diff --git a/data/anchore/2023/CVE-2023-23991.json b/data/anchore/2023/CVE-2023-23991.json index 056285e7..c8fdae60 100644 --- a/data/anchore/2023/CVE-2023-23991.json +++ b/data/anchore/2023/CVE-2023-23991.json @@ -13,7 +13,9 @@ { "collectionURL": "https://wordpress.org/plugins", "cpes": [ - "cpe:2.3:a:wpbookingcalendar:booking_calendar:*:*:*:*:*:wordpress:*:*" + "cpe:2.3:a:booking_calendar_project:booking_calendar:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wpbookingcalendar:booking_calendar:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wpbookingcalendar:wp_booking_calendar:*:*:*:*:*:wordpress:*:*" ], "packageName": "booking", "packageType": "wordpress-plugin", diff --git a/data/anchore/2024/CVE-2024-10027.json b/data/anchore/2024/CVE-2024-10027.json index 3c7f6555..f4d913ce 100644 --- a/data/anchore/2024/CVE-2024-10027.json +++ b/data/anchore/2024/CVE-2024-10027.json @@ -14,11 +14,14 @@ "collectionURL": "https://wordpress.org/plugins", "cpes": [ "cpe:2.3:a:booking_calendar_project:booking_calendar:*:*:*:*:*:wordpress:*:*", - "cpe:2.3:a:wpbookingcalendar:booking_calendar:*:*:*:*:*:wordpress:*:*" + "cpe:2.3:a:wpbookingcalendar:booking_calendar:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wpbookingcalendar:wp_booking_calendar:*:*:*:*:*:wordpress:*:*" ], "packageName": "booking", "packageType": "wordpress-plugin", "product": "WP Booking Calendar", + "repo": "https://plugins.svn.wordpress.org/booking", + "vendor": "wpdevelop", "versions": [ { "lessThan": "10.6.3", diff --git a/data/anchore/2024/CVE-2024-10484.json b/data/anchore/2024/CVE-2024-10484.json new file mode 100644 index 00000000..4ff68c82 --- /dev/null +++ b/data/anchore/2024/CVE-2024-10484.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-10484", + "description": "The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'Team' widget in all versions up to, and including, 2.16.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/changeset/3180325/", + "https://wordpress.org/plugins/ultimate-addons-for-gutenberg/#developers", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/c218bf5e-b28b-4512-8bc7-7662b4a06f1e?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:brainstormforce:spectra:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ultimate-addons-for-gutenberg", + "packageType": "wordpress-plugin", + "product": "Spectra – WordPress Gutenberg Blocks", + "repo": "https://plugins.svn.wordpress.org/ultimate-addons-for-gutenberg", + "vendor": "brainstormforce", + "versions": [ + { + "lessThan": "2.16.3", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-10893.json b/data/anchore/2024/CVE-2024-10893.json new file mode 100644 index 00000000..91d93882 --- /dev/null +++ b/data/anchore/2024/CVE-2024-10893.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "wpscan", + "cveId": "CVE-2024-10893", + "description": "The WP Booking Calendar WordPress plugin before 10.6.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://wpscan.com/vulnerability/a230a552-3fda-4145-810f-58af540107db/" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:booking_calendar_project:booking_calendar:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wpbookingcalendar:booking_calendar:*:*:*:*:*:wordpress:*:*", + "cpe:2.3:a:wpbookingcalendar:wp_booking_calendar:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "booking", + "packageType": "wordpress-plugin", + "product": "WP Booking Calendar", + "repo": "https://plugins.svn.wordpress.org/booking", + "vendor": "wpdevelop", + "versions": [ + { + "lessThan": "10.6.5", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-11326.json b/data/anchore/2024/CVE-2024-11326.json new file mode 100644 index 00000000..455ed5c2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-11326.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-11326", + "description": "The Campaign Monitor Forms by Optin Cat plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.5.7. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/browser/campaign-monitor-wp/trunk/includes/eoi-subscribers.php#L353", + "https://plugins.trac.wordpress.org/changeset/3198560/campaign-monitor-wp/trunk/includes/eoi-subscribers.php", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/95ebb2ad-91a8-4a0d-ba91-f417943545b4?