Skip to content

Commit

Permalink
Add data for 2024-10-28
Browse files Browse the repository at this point in the history
Signed-off-by: Josh Bressers <[email protected]>
  • Loading branch information
joshbressers committed Oct 28, 2024
1 parent 4cabe4a commit 31380cf
Show file tree
Hide file tree
Showing 25 changed files with 1,055 additions and 0 deletions.
38 changes: 38 additions & 0 deletions data/anchore/2020/CVE-2020-26311.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"additionalMetadata": {
"cna": "github_m",
"cveId": "CVE-2020-26311",
"description": "Useragent is a user agent parser for Node.js. All versions as of time of publication contain one or more regular expressions that are vulnerable to Regular Expression Denial of Service (ReDoS). As of time of publication, no patches are available.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://github.com/3rd-Eden/useragent/issues/167",
"https://securitylab.github.com/advisories/GHSL-2020-312-redos-useragent/"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://registry.npmjs.org",
"cpes": [
"cpe:2.3:a:useragent_project:useragent:*:*:*:*:*:node.js:*:*"
],
"packageName": "useragent",
"packageType": "npm",
"product": "useragent",
"repo": "https://github.com/3rd-Eden/useragent",
"vendor": "3rd-Eden",
"versions": [
{
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
41 changes: 41 additions & 0 deletions data/anchore/2024/CVE-2024-10011.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-10011",
"description": "The BuddyPress plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 14.1.0 via the id parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform actions on files outside of the originally intended directory and enables file uploads to directories outside of the web root. Depending on server configuration it may be possible to upload files with double extensions. This vulnerability only affects Windows.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://codex.buddypress.org/releases/version-14-2-1/",
"https://github.com/buddypress/buddypress/blob/master/src/bp-core/bp-core-avatars.php#L1270",
"https://github.com/buddypress/buddypress/blob/master/src/bp-core/bp-core-avatars.php#L1370",
"https://plugins.trac.wordpress.org/changeset/3173924/buddypress/trunk/bp-core/bp-core-avatars.php?contextall=1&old=3102524&old_path=%2Fbuddypress%2Ftrunk%2Fbp-core%2Fbp-core-avatars.php",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/4327f414-64f4-4193-a5c0-2a5ecdd75e11?source=cve"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:buddypress:buddypress:*:*:*:*:*:wordpress:*:*"
],
"packageName": "buddypress",
"packageType": "wordpress-plugin",
"product": "BuddyPress",
"vendor": "buddypress",
"versions": [
{
"lessThan": "14.2.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
39 changes: 39 additions & 0 deletions data/anchore/2024/CVE-2024-10091.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-10091",
"description": "The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Comparison Widget in all versions up to, and including, 3.2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.trac.wordpress.org/browser/elementskit-lite/tags/3.2.9/widgets/image-comparison/image-comparison.php#L657",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/00b278af-6ce6-4e70-a83a-a1b035542cd4?source=cve"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:wpmet:elements_kit_elementor_addons:*:*:*:*:*:wordpress:*:*"
],
"packageName": "elementskit-lite",
"packageType": "wordpress-plugin",
"product": "ElementsKit Elementor addons",
"repo": "https://plugins.svn.wordpress.org/elementskit-lite",
"vendor": "xpeedstudio",
"versions": [
{
"lessThan": "3.3.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
40 changes: 40 additions & 0 deletions data/anchore/2024/CVE-2024-10092.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-10092",
"description": "The Download Monitor plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_handle_api_key_actions function in all versions up to, and including, 5.0.12. This makes it possible for authenticated attackers, with Subscriber-level access and above, to revoke existing API keys and generate new ones.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.trac.wordpress.org/browser/download-monitor/tags/5.0.12/src/KeyGeneration/class-dlm-key-generation.php#L299",
"https://plugins.trac.wordpress.org/changeset/3173614/download-monitor/trunk/src/KeyGeneration/class-dlm-key-generation.php",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/f1e50d8c-e61c-4e94-b5e8-b24832dc24b6?source=cve"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:never5:download_monitor:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:wpchill:download_monitor:*:*:*:*:*:wordpress:*:*"
],
"packageName": "download-monitor",
"packageType": "wordpress-plugin",
"product": "Download Monitor",
"vendor": "wpchill",
"versions": [
{
"lessThan": "5.0.13",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
41 changes: 41 additions & 0 deletions data/anchore/2024/CVE-2024-10117.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,41 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-10117",
"description": "The WP Crowdfunding plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpcf_donate shortcode in all versions up to, and including, 2.1.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://docs.themeum.com/wp-crowdfunding/",
