From eb37c9a8b2a4ddfcd1c76376b144cf102e896c6a Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" Date: Thu, 9 Jan 2025 16:33:14 +0000 Subject: [PATCH] chore: generate overrides as of https://github.com/anchore/cve-data-enrichment/commit/3f9a15409bd9aa78eee7e3a2e1144873ff4f1af9 --- data/2023/CVE-2023-28120.json | 34 ++++++++++++ data/2023/CVE-2023-38037.json | 35 ++++++++++++ data/2024/CVE-2024-10585.json | 27 +++++++++ data/2024/CVE-2024-10892.json | 6 ++ data/2024/CVE-2024-11270.json | 27 +++++++++ data/2024/CVE-2024-11271.json | 27 +++++++++ data/2024/CVE-2024-11613.json | 27 +++++++++ data/2024/CVE-2024-11635.json | 27 +++++++++ data/2024/CVE-2024-11816.json | 27 +++++++++ data/2024/CVE-2024-11916.json | 27 +++++++++ data/2024/CVE-2024-11939.json | 27 +++++++++ data/2024/CVE-2024-12030.json | 27 +++++++++ data/2024/CVE-2024-12045.json | 27 +++++++++ data/2024/CVE-2024-12205.json | 27 +++++++++ data/2024/CVE-2024-12328.json | 27 +++++++++ data/2024/CVE-2024-12431.json | 100 ++++++++++++++++++++++++++++++++++ data/2024/CVE-2024-12584.json | 27 +++++++++ data/2024/CVE-2024-12712.json | 27 +++++++++ data/2024/CVE-2024-12852.json | 27 +++++++++ data/2024/CVE-2024-12854.json | 27 +++++++++ data/2024/CVE-2024-13041.json | 100 ++++++++++++++++++++++++++++++++++ data/2024/CVE-2024-1388.json | 27 +++++++++ data/2024/CVE-2024-27980.json | 53 ++++++++++++++++++ data/2024/CVE-2024-32524.json | 33 +++++++++++ data/2024/CVE-2024-32708.json | 33 +++++++++++ data/2024/CVE-2024-37372.json | 35 ++++++++++++ data/2024/CVE-2024-45033.json | 27 +++++++++ data/2024/CVE-2024-54676.json | 41 ++++++++++++++ data/2024/CVE-2024-56042.json | 6 ++ data/2024/CVE-2024-56043.json | 6 ++ data/2024/CVE-2024-56044.json | 6 ++ data/2024/CVE-2024-56045.json | 6 ++ data/2024/CVE-2024-56046.json | 6 ++ data/2024/CVE-2024-56047.json | 6 ++ data/2024/CVE-2024-56048.json | 10 +++- data/2024/CVE-2024-56049.json | 6 ++ data/2024/CVE-2024-56050.json | 6 ++ data/2024/CVE-2024-56051.json | 6 ++ data/2024/CVE-2024-56052.json | 6 ++ data/2024/CVE-2024-56053.json | 6 ++ data/2024/CVE-2024-56054.json | 6 ++ data/2024/CVE-2024-56055.json | 6 ++ data/2024/CVE-2024-56057.json | 6 ++ data/2024/CVE-2024-56060.json | 6 ++ data/2024/CVE-2024-56061.json | 6 ++ data/2024/CVE-2024-56062.json | 6 ++ data/2024/CVE-2024-56063.json | 6 ++ data/2024/CVE-2024-56210.json | 6 ++ data/2024/CVE-2024-56211.json | 6 ++ data/2024/CVE-2024-56212.json | 6 ++ data/2024/CVE-2024-56213.json | 6 ++ data/2024/CVE-2024-56214.json | 6 ++ data/2024/CVE-2024-56216.json | 6 ++ data/2024/CVE-2024-56217.json | 6 ++ data/2024/CVE-2024-56225.json | 6 ++ data/2024/CVE-2024-56226.json | 6 ++ data/2024/CVE-2024-56227.json | 6 ++ data/2024/CVE-2024-56229.json | 6 ++ data/2024/CVE-2024-56237.json | 6 ++ data/2024/CVE-2024-56241.json | 6 ++ data/2024/CVE-2024-56242.json | 6 ++ data/2024/CVE-2024-56245.json | 6 ++ data/2024/CVE-2024-56246.json | 6 ++ data/2024/CVE-2024-56247.json | 6 ++ data/2024/CVE-2024-56251.json | 6 ++ data/2024/CVE-2024-56252.json | 6 ++ data/2024/CVE-2024-56253.json | 6 ++ data/2024/CVE-2024-56254.json | 6 ++ data/2024/CVE-2024-56259.json | 10 +++- data/2024/CVE-2024-56266.json | 6 ++ data/2024/CVE-2024-56273.json | 10 +++- data/2024/CVE-2024-56274.json | 10 +++- data/2024/CVE-2024-56275.json | 10 +++- data/2024/CVE-2024-56276.json | 10 +++- data/2024/CVE-2024-56278.json | 18 ++++-- data/2024/CVE-2024-56279.json | 10 +++- data/2024/CVE-2024-56283.json | 10 +++- data/2024/CVE-2024-56286.json | 10 +++- data/2024/CVE-2024-56288.json | 10 +++- data/2024/CVE-2024-56289.json | 10 +++- data/2024/CVE-2024-56293.json | 10 +++- data/2024/CVE-2024-56294.json | 10 +++- data/2024/CVE-2024-56296.json | 14 +++-- data/2024/CVE-2024-56297.json | 10 +++- data/2024/CVE-2024-56298.json | 10 +++- data/2024/CVE-2024-6324.json | 100 ++++++++++++++++++++++++++++++++++ data/2024/CVE-2024-9673.json | 27 +++++++++ data/2024/CVE-2024-9939.json | 27 +++++++++ data/2025/CVE-2025-0194.json | 100 ++++++++++++++++++++++++++++++++++ data/2025/CVE-2025-0291.json | 27 +++++++++ data/2025/CVE-2025-22130.json | 27 +++++++++ data/2025/CVE-2025-22319.json | 6 ++ data/2025/CVE-2025-22347.json | 6 ++ 93 files changed, 1658 insertions(+), 40 deletions(-) create mode 100644 data/2023/CVE-2023-28120.json create mode 100644 data/2023/CVE-2023-38037.json create mode 100644 data/2024/CVE-2024-10585.json create mode 100644 data/2024/CVE-2024-11270.json create mode 100644 data/2024/CVE-2024-11271.json create mode 100644 data/2024/CVE-2024-11613.json create mode 100644 data/2024/CVE-2024-11635.json create mode 100644 data/2024/CVE-2024-11816.json create mode 100644 data/2024/CVE-2024-11916.json create mode 100644 data/2024/CVE-2024-11939.json create mode 100644 data/2024/CVE-2024-12030.json create mode 100644 data/2024/CVE-2024-12045.json create mode 100644 data/2024/CVE-2024-12205.json create mode 100644 data/2024/CVE-2024-12328.json create mode 100644 data/2024/CVE-2024-12431.json create mode 100644 data/2024/CVE-2024-12584.json create mode 100644 data/2024/CVE-2024-12712.json create mode 100644 data/2024/CVE-2024-12852.json create mode 100644 data/2024/CVE-2024-12854.json create mode 100644 data/2024/CVE-2024-13041.json create mode 100644 data/2024/CVE-2024-1388.json create mode 100644 data/2024/CVE-2024-27980.json create mode 100644 data/2024/CVE-2024-32524.json create mode 100644 data/2024/CVE-2024-32708.json create mode 100644 data/2024/CVE-2024-37372.json create mode 100644 data/2024/CVE-2024-45033.json create mode 100644 data/2024/CVE-2024-54676.json create mode 100644 data/2024/CVE-2024-6324.json create mode 100644 data/2024/CVE-2024-9673.json create mode 100644 data/2024/CVE-2024-9939.json create mode 100644 data/2025/CVE-2025-0194.json create mode 100644 data/2025/CVE-2025-0291.json create mode 100644 data/2025/CVE-2025-22130.json diff --git a/data/2023/CVE-2023-28120.json b/data/2023/CVE-2023-28120.json new file mode 100644 index 00000000..e2154995 --- /dev/null +++ b/data/2023/CVE-2023-28120.json @@ -0,0 +1,34 @@ +{ + "_annotation": { + "cve_id": "CVE-2023-28120", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2023/CVE-2023-28120.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:activesupport_project:activesupport:*:*:*:*:*:ruby:*:*", + "matchCriteriaId": "049833C7-4258-5CD3-B8DA-030363E4CE48", + "versionEndExcluding": "7.0.4.3", + "versionStartIncluding": "7", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:activesupport_project:activesupport:*:*:*:*:*:ruby:*:*", + "matchCriteriaId": "33175EAD-A24C-5B00-BAF5-A9016B63E79E", + "versionEndExcluding": "6.1.7.3", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2023/CVE-2023-38037.json b/data/2023/CVE-2023-38037.json new file mode 100644 index 00000000..f42cee54 --- /dev/null +++ b/data/2023/CVE-2023-38037.json @@ -0,0 +1,35 @@ +{ + "_annotation": { + "cve_id": "CVE-2023-38037", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2023/CVE-2023-38037.