Skip to content

Commit

Permalink
more updates 2024-11-05
Browse files Browse the repository at this point in the history
Signed-off-by: Weston Steimel <[email protected]>
  • Loading branch information
westonsteimel committed Nov 5, 2024
1 parent bc67da1 commit f935625
Show file tree
Hide file tree
Showing 21 changed files with 821 additions and 1 deletion.
44 changes: 44 additions & 0 deletions data/anchore/2023/CVE-2023-34443.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
{
"additionalMetadata": {
"cna": "github_m",
"cveId": "CVE-2023-34443",
"description": "Combodo iTop is a simple, web based IT Service Management tool. When displaying page Run queries Cross-site Scripting (XSS) are possible for scripts outside of script tags. This has been fixed in versions 2.7.9, 3.0.4, 3.1.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://github.com/Combodo/iTop/security/advisories/GHSA-9mx6-pwpp-j3xx",
"https://huntr.dev/bounties/c230d55d-1f0e-40c3-8c7e-20587d3e54da/?token=4d1195d5a50a9f0f7ae9fc24a2b0a3bd907427edaf7ee6ac1f8f31c11d8b7a5d2c204957125e63fd7cf3a87df6d5d12a35f9c7107ba5f33b5f668fa199a36932448b9bf186daa62cb32b5635770730eb68eeeba079b8864ab00358fd0dc65fa406d986525814a14951db2025e117f0098a1f270f5a5b2c935a65b00b5106e5511b61d501c4357654cb8ea76b"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://github.com",
"cpes": [
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*"
],
"packageName": "combodo/itop",
"product": "iTop",
"repo": "https://github.com/combodo/itop",
"vendor": "Combodo",
"versions": [
{
"lessThan": "2.7.9",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "3.0.4",
"status": "affected",
"version": "3.0.0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
43 changes: 43 additions & 0 deletions data/anchore/2023/CVE-2023-34444.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
{
"additionalMetadata": {
"cna": "github_m",
"cveId": "CVE-2023-34444",
"description": "Combodo iTop is a simple, web based IT Service Management tool. When displaying pages/ajax.searchform.php XSS are possible for scripts outside of script tags. This issue has been fixed in versions 2.7.9, 3.0.4, 3.1.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://github.com/Combodo/iTop/security/advisories/GHSA-rwx9-rcxf-qrwv"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://github.com",
"cpes": [
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*"
],
"packageName": "combodo/itop",
"product": "iTop",
"repo": "https://github.com/combodo/itop",
"vendor": "Combodo",
"versions": [
{
"lessThan": "2.7.9",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "3.0.4",
"status": "affected",
"version": "3.0.0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
43 changes: 43 additions & 0 deletions data/anchore/2023/CVE-2023-34445.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
{
"additionalMetadata": {
"cna": "github_m",
"cveId": "CVE-2023-34445",
"description": "Combodo iTop is a simple, web based IT Service Management tool. When displaying pages/ajax.render.php XSS are possible for scripts outside of script tags. This issue has been fixed in versions 2.7.9, 3.0.4, 3.1.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://github.com/Combodo/iTop/security/advisories/GHSA-mm45-wh68-jpvq"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://github.com",
"cpes": [
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*"
],
"packageName": "combodo/itop",
"product": "iTop",
"repo": "https://github.com/combodo/itop",
"vendor": "Combodo",
"versions": [
{
"lessThan": "2.7.9",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "3.0.4",
"status": "affected",
"version": "3.0.0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
38 changes: 38 additions & 0 deletions data/anchore/2024/CVE-2024-23590.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"additionalMetadata": {
"cna": "apache",
"cveId": "CVE-2024-23590",
"description": "Session Fixation vulnerability in Apache Kylin.\n\nThis issue affects Apache Kylin: from 2.0.0 through 4.x.\n\nUsers are recommended to upgrade to version 5.0.0 or above, which fixes the issue.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://lists.apache.org/thread/7161154h0k6zygr9917qq0g95p39szml"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://repo.maven.apache.org/maven2",
"cpes": [
"cpe:2.3:a:apache:kylin:*:*:*:*:*:maven:*:*",
"cpe:2.3:a:org.apache.kylin:kylin:*:*:*:*:*:maven:*:*"
],
"packageName": "org.apache.kylin:kylin",
"packageType": "maven",
"product": "Apache Kylin",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThan": "5.0.0",
"status": "affected",
"version": "2.0.0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
37 changes: 37 additions & 0 deletions data/anchore/2024/CVE-2024-31448.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
{
"additionalMetadata": {
"cna": "github_m",
"cveId": "CVE-2024-31448",
