-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Signed-off-by: Weston Steimel <[email protected]>
- Loading branch information
1 parent
bc67da1
commit f935625
Showing
21 changed files
with
821 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,44 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "github_m", | ||
"cveId": "CVE-2023-34443", | ||
"description": "Combodo iTop is a simple, web based IT Service Management tool. When displaying page Run queries Cross-site Scripting (XSS) are possible for scripts outside of script tags. This has been fixed in versions 2.7.9, 3.0.4, 3.1.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://github.com/Combodo/iTop/security/advisories/GHSA-9mx6-pwpp-j3xx", | ||
"https://huntr.dev/bounties/c230d55d-1f0e-40c3-8c7e-20587d3e54da/?token=4d1195d5a50a9f0f7ae9fc24a2b0a3bd907427edaf7ee6ac1f8f31c11d8b7a5d2c204957125e63fd7cf3a87df6d5d12a35f9c7107ba5f33b5f668fa199a36932448b9bf186daa62cb32b5635770730eb68eeeba079b8864ab00358fd0dc65fa406d986525814a14951db2025e117f0098a1f270f5a5b2c935a65b00b5106e5511b61d501c4357654cb8ea76b" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://github.com", | ||
"cpes": [ | ||
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" | ||
], | ||
"packageName": "combodo/itop", | ||
"product": "iTop", | ||
"repo": "https://github.com/combodo/itop", | ||
"vendor": "Combodo", | ||
"versions": [ | ||
{ | ||
"lessThan": "2.7.9", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "custom" | ||
}, | ||
{ | ||
"lessThan": "3.0.4", | ||
"status": "affected", | ||
"version": "3.0.0", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "github_m", | ||
"cveId": "CVE-2023-34444", | ||
"description": "Combodo iTop is a simple, web based IT Service Management tool. When displaying pages/ajax.searchform.php XSS are possible for scripts outside of script tags. This issue has been fixed in versions 2.7.9, 3.0.4, 3.1.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://github.com/Combodo/iTop/security/advisories/GHSA-rwx9-rcxf-qrwv" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://github.com", | ||
"cpes": [ | ||
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" | ||
], | ||
"packageName": "combodo/itop", | ||
"product": "iTop", | ||
"repo": "https://github.com/combodo/itop", | ||
"vendor": "Combodo", | ||
"versions": [ | ||
{ | ||
"lessThan": "2.7.9", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "custom" | ||
}, | ||
{ | ||
"lessThan": "3.0.4", | ||
"status": "affected", | ||
"version": "3.0.0", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "github_m", | ||
"cveId": "CVE-2023-34445", | ||
"description": "Combodo iTop is a simple, web based IT Service Management tool. When displaying pages/ajax.render.php XSS are possible for scripts outside of script tags. This issue has been fixed in versions 2.7.9, 3.0.4, 3.1.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://github.com/Combodo/iTop/security/advisories/GHSA-mm45-wh68-jpvq" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://github.com", | ||
"cpes": [ | ||
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" | ||
], | ||
"packageName": "combodo/itop", | ||
"product": "iTop", | ||
"repo": "https://github.com/combodo/itop", | ||
"vendor": "Combodo", | ||
"versions": [ | ||
{ | ||
"lessThan": "2.7.9", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "custom" | ||
}, | ||
{ | ||
"lessThan": "3.0.4", | ||
"status": "affected", | ||
"version": "3.0.0", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "apache", | ||
"cveId": "CVE-2024-23590", | ||
"description": "Session Fixation vulnerability in Apache Kylin.\n\nThis issue affects Apache Kylin: from 2.0.0 through 4.x.\n\nUsers are recommended to upgrade to version 5.0.0 or above, which fixes the issue.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://lists.apache.org/thread/7161154h0k6zygr9917qq0g95p39szml" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://repo.maven.apache.org/maven2", | ||
"cpes": [ | ||
"cpe:2.3:a:apache:kylin:*:*:*:*:*:maven:*:*", | ||
"cpe:2.3:a:org.apache.kylin:kylin:*:*:*:*:*:maven:*:*" | ||
], | ||
"packageName": "org.apache.kylin:kylin", | ||
"packageType": "maven", | ||
"product": "Apache Kylin", | ||
"vendor": "Apache Software Foundation", | ||
"versions": [ | ||
{ | ||
"lessThan": "5.0.0", | ||
"status": "affected", | ||
"version": "2.0.0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "github_m", | ||
"cveId": "CVE-2024-31448", | ||
"description": "Combodo iTop is a simple, web based IT Service Management tool. By filling malicious code in a CSV content, an Cross-site Scripting (XSS) attack can be performed when importing this content. This issue has been fixed in versions 3.1.2 and 3.2.0. All users are advised to upgrade. Users unable to upgrade should validate CSV content before importing it.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://github.com/Combodo/iTop/security/advisories/GHSA-776w-x6v7-vfwf" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://github.com", | ||