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:fatcatapps:campaign_monitor_optin_cat:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "campaign-monitor-wp", + "packageType": "wordpress-plugin", + "product": "Campaign Monitor Forms by Optin Cat", + "repo": "https://plugins.svn.wordpress.org/campaign-monitor-wp", + "vendor": "fatcatapps", + "versions": [ + { + "lessThan": "2.5.8", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-11391.json b/data/anchore/2024/CVE-2024-11391.json new file mode 100644 index 00000000..62266367 --- /dev/null +++ b/data/anchore/2024/CVE-2024-11391.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-11391", + "description": "The Advanced File Manager plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation via the 'class_fma_connector.php' file in all versions up to, and including, 5.2.10. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an Administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/changeset/3199242/", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/f14a658c-1517-4af4-8bd7-c379ac07ab35?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:advancedfilemanager:advanced_file_manager:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "file-manager-advanced", + "packageType": "wordpress-plugin", + "product": "Advanced File Manager", + "repo": "https://plugins.svn.wordpress.org/file-manager-advanced", + "vendor": "modalweb", + "versions": [ + { + "lessThan": "5.2.11", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-11732.json b/data/anchore/2024/CVE-2024-11732.json new file mode 100644 index 00000000..bbd946cd --- /dev/null +++ b/data/anchore/2024/CVE-2024-11732.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-11732", + "description": "The BP Profile Shortcodes Extra plugin for WordPress is vulnerable to time-based SQL Injection via the β€˜tab’ parameter in all versions up to, and including, 2.6.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/browser/bp-profile-shortcodes-extra/tags/2.6.0/inc/bppsc-shortcodes-extra.php#L1694", + "https://wordpress.org/plugins/bp-profile-shortcodes-extra/#developers", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/d7324a4e-ff45-4908-bcaa-379b130f73c0?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:venutius:bp_profile_shortcodes_extra:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "bp-profile-shortcodes-extra", + "packageType": "wordpress-plugin", + "product": "BP Profile Shortcodes Extra", + "repo": "https://plugins.svn.wordpress.org/bp-profile-shortcodes-extra", + "vendor": "venutius", + "versions": [ + { + "lessThanOrEqual": "2.6.0", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-11782.json b/data/anchore/2024/CVE-2024-11782.json new file mode 100644 index 00000000..6ef9048e --- /dev/null +++ b/data/anchore/2024/CVE-2024-11782.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-11782", + "description": "The WP Mailster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mst_subscribe' shortcode in all versions up to, and including, 1.8.17.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/browser/wp-mailster/tags/1.8.17.0/mailster/subscr/SubscriberPlugin.php#L216", + "https://plugins.trac.wordpress.org/changeset/3198497/wp-mailster/trunk/mailster/subscr/SubscriberPlugin.php", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/909beed4-06a9-4ec4-bf00-4072a38af82b?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:wpmailster:wp_mailster:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "wp-mailster", + "packageType": "wordpress-plugin", + "product": "WP Mailster", + "repo": "https://plugins.svn.wordpress.org/wp-mailster", + "vendor": "brandtoss", + "versions": [ + { + "lessThan": "1.8.18.0", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-11844.json b/data/anchore/2024/CVE-2024-11844.json new file mode 100644 index 00000000..f320145a --- /dev/null +++ b/data/anchore/2024/CVE-2024-11844.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "wordfence", + "cveId": "CVE-2024-11844", + "description": "The IdeaPush plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the idea_push_taxonomy_save_routine function in all versions up to, and including, 8.71. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete terms for the \"boards\" taxonomy.