diff --git a/data/anchore/2023/CVE-2023-34370.json b/data/anchore/2023/CVE-2023-34370.json new file mode 100644 index 00000000..61116385 --- /dev/null +++ b/data/anchore/2023/CVE-2023-34370.json @@ -0,0 +1,54 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2023-34370", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "packageName": "astra-sites", + "product": "Starter Templates — Elementor, WordPress & Beaver Builder Templates", + "vendor": "Brainstorm Force", + "repo": "https://plugins.svn.wordpress.org/astra-sites", + "cpes": [ + "cpe:2.3:a:brainstormforce:starter_templates:*:*:*:*:*:wordpress:*:*" + ], + "versions": [ + { + "lessThan": "3.2.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + }, + { + "packageName": "astra-pro-sites", + "product": "Premium Starter Templates", + "vendor": "Brainstorm Force", + "cpes": [ + "cpe:2.3:a:brainstormforce:starter_templates:*:*:*:*:*:wordpress:*:*" + ], + "versions": [ + { + "lessThan": "3.2.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e0bdbba-2b67-42b9-8c26-115d472aed0e?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31430.json b/data/anchore/2024/CVE-2024-31430.json new file mode 100644 index 00000000..8de6b5ce --- /dev/null +++ b/data/anchore/2024/CVE-2024-31430.json @@ -0,0 +1,56 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-31430", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "packageName": "bulk-editor", + "product": "WOLF – WordPress Posts Bulk Editor and Manager Professional", + "vendor": "realmag777", + "repo": "https://plugins.svn.wordpress.org/bulk-editor", + "cpes": [ + "cpe:2.3:a:pluginus:wolf_-_wordpress_posts_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*" + ], + "versions": [ + { + "lessThan": "1.0.8.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://wordpress.org/plugins", + "packageName": "woo-bulk-editor", + "product": "BEAR – Bulk Editor and Products Manager Professional for WooCommerce by Pluginus.Net", + "vendor": "realmag777", + "repo": "https://plugins.svn.wordpress.org/woo-bulk-editor", + "cpes": [ + "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*" + ], + "versions": [ + { + "lessThan": "1.1.4.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/12188a74-b1a6-4aa4-88b4-2d0d0dd32916?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-4233.json b/data/anchore/2024/CVE-2024-4233.json new file mode 100644 index 00000000..b35383a7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-4233.json @@ -0,0 +1,74 @@ +{ + "additionalMetadata": { + "cna": "patchstack", + "cveId": "CVE-2024-4233", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "adp": { + "affected": [ + { + "collectionURL": "https://wordpress.org/plugins", + "packageName": "woocommerce-delivery-notes", + "product": "Print Invoice & Delivery Notes for WooCommerce", + "vendor": "Tyche Softwares", + "repo": "https://plugins.svn.wordpress.org/woocommerce-delivery-notes", + "cpes": [ + "cpe:2.3:a:tychesoftwares:print_invoice_\\&_delivery_notes_for_woocommerce:*:*:*:*:*:wordpress:*:*" + ], + "versions": [ + { + "lessThan": "4.9.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://wordpress.org/plugins", + "packageName": "arconix-shortcodes", + "product": "Arconix Shortcodes", + "vendor": "Tyche Softwares", + "repo": "https://plugins.svn.wordpress.org/arconix-shortcodes", + "cpes": [ + "cpe:2.3:a:tychesoftwares:arconix_shortcodes:*:*:*:*:*:wordpress:*:*" + ], + "versions": [ + { + "lessThan": "2.1.11", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://wordpress.org/plugins", + "packageName": "arconix-faq", + "product": "Arconix FAQ", + "vendor": "Tyche Softwares", + "repo": "https://plugins.svn.wordpress.org/arconix-faq", + "cpes": [ + "cpe:2.3:a:tychesoftwares:arconix_faq:*:*:*:*:*:wordpress:*:*" + ], + "versions": [ + { + "lessThan": "1.9.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + }, + "references": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8a07d293-4c50-4be0-955f-b7c4a0eaef4b?source=cve" + } + ] + } +} \ No newline at end of file