson", + "versions": [ + { + "lessThan": "3.26.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4b6e1c70-a112-4564-9e18-bdc2a8028482?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33908.json b/data/anchore/2024/CVE-2024-33908.json new file mode 100644 index 00000000..6667f93b --- /dev/null +++ b/data/anchore/2024/CVE-2024-33908.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33908", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:themesgrove:all-in-one_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "widgetkit-for-elementor", + "product": "WidgetKit", + "repo": "https://plugins.svn.wordpress.org/widgetkit-for-elementor", + "vendor": "Themesgrove", + "versions": [ + { + "lessThanOrEqual": "2.5.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e809cd39-7bb0-475f-a2ae-c7bc4bdba63c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33910.json b/data/anchore/2024/CVE-2024-33910.json new file mode 100644 index 00000000..7da07e5f --- /dev/null +++ b/data/anchore/2024/CVE-2024-33910.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33910", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:supsystic:digital_publications_by_supsystic:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "digital-publications-by-supsystic", + "product": "Digital Publications by Supsystic", + "repo": "https://plugins.svn.wordpress.org/digital-publications-by-supsystic", + "vendor": "Supsystic", + "versions": [ + { + "lessThan": "1.7.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/763f0c23-49c8-4e7a-b1c1-d33eb5b1b7c2?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33911.json b/data/anchore/2024/CVE-2024-33911.json new file mode 100644 index 00000000..0f0c827a --- /dev/null +++ b/data/anchore/2024/CVE-2024-33911.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33911", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:weblizar:school_management:*:*:*:*:pro:wordpress:*:*" + ], + "product": "School Management Pro", + "vendor": "Weblizar", + "versions": [ + { + "lessThanOrEqual": "10.3.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/446522ea-7cf1-449b-b05c-58eb815142a4?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33912.json b/data/anchore/2024/CVE-2024-33912.json new file mode 100644 index 00000000..542eaa67 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33912.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33912", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:creativeitem:academy_lms:*:*:*:*:*:*:*:*" + ], + "packageName": "academy", + "product": "Academy LMS", + "repo": "https://plugins.svn.wordpress.org/academy", + "vendor": "Academy LMS", + "versions": [ + { + "lessThan": "1.9.17", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/248750b0-0fed-4c31-aeeb-709da3e7e2a1?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33914.json b/data/anchore/2024/CVE-2024-33914.json new file mode 100644 index 00000000..477f350d --- /dev/null +++ b/data/anchore/2024/CVE-2024-33914.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33914", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:devscred:exclusive_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "exclusive-addons-for-elementor", + "product": "Exclusive Addons Elementor", + "repo": "https://plugins.svn.wordpress.org/exclusive-addons-for-elementor", + "vendor": "Exclusive Addons", + "versions": [ + { + "lessThan": "2.6.9.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eae9b960-36b1-4b83-855a-d1beaa60a93f?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33915.json b/data/anchore/2024/CVE-2024-33915.json new file mode 100644 index 00000000..d01e251b --- /dev/null +++ b/data/anchore/2024/CVE-2024-33915.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33915", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:bowo:debug_log_manager:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "debug-log-manager", + "product": "Debug Log Manager", + "repo": "https://plugins.svn.wordpress.org/debug-log-manager", + "vendor": "Bowo", + "versions": [ + { + "lessThan": "2.3.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/48cb5d7b-afbc-4387-ad32-13d2fcb19061?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33916.json b/data/anchore/2024/CVE-2024-33916.json new file mode 100644 index 00000000..0267224b --- /dev/null +++ b/data/anchore/2024/CVE-2024-33916.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33916", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:machothemes:cpo_companion:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "cpo-companion", + "product": "CPO Companion", + "repo": "https://plugins.svn.wordpress.org/cpo-companion", + "vendor": "MachoThemes", + "versions": [ + { + "lessThanOrEqual": "1.1.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/920dbe31-ccbd-4ad9-9c5f-f7389c1b4318?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33920.json b/data/anchore/2024/CVE-2024-33920.json new file mode 100644 index 00000000..0538bdc7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33920.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33920", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wp-kama:democracy_poll:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "democracy-poll", + "product": "Democracy Poll", + "repo": "https://plugins.svn.wordpress.org/democracy-poll", + "vendor": "Kama", + "versions": [ + { + "lessThanOrEqual": "6.0.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b29144f7-08cb-4703-a977-4fece763abbd?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33921.json b/data/anchore/2024/CVE-2024-33921.json new file mode 100644 index 00000000..fa23286d --- /dev/null +++ b/data/anchore/2024/CVE-2024-33921.