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://plugins.trac.wordpress.org/browser/ideapush/trunk/ideapush.php#L766", + "https://plugins.trac.wordpress.org/changeset/3198488/ideapush/trunk/ideapush.php", + "https://www.wordfence.com/threat-intel/vulnerabilities/id/34603c3f-834f-4a2a-9b9f-5213155d4317?source=cve" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "cpes": [ + "cpe:2.3:a:northernbeacheswebsites:ideapush:*:*:*:*:*:wordpress:*:*" + ], + "packageName": "ideapush", + "packageType": "wordpress-plugin", + "product": "IdeaPush", + "repo": "https://plugins.svn.wordpress.org/ideapush", + "vendor": "northernbeacheswebsites", + "versions": [ + { + "lessThan": "8.72", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-12053.json b/data/anchore/2024/CVE-2024-12053.json new file mode 100644 index 00000000..88348234 --- /dev/null +++ b/data/anchore/2024/CVE-2024-12053.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "chrome", + "cveId": "CVE-2024-12053", + "description": "Type Confusion in V8 in Google Chrome prior to 131.0.6778.108 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://chromereleases.googleblog.com/2024/12/stable-channel-update-for-desktop.html", + "https://issues.chromium.org/issues/379009132" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" + ], + "product": "Chrome", + "vendor": "Google", + "versions": [ + { + "lessThan": "131.0.6778.108", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-35695.json b/data/anchore/2024/CVE-2024-35695.json index 7fd889b4..770f1b25 100644 --- a/data/anchore/2024/CVE-2024-35695.json +++ b/data/anchore/2024/CVE-2024-35695.json @@ -16,9 +16,9 @@ { "collectionURL": "https://wordpress.org/plugins", "cpes": [ + "cpe:2.3:a:androidbubble:wp_docs:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:fahad_mahmood:wp_docs:*:*:*:*:*:wordpress:*:*", - "cpe:2.3:a:fahadmahmood:wp_docs:*:*:*:*:*:wordpress:*:*", - "cpe:2.3:a:androidbubble:wp_docs:*:*:*:*:*:wordpress:*:*" + "cpe:2.3:a:fahadmahmood:wp_docs:*:*:*:*:*:wordpress:*:*" ], "packageName": "wp-docs", "packageType": "wordpress-plugin", diff --git a/data/anchore/2024/CVE-2024-35696.json b/data/anchore/2024/CVE-2024-35696.json index 860ab143..a5ee27e7 100644 --- a/data/anchore/2024/CVE-2024-35696.json +++ b/data/anchore/2024/CVE-2024-35696.json @@ -16,9 +16,9 @@ { "collectionURL": "https://wordpress.org/plugins", "cpes": [ + "cpe:2.3:a:androidbubble:wp_docs:*:*:*:*:*:wordpress:*:*", "cpe:2.3:a:fahad_mahmood:wp_docs:*:*:*:*:*:wordpress:*:*", - "cpe:2.3:a:fahadmahmood:wp_docs:*:*:*:*:*:wordpress:*:*", - "cpe:2.3:a:androidbubble:wp_docs:*:*:*:*:*:wordpress:*:*" + "cpe:2.3:a:fahadmahmood:wp_docs:*:*:*:*:*:wordpress:*:*" ], "packageName": "wp-docs", "packageType": "wordpress-plugin", diff --git a/data/anchore/2024/CVE-2024-37302.json b/data/anchore/2024/CVE-2024-37302.json new file mode 100644 index 00000000..9dc19973 --- /dev/null +++ b/data/anchore/2024/CVE-2024-37302.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-37302", + "description": "Synapse is an open-source Matrix homeserver. Synapse versions before 1.106 are vulnerable to a disk fill attack, where an unauthenticated adversary can induce Synapse to download and cache large amounts of remote media. The default rate limit strategy is insufficient to mitigate this. This can lead to a denial of service, ranging from further media uploads/downloads failing to completely unavailability of the Synapse process, depending on how Synapse was deployed. Synapse 1.106 introduces a new \"leaky bucket\" rate limit on remote media downloads to reduce the amount of data a user can request at a time. This does not fully address the issue, but does limit an unauthenticated user's ability to request large amounts of data to be cached.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/element-hq/synapse/security/advisories/GHSA-4mhg-xv73-xq2x" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pypi.org", + "cpes": [ + "cpe:2.3:a:element-hq:synapse:*:*:*:*:*:python:*:*", + "cpe:2.3:a:matrix:synapse:*:*:*:*:*:python:*:*" + ], + "packageName": "matrix-synapse", + "packageType": "python", + "product": "synapse", + "repo": "https://github.com/element-hq/synapse", + "vendor": "element-hq", + "versions": [ + { + "lessThan": "1.106", + "status": "affected", + "version": "0", + "versionType": "python" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-37303.json b/data/anchore/2024/CVE-2024-37303.json new file mode 100644 index 00000000..ecb36258 --- /dev/null +++ b/data/anchore/2024/CVE-2024-37303.