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:activesupport_project:activesupport:*:*:*:*:*:ruby:*:*", + "matchCriteriaId": "27D4DDBB-E67E-5486-8924-8E27892D9EC8", + "versionEndExcluding": "7.0.7.1", + "versionStartIncluding": "7", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:activesupport_project:activesupport:*:*:*:*:*:ruby:*:*", + "matchCriteriaId": "C05C1C67-C91A-5DD4-A89F-F9BEFFD05F23", + "versionEndExcluding": "6.1.7.5", + "versionStartIncluding": "5.2.0", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-10585.json b/data/2024/CVE-2024-10585.json new file mode 100644 index 00000000..bb3fef70 --- /dev/null +++ b/data/2024/CVE-2024-10585.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-10585", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-10585.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:revmakx:infinitewp_client:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "FDDDE1CD-8ECF-5666-9911-33E242DD78FF", + "versionEndExcluding": "1.13.1", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-10892.json b/data/2024/CVE-2024-10892.json index f3f21a6b..ee345fad 100644 --- a/data/2024/CVE-2024-10892.json +++ b/data/2024/CVE-2024-10892.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/127691c4-dc63-44e0-b591-b342a3809888?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-11270.json b/data/2024/CVE-2024-11270.json new file mode 100644 index 00000000..d044e877 --- /dev/null +++ b/data/2024/CVE-2024-11270.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-11270", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-11270.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:webinarpress:webinarpress:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "85EEF38D-B8CE-5113-8653-0F362810B11E", + "versionEndExcluding": "1.33.25", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-11271.json b/data/2024/CVE-2024-11271.json new file mode 100644 index 00000000..dacfe79b --- /dev/null +++ b/data/2024/CVE-2024-11271.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-11271", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-11271.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:webinarpress:webinarpress:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "85EEF38D-B8CE-5113-8653-0F362810B11E", + "versionEndExcluding": "1.33.25", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-11613.json b/data/2024/CVE-2024-11613.json new file mode 100644 index 00000000..166d155c --- /dev/null +++ b/data/2024/CVE-2024-11613.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-11613", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-11613.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "FA4EFB41-A697-530F-A4AC-771D1E3534F4", + "versionEndExcluding": "4.25.0", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-11635.json b/data/2024/CVE-2024-11635.json new file mode 100644 index 00000000..3861888b --- /dev/null +++ b/data/2024/CVE-2024-11635.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-11635", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-11635.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "E0E5C496-7FED-50BE-A2EB-3FBC84A829D5", + "versionEndExcluding": "4.24.14", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-11816.json b/data/2024/CVE-2024-11816.json new file mode 100644 index 00000000..35595de5 --- /dev/null +++ b/data/2024/CVE-2024-11816.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-11816", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-11816.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:wpextended:wp_extended:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "46E324BF-6FC0-5100-B5FB-EE3C8FC66B9B", + "versionEndExcluding": "3.0.12", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-11916.json b/data/2024/CVE-2024-11916.json new file mode 100644 index 00000000..6ed4ebc0 --- /dev/null +++ b/data/2024/CVE-2024-11916.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-11916", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-11916.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:wpextended:wp_extended:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "46E324BF-6FC0-5100-B5FB-EE3C8FC66B9B", + "versionEndExcluding": "3.0.12", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-11939.json b/data/2024/CVE-2024-11939.json new file mode 100644 index 00000000..37c45952 --- /dev/null +++ b/data/2024/CVE-2024-11939.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-11939", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-11939.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:stylemixthemes:cost_calculator_builder:*:*:*:*:pro:wordpress:*:*", + "matchCriteriaId": "265CBC72-CBB2-54EB-AC12-BB791C6F4585", + "versionEndExcluding": "3.2.16", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-12030.json b/data/2024/CVE-2024-12030.json new file mode 100644 index 00000000..638b7a7d --- /dev/null +++ b/data/2024/CVE-2024-12030.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-12030", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-12030.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:pluginus:wordpress_meta_data_and_taxonomies_filter:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "93A5BE30-C29A-5B3F-A79C-497437151F1A", + "versionEndExcluding": "1.3.3.6", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-12045.json b/data/2024/CVE-2024-12045.json new file mode 100644 index 00000000..3532f0ed --- /dev/null +++ b/data/2024/CVE-2024-12045.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-12045", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-12045.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "14E09579-6963-52FC-859F-01730523AA4A", + "versionEndExcluding": "5.1.1", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-12205.json b/data/2024/CVE-2024-12205.json new file mode 100644 index 00000000..34654fee --- /dev/null +++ b/data/2024/CVE-2024-12205.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-12205", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-12205.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:themesflat:themesflat_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "0CE59BE6-0019-57DC-BDFE-73D922D33731", + "versionEndExcluding": "2.2.5", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-12328.json b/data/2024/CVE-2024-12328.json new file mode 100644 index 00000000..f00889ff --- /dev/null +++ b/data/2024/CVE-2024-12328.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-12328", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-12328.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:madrasthemes:mas_elementor:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "D1A487E3-BD0F-51A5-851A-AB5470A0A7BB", + "versionEndExcluding": "1.1.8", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-12431.json b/data/2024/CVE-2024-12431.json new file mode 100644 index 00000000..61951693 --- /dev/null +++ b/data/2024/CVE-2024-12431.json @@ -0,0 +1,100 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-12431", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-12431.