Skip to content

Commit

Permalink
updates 2024-11-19
Browse files Browse the repository at this point in the history
Signed-off-by: Weston Steimel <[email protected]>
  • Loading branch information
westonsteimel committed Nov 19, 2024
1 parent 706356a commit 6c91c09
Show file tree
Hide file tree
Showing 29 changed files with 1,119 additions and 4 deletions.
6 changes: 3 additions & 3 deletions data/anchore/2019/CVE-2019-10247.json
Original file line number Diff line number Diff line change
Expand Up @@ -43,19 +43,19 @@
"lessThan": "9.2.28.v20190418",
"status": "affected",
"version": "7.0.0",
"versionType": "custom"
"versionType": "maven"
},
{
"lessThan": "9.3.27.v20190418",
"status": "affected",
"version": "9.3.0",
"versionType": "custom"
"versionType": "maven"
},
{
"lessThan": "9.4.17.v20190418",
"status": "affected",
"version": "9.4.0",
"versionType": "custom"
"versionType": "maven"
}
]
}
Expand Down
43 changes: 43 additions & 0 deletions data/anchore/2024/CVE-2024-0820.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
{
"additionalMetadata": {
"cna": "wpscan",
"cveId": "CVE-2024-0820",
"description": "The Jobs for WordPress plugin before 2.7.4 does not sanitise and escape some parameters, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://wpscan.com/vulnerability/fc091bbd-7338-4bd4-add5-e46502a9a949/"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:blueglass:jobs_for_wordpress:*:*:*:*:*:wordpress:*:*"
],
"packageName": "job-postings",
"packageType": "wordpress-plugin",
"product": "Jobs for WordPress",
"repo": "https://plugins.svn.wordpress.org/job-postings",
"vendor": "BlueGlass",
"versions": [
{
"lessThan": "2.7.4",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/37c18340-d7aa-4410-be17-c61c286838ce?source=cve"
}
]
}
}
2 changes: 2 additions & 0 deletions data/anchore/2024/CVE-2024-10104.json
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,8 @@
"packageName": "job-postings",
"packageType": "wordpress-plugin",
"product": "Jobs for WordPress",
"repo": "https://plugins.svn.wordpress.org/job-postings",
"vendor": "BlueGlass",
"versions": [
{
"lessThan": "2.7.8",
Expand Down
32 changes: 32 additions & 0 deletions data/anchore/2024/CVE-2024-21287.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
{
"additionalMetadata": {
"cna": "oracle",
"cveId": "CVE-2024-21287",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://www.oracle.com/security-alerts/alert-cve-2024-21287.html"
]
},
"adp": {
"affected": [
{
"cpes": [
"cpe:2.3:a:oracle:agile_plm_framework:*:*:*:*:*:*:*:*"
],
"product": "Oracle Agile PLM Framework",
"vendor": "Oracle Corporation",
"versions": [
{
"status": "affected",
"version": "9.3.6",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
2 changes: 1 addition & 1 deletion data/anchore/2024/CVE-2024-2833.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@
"packageType": "wordpress-plugin",
"product": "Jobs for WordPress",
"repo": "https://plugins.svn.wordpress.org/job-postings",
"vendor": "blueglassch",
"vendor": "BlueGlass",
"versions": [
{
"lessThan": "2.7.6",
Expand Down
38 changes: 38 additions & 0 deletions data/anchore/2024/CVE-2024-30263.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"additionalMetadata": {
"cna": "github_m",
"cveId": "CVE-2024-30263",
"description": "macro-pdfviewer is a PDF Viewer Macro for XWiki using Mozilla pdf.js. Users with edit rights can access restricted PDF attachments using the PDF Viewer macro, just by passing the attachment URL as the value of the ``file`` parameter. Users with view rights can access restricted PDF attachments if they are shown on public pages where the PDF Viewer macro is called using the attachment URL instead of its reference. This vulnerability has been patched in version 2.5.1.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://github.com/xwikisas/macro-pdfviewer/issues/49",
"https://github.com/xwikisas/macro-pdfviewer/security/advisories/GHSA-93qq-2h34-g29f"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://github.com",
"cpes": [
"cpe:2.3:a:xwiki:pdf_viewer_macro:*:*:*:*:pro:*:*:*"
],
"packageName": "xwikisas/macro-pdfviewer",
"product": "macro-pdfviewer",
"repo": "https://github.com/xwikisas/macro-pdfviewer",
"vendor": "xwikisas",
"versions": [
{
"lessThan": "2.5.1",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
39 changes: 39 additions & 0 deletions data/anchore/2024/CVE-2024-37155.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
{
"additionalMetadata": {
"cna": "github_m",
"cveId": "CVE-2024-37155",
"description": "OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. Prior to version 6.1.9, the regex validation used to prevent Introspection queries can be bypassed by removing the extra whitespace, carriage return, and line feed characters from the query. GraphQL Queries in OpenCTI can be validated using the `secureIntrospectionPlugin`. The regex check in the plkugin can be bypassed by removing the carriage return and line feed characters (`\\r\\n`). Running a curl command against a local instance of OpenCTI will result in a limited error message. By running the same Introspection query without the `\\r\\n` characters, the unauthenticated user is able to successfully run a full Introspection query. Bypassing this restriction allows the attacker to gather a wealth of information about the GraphQL endpoint functionality that can be used to perform actions and/or read data without authorization. These queries can also be weaponized to conduct a Denial of Service (DoS) attack if sent repeatedly. Users should upgrade to version 6.1.9 to receive a patch for the issue.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://github.com/OpenCTI-Platform/opencti/blob/6343b82b0b0a5d3ded3b30d08ce282328a556268/opencti-platform/opencti-graphql/src/graphql/graphql.js#L83-L94",
