-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Signed-off-by: Weston Steimel <[email protected]>
- Loading branch information
1 parent
49752b4
commit 1454f87
Showing
24 changed files
with
961 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,39 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "wordfence", | ||
"cveId": "CVE-2022-4534", | ||
"description": "The Limit Login Attempts (Spam Protection) plugin for WordPress is vulnerable to IP Address Spoofing in versions up to, and including, 5.3. This is due to insufficient restrictions on where the IP Address information is being retrieved for request logging and login restrictions. Attackers can supply the X-Forwarded-For header with with a different IP Address that will be logged and can be used to bypass settings that may have blocked out an IP address or country from logging in.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://plugins.trac.wordpress.org/browser/wp-limit-failed-login-attempts/tags/5.3/login.php#L466", | ||
"https://plugins.trac.wordpress.org/changeset/3163023/", | ||
"https://www.wordfence.com/threat-intel/vulnerabilities/id/561ec1b2-ee26-4e0c-b437-d70b04be5b4c?source=cve" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"cpes": [ | ||
"cpe:2.3:a:wp-buy:login_protection_-_limit_failed_login_attempts:*:*:*:*:*:wordpress:*:*" | ||
], | ||
"packageName": "wp-limit-failed-login-attempts", | ||
"packageType": "wordpress-plugin", | ||
"product": "Limit Login Attempts (Spam Protection)", | ||
"vendor": "wp-buy", | ||
"versions": [ | ||
{ | ||
"lessThan": "5.4", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,46 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "patchstack", | ||
"cveId": "CVE-2024-32602", | ||
"description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in OnTheGoSystems WooCommerce Multilingual & Multicurrency.This issue affects WooCommerce Multilingual & Multicurrency: from n/a through 5.3.3.1.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://patchstack.com/database/vulnerability/woocommerce-multilingual/wordpress-woocommerce-multilingual-multicurrency-plugin-5-3-3-1-sql-injection-vulnerability?_s_id=cve" | ||
], | ||
"solutions": [ | ||
"Update to 5.3.4 or a higher version." | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"cpes": [ | ||
"cpe:2.3:a:onthegosystems:woocommerce_multilingual_\\&_multicurrency:*:*:*:*:*:wordpress:*:*" | ||
], | ||
"packageName": "woocommerce-multilingual", | ||
"packageType": "wordpress-plugin", | ||
"product": "WooCommerce Multilingual & Multicurrency", | ||
"repo": "https://plugins.svn.wordpress.org/woocommerce-multilingual", | ||
"vendor": "OnTheGoSystems", | ||
"versions": [ | ||
{ | ||
"lessThan": "5.3.4", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
}, | ||
"references": [ | ||
{ | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8b0f58b8-46d6-4deb-bfcc-806bb635b060?source=cve" | ||
} | ||
] | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,34 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "jetbrains", | ||
"cveId": "CVE-2024-47161", | ||
"description": "In JetBrains TeamCity before 2024.07.3 password could be exposed via Sonar runner REST API", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://www.jetbrains.com/privacy-security/issues-fixed/" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"cpes": [ | ||
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" | ||
], | ||
"product": "TeamCity", | ||
"vendor": "JetBrains", | ||
"versions": [ | ||
{ | ||
"lessThan": "2024.07.3", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "github_m", | ||
"cveId": "CVE-2024-47529", | ||
"description": "OpenC3 COSMOS provides the functionality needed to send commands to and receive data from one or more embedded systems. OpenC3 COSMOS stores the password of a user unencrypted in the LocalStorage of a web browser. This makes the user password susceptible to exfiltration via Cross-site scripting (see GHSL-2024-128). This vulnerability is fixed in 5.19.0. This only affects Open Source edition, and not OpenC3 COSMOS Enterprise Edition.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://github.com/OpenC3/cosmos/commit/b5ab34fe7fa54c0c8171c4aa3caf4e03d6f63bd7", | ||
"https://github.com/OpenC3/cosmos/security/advisories/GHSA-4xqv-47rm-37mm" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://github.com", | ||
"cpes": [ | ||
"cpe:2.3:a:openc3:cosmos:*:*:*:*:open_source:*:*:*" | ||
], | ||
"packageName": "openc3/cosmos", | ||
"product": "cosmos", | ||
"repo": "https://github.com/openc3/cosmos", | ||
"vendor": "OpenC3", | ||
"versions": [ | ||
{ | ||
"lessThan": "5.19.0", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "github_m", | ||
"cveId": "CVE-2024-47773", | ||
"description": "Discourse is an open source platform for community discussion. An attacker can make several XHR requests until the cache is poisoned with a response without any preloaded data. This issue only affects anonymous visitors of the site. This problem has been patched in the latest version of Discourse. Users are advised to upgrade. Users unable to upgrade should disable anonymous cache by setting the `DISCOURSE_DISABLE_ANON_CACHE` environment variable to a non-empty value.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://github.com/discourse/discourse/security/advisories/GHSA-58vv-9j8h-hw2v" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://github.com", | ||