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "matchCriteriaId": "316BB765-5217-5A2C-ACDB-F8C34D2871FF", + "versionEndExcluding": "17.5.5", + "versionStartIncluding": "15.5", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8D83ED5F-0665-5759-9976-D695B2D16892", + "versionEndExcluding": "17.6.3", + "versionStartIncluding": "17.6", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "matchCriteriaId": "31CAE4D7-DEFB-591C-A895-C7FB45A574A8", + "versionEndExcluding": "17.7.1", + "versionStartIncluding": "17.7", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + }, + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "F0684B95-889E-56DA-841D-301679DFF21B", + "versionEndExcluding": "17.5.5", + "versionStartIncluding": "15.5", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "90DC1FFC-5750-5925-B4B1-B01BC5A6F06D", + "versionEndExcluding": "17.6.3", + "versionStartIncluding": "17.6", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "F3664AF4-4749-5AFE-9349-BCF9CE08D412", + "versionEndExcluding": "17.7.1", + "versionStartIncluding": "17.7", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + }, + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:gitlab:gitlab_enterprise:*:*:*:*:*:*:*:*", + "matchCriteriaId": "EFAA7143-BF88-539B-BC28-1B20E266CBB2", + "versionEndExcluding": "17.5.5", + "versionStartIncluding": "15.5", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab_enterprise:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9E71B0D7-C54B-5929-B1FD-3142D8E62259", + "versionEndExcluding": "17.6.3", + "versionStartIncluding": "17.6", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab_enterprise:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B78BBCA6-F23D-5A97-9BDB-F5D841B8B628", + "versionEndExcluding": "17.7.1", + "versionStartIncluding": "17.7", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-12584.json b/data/2024/CVE-2024-12584.json new file mode 100644 index 00000000..d4bf6e08 --- /dev/null +++ b/data/2024/CVE-2024-12584.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-12584", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-12584.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:wpxpro:xpro_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "B2514E52-385A-54C1-9283-873C229F0FF5", + "versionEndExcluding": "1.4.6.3", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-12712.json b/data/2024/CVE-2024-12712.json new file mode 100644 index 00000000..77ddf624 --- /dev/null +++ b/data/2024/CVE-2024-12712.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-12712", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-12712.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:wpeasycart:wp_easycart:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "F0BC4AAB-055E-59A9-8A41-5E0D77ED25ED", + "versionEndExcluding": "5.7.9", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-12852.json b/data/2024/CVE-2024-12852.json new file mode 100644 index 00000000..117d9d02 --- /dev/null +++ b/data/2024/CVE-2024-12852.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-12852", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-12852.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:wedevs:happy_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "AE5F0240-929E-5E74-9F20-BCC2788352B6", + "versionEndExcluding": "3.15.2", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-12854.json b/data/2024/CVE-2024-12854.json new file mode 100644 index 00000000..7d0550d3 --- /dev/null +++ b/data/2024/CVE-2024-12854.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-12854", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-12854.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:ggnome:garden_gnome_package:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "4A7D53C2-0E71-589F-B747-10B67B39BDA9", + "versionEndExcluding": "2.4.0", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-13041.json b/data/2024/CVE-2024-13041.json new file mode 100644 index 00000000..7597df02 --- /dev/null +++ b/data/2024/CVE-2024-13041.json @@ -0,0 +1,100 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-13041", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-13041.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5D7B8886-00EB-59F4-9F29-D077F2E01932", + "versionEndExcluding": "17.5.5", + "versionStartIncluding": "16.4", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8D83ED5F-0665-5759-9976-D695B2D16892", + "versionEndExcluding": "17.6.3", + "versionStartIncluding": "17.6", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "matchCriteriaId": "31CAE4D7-DEFB-591C-A895-C7FB45A574A8", + "versionEndExcluding": "17.7.1", + "versionStartIncluding": "17.7", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + }, + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "9AD354A7-EA07-5D8C-9894-52D417C0DBE5", + "versionEndExcluding": "17.5.5", + "versionStartIncluding": "16.4", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "90DC1FFC-5750-5925-B4B1-B01BC5A6F06D", + "versionEndExcluding": "17.6.3", + "versionStartIncluding": "17.6", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "F3664AF4-4749-5AFE-9349-BCF9CE08D412", + "versionEndExcluding": "17.7.1", + "versionStartIncluding": "17.7", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + }, + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:gitlab:gitlab_enterprise:*:*:*:*:*:*:*:*", + "matchCriteriaId": "3BB46E26-CF0C-509F-8DA9-3374678F2A47", + "versionEndExcluding": "17.5.5", + "versionStartIncluding": "16.4", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab_enterprise:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9E71B0D7-C54B-5929-B1FD-3142D8E62259", + "versionEndExcluding": "17.6.3", + "versionStartIncluding": "17.6", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab_enterprise:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B78BBCA6-F23D-5A97-9BDB-F5D841B8B628", + "versionEndExcluding": "17.7.1", + "versionStartIncluding": "17.7", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-1388.json b/data/2024/CVE-2024-1388.json new file mode 100644 index 00000000..52429ba9 --- /dev/null +++ b/data/2024/CVE-2024-1388.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-1388", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-1388.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:wpmoose:yuki:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "B38B8A7C-D34F-5F8B-A0CA-F3F95689F050", + "versionEndExcluding": "1.3.14", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-27980.json b/data/2024/CVE-2024-27980.json new file mode 100644 index 00000000..f250d759 --- /dev/null +++ b/data/2024/CVE-2024-27980.json @@ -0,0 +1,53 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-27980", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-27980.