"https://github.com/OpenCTI-Platform/opencti/commit/f87d96918c63b0c3d3ebfbea6c789d48e2f56ad5",
"https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-4mvw-j8r9-xcgc"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://github.com",
"cpes": [
"cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:*"
],
"packageName": "opencti-platform/opencti",
"product": "opencti",
"repo": "https://github.com/opencti-platform/opencti",
"vendor": "OpenCTI-Platform",
"versions": [
{
"lessThan": "6.1.9",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
38 changes: 38 additions & 0 deletions data/anchore/2024/CVE-2024-43416.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
{
"additionalMetadata": {
"cna": "github_m",
"cveId": "CVE-2024-43416",
"description": "GLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.17, an unauthenticated user can use an application endpoint to check if an email address corresponds to a valid GLPI user. Version 10.0.17 fixes the issue.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://github.com/glpi-project/glpi/commit/9be1466053f829680db318f7e7e5880d2d789c6d",
"https://github.com/glpi-project/glpi/security/advisories/GHSA-j8gc-xpgr-2ww7"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://github.com",
"cpes": [
"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*"
],
"packageName": "glpi-project/glpi",
"product": "glpi",
"repo": "https://github.com/glpi-project/glpi",
"vendor": "glpi-project",
"versions": [
{
"lessThan": "10.0.17",
"status": "affected",
"version": "0.80",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
37 changes: 37 additions & 0 deletions data/anchore/2024/CVE-2024-47208.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
{
"additionalMetadata": {
"cna": "apache",
"cveId": "CVE-2024-47208",
"description": "Server-Side Request Forgery (SSRF), Improper Control of Generation of Code ('Code Injection') vulnerability in Apache OFBiz.\n\nThis issue affects Apache OFBiz: before 18.12.17.\n\nUsers are recommended to upgrade to version 18.12.17, which fixes the issue.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://issues.apache.org/jira/browse/OFBIZ-13158",
"https://lists.apache.org/thread/022r19skfofhv3lzql33vowlrvqndh11",
"https://ofbiz.apache.org/download.html",
"https://ofbiz.apache.org/security.html"
]
},
"adp": {
"affected": [
{
"cpes": [
"cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*"
],
"product": "Apache OFBiz",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThan": "18.12.17",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
47 changes: 47 additions & 0 deletions data/anchore/2024/CVE-2024-47533.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
{
"additionalMetadata": {
"cna": "github_m",
"cveId": "CVE-2024-47533",
"description": "Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyone to connect to cobbler XML-RPC as user `''` password `-1` and make any changes. This gives anyone with network access to a cobbler server full control of the server. Versions 3.2.3 and 3.3.7 fix the issue.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://github.com/cobbler/cobbler/commit/32c5cada013dc8daa7320a8eda9932c2814742b0",
"https://github.com/cobbler/cobbler/commit/e19717623c10b29e7466ed4ab23515a94beb2dda",
"https://github.com/cobbler/cobbler/security/advisories/GHSA-m26c-fcgh-cp6h"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://pypi.org",
"cpes": [
"cpe:2.3:a:cobbler_project:cobbler:*:*:*:*:*:python:*:*",
"cpe:2.3:a:cobblerd:cobbler:*:*:*:*:*:python:*:*"
],
"packageName": "cobbler",
"packageType": "python",
"product": "cobbler",
"repo": "https://github.com/cobbler/cobbler",
"vendor": "cobbler",
"versions": [
{
"lessThan": "3.2.3",
"status": "affected",
"version": "3.0.0",
"versionType": "python"
},
{
"lessThan": "3.3.7",
"status": "affected",
"version": "3.3.0",
"versionType": "python"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
59 changes: 59 additions & 0 deletions data/anchore/2024/CVE-2024-47873.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
{
"additionalMetadata": {
"cna": "github_m",
"cveId": "CVE-2024-47873",
"description": "PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. The XmlScanner class has a scan method which should prevent XXE attacks. However, prior to versions 1.9.4, 2.1.3, 2.3.2, and 3.4.0, the regexes used in the `scan` method and the findCharSet method can be bypassed by using UCS-4 and encoding guessing. An attacker can bypass the sanitizer and achieve an XML external entity attack. Versions 1.9.4, 2.1.3, 2.3.2, and 3.4.0 fix the issue.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://github.com/PHPOffice/PhpSpreadsheet/blob/39fc51309181e82593b06e2fa8e45ef8333a0335/src/PhpSpreadsheet/Reader/Security/XmlScanner.php",
"https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-jw4x-v69f-hh5w",
"https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing",
"https://www.w3.org/TR/xml/#sec-guessing-no-ext-info"
]
},
"adp": {
"affected": [
{
"collectionURL": "https://packagist.org",
"cpes": [
"cpe:2.3:a:phpspreadsheet_project:phpspreadsheet:*:*:*:*:*:php:*:*"
],
"packageName": "phpoffice/phpspreadsheet",
"packageType": "php-composer",
"product": "PhpSpreadsheet",
"repo": "https://github.com/phpoffice/phpspreadsheet",
"vendor": "PHPOffice",
"versions": [
{
"lessThan": "1.29.4",
"status": "affected",
"version": "0",
"versionType": "custom"
},
{
"lessThan": "2.1.3",
"status": "affected",
"version": "2.0.0",
"versionType": "custom"
},
{
"lessThan": "2.3.2",
"status": "affected",
"version": "2.2.0",
"versionType": "custom"
},
{
"lessThan": "3.4.0",
"status": "affected",
"version": "3.3.0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
Loading

0 comments on commit 6c91c09

Please sign in to comment.