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-37303", + "description": "Synapse is an open-source Matrix homeserver. Synapse before version 1.106 allows, by design, unauthenticated remote participants to trigger a download and caching of remote media from a remote homeserver to the local media repository. Such content then also becomes available for download from the local homeserver in an unauthenticated way. The implication is that unauthenticated remote adversaries can use this functionality to plant problematic content into the media repository. Synapse 1.106 introduces a partial mitigation in the form of new endpoints which require authentication for media downloads. The unauthenticated endpoints will be frozen in a future release, closing the attack vector.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/element-hq/synapse/security/advisories/GHSA-gjgr-7834-rhxr", + "https://github.com/matrix-org/matrix-spec-proposals/pull/3916" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pypi.org", + "cpes": [ + "cpe:2.3:a:element-hq:synapse:*:*:*:*:*:python:*:*", + "cpe:2.3:a:matrix:synapse:*:*:*:*:*:python:*:*" + ], + "packageName": "matrix-synapse", + "packageType": "python", + "product": "synapse", + "repo": "https://github.com/element-hq/synapse", + "vendor": "element-hq", + "versions": [ + { + "lessThan": "1.106", + "status": "affected", + "version": "0", + "versionType": "python" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-45106.json b/data/anchore/2024/CVE-2024-45106.json new file mode 100644 index 00000000..2bf582d1 --- /dev/null +++ b/data/anchore/2024/CVE-2024-45106.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "apache", + "cveId": "CVE-2024-45106", + "description": "Improper authentication of an HTTP endpoint in the S3 Gateway of Apache Ozone 1.4.0 allows any authenticated Kerberos user to revoke and regenerate the S3 secrets of any other user. This is only possible if:\n * ozone.s3g.secret.http.enabled is set to true. The default value of this configuration is false.\n * The user configured in ozone.s3g.kerberos.principal is also configured in ozone.s3.administrators or ozone.administrators.\n\n\nUsers are recommended to upgrade to Apache Ozone version 1.4.1 which disables the affected endpoint.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://lists.apache.org/thread/rylnxwttp004kvotpk9j158vb238pfkm" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://repo.maven.apache.org/maven2", + "cpes": [ + "cpe:2.3:a:org.apache.ozone:ozone-s3gateway:*:*:*:*:*:maven:*:*" + ], + "packageName": "org.apache.ozone:ozone-s3gateway", + "packageType": "maven", + "product": "Apache Ozone", + "vendor": "Apache Software Foundation", + "versions": [ + { + "lessThan": "1.4.1", + "status": "affected", + "version": "1.4.0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-52596.json b/data/anchore/2024/CVE-2024-52596.json new file mode 100644 index 00000000..e9bfc53a --- /dev/null +++ b/data/anchore/2024/CVE-2024-52596.json @@ -0,0 +1,96 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-52596", + "description": "SimpleSAMLphp xml-common is a common classes for handling XML-structures. When loading an (untrusted) XML document, for example the SAMLResponse, it's possible to induce an XXE. This vulnerability is fixed in 1.19.0.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/simplesamlphp/xml-common/commit/fa4ade391c3194466acf5fbfd5d2ecdbf5e831f5", + "https://github.com/simplesamlphp/xml-common/security/advisories/GHSA-2x65-fpch-2fcm" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://packagist.org", + "cpes": [ + "cpe:2.3:a:simplesamlphp:saml2:*:*:*:*:*:php:*:*" + ], + "packageName": "simplesamlphp/saml2", + "packageType": "php-composer", + "product": "saml2", + "repo": "https://github.com/simplesamlphp/saml2", + "vendor": "simplesamlphp", + "versions": [ + { + "lessThan": "4.6.14", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://packagist.org", + "cpes": [ + "cpe:2.3:a:simplesamlphp:saml2_legacy:*:*:*:*:*:php:*:*" + ], + "packageName": "simplesamlphp/saml2-legacy", + "packageType": "php-composer", + "product": "saml2-legacy", + "repo": "https://github.com/simplesamlphp/saml2-legacy", + "vendor": "simplesamlphp", + "versions": [ + { + "lessThan": "4.6.14", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://packagist.org", + "cpes": [ + "cpe:2.3:a:simplesamlphp:xml_common:*:*:*:*:*:php:*:*" + ], + "packageName": "simplesamlphp/xml-common", + "packageType": "php-composer", + "product": "xml-common", + "repo": "https://github.com/simplesamlphp/xml-common", + "vendor": "simplesamlphp", + "versions": [ + { + "lessThan": "1.20.