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", + "matchCriteriaId": "495EA205-B5B2-5B3F-BB92-DAF0C9520E2E", + "versionEndExcluding": "21.7.3", + "versionStartIncluding": "21", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B7153081-D6DA-5FAB-BF94-D6EDA7428EEB", + "versionEndExcluding": "20.12.2", + "versionStartIncluding": "19", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", + "matchCriteriaId": "29197987-8257-58C8-8358-5BBD2EFBC705", + "versionEndExcluding": "18.20.2", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + }, + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", + "vulnerable": false + } + ], + "negate": false, + "operator": "OR" + } + ], + "operator": "AND" + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-32524.json b/data/2024/CVE-2024-32524.json new file mode 100644 index 00000000..bf9d87c6 --- /dev/null +++ b/data/2024/CVE-2024-32524.json @@ -0,0 +1,33 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-32524", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-32524.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:nuggethon:custom_order_status_manager_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "67A30BFB-B677-430D-8625-EDCDA9A0E11B", + "versionEndIncluding": "1.5.2", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e0981349-e627-4a3c-9972-01111a6b6140?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-32708.json b/data/2024/CVE-2024-32708.json new file mode 100644 index 00000000..8dcdd6af --- /dev/null +++ b/data/2024/CVE-2024-32708.json @@ -0,0 +1,33 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-32708", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-32708.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:helderk:maintenance_mode:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "00F9028B-CA76-43F5-A0FC-752B9F1D4D05", + "versionEndExcluding": "3.0.2", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/17906039-0130-4e24-b932-1ba19d3d58ff?source=cve" + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-37372.json b/data/2024/CVE-2024-37372.json new file mode 100644 index 00000000..187f6932 --- /dev/null +++ b/data/2024/CVE-2024-37372.json @@ -0,0 +1,35 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-37372", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-37372.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7999669C-D898-58F7-B9F0-9259970C114A", + "versionEndExcluding": "20.15.1", + "versionStartIncluding": "19", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8688C0AD-010A-5E49-9D25-B8683DFFFE65", + "versionEndExcluding": "22.4.1", + "versionStartIncluding": "21", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-45033.json b/data/2024/CVE-2024-45033.json new file mode 100644 index 00000000..cedff0e7 --- /dev/null +++ b/data/2024/CVE-2024-45033.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-45033", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-45033.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:apache:apache-airflow-providers-fab:*:*:*:*:*:python:*:*", + "matchCriteriaId": "4E75E839-3016-5960-ADBA-AFA219B6240B", + "versionEndExcluding": "1.5.2", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-54676.json b/data/2024/CVE-2024-54676.json new file mode 100644 index 00000000..d9a0c29d --- /dev/null +++ b/data/2024/CVE-2024-54676.json @@ -0,0 +1,41 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-54676", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-54676.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:apache:openmeetings:*:*:*:*:*:maven:*:*", + "matchCriteriaId": "4A85182C-BA66-53C8-A72D-609D829EB951", + "versionEndExcluding": "8.0.0", + "versionStartIncluding": "2.1", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + }, + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:org.apache.openmeetings:openmeetings-core:*:*:*:*:*:maven:*:*", + "matchCriteriaId": "6D106B8D-1B89-57A2-B89D-7DDB4181867D", + "versionEndExcluding": "8.0.0", + "versionStartIncluding": "2.1", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-56042.json b/data/2024/CVE-2024-56042.json index cc909552..4200df58 100644 --- a/data/2024/CVE-2024-56042.json +++ b/data/2024/CVE-2024-56042.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/06919817-a2ce-4914-bf1c-7763c1cde543?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56043.json b/data/2024/CVE-2024-56043.json index 73a0cee0..3f2ac0ef 100644 --- a/data/2024/CVE-2024-56043.json +++ b/data/2024/CVE-2024-56043.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c3d42b22-cf8f-4726-9188-4c7baf8e5200?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56044.json b/data/2024/CVE-2024-56044.json index a44114a3..881f765b 100644 --- a/data/2024/CVE-2024-56044.json +++ b/data/2024/CVE-2024-56044.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b1469b02-c52d-4a02-a974-81dd1e2c1f97?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56045.json b/data/2024/CVE-2024-56045.json index 3ed5e67d..dbe136f7 100644 --- a/data/2024/CVE-2024-56045.json +++ b/data/2024/CVE-2024-56045.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e8a704b5-6db3-4197-bf03-c64f0508bcf1?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56046.json b/data/2024/CVE-2024-56046.json index 30cb6e36..9416b955 100644 --- a/data/2024/CVE-2024-56046.json +++ b/data/2024/CVE-2024-56046.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/45531492-9238-4e2e-ad37-d0e5c457af07?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56047.json b/data/2024/CVE-2024-56047.json index 5038d687..62c5641d 100644 --- a/data/2024/CVE-2024-56047.json +++ b/data/2024/CVE-2024-56047.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1829d178-a35b-4577-9522-8765efec7775?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56048.json b/data/2024/CVE-2024-56048.json index 355cf47d..83621368 100644 --- a/data/2024/CVE-2024-56048.json +++ b/data/2024/CVE-2024-56048.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:vibethemes:wordpress_learning_management_system_:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "64F7BB8B-E805-5261-AE8F-F6352F83FA88", - "versionEndIncluding": "1.9.9", + "matchCriteriaId": "18DEBF13-3BCD-5853-8A69-43EB90C6257A", + "versionEndExcluding": "1.9.9.1", "vulnerable": true } ], @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6f099519-0ebc-45f5-93a9-2b32d51c874f?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56049.json b/data/2024/CVE-2024-56049.json index ebc9d592..69dcd033 100644 --- a/data/2024/CVE-2024-56049.json +++ b/data/2024/CVE-2024-56049.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a4c0180e-e3f0-42a3-9f97-735b22c1260c?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56050.json b/data/2024/CVE-2024-56050.json index 9345fe4f..6623e660 100644 --- a/data/2024/CVE-2024-56050.json +++ b/data/2024/CVE-2024-56050.