"cpes": [ | ||
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" | ||
], | ||
"packageName": "combodo/itop", | ||
"product": "iTop", | ||
"repo": "https://github.com/combodo/itop", | ||
"vendor": "Combodo", | ||
"versions": [ | ||
{ | ||
"lessThan": "3.1.2", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "github_m", | ||
"cveId": "CVE-2024-31998", | ||
"description": "Combodo iTop is a simple, web based IT Service Management tool. A CSRF can be performed on CSV import simulation. This issue has been fixed in versions 3.1.2 and 3.2.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://github.com/Combodo/iTop/security/advisories/GHSA-8cwx-q4xh-7c7r" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://github.com", | ||
"cpes": [ | ||
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" | ||
], | ||
"packageName": "combodo/itop", | ||
"product": "iTop", | ||
"repo": "https://github.com/combodo/itop", | ||
"vendor": "Combodo", | ||
"versions": [ | ||
{ | ||
"lessThan": "3.1.2", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,49 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "github_m", | ||
"cveId": "CVE-2024-32870", | ||
"description": "Combodo iTop is a simple, web based IT Service Management tool. Server, OS, DBMS, PHP, and iTop info (name, version and parameters) can be read by anyone having access to iTop URI. This issue has been patched in versions 2.7.11, 3.0.5, 3.1.2, and 3.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://github.com/Combodo/iTop/security/advisories/GHSA-rfjh-2f5x-qxmx" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://github.com", | ||
"cpes": [ | ||
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" | ||
], | ||
"packageName": "combodo/itop", | ||
"product": "iTop", | ||
"repo": "https://github.com/combodo/itop", | ||
"vendor": "Combodo", | ||
"versions": [ | ||
{ | ||
"lessThan": "2.7.11", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "custom" | ||
}, | ||
{ | ||
"lessThan": "3.0.5", | ||
"status": "affected", | ||
"version": "3.0.0", | ||
"versionType": "custom" | ||
}, | ||
{ | ||
"lessThan": "3.1.2", | ||
"status": "affected", | ||
"version": "3.1.0", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "patchstack", | ||
"cveId": "CVE-2024-37946", | ||
"description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in weDevs ReCaptcha Integration for WordPress allows Stored XSS.This issue affects ReCaptcha Integration for WordPress: from n/a through 1.2.5.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://patchstack.com/database/vulnerability/wp-recaptcha-integration/wordpress-recaptcha-integration-for-wordpress-plugin-1-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"cpes": [ | ||
"cpe:2.3:a:wedevs:recaptcha_integration:*:*:*:*:*:wordpress:*:*" | ||
], | ||
"packageName": "wp-recaptcha-integration", | ||
"packageType": "wordpress-plugin", | ||
"product": "ReCaptcha Integration for WordPress", | ||
"repo": "https://plugins.svn.wordpress.org/wp-recaptcha-integration", | ||
"vendor": "weDevs", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "1.2.5", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
}, | ||
"references": [ | ||
{ | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a469a2cb-1011-4d47-95d2-0b895f24ae8f?source=cve" | ||
} | ||
] | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,38 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "patchstack", | ||
"cveId": "CVE-2024-50525", | ||
"description": "Unrestricted Upload of File with Dangerous Type vulnerability in Helloprint Plug your WooCommerce into the largest catalog of customized print products from Helloprint allows Upload a Web Shell to a Web Server.This issue affects Plug your WooCommerce into the largest catalog of customized print products from Helloprint: from n/a through 2.0.2.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://patchstack.com/database/vulnerability/helloprint/wordpress-helloprint-plugin-2-0-2-arbitrary-file-upload-vulnerability?_s_id=cve" | ||
] | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"cpes": [ | ||
"cpe:2.3:a:helloprint:helloprint:*:*:*:*:*:wordpress:*:*" | ||
], | ||
"packageName": "helloprint", | ||
"packageType": "wordpress-plugin", | ||
"product": "Plug your WooCommerce into the largest catalog of customized print products from Helloprint", | ||
"repo": "https://plugins.svn.wordpress.org/helloprint", | ||
"vendor": "Helloprint", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "2.0.2", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
Oops, something went wrong.