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33921", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpdeveloper:reviewx:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "reviewx", + "product": "ReviewX", + "repo": "https://plugins.svn.wordpress.org/reviewx", + "vendor": "ReviewX", + "versions": [ + { + "lessThan": "1.6.22", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/08f4445b-9c79-42e3-be45-d07f72c00a01?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33923.json b/data/anchore/2024/CVE-2024-33923.json new file mode 100644 index 00000000..395cdf63 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33923.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33923", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:smartypantsplugins:sp_project_\\&_document_manager:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "sp-client-document-manager", + "product": "SP Project & Document Manager ", + "repo": "https://plugins.svn.wordpress.org/sp-client-document-manager", + "vendor": "Smartypants", + "versions": [ + { + "lessThanOrEqual": "4.69", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c6d5a66-0eec-4a73-ad78-2b66a688c67a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33928.json b/data/anchore/2024/CVE-2024-33928.json new file mode 100644 index 00000000..9cc84545 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33928.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33928", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:codebard:codebard\\'s_patron_button_and_widgets_for_patreon:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "patron-button-and-widgets-by-codebard", + "product": "CodeBard's Patron Button and Widgets for Patreon", + "repo": "https://plugins.svn.wordpress.org/patron-button-and-widgets-by-codebard", + "vendor": "CodeBard", + "versions": [ + { + "lessThanOrEqual": "2.2.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/afff886c-92e6-41fc-9a88-befc158ad403?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33929.json b/data/anchore/2024/CVE-2024-33929.json new file mode 100644 index 00000000..4a00225b --- /dev/null +++ b/data/anchore/2024/CVE-2024-33929.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33929", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpwax:directorist:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "directorist", + "product": "Directorist", + "repo": "https://plugins.svn.wordpress.org/directorist", + "vendor": "wpWax", + "versions": [ + { + "lessThan": "7.9.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0655cd61-8ebe-47f8-a21b-6311c98a7193?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33930.json b/data/anchore/2024/CVE-2024-33930.json new file mode 100644 index 00000000..a840304a --- /dev/null +++ b/data/anchore/2024/CVE-2024-33930.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33930", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:share_this_image_project:share_this_image:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "share-this-image", + "product": "Share This Image", + "repo": "https://plugins.svn.wordpress.org/share-this-image", + "vendor": "ILLID", + "versions": [ + { + "lessThanOrEqual": "1.97", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/774776dc-3780-496c-907a-0d1f86a5d0ac?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33936.json b/data/anchore/2024/CVE-2024-33936.json new file mode 100644 index 00000000..14d48b1c --- /dev/null +++ b/data/anchore/2024/CVE-2024-33936.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33936", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:print-o-matic_project:print-o-matic:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "print-o-matic", + "product": "Print-O-Matic", + "repo": "https://plugins.svn.wordpress.org/print-o-matic", + "vendor": "Twinpictures", + "versions": [ + { + "lessThanOrEqual": "2.1.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/706549d9-aa2f-4b1e-83b8-0eea38654565?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33940.json b/data/anchore/2024/CVE-2024-33940.json new file mode 100644 index 00000000..af25a8d6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33940.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33940", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:myeventon:eventon-lite:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "eventon-lite", + "product": "EventON", + "repo": "https://plugins.svn.wordpress.org/eventon-lite", + "vendor": "Ashan Jay", + "versions": [ + { + "lessThanOrEqual": "2.2.14", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3a044983-1ec7-464b-aa5d-d479be45bb1a?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33941.json b/data/anchore/2024/CVE-2024-33941.json new file mode 100644 index 00000000..b517ad13 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33941.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33941", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ipanorama_360_wordpress_virtual_tour_builder_project:ipanorama_360_wordpress_virtual_tour_builder:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ipanorama-360-virtual-tour-builder-lite", + "product": "iPanorama 360 WordPress Virtual Tour Builder", + "repo": "https://plugins.svn.wordpress.org/ipanorama-360-virtual-tour-builder-lite", + "vendor": "Avirtum", + "versions": [ + { + "lessThan": "1.8.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/924145bb-d636-4184-8f3f-578c8b11e3a6?