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5983142d-550f-488f-a2d9-ee552ae8818f?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56051.json b/data/2024/CVE-2024-56051.json index 79f561a7..c668c07b 100644 --- a/data/2024/CVE-2024-56051.json +++ b/data/2024/CVE-2024-56051.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/46c0fa1e-f400-435c-b781-23919a192e89?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56052.json b/data/2024/CVE-2024-56052.json index 2e154b98..8c6fc2d6 100644 --- a/data/2024/CVE-2024-56052.json +++ b/data/2024/CVE-2024-56052.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/281c336e-7a1e-4106-ae79-b3b512b430ca?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56053.json b/data/2024/CVE-2024-56053.json index 5a6a2eb2..7beb835d 100644 --- a/data/2024/CVE-2024-56053.json +++ b/data/2024/CVE-2024-56053.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/193f0a25-4400-40e0-8070-94fbf9c28c11?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56054.json b/data/2024/CVE-2024-56054.json index 76946875..06eca00e 100644 --- a/data/2024/CVE-2024-56054.json +++ b/data/2024/CVE-2024-56054.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bfc62289-9ac0-4aeb-96ac-010af6f437a6?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56055.json b/data/2024/CVE-2024-56055.json index 4e1f18e8..eedd13e7 100644 --- a/data/2024/CVE-2024-56055.json +++ b/data/2024/CVE-2024-56055.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/637a53b5-6d2f-4671-8126-f218c3ca73de?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56057.json b/data/2024/CVE-2024-56057.json index 66457156..b5869b87 100644 --- a/data/2024/CVE-2024-56057.json +++ b/data/2024/CVE-2024-56057.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bff9866e-3967-426e-9b8d-17b317aac7a3?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56060.json b/data/2024/CVE-2024-56060.json index b9cdb0aa..78c28942 100644 --- a/data/2024/CVE-2024-56060.json +++ b/data/2024/CVE-2024-56060.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4773d95-17ce-4c16-a1ba-953687ecb0b0?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56061.json b/data/2024/CVE-2024-56061.json index ba9dbf4a..95afb9b1 100644 --- a/data/2024/CVE-2024-56061.json +++ b/data/2024/CVE-2024-56061.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/740ed055-8548-42fd-81e1-9f63dda85374?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56062.json b/data/2024/CVE-2024-56062.json index 9876cae0..d68347cf 100644 --- a/data/2024/CVE-2024-56062.json +++ b/data/2024/CVE-2024-56062.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a4b353bf-f9be-465a-8723-9ea721b5baab?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56063.json b/data/2024/CVE-2024-56063.json index 2a214d3a..98cb2365 100644 --- a/data/2024/CVE-2024-56063.json +++ b/data/2024/CVE-2024-56063.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/167d3e1d-be74-4bfb-b3bf-e2c53d90e12f?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56210.json b/data/2024/CVE-2024-56210.json index 73929028..22d9b3f7 100644 --- a/data/2024/CVE-2024-56210.json +++ b/data/2024/CVE-2024-56210.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3674a90a-9844-40bd-a75d-3fed36dbc7cd?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56211.json b/data/2024/CVE-2024-56211.json index 000b1c77..0ee4ae2c 100644 --- a/data/2024/CVE-2024-56211.json +++ b/data/2024/CVE-2024-56211.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/50782dc3-1206-42ea-90c0-ab1b37b64e48?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56212.json b/data/2024/CVE-2024-56212.json index b47c4b3f..43b128c1 100644 --- a/data/2024/CVE-2024-56212.json +++ b/data/2024/CVE-2024-56212.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7af56157-7b69-4bbd-8f22-4963d0cdf9eb?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56213.json b/data/2024/CVE-2024-56213.json index 8e70cc17..7ae5fcc9 100644 --- a/data/2024/CVE-2024-56213.json +++ b/data/2024/CVE-2024-56213.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e5b01e96-63e6-4ba0-8c83-f9b05e4050b3?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56214.json b/data/2024/CVE-2024-56214.json index 1330ceb8..653b19fb 100644 --- a/data/2024/CVE-2024-56214.json +++ b/data/2024/CVE-2024-56214.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/49ca1e15-b015-4e9e-bb79-be3968689609?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56216.json b/data/2024/CVE-2024-56216.json index 95d1d4c8..dbbf4e95 100644 --- a/data/2024/CVE-2024-56216.json +++ b/data/2024/CVE-2024-56216.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c3dd6240-bb39-49a3-b012-773a831d2034?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56217.json b/data/2024/CVE-2024-56217.json index 5e1bc43e..3df2da2d 100644 --- a/data/2024/CVE-2024-56217.json +++ b/data/2024/CVE-2024-56217.json @@ -34,6 +34,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/25f0615b-17a1-4bf8-9f77-4703c39baca5?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56225.json b/data/2024/CVE-2024-56225.json index 93b3dab5..2c569de7 100644 --- a/data/2024/CVE-2024-56225.json +++ b/data/2024/CVE-2024-56225.json @@ -34,6 +34,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/575a648a-6bf0-42d9-964e-59800e856bd0?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56226.json b/data/2024/CVE-2024-56226.json index 77b19f2c..900f44d2 100644 --- a/data/2024/CVE-2024-56226.json +++ b/data/2024/CVE-2024-56226.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9e860c60-b330-4a6c-8d15-947451af62fc?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56227.json b/data/2024/CVE-2024-56227.json index 9020105e..8f053be7 100644 --- a/data/2024/CVE-2024-56227.json +++ b/data/2024/CVE-2024-56227.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f7f9b1ef-2efc-4d88-bff8-e0dd711b85ab?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56229.json b/data/2024/CVE-2024-56229.json index 31f267a2..30ebe6ea 100644 --- a/data/2024/CVE-2024-56229.json +++ b/data/2024/CVE-2024-56229.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ea78c3f-f033-4a47-8190-07ae2552fdd2?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56237.json b/data/2024/CVE-2024-56237.json index a7a76d51..342ae85b 100644 --- a/data/2024/CVE-2024-56237.json +++ b/data/2024/CVE-2024-56237.json @@ -46,6 +46,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2aa5b7e8-3030-47d3-9440-3b1b5c94b5ec?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56241.json b/data/2024/CVE-2024-56241.json index 49dd9161..ab28f08e 100644 --- a/data/2024/CVE-2024-56241.json +++ b/data/2024/CVE-2024-56241.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/84389347-5dc2-4c58-bc73-1d7384241c2c?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56242.json b/data/2024/CVE-2024-56242.json index f9038627..5758e61c 100644 --- a/data/2024/CVE-2024-56242.json +++ b/data/2024/CVE-2024-56242.