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://packagist.org", + "cpes": [ + "cpe:2.3:a:simplesamlphp:xml_security:*:*:*:*:*:php:*:*" + ], + "packageName": "simplesamlphp/xml-security", + "packageType": "php-composer", + "product": "xml-security", + "repo": "https://github.com/simplesamlphp/xml-security", + "vendor": "simplesamlphp", + "versions": [ + { + "lessThan": "1.10.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-52805.json b/data/anchore/2024/CVE-2024-52805.json new file mode 100644 index 00000000..f096aa14 --- /dev/null +++ b/data/anchore/2024/CVE-2024-52805.json @@ -0,0 +1,41 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-52805", + "description": "Synapse is an open-source Matrix homeserver. In Synapse before 1.120.1, multipart/form-data requests can in certain configurations transiently increase memory consumption beyond expected levels while processing the request, which can be used to amplify denial of service attacks. Synapse 1.120.1 resolves the issue by denying requests with unsupported multipart/form-data content type.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/element-hq/synapse/security/advisories/GHSA-rfq8-j7rh-8hf2", + "https://github.com/twisted/twisted/issues/4688#issuecomment-1167705518", + "https://github.com/twisted/twisted/issues/4688#issuecomment-2385711609" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pypi.org", + "cpes": [ + "cpe:2.3:a:element-hq:synapse:*:*:*:*:*:python:*:*", + "cpe:2.3:a:matrix:synapse:*:*:*:*:*:python:*:*" + ], + "packageName": "matrix-synapse", + "packageType": "python", + "product": "synapse", + "repo": "https://github.com/element-hq/synapse", + "vendor": "element-hq", + "versions": [ + { + "lessThan": "1.120.1", + "status": "affected", + "version": "0", + "versionType": "python" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-52815.json b/data/anchore/2024/CVE-2024-52815.json new file mode 100644 index 00000000..cd83e2f3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-52815.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-52815", + "description": "Synapse is an open-source Matrix homeserver. Synapse versions before 1.120.1 fail to properly validate invites received over federation. This vulnerability allows a malicious server to send a specially crafted invite that disrupts the invited user's /sync functionality. Synapse 1.120.1 rejects such invalid invites received over federation and restores the ability to sync for affected users.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/element-hq/synapse/security/advisories/GHSA-f3r3-h2mq-hx2h" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pypi.org", + "cpes": [ + "cpe:2.3:a:element-hq:synapse:*:*:*:*:*:python:*:*", + "cpe:2.3:a:matrix:synapse:*:*:*:*:*:python:*:*" + ], + "packageName": "matrix-synapse", + "packageType": "python", + "product": "synapse", + "repo": "https://github.com/element-hq/synapse", + "vendor": "element-hq", + "versions": [ + { + "lessThan": "1.120.1", + "status": "affected", + "version": "0", + "versionType": "python" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-53257.json b/data/anchore/2024/CVE-2024-53257.json new file mode 100644 index 00000000..182e8dec --- /dev/null +++ b/data/anchore/2024/CVE-2024-53257.json @@ -0,0 +1,51 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-53257", + "description": "Vitess is a database clustering system for horizontal scaling of MySQL. The /debug/querylogz and /debug/env pages for vtgate and vttablet do not properly escape user input. The result is that queries executed by Vitess can write HTML into the monitoring page at will. These pages are rendered using text/template instead of rendering with a proper HTML templating engine. This vulnerability is fixed in 21.0.1, 20.0.4, and 19.0.8.