"cpes": [ | ||
"cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*" | ||
], | ||
"packageName": "discourse/discourse", | ||
"product": "discourse", | ||
"repo": "https://github.com/discourse/discourse", | ||
"vendor": "discourse", | ||
"versions": [ | ||
{ | ||
"lessThan": "3.3.2", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "custom" | ||
}, | ||
{ | ||
"lessThan": "3.4.0.beta2", | ||
"status": "affected", | ||
"version": "3.4.0.beta1", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,57 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "github_m", | ||
"cveId": "CVE-2024-47780", | ||
"description": "TYPO3 is a free and open source Content Management Framework. Backend users could see items in the backend page tree without having access if the mounts pointed to pages restricted for their user/group, or if no mounts were configured but the pages allowed access to \"everybody.\" However, affected users could not manipulate these pages. Users are advised to update to TYPO3 versions 10.4.46 ELTS, 11.5.40 LTS, 12.4.21 LTS, 13.3.1 that fix the problem described. There are no known workarounds for this vulnerability.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://github.com/TYPO3/typo3/security/advisories/GHSA-rf5m-h8q9-9w6q", | ||
"https://typo3.org/security/advisory/typo3-core-sa-2024-012" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://packagist.org", | ||
"cpes": [ | ||
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:php:*:*" | ||
], | ||
"packageName": "typo3/cms-backend", | ||
"packageType": "php-composer", | ||
"product": "typo3", | ||
"repo": "https://github.com/typo3/typo3", | ||
"vendor": "TYPO3", | ||
"versions": [ | ||
{ | ||
"lessThan": "10.4.46", | ||
"status": "affected", | ||
"version": "10.0.0", | ||
"versionType": "custom" | ||
}, | ||
{ | ||
"lessThan": "11.5.40", | ||
"status": "affected", | ||
"version": "11.0.0", | ||
"versionType": "custom" | ||
}, | ||
{ | ||
"lessThan": "12.4.21", | ||
"status": "affected", | ||
"version": "12.0.0", | ||
"versionType": "custom" | ||
}, | ||
{ | ||
"lessThan": "13.3.1", | ||
"status": "affected", | ||
"version": "13.0.0", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,39 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "github_m", | ||
"cveId": "CVE-2024-47822", | ||
"description": "Directus is a real-time API and App dashboard for managing SQL database content. Access tokens from query strings are not redacted and are potentially exposed in system logs which may be persisted. The access token in `req.query` is not redacted when the `LOG_STYLE` is set to `raw`. If these logs are not properly sanitized or protected, an attacker with access to it can potentially gain administrative control, leading to unauthorized data access and manipulation. This impacts systems where the `LOG_STYLE` is set to `raw`. The `access_token` in the query could potentially be a long-lived static token. Users with impacted systems should rotate their static tokens if they were provided using query string. This vulnerability has been patched in release version 10.13.2 and subsequent releases as well. Users are advised to upgrade. There are no known workarounds for this vulnerability.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://github.com/directus/directus/security/advisories/GHSA-vw58-ph65-6rxp" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://registry.npmjs.org", | ||
"cpes": [ | ||
"cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", | ||
"cpe:2.3:a:rangerstudio:directus:*:*:*:*:*:node.js:*:*" | ||
], | ||
"packageName": "directus", | ||
"packageType": "npm", | ||
"product": "directus", | ||
"repo": "https://github.com/directus/directus", | ||
"vendor": "directus", | ||
"versions": [ | ||
{ | ||
"lessThan": "10.13.2", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,34 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "jetbrains", | ||
"cveId": "CVE-2024-47948", | ||
"description": "In JetBrains TeamCity before 2024.07.3 path traversal leading to information disclosure was possible via server backups", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://www.jetbrains.com/privacy-security/issues-fixed/" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"cpes": [ | ||
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" | ||
], | ||
"product": "TeamCity", | ||
"vendor": "JetBrains", | ||
"versions": [ | ||
{ | ||
"lessThan": "2024.07.3", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,34 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "jetbrains", | ||
"cveId": "CVE-2024-47949", | ||
"description": "In JetBrains TeamCity before 2024.07.3 path traversal allowed backup file write to arbitrary location", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://www.jetbrains.com/privacy-security/issues-fixed/" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"cpes": [ | ||
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*" | ||
], | ||
"product": "TeamCity", | ||
"vendor": "JetBrains", | ||
"versions": [ | ||
{ | ||
"lessThan": "2024.07.3", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
Oops, something went wrong.