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aade146b-029e-40c8-852f-879b6b57ee90?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56245.json b/data/2024/CVE-2024-56245.json index 6d561945..54fabea2 100644 --- a/data/2024/CVE-2024-56245.json +++ b/data/2024/CVE-2024-56245.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9751da30-abc7-466d-8990-4eefe65cb878?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56246.json b/data/2024/CVE-2024-56246.json index 14cb9ea8..42013d6b 100644 --- a/data/2024/CVE-2024-56246.json +++ b/data/2024/CVE-2024-56246.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/adf10688-834c-4922-89a3-0048dde5f210?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56247.json b/data/2024/CVE-2024-56247.json index 0b0d79b3..3910aa9b 100644 --- a/data/2024/CVE-2024-56247.json +++ b/data/2024/CVE-2024-56247.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/935171a3-9db0-4b01-babb-fa0b3d8985f6?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56251.json b/data/2024/CVE-2024-56251.json index 633f2b7c..c7b00d5a 100644 --- a/data/2024/CVE-2024-56251.json +++ b/data/2024/CVE-2024-56251.json @@ -34,6 +34,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a4d6dcb5-a97a-4e80-b0dc-5649c9867374?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56252.json b/data/2024/CVE-2024-56252.json index 508c45b1..e2450afe 100644 --- a/data/2024/CVE-2024-56252.json +++ b/data/2024/CVE-2024-56252.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/14d52936-8fb6-464b-9c0f-038fba0ee57f?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56253.json b/data/2024/CVE-2024-56253.json index 738e844e..e3a13675 100644 --- a/data/2024/CVE-2024-56253.json +++ b/data/2024/CVE-2024-56253.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2275f49d-2b31-4e24-aa3f-16f5febd2738?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56254.json b/data/2024/CVE-2024-56254.json index d6acec74..bda6fb88 100644 --- a/data/2024/CVE-2024-56254.json +++ b/data/2024/CVE-2024-56254.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/82c9a361-8a69-4468-8f3e-3caa2c169332?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56259.json b/data/2024/CVE-2024-56259.json index 4fbd982b..81429c48 100644 --- a/data/2024/CVE-2024-56259.json +++ b/data/2024/CVE-2024-56259.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:ayecode:geodirectory:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "EFE1AEA0-67B3-5B1A-A21D-C999B9299B46", - "versionEndIncluding": "2.3.85", + "matchCriteriaId": "C2F39150-AF94-5060-8FC0-153AB0D83D7C", + "versionEndExcluding": "2.3.85", "vulnerable": true } ], @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cb49f48e-98bf-4838-8eb0-91a7daad182c?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56266.json b/data/2024/CVE-2024-56266.json index 2e53789a..26e5f61c 100644 --- a/data/2024/CVE-2024-56266.json +++ b/data/2024/CVE-2024-56266.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a54e9aa6-943d-4f76-81af-3424a23f9313?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56273.json b/data/2024/CVE-2024-56273.json index 17323c70..e9eb336e 100644 --- a/data/2024/CVE-2024-56273.json +++ b/data/2024/CVE-2024-56273.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:wpvivid:migration\\,_backup\\,_staging:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "92A7A601-42C7-5625-BA18-11838255E137", - "versionEndIncluding": "0.9.106", + "matchCriteriaId": "450FBB00-00EA-5F09-B3B5-683AC26D873F", + "versionEndExcluding": "0.9.107", "vulnerable": true } ], @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3826e2f8-3d91-4e07-84c8-8c88b374764b?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56274.json b/data/2024/CVE-2024-56274.json index 35dedbe1..4ac3aa15 100644 --- a/data/2024/CVE-2024-56274.json +++ b/data/2024/CVE-2024-56274.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:brainstormforce:astra_widgets:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "B3C45FE3-C47C-54D2-9F16-5321E751BE2B", - "versionEndIncluding": "1.2.15", + "matchCriteriaId": "7C05DDC2-93B1-5C44-88AA-CC3994F0A158", + "versionEndExcluding": "1.2.16", "vulnerable": true } ], @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a6df96a3-d56b-4eac-af33-92f4a76e3902?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56275.json b/data/2024/CVE-2024-56275.json index c73169cf..a667fad5 100644 --- a/data/2024/CVE-2024-56275.json +++ b/data/2024/CVE-2024-56275.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:envato:envato_elements:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "DE272B90-3EE5-5F2A-9B6D-4332D82E02CF", - "versionEndIncluding": "2.0.14", + "matchCriteriaId": "CA49EAAE-E70A-5B14-869C-4AE9AAFB8F4E", + "versionEndExcluding": "2.0.15", "vulnerable": true } ], @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6cdbc865-2566-419c-a54f-f719b64bf149?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56276.json b/data/2024/CVE-2024-56276.json index c429f534..9326ccbc 100644 --- a/data/2024/CVE-2024-56276.json +++ b/data/2024/CVE-2024-56276.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:wpforms:contact_form:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "159B68EC-6642-5B96-963D-096F7EA973BC", - "versionEndIncluding": "1.9.2.2", + "matchCriteriaId": "F47ED427-F3B5-526D-8AC0-513408F57E3D", + "versionEndExcluding": "1.9.2.3", "vulnerable": true } ], @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/95de9099-6071-46d8-a7c9-bb2c1caa6b38?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56278.json b/data/2024/CVE-2024-56278.json index b414e076..f2587b12 100644 --- a/data/2024/CVE-2024-56278.json +++ b/data/2024/CVE-2024-56278.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:smackcoders:export_all_posts\\,_products\\,_orders\\,_refunds_\\&_users:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "0E89F7C6-3059-5704-A225-BE5A492B4B20", - "versionEndIncluding": "2.9.1", + "matchCriteriaId": "C077F900-6C65-5CAE-99FF-14F13A51858B", + "versionEndExcluding": "2.9.2", "vulnerable": true } ], @@ -24,8 +24,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:smackcoders:ultimate_encoder:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "52B41FCD-6DAD-50B5-ACBD-32E5D71ACF77", - "versionEndIncluding": "2.9.1", + "matchCriteriaId": "06598A89-6526-5976-A38F-C807C19B1160", + "versionEndExcluding": "2.9.2", "vulnerable": true } ], @@ -36,8 +36,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:smackcoders:ultimate_exporter:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "E9CBB6DB-8C98-59CC-87E4-9865DAAC353B", - "versionEndIncluding": "2.9.1", + "matchCriteriaId": "1997C894-345C-52DA-9F1C-CE3E21B79CCD", + "versionEndExcluding": "2.9.2", "vulnerable": true } ], @@ -46,6 +46,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4fd929e7-8f28-43de-92ce-4f52ece24f7c?