"https://plugins.trac.wordpress.org/changeset/3174230/",
"https://plugins.trac.wordpress.org/changeset/3174230/#file19",
"https://wordpress.org/plugins/wp-crowdfunding/#developers",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/7813dfdc-06e0-4fa9-aabe-b5b9772368c2?source=cve"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:themeum:wp_crowdfunding:*:*:*:*:*:wordpress:*:*"
],
"packageName": "wp-crowdfunding",
"packageType": "wordpress-plugin",
"product": "WP Crowdfunding",
"vendor": "themeum",
"versions": [
{
"lessThan": "2.1.12",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
40 changes: 40 additions & 0 deletions data/anchore/2024/CVE-2024-10357.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-10357",
"description": "The Clever Addons for Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.2.1 via the getTemplateContent function in src/widgets/class-clever-widget-base.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, and draft template data.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.trac.wordpress.org/browser/cafe-lite/trunk/src/widgets/class-clever-widget-base.php#L411",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/e1fa3569-9a9a-4aa6-9057-c87601fadb9f?source=cve"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:clever-soft:clever_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:cleversoft:clever_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:download_clever_addons_for_elementor_project:download_clever_addons_for_elementor:*:*:*:*:*:wordpress:*:*"
],
"packageName": "cafe-lite",
"packageType": "wordpress-plugin",
"product": "Clever Addons for Elementor",
"vendor": "zootemplate",
"versions": [
{
"lessThanOrEqual": "2.2.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
39 changes: 39 additions & 0 deletions data/anchore/2024/CVE-2024-10374.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-10374",
"description": "The WP-Members Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpmem_loginout shortcode in all versions up to, and including, 3.4.9.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.trac.wordpress.org/changeset/3172530/",
"https://wordpress.org/plugins/wp-members/#developers",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/5ea93a49-0e1a-4a24-8f6b-03e624f517d4?source=cve"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:wp-members_project:wp-members:*:*:*:*:*:wordpress:*:*"
],
"packageName": "wp-members",
"packageType": "wordpress-plugin",
"product": "WP-Members Membership Plugin",
"vendor": "cbutlerjr",
"versions": [
{
"lessThan": "3.4.9.6",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
37 changes: 37 additions & 0 deletions data/anchore/2024/CVE-2024-47821.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
{
"additionalMetadata": {
"cna": "github_m",
"cveId": "CVE-2024-47821",
"description": "pyLoad is a free and open-source Download Manager. The folder `/.pyload/scripts` has scripts which are run when certain actions are completed, for e.g. a download is finished. By downloading a executable file to a folder in /scripts and performing the respective action, remote code execution can be achieved in versions prior to 0.5.0b3.dev87. A file can be downloaded to such a folder by changing the download folder to a folder in `/scripts` path and using the `/flashgot` API to download the file. This vulnerability allows an attacker with access to change the settings on a pyload server to execute arbitrary code and completely compromise the system. Version 0.5.0b3.dev87 fixes this issue.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://github.com/pyload/pyload/security/advisories/GHSA-w7hq-f2pj-c53g"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://github.com",
"cpes": [
"cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:*"
],
"packageName": "pyload/pyload",
"product": "pyload",
"repo": "https://github.com/pyload/pyload",
"vendor": "pyload",
"versions": [
{
"lessThan": "0.5.0b3.dev87",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
38 changes: 38 additions & 0 deletions data/anchore/2024/CVE-2024-49376.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"additionalMetadata": {
"cna": "github_m",
"cveId": "CVE-2024-49376",
"description": "Autolab, a course management service that enables auto-graded programming assignments, has misconfigured reset password permissions in version 3.0.0. For email-based accounts, users with insufficient privileges could reset and theoretically access privileged users' accounts by resetting their passwords. This issue is fixed in version 3.0.1. No known workarounds exist.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://github.com/autolab/Autolab/commit/301689ab5c5e39d13bab47b71eaf8998d04bcc9b",
"https://github.com/autolab/Autolab/security/advisories/GHSA-v46j-h43h-rwrm"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://rubygems.org",
"cpes": [
"cpe:2.3:a:autolabproject:autolab:*:*:*:*:*:ruby:*:*"
],
"packageName": "Autolab",
"packageType": "gem",
"product": "Autolab",
"repo": "https://github.com/autolab/autolab",
"vendor": "autolab",
"versions": [
{
"status": "affected",
"version": "3.0.0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
Loading

0 comments on commit 31380cf

Please sign in to comment.