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-33947.json b/data/anchore/2024/CVE-2024-33947.json new file mode 100644 index 00000000..310b3730 --- /dev/null +++ b/data/anchore/2024/CVE-2024-33947.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-33947", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "custom-registration-form-builder-with-submission-manager", + "product": "RegistrationMagic", + "repo": "https://plugins.svn.wordpress.org/custom-registration-form-builder-with-submission-manager", + "vendor": "Metagauss", + "versions": [ + { + "lessThan": "5.3.2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/24f2eafc-c8eb-4d78-af5e-1a589d7e4d21?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34367.json b/data/anchore/2024/CVE-2024-34367.json new file mode 100644 index 00000000..4f424af6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34367.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-34367", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:ays-pro:popup_box:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ays-popup-box", + "product": "Popup box", + "repo": "https://plugins.svn.wordpress.org/ays-popup-box", + "vendor": "Popup Box Team", + "versions": [ + { + "lessThan": "4.1.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ffae2808-454e-4380-af83-b181cf2e8fbd?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34369.json b/data/anchore/2024/CVE-2024-34369.json new file mode 100644 index 00000000..374402a0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34369.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-34369", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:webpushr:web_push_notifications:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "webpushr-web-push-notifications", + "product": "Webpushr", + "repo": "https://plugins.svn.wordpress.org/webpushr-web-push-notifications", + "vendor": "Webpushr Web Push Notifications", + "versions": [ + { + "lessThan": "4.36.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/32348f79-232f-42e6-bbea-aba6203d9f26?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34371.json b/data/anchore/2024/CVE-2024-34371.json new file mode 100644 index 00000000..78bbbf05 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34371.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-34371", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:idehweb:login_with_phone_number:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "login-with-phone-number", + "product": "Login with phone number", + "repo": "https://plugins.svn.wordpress.org/login-with-phone-number", + "vendor": "Hamid Alinia – idehweb", + "versions": [ + { + "lessThan": "1.7.20", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2756dcf4-715f-4a7b-855c-7347455e0323?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34373.json b/data/anchore/2024/CVE-2024-34373.json new file mode 100644 index 00000000..a4fde34d --- /dev/null +++ b/data/anchore/2024/CVE-2024-34373.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-34373", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "cpe:2.3:a:posimyth:the_plus_addons_for_elementor_page_builder_lite:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "the-plus-addons-for-elementor-page-builder", + "product": "The Plus Addons for Elementor Page Builder Lite", + "repo": "https://plugins.svn.wordpress.org/the-plus-addons-for-elementor-page-builder", + "vendor": "POSIMYTH", + "versions": [ + { + "lessThan": "5.5.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34375.json b/data/anchore/2024/CVE-2024-34375.json new file mode 100644 index 00000000..620a26c0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34375.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-34375", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wppool:sheets_to_wp_table_live_sync:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "sheets-to-wp-table-live-sync", + "product": "Sheets To WP Table Live Sync", + "repo": "https://plugins.svn.wordpress.org/sheets-to-wp-table-live-sync", + "vendor": "WPPOOL", + "versions": [ + { + "lessThan": "3.7.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/45112069-9831-41d5-b868-8007ccfe9839?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34380.json b/data/anchore/2024/CVE-2024-34380.json new file mode 100644 index 00000000..106f2b11 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34380.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-34380", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:quantumcloud:conversational_forms_for_chatbot:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "conversational-forms", + "product": "Conversational Forms for ChatBot", + "repo": "https://plugins.svn.wordpress.org/conversational-forms", + "vendor": "QuantumCloud", + "versions": [ + { + "lessThan": "1.3.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f2251c72-cc98-477e-bd4d-0e134b86acce?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34381.json b/data/anchore/2024/CVE-2024-34381.json new file mode 100644 index 00000000..cdec1e7b --- /dev/null +++ b/data/anchore/2024/CVE-2024-34381.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-34381", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wp-property-hive:propertyhive:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "propertyhive", + "product": "PropertyHive", + "repo": "https://plugins.svn.wordpress.org/propertyhive", + "vendor": "PropertyHive", + "versions": [ + { + "lessThan": "2.0.11", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e9a0ca58-ddc1-43ec-bb08-7fd31f92e275?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34382.json b/data/anchore/2024/CVE-2024-34382.json new file mode 100644 index 00000000..372ed262 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34382.