"description": "Combodo iTop is a simple, web based IT Service Management tool. By filling malicious code in a CSV content, an Cross-site Scripting (XSS) attack can be performed when importing this content. This issue has been fixed in versions 3.1.2 and 3.2.0. All users are advised to upgrade. Users unable to upgrade should validate CSV content before importing it.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://github.com/Combodo/iTop/security/advisories/GHSA-776w-x6v7-vfwf"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://github.com",
"cpes": [
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*"
],
"packageName": "combodo/itop",
"product": "iTop",
"repo": "https://github.com/combodo/itop",
"vendor": "Combodo",
"versions": [
{
"lessThan": "3.1.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
37 changes: 37 additions & 0 deletions data/anchore/2024/CVE-2024-31998.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
{
"additionalMetadata": {
"cna": "github_m",
"cveId": "CVE-2024-31998",
"description": "Combodo iTop is a simple, web based IT Service Management tool. A CSRF can be performed on CSV import simulation. This issue has been fixed in versions 3.1.2 and 3.2.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://github.com/Combodo/iTop/security/advisories/GHSA-8cwx-q4xh-7c7r"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://github.com",
"cpes": [
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*"
],
"packageName": "combodo/itop",
"product": "iTop",
"repo": "https://github.com/combodo/itop",
"vendor": "Combodo",
"versions": [
{
"lessThan": "3.1.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
49 changes: 49 additions & 0 deletions data/anchore/2024/CVE-2024-32870.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,49 @@
{
"additionalMetadata": {
"cna": "github_m",
"cveId": "CVE-2024-32870",
"description": "Combodo iTop is a simple, web based IT Service Management tool. Server, OS, DBMS, PHP, and iTop info (name, version and parameters) can be read by anyone having access to iTop URI. This issue has been patched in versions 2.7.11, 3.0.5, 3.1.2, and 3.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://github.com/Combodo/iTop/security/advisories/GHSA-rfjh-2f5x-qxmx"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://github.com",
"cpes": [
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*"
],
"packageName": "combodo/itop",
"product": "iTop",
"repo": "https://github.com/combodo/itop",
"vendor": "Combodo",
"versions": [
{
"lessThan": "2.7.11",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "3.0.5",
"status": "affected",
"version": "3.0.0",
"versionType": "custom"
},
{
"lessThan": "3.1.2",
"status": "affected",
"version": "3.1.0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
43 changes: 43 additions & 0 deletions data/anchore/2024/CVE-2024-37946.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
{
"additionalMetadata": {
"cna": "patchstack",
"cveId": "CVE-2024-37946",
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in weDevs ReCaptcha Integration for WordPress allows Stored XSS.This issue affects ReCaptcha Integration for WordPress: from n/a through 1.2.5.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://patchstack.com/database/vulnerability/wp-recaptcha-integration/wordpress-recaptcha-integration-for-wordpress-plugin-1-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:wedevs:recaptcha_integration:*:*:*:*:*:wordpress:*:*"
],
"packageName": "wp-recaptcha-integration",
"packageType": "wordpress-plugin",
"product": "ReCaptcha Integration for WordPress",
"repo": "https://plugins.svn.wordpress.org/wp-recaptcha-integration",
"vendor": "weDevs",
"versions": [
{
"lessThanOrEqual": "1.2.5",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a469a2cb-1011-4d47-95d2-0b895f24ae8f?source=cve"
}
]
}
}
2 changes: 1 addition & 1 deletion data/anchore/2024/CVE-2024-43209.json
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@
"vendor": "Bitly",
"versions": [
{
"lessThanOrEqual": "2.7.2",
"lessThan": "2.7.3",
"status": "affected",
"version": "0",
"versionType": "custom"
Expand Down
38 changes: 38 additions & 0 deletions data/anchore/2024/CVE-2024-50525.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"additionalMetadata": {
"cna": "patchstack",
"cveId": "CVE-2024-50525",
"description": "Unrestricted Upload of File with Dangerous Type vulnerability in Helloprint Plug your WooCommerce into the largest catalog of customized print products from Helloprint allows Upload a Web Shell to a Web Server.This issue affects Plug your WooCommerce into the largest catalog of customized print products from Helloprint: from n/a through 2.0.2.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://patchstack.com/database/vulnerability/helloprint/wordpress-helloprint-plugin-2-0-2-arbitrary-file-upload-vulnerability?_s_id=cve"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:helloprint:helloprint:*:*:*:*:*:wordpress:*:*"
],
"packageName": "helloprint",
"packageType": "wordpress-plugin",
"product": "Plug your WooCommerce into the largest catalog of customized print products from Helloprint",
"repo": "https://plugins.svn.wordpress.org/helloprint",
"vendor": "Helloprint",
"versions": [
{
"lessThanOrEqual": "2.0.2",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
Loading

0 comments on commit f935625

Please sign in to comment.