Skip to content

Commit

Permalink
patchstack 2024-06-05
Browse files Browse the repository at this point in the history
Signed-off-by: Weston Steimel <[email protected]>
  • Loading branch information
westonsteimel committed Jun 5, 2024
1 parent 4685b5e commit 81ff454
Show file tree
Hide file tree
Showing 39 changed files with 1,635 additions and 2 deletions.
44 changes: 44 additions & 0 deletions data/anchore/2023/CVE-2023-28494.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
{
"additionalMetadata": {
"cna": "patchstack",
"cveId": "CVE-2023-28494",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://patchstack.com/database/vulnerability/contact-form-to-email/wordpress-contact-form-email-plugin-1-3-31-missing-authorization-leading-to-feedback-submission-vulnerability?_s_id=cve"
],
"solutions": [
"Update to 1.3.32 or a higher version."
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:codepeople:contact_form_email:*:*:*:*:*:wordpress:*:*"
],
"packageName": "contact-form-to-email",
"product": "Contact Form Email",
"repo": "https://plugins.svn.wordpress.org/contact-form-to-email",
"vendor": "CodePeople",
"versions": [
{
"lessThan": "1.3.32",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9596c243-4099-420a-aa2a-381b6299f927?source=cve"
}
]
}
}
44 changes: 44 additions & 0 deletions data/anchore/2023/CVE-2023-33930.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
{
"additionalMetadata": {
"cna": "patchstack",
"cveId": "CVE-2023-33930",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://patchstack.com/database/vulnerability/unlimited-elements-for-elementor/wordpress-unlimited-elements-for-elementor-plugin-1-5-66-unrestricted-zip-extraction-vulnerability?_s_id=cve"
],
"solutions": [
"Update to 1.5.67 or a higher version."
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor_\\(free_widgets\\,_addons\\,_templates\\):*:*:*:*:*:wordpress:*:*"
],
"packageName": "unlimited-elements-for-elementor",
"product": "Unlimited Elements For Elementor (Free Widgets, Addons, Templates)",
"repo": "https://plugins.svn.wordpress.org/unlimited-elements-for-elementor",
"vendor": "Unlimited Elements",
"versions": [
{
"lessThan": "1.5.67",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f600361c-cf7a-498c-aa3d-beeb28d27101?source=cve"
}
]
}
}
44 changes: 44 additions & 0 deletions data/anchore/2023/CVE-2023-37865.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
{
"additionalMetadata": {
"cna": "patchstack",
"cveId": "CVE-2023-37865",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://patchstack.com/database/vulnerability/ip2location-country-blocker/wordpress-ip2location-country-blocker-plugin-2-29-1-ip-bypass-vulnerability-vulnerability?_s_id=cve"
],
"solutions": [
"Update to 2.29.2 or a higher version."
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:ip2location:country_blocker:*:*:*:*:*:wordpress:*:*"
],
"packageName": "ip2location-country-blocker",
"product": "Download IP2Location Country Blocker",
"repo": "https://plugins.svn.wordpress.org/ip2location-country-blocker",
"vendor": "IP2Location",
"versions": [
{
"lessThan": "2.29.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/814fd060-8781-46ad-86e6-e2b75a7fffc0?source=cve"
}
]
}
}
44 changes: 44 additions & 0 deletions data/anchore/2023/CVE-2023-38520.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
{
"additionalMetadata": {
"cna": "patchstack",
"cveId": "CVE-2023-38520",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://patchstack.com/database/vulnerability/booking-system/wordpress-pinpoint-booking-system-plugin-2-9-9-3-4-parameter-tampering?_s_id=cve"
],
"solutions": [
"Update to 2.9.9.3.5 or a higher version."
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:pinpoint:pinpoint_booking_system:*:*:*:*:*:wordpress:*:*"
],
"packageName": "booking-system",
"product": "Pinpoint Booking System",
"repo": "https://plugins.svn.wordpress.org/booking-system",
"vendor": "PINPOINT.WORLD",
"versions": [
{
"lessThan": "2.9.9.3.5",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6ad895db-5fe9-419b-8884-9a840bd350f6?source=cve"
}
]
}
}
44 changes: 44 additions & 0 deletions data/anchore/2023/CVE-2023-40332.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
{
"additionalMetadata": {
"cna": "patchstack",
"cveId": "CVE-2023-40332",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://patchstack.com/database/vulnerability/wp-postratings/wordpress-wp-postratings-plugin-1-91-rating-limit-bypass-vulnerability?_s_id=cve"
],
"solutions": [
"Update to 1.91.1 or a higher version."
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:lesterchan:wp-postratings:*:*:*:*:*:wordpress:*:*"
],
"packageName": "wp-postratings",
"product": "WP-PostRatings",
"repo": "https://plugins.svn.wordpress.org/wp-postratings",
"vendor": "Lester ‘GaMerZ’ Chan",
"versions": [
{
"lessThan": "1.91.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6aed9434-1681-47d6-bbc1-0815db548a24?source=cve"
}
]
}
}
41 changes: 41 additions & 0 deletions data/anchore/2023/CVE-2023-44235.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
{
"additionalMetadata": {
"cna": "patchstack",
"cveId": "CVE-2023-44235",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://patchstack.com/database/vulnerability/wp-captcha/wordpress-wp-captcha-plugin-2-0-0-captcha-bypass-vulnerability?_s_id=cve"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:devnath_verma:wp_captcha:*:*:*:*:*:wordpress:*:*"
],
"packageName": "wp-captcha",
"product": "WP Captcha",
"repo": "https://plugins.svn.wordpress.org/wp-captcha",
"vendor": "Devnath verma",
"versions": [
{
"lessThanOrEqual": "2.0.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9bc2a04c-7b7c-483f-b81b-97a7caac179c?source=cve"
}
]
}
}
44 changes: 44 additions & 0 deletions data/anchore/2023/CVE-2023-45635.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
{
"additionalMetadata": {
"cna": "patchstack",
"cveId": "CVE-2023-45635",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://patchstack.com/database/vulnerability/responsive-tabs/wordpress-responsive-tabs-plugin-4-0-6-html-content-injection-vulnerability?_s_id=cve"
],
"solutions": [
"Update to 4.0.6 or a higher version."
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:wpdarko:responsive_tabs:*:*:*:*:*:wordpress:*:*"
],
"packageName": "responsive-tabs",
"product": "Responsive Tabs",
"repo": "https://plugins.svn.wordpress.org/responsive-tabs",
"vendor": "WP Darko",
"versions": [
{
"lessThan": "4.0.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d9af12ac-68ef-4c65-aecb-82ce7b927340?source=cve"
}
]
}
}
44 changes: 44 additions & 0 deletions data/anchore/2023/CVE-2023-46310.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
{
"additionalMetadata": {
"cna": "patchstack",
"cveId": "CVE-2023-46310",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://patchstack.com/database/vulnerability/wpdiscuz/wordpress-wpdiscuz-plugin-7-6-10-content-injection-vulnerability?_s_id=cve"
],
"solutions": [
"Update to 7.6.11 or a higher version."
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*"
],
"packageName": "wpdiscuz",
"product": "wpDiscuz",
"repo": "https://plugins.svn.wordpress.org/wpdiscuz",
"vendor": "gVectors Team",
"versions": [
{
"lessThan": "7.6.11",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6fa1299e-308e-47ea-843c-c76b8a412ce9?source=cve"
}
]
}
}
Loading

0 comments on commit 81ff454

Please sign in to comment.