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56279.json b/data/2024/CVE-2024-56279.json index 740b3755..04265738 100644 --- a/data/2024/CVE-2024-56279.json +++ b/data/2024/CVE-2024-56279.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:tipsandtricks-hq:compact_wp_audio_player:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "18FD759F-6736-50F2-AA88-141EEABAE95A", - "versionEndIncluding": "1.9.14", + "matchCriteriaId": "60CA320C-C476-5FF0-A6A7-C3145289189C", + "versionEndExcluding": "1.9.15", "vulnerable": true } ], @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/700b9a34-bf9c-444d-80c7-87bf9412673f?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56283.json b/data/2024/CVE-2024-56283.json index 7c0a3d93..4ccc20fc 100644 --- a/data/2024/CVE-2024-56283.json +++ b/data/2024/CVE-2024-56283.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:plainware:locatoraid:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "615C7122-D3CE-5B0B-AD19-0AFF6AE76EF7", - "versionEndIncluding": "3.9.50", + "matchCriteriaId": "F380C9E1-9593-50CC-9719-2B18D29AF5B0", + "versionEndExcluding": "3.9.51", "vulnerable": true } ], @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ba6d8be6-e7a6-4275-b5f1-86e2ea85ff76?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56286.json b/data/2024/CVE-2024-56286.json index 8c86bc19..f9454011 100644 --- a/data/2024/CVE-2024-56286.json +++ b/data/2024/CVE-2024-56286.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:wpbakery:page_builder:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "BD7AFAD4-3BA4-4F05-88A4-990DDE17077B", - "versionEndIncluding": "3.0", + "matchCriteriaId": "EFA578CE-50CA-5F85-B0AE-614BCFB2CC44", + "versionEndExcluding": "3.1", "vulnerable": true } ], @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/206eee58-af07-426d-8c11-7a5e5ec52ddc?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56288.json b/data/2024/CVE-2024-56288.json index f50931f9..f78c047a 100644 --- a/data/2024/CVE-2024-56288.json +++ b/data/2024/CVE-2024-56288.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:fahad_mahmood:wp_docs:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "88F003F2-E660-5BC2-94AA-0E6171B85212", - "versionEndIncluding": "2.2.1", + "matchCriteriaId": "7D6E0F89-3DEA-51A5-BB3E-CD6C4830E39D", + "versionEndExcluding": "2.2.2", "vulnerable": true } ], @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ded44da1-b3c5-43b6-aa9d-69d3cbf72826?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56289.json b/data/2024/CVE-2024-56289.json index 4529cece..611ef7a8 100644 --- a/data/2024/CVE-2024-56289.json +++ b/data/2024/CVE-2024-56289.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:groundhogg:groundhogg:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "7CE3A03F-36B0-50AE-BE5E-118F832EF06F", - "versionEndIncluding": "3.7.3.3", + "matchCriteriaId": "79897AC5-DE46-58F7-B68F-9EB2B6E4D5D2", + "versionEndExcluding": "3.7.3.4", "vulnerable": true } ], @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/060dd6aa-0864-4357-9e78-bd7797af58a0?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56293.json b/data/2024/CVE-2024-56293.json index df55aa10..f60f3e8e 100644 --- a/data/2024/CVE-2024-56293.json +++ b/data/2024/CVE-2024-56293.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:advancedformintegration:advanced_form_integration:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "B616C15E-EA3C-5AB3-BAAB-5763CA878A43", - "versionEndIncluding": "1.95.0", + "matchCriteriaId": "2B2D4F28-45A9-5402-8D66-40AE20C35F14", + "versionEndExcluding": "1.97.0", "vulnerable": true } ], @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4c64ec9f-c9ca-49c1-9126-b31defb826dd?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56294.json b/data/2024/CVE-2024-56294.json index 64cfc3bc..0eba9d50 100644 --- a/data/2024/CVE-2024-56294.json +++ b/data/2024/CVE-2024-56294.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:posimyth:nexter_blocks:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "457BA60D-2749-5F3C-B15A-CFDEF86085A8", - "versionEndIncluding": "4.0.7", + "matchCriteriaId": "FD1613EA-DB6C-5D2D-B517-D821E7B2FF6F", + "versionEndExcluding": "4.0.8", "vulnerable": true } ], @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/819580a0-75ea-475d-b6b8-47d57e5c3d05?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56296.json b/data/2024/CVE-2024-56296.json index dbffb77d..d7652389 100644 --- a/data/2024/CVE-2024-56296.json +++ b/data/2024/CVE-2024-56296.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:mangboard:mang_board:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "836BF27C-A2C5-5A54-8643-3010AE0781CB", - "versionEndIncluding": "1.8.4", + "matchCriteriaId": "BADD04CB-A040-58F9-BACB-86BDF19F0118", + "versionEndExcluding": "1.8.5", "vulnerable": true } ], @@ -24,8 +24,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:mangboard:mangboard_wp:*:*:*:*:basic:wordpress:*:*", - "matchCriteriaId": "D684DACC-067D-5403-B2FB-FB551AFEB75A", - "versionEndIncluding": "1.8.4", + "matchCriteriaId": "2AB94E19-5397-58ED-8BBD-D2DB235FAFEA", + "versionEndExcluding": "1.8.5", "vulnerable": true } ], @@ -34,6 +34,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/324e5681-a76f-4611-adff-02b4735f4efc?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56297.json b/data/2024/CVE-2024-56297.json index df5f1082..56f4bdc8 100644 --- a/data/2024/CVE-2024-56297.json +++ b/data/2024/CVE-2024-56297.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:dna88:highlight:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "95085C02-049C-5D1D-AB96-3D686F18C04F", - "versionEndIncluding": "2.0.2", + "matchCriteriaId": "5823CCA6-19B2-5B66-B1CB-B42277E5D7BE", + "versionEndExcluding": "2.0.6", "vulnerable": true } ], @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/42665ffd-e2fa-4883-9275-5e0b54943d3c?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-56298.json b/data/2024/CVE-2024-56298.json index 5ff4ce25..4a082d99 100644 --- a/data/2024/CVE-2024-56298.json +++ b/data/2024/CVE-2024-56298.json @@ -12,8 +12,8 @@ "cpeMatch": [ { "criteria": "cpe:2.3:a:5starplugins:pretty_simple_popup_builder:*:*:*:*:*:wordpress:*:*", - "matchCriteriaId": "DE75D6FB-A822-5F34-A010-FB6719F6608F", - "versionEndIncluding": "1.0.9", + "matchCriteriaId": "AF5FFE34-4647-53BF-A178-A38B7C2A0E0F", + "versionEndExcluding": "1.0.10", "vulnerable": true } ], @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d926d9fd-41b4-4d1b-9546-82f0a757a4fa?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2024/CVE-2024-6324.json b/data/2024/CVE-2024-6324.json new file mode 100644 index 00000000..456a3c72 --- /dev/null +++ b/data/2024/CVE-2024-6324.json @@ -0,0 +1,100 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-6324", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-6324.