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/vitessio/vitess/commit/2b71d1b5f8ca676beeab2875525003cd45096217", + "https://github.com/vitessio/vitess/security/advisories/GHSA-7mwh-q3xm-qh6p" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pkg.go.dev", + "cpes": [ + "cpe:2.3:a:linuxfoundation:vitess:*:*:*:*:*:go:*:*" + ], + "packageName": "vitess.io/vitess", + "packageType": "go-module", + "product": "vitess", + "repo": "https://github.com/vitessio/vitess", + "vendor": "vitessio", + "versions": [ + { + "lessThan": "21.0.1", + "status": "affected", + "version": "0.21.0-rc1", + "versionType": "custom" + }, + { + "lessThan": "20.0.4", + "status": "affected", + "version": "0.20.0-rc1", + "versionType": "custom" + }, + { + "lessThan": "19.0.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-53863.json b/data/anchore/2024/CVE-2024-53863.json new file mode 100644 index 00000000..4231a0bd --- /dev/null +++ b/data/anchore/2024/CVE-2024-53863.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-53863", + "description": "Synapse is an open-source Matrix homeserver. In Synapse versions before 1.120.1, enabling the dynamic_thumbnails option or processing a specially crafted request could trigger the decoding and thumbnail generation of uncommon image formats, potentially invoking external tools like Ghostscript for processing. This significantly expands the attack surface in a historically vulnerable area, presenting a risk that far outweighs the benefit, particularly since these formats are rarely used on the open web or within the Matrix ecosystem. Synapse 1.120.1 addresses the issue by restricting thumbnail generation to images in the following widely used formats: PNG, JPEG, GIF, and WebP. This vulnerability is fixed in 1.120.1.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/element-hq/synapse/security/advisories/GHSA-vp6v-whfm-rv3g" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pypi.org", + "cpes": [ + "cpe:2.3:a:element-hq:synapse:*:*:*:*:*:python:*:*", + "cpe:2.3:a:matrix:synapse:*:*:*:*:*:python:*:*" + ], + "packageName": "matrix-synapse", + "packageType": "python", + "product": "synapse", + "repo": "https://github.com/element-hq/synapse", + "vendor": "element-hq", + "versions": [ + { + "lessThan": "1.120.1", + "status": "affected", + "version": "0", + "versionType": "python" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-53867.json b/data/anchore/2024/CVE-2024-53867.json new file mode 100644 index 00000000..b32cbc8e --- /dev/null +++ b/data/anchore/2024/CVE-2024-53867.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-53867", + "description": "Synapse is an open-source Matrix homeserver. The Sliding Sync feature on Synapse versions between 1.113.0rc1 and 1.120.0 can leak partial room state changes to users no longer in a room. Non-state events, like messages, are unaffected. This vulnerability is fixed in 1.120.1.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/element-hq/synapse/security/advisories/GHSA-56w4-5538-8v8h", + "https://github.com/matrix-org/matrix-spec-proposals/pull/4186" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pypi.org", + "cpes": [ + "cpe:2.3:a:element-hq:synapse:*:*:*:*:*:python:*:*", + "cpe:2.3:a:matrix:synapse:*:*:*:*:*:python:*:*" + ], + "packageName": "matrix-synapse", + "packageType": "python", + "product": "synapse", + "repo": "https://github.com/element-hq/synapse", + "vendor": "element-hq", + "versions": [ + { + "lessThan": "1.120.1", + "status": "affected", + "version": "1.113.0rc1", + "versionType": "python" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-53999.json b/data/anchore/2024/CVE-2024-53999.json new file mode 100644 index 00000000..5643a7cc --- /dev/null +++ b/data/anchore/2024/CVE-2024-53999.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-53999", + "description": "Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. The application allows users to upload files with scripts in the filename parameter. As a result, a malicious user can upload a script file to the system. When users in the application use the \"Diff or Compare\" functionality, they are affected by a Stored Cross-Site Scripting vulnerability. This vulnerability is fixed in 4.2.9.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/27d165872847f5ae7417caf09f37edeeba741e1e", + "https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-5jc6-h9w7-jm3p" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pypi.org", + "cpes": [ + "cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:python:*:*" + ], + "packageName": "mobsf", + "packageType": "python", + "product": "Mobile-Security-Framework-MobSF", + "repo": "https://github.com/mobsf/mobile-security-framework-mobsf", + "vendor": "MobSF", + "versions": [ + { + "lessThan": "4.2.9", + "status": "affected", + "version": "0", + "versionType": "python" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-54000.json b/data/anchore/2024/CVE-2024-54000.json new file mode 100644 index 00000000..272e80fc --- /dev/null +++ b/data/anchore/2024/CVE-2024-54000.