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-34382", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:robogallery:robo_gallery:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "robo-gallery", + "product": "Robo Gallery", + "repo": "https://plugins.svn.wordpress.org/robo-gallery", + "vendor": "RoboSoft", + "versions": [ + { + "lessThan": "3.2.19", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ae5779cc-b55b-4b8f-ae66-8607a689ef72?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34383.json b/data/anchore/2024/CVE-2024-34383.json new file mode 100644 index 00000000..c8dc426b --- /dev/null +++ b/data/anchore/2024/CVE-2024-34383.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-34383", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:seopress:seopress:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-seopress", + "product": "SEOPress", + "repo": "https://plugins.svn.wordpress.org/wp-seopress", + "vendor": "The SEO Guys at SEOPress", + "versions": [ + { + "lessThan": "7.7.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3c6ba21-7631-4bbd-b08e-926d2f129cc3?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34386.json b/data/anchore/2024/CVE-2024-34386.json new file mode 100644 index 00000000..48f023b2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34386.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-34386", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:autoaffiliatelinks:auto_affiliate_links:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-auto-affiliate-links", + "product": "Auto Affiliate Links", + "repo": "https://plugins.svn.wordpress.org/wp-auto-affiliate-links", + "vendor": "Lucian Apostol", + "versions": [ + { + "lessThan": "6.4.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d34b675-ff66-475e-b838-657dd51fc48c?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34548.json b/data/anchore/2024/CVE-2024-34548.json new file mode 100644 index 00000000..2b978b11 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34548.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-34548", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:themesgrove:all-in-one_addons_for_elementor:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "widgetkit-for-elementor", + "product": "WidgetKit", + "repo": "https://plugins.svn.wordpress.org/widgetkit-for-elementor", + "vendor": "Themesgrove", + "versions": [ + { + "lessThan": "2.5.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34558.json b/data/anchore/2024/CVE-2024-34558.json new file mode 100644 index 00000000..a953b91d --- /dev/null +++ b/data/anchore/2024/CVE-2024-34558.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-34558", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:pluginus:wolf_-_wordpress_posts_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "bulk-editor", + "product": "WOLF", + "repo": "https://plugins.svn.wordpress.org/bulk-editor", + "vendor": "realmag777", + "versions": [ + { + "lessThan": "1.0.8.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34561.json b/data/anchore/2024/CVE-2024-34561.json new file mode 100644 index 00000000..38e7fc90 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34561.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-34561", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:creativeinteractivemedia:real3d_flipbook:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "real3d-flipbook-lite", + "product": "3D FlipBook, PDF Viewer, PDF Embedder – Real 3D FlipBook WordPress Plugin", + "repo": "https://plugins.svn.wordpress.org/real3d-flipbook-lite", + "vendor": "Creative interactive media", + "versions": [ + { + "lessThan": "3.72", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34568.json b/data/anchore/2024/CVE-2024-34568.json new file mode 100644 index 00000000..8e0df66c --- /dev/null +++ b/data/anchore/2024/CVE-2024-34568.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-34568", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:themeqx:letterpress:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "letterpress", + "product": "LetterPress", + "repo": "https://plugins.svn.wordpress.org/letterpress", + "vendor": "Themeqx", + "versions": [ + { + "lessThanOrEqual": "1.2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34569.json b/data/anchore/2024/CVE-2024-34569.json new file mode 100644 index 00000000..7709aff1 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34569.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-34569", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:zotpress_project:zotpress:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "zotpress", + "product": "Zotpress", + "repo": "https://plugins.svn.wordpress.org/zotpress", + "vendor": "Katie Seaborn", + "versions": [ + { + "lessThan": "7.3.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-4433.json b/data/anchore/2024/CVE-2024-4433.json new file mode 100644 index 00000000..33c77912 --- /dev/null +++ b/data/anchore/2024/CVE-2024-4433.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-4433", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:mrdigital:simple_image_popup:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "simple-image-popup", + "product": "Simple Image Popup", + "repo": "https://plugins.svn.wordpress.org/simple-image-popup", + "vendor": "Mr Digital", + "versions": [ + { + "lessThanOrEqual": "2.4.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/13389191-cbda-4c39-8598-7c2b41f31da7?source=cve" + } + ] + } +} \ No newline at end of file