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "matchCriteriaId": "31CAE4D7-DEFB-591C-A895-C7FB45A574A8", + "versionEndExcluding": "17.7.1", + "versionStartIncluding": "17.7", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8D83ED5F-0665-5759-9976-D695B2D16892", + "versionEndExcluding": "17.6.3", + "versionStartIncluding": "17.6", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "matchCriteriaId": "971169C6-A4B5-5210-988F-DA6261C2E055", + "versionEndExcluding": "17.5.5", + "versionStartIncluding": "15.7", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + }, + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "F3664AF4-4749-5AFE-9349-BCF9CE08D412", + "versionEndExcluding": "17.7.1", + "versionStartIncluding": "17.7", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "90DC1FFC-5750-5925-B4B1-B01BC5A6F06D", + "versionEndExcluding": "17.6.3", + "versionStartIncluding": "17.6", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "2D8491CF-CDF7-599D-9208-81A1B53C3B25", + "versionEndExcluding": "17.5.5", + "versionStartIncluding": "15.7", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + }, + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:gitlab:gitlab_enterprise:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B78BBCA6-F23D-5A97-9BDB-F5D841B8B628", + "versionEndExcluding": "17.7.1", + "versionStartIncluding": "17.7", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab_enterprise:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9E71B0D7-C54B-5929-B1FD-3142D8E62259", + "versionEndExcluding": "17.6.3", + "versionStartIncluding": "17.6", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab_enterprise:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B29A9433-184E-571E-98BE-89FA736CB840", + "versionEndExcluding": "17.5.5", + "versionStartIncluding": "15.7", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-9673.json b/data/2024/CVE-2024-9673.json new file mode 100644 index 00000000..0592f683 --- /dev/null +++ b/data/2024/CVE-2024-9673.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-9673", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-9673.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:piotnet:piotnet_addons:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "862D50DD-1ED5-58C1-ABC2-9A58BBFD83FE", + "versionEndExcluding": "2.4.32", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2024/CVE-2024-9939.json b/data/2024/CVE-2024-9939.json new file mode 100644 index 00000000..80fec814 --- /dev/null +++ b/data/2024/CVE-2024-9939.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2024-9939", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2024/CVE-2024-9939.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "E0E5C496-7FED-50BE-A2EB-3FBC84A829D5", + "versionEndExcluding": "4.24.14", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2025/CVE-2025-0194.json b/data/2025/CVE-2025-0194.json new file mode 100644 index 00000000..24e8e4e1 --- /dev/null +++ b/data/2025/CVE-2025-0194.json @@ -0,0 +1,100 @@ +{ + "_annotation": { + "cve_id": "CVE-2025-0194", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2025/CVE-2025-0194.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "matchCriteriaId": "073A4A99-7CA8-5A57-A05C-32B117263529", + "versionEndExcluding": "17.5.5", + "versionStartIncluding": "17.4", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8D83ED5F-0665-5759-9976-D695B2D16892", + "versionEndExcluding": "17.6.3", + "versionStartIncluding": "17.6", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*", + "matchCriteriaId": "31CAE4D7-DEFB-591C-A895-C7FB45A574A8", + "versionEndExcluding": "17.7.1", + "versionStartIncluding": "17.7", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + }, + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "A9942E9E-77AB-5696-BC99-AF5252B0E3D9", + "versionEndExcluding": "17.5.5", + "versionStartIncluding": "17.4", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "90DC1FFC-5750-5925-B4B1-B01BC5A6F06D", + "versionEndExcluding": "17.6.3", + "versionStartIncluding": "17.6", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "F3664AF4-4749-5AFE-9349-BCF9CE08D412", + "versionEndExcluding": "17.7.1", + "versionStartIncluding": "17.7", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + }, + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:gitlab:gitlab_enterprise:*:*:*:*:*:*:*:*", + "matchCriteriaId": "BF36D92A-BF07-5FA0-A5DD-440B33DCB241", + "versionEndExcluding": "17.5.5", + "versionStartIncluding": "17.4", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab_enterprise:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9E71B0D7-C54B-5929-B1FD-3142D8E62259", + "versionEndExcluding": "17.6.3", + "versionStartIncluding": "17.6", + "vulnerable": true + }, + { + "criteria": "cpe:2.3:a:gitlab:gitlab_enterprise:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B78BBCA6-F23D-5A97-9BDB-F5D841B8B628", + "versionEndExcluding": "17.7.1", + "versionStartIncluding": "17.7", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2025/CVE-2025-0291.json b/data/2025/CVE-2025-0291.json new file mode 100644 index 00000000..7c323835 --- /dev/null +++ b/data/2025/CVE-2025-0291.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2025-0291", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2025/CVE-2025-0291.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FD94C218-FDC2-5213-BDB8-900A70FF9E0F", + "versionEndExcluding": "131.0.6778.264", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2025/CVE-2025-22130.json b/data/2025/CVE-2025-22130.json new file mode 100644 index 00000000..cb964b8f --- /dev/null +++ b/data/2025/CVE-2025-22130.json @@ -0,0 +1,27 @@ +{ + "_annotation": { + "cve_id": "CVE-2025-22130", + "generated_from": "https://raw.githubusercontent.com/anchore/cve-data-enrichment/main/data/anchore/2025/CVE-2025-22130.json", + "reason": "Added CPE configurations because not yet analyzed by NVD." + }, + "cve": { + "configurations": [ + { + "nodes": [ + { + "cpeMatch": [ + { + "criteria": "cpe:2.3:a:charm:soft_serve:*:*:*:*:*:go:*:*", + "matchCriteriaId": "F2F01F0D-E2B5-5201-920E-ACDAC1E5E2FA", + "versionEndExcluding": "0.8.2", + "vulnerable": true + } + ], + "negate": false, + "operator": "OR" + } + ] + } + ] + } +} \ No newline at end of file diff --git a/data/2025/CVE-2025-22319.json b/data/2025/CVE-2025-22319.json index 4cce2bba..e6fbafd3 100644 --- a/data/2025/CVE-2025-22319.json +++ b/data/2025/CVE-2025-22319.json @@ -34,6 +34,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/47906d5e-b77f-4b40-b89e-0bd0ed82b2e5?source=cve" + } ] } } \ No newline at end of file diff --git a/data/2025/CVE-2025-22347.json b/data/2025/CVE-2025-22347.json index cf6c2e27..440dd268 100644 --- a/data/2025/CVE-2025-22347.json +++ b/data/2025/CVE-2025-22347.json @@ -22,6 +22,12 @@ } ] } + ], + "references": [ + { + "source": "anchoreadp", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bff60dda-30e2-4660-931e-4bb9acae0396?source=cve" + } ] } } \ No newline at end of file