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-54000", + "description": "Mobile Security Framework (MobSF) is a pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis. In versions prior to 3.9.7, the requests.get() request in the _check_url method is specified as allow_redirects=True, which allows a server-side request forgery when a request to .well-known/assetlinks.json\" returns a 302 redirect. This is a bypass of the fix for CVE-2024-29190 and is fixed in 3.9.7.", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/f22c584aa7d43527970c9da61eb678953cfc0a8e", + "https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-m435-9v6r-v5f6" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://github.com", + "cpes": [ + "cpe:2.3:a:opensecurity:mobile_security_framework:*:*:*:*:*:*:*:*" + ], + "packageName": "mobsf/mobile-security-framework-mobsf", + "product": "Mobile-Security-Framework-MobSF", + "repo": "https://github.com/mobsf/mobile-security-framework-mobsf", + "vendor": "MobSF", + "versions": [ + { + "lessThan": "3.9.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-5598.json b/data/anchore/2024/CVE-2024-5598.json index caafb81a..745b62d5 100644 --- a/data/anchore/2024/CVE-2024-5598.json +++ b/data/anchore/2024/CVE-2024-5598.json @@ -20,6 +20,7 @@ "packageName": "file-manager-advanced", "packageType": "wordpress-plugin", "product": "Advanced File Manager", + "repo": "https://plugins.svn.wordpress.org/file-manager-advanced", "vendor": "modalweb", "versions": [ { diff --git a/data/anchore/2024/CVE-2024-6930.json b/data/anchore/2024/CVE-2024-6930.json index 26bc9b9c..76cfb310 100644 --- a/data/anchore/2024/CVE-2024-6930.json +++ b/data/anchore/2024/CVE-2024-6930.json @@ -23,6 +23,7 @@ "packageName": "booking", "packageType": "wordpress-plugin", "product": "WP Booking Calendar", + "repo": "https://plugins.svn.wordpress.org/booking", "vendor": "wpdevelop", "versions": [ { diff --git a/data/anchore/2024/CVE-2024-8126.json b/data/anchore/2024/CVE-2024-8126.json index 718b2c70..26899f0a 100644 --- a/data/anchore/2024/CVE-2024-8126.json +++ b/data/anchore/2024/CVE-2024-8126.json @@ -20,6 +20,7 @@ "packageName": "file-manager-advanced", "packageType": "wordpress-plugin", "product": "Advanced File Manager", + "repo": "https://plugins.svn.wordpress.org/file-manager-advanced", "vendor": "modalweb", "versions": [ { diff --git a/data/anchore/2024/CVE-2024-8274.json b/data/anchore/2024/CVE-2024-8274.json index 4d01a11b..09c042e5 100644 --- a/data/anchore/2024/CVE-2024-8274.json +++ b/data/anchore/2024/CVE-2024-8274.json @@ -22,6 +22,7 @@ "packageName": "booking", "packageType": "wordpress-plugin", "product": "WP Booking Calendar", + "repo": "https://plugins.svn.wordpress.org/booking", "vendor": "wpdevelop", "versions": [ { diff --git a/data/anchore/2024/CVE-2024-8704.json b/data/anchore/2024/CVE-2024-8704.json index 5b38c9e6..d89d5471 100644 --- a/data/anchore/2024/CVE-2024-8704.json +++ b/data/anchore/2024/CVE-2024-8704.json @@ -20,6 +20,7 @@ "packageName": "file-manager-advanced", "packageType": "wordpress-plugin", "product": "Advanced File Manager", + "repo": "https://plugins.svn.wordpress.org/file-manager-advanced", "vendor": "modalweb", "versions": [ { diff --git a/data/anchore/2024/CVE-2024-8725.json b/data/anchore/2024/CVE-2024-8725.json index 4f6513ed..dbff32f2 100644 --- a/data/anchore/2024/CVE-2024-8725.json +++ b/data/anchore/2024/CVE-2024-8725.json @@ -21,6 +21,7 @@ "packageName": "file-manager-advanced", "packageType": "wordpress-plugin", "product": "Advanced File Manager", + "repo": "https://plugins.svn.wordpress.org/file-manager-advanced", "vendor": "modalweb", "versions": [ { diff --git a/data/anchore/2024/CVE-2024-9306.json b/data/anchore/2024/CVE-2024-9306.json index ca8b5b8d..6debb7f2 100644 --- a/data/anchore/2024/CVE-2024-9306.json +++ b/data/anchore/2024/CVE-2024-9306.json @@ -21,6 +21,7 @@ "packageName": "booking", "packageType": "wordpress-plugin", "product": "WP Booking Calendar", + "repo": "https://plugins.svn.wordpress.org/booking", "vendor": "wpdevelop", "versions": [ {