From fe4449f1c52766ceb37c6d9a9cbf591cb92edbe3 Mon Sep 17 00:00:00 2001 From: Weston Steimel Date: Mon, 20 May 2024 11:11:56 +0100 Subject: [PATCH] conversion for github_m records Signed-off-by: Weston Steimel --- data/anchore/2022/CVE-2022-24805.json | 41 ++++++ data/anchore/2022/CVE-2022-24806.json | 39 ++++++ data/anchore/2022/CVE-2022-24807.json | 41 ++++++ data/anchore/2022/CVE-2022-24808.json | 41 ++++++ data/anchore/2022/CVE-2022-24809.json | 40 ++++++ data/anchore/2022/CVE-2022-24810.json | 40 ++++++ data/anchore/2022/CVE-2022-36028.json | 36 ++++++ data/anchore/2022/CVE-2022-36029.json | 36 ++++++ data/anchore/2023/CVE-2023-38511.json | 42 +++++++ data/anchore/2023/CVE-2023-41038.json | 40 ++++++ data/anchore/2023/CVE-2023-41877.json | 38 ++++++ data/anchore/2023/CVE-2023-43790.json | 34 +++++ data/anchore/2023/CVE-2023-44379.json | 38 ++++++ data/anchore/2023/CVE-2023-44396.json | 47 +++++++ data/anchore/2023/CVE-2023-45808.json | 47 +++++++ data/anchore/2023/CVE-2023-45824.json | 36 ++++++ data/anchore/2023/CVE-2023-47123.json | 34 +++++ data/anchore/2023/CVE-2023-47622.json | 40 ++++++ data/anchore/2023/CVE-2023-47626.json | 33 +++++ data/anchore/2023/CVE-2023-47634.json | 50 ++++++++ data/anchore/2023/CVE-2023-47635.json | 48 ++++++++ data/anchore/2023/CVE-2023-48220.json | 130 ++++++++++++++++++++ data/anchore/2023/CVE-2023-48229.json | 34 +++++ data/anchore/2023/CVE-2023-48296.json | 36 ++++++ data/anchore/2023/CVE-2023-48703.json | 36 ++++++ data/anchore/2023/CVE-2023-48709.json | 47 +++++++ data/anchore/2023/CVE-2023-48710.json | 46 +++++++ data/anchore/2023/CVE-2023-49275.json | 35 ++++++ data/anchore/2023/CVE-2023-49781.json | 38 ++++++ data/anchore/2023/CVE-2023-50257.json | 55 +++++++++ data/anchore/2023/CVE-2023-50260.json | 33 +++++ data/anchore/2023/CVE-2023-50716.json | 51 ++++++++ data/anchore/2023/CVE-2023-50717.json | 37 ++++++ data/anchore/2023/CVE-2023-50718.json | 37 ++++++ data/anchore/2023/CVE-2023-50726.json | 80 ++++++++++++ data/anchore/2023/CVE-2023-50926.json | 34 +++++ data/anchore/2023/CVE-2023-50927.json | 34 +++++ data/anchore/2023/CVE-2023-51388.json | 34 +++++ data/anchore/2023/CVE-2023-51389.json | 34 +++++ data/anchore/2023/CVE-2023-51444.json | 73 +++++++++++ data/anchore/2023/CVE-2023-51445.json | 39 ++++++ data/anchore/2023/CVE-2023-51447.json | 69 +++++++++++ data/anchore/2023/CVE-2023-51450.json | 38 ++++++ data/anchore/2023/CVE-2023-51653.json | 34 +++++ data/anchore/2023/CVE-2023-51699.json | 37 ++++++ data/anchore/2024/CVE-2024-21652.json | 78 ++++++++++++ data/anchore/2024/CVE-2024-21661.json | 82 ++++++++++++ data/anchore/2024/CVE-2024-21662.json | 82 ++++++++++++ data/anchore/2024/CVE-2024-22189.json | 39 ++++++ data/anchore/2024/CVE-2024-22412.json | 69 +++++++++++ data/anchore/2024/CVE-2024-22423.json | 42 +++++++ data/anchore/2024/CVE-2024-23328.json | 41 ++++++ data/anchore/2024/CVE-2024-23333.json | 34 +++++ data/anchore/2024/CVE-2024-23335.json | 35 ++++++ data/anchore/2024/CVE-2024-23336.json | 36 ++++++ data/anchore/2024/CVE-2024-23346.json | 35 ++++++ data/anchore/2024/CVE-2024-23634.json | 46 +++++++ data/anchore/2024/CVE-2024-23640.json | 59 +++++++++ data/anchore/2024/CVE-2024-23642.json | 46 +++++++ data/anchore/2024/CVE-2024-23643.json | 45 +++++++ data/anchore/2024/CVE-2024-23818.json | 46 +++++++ data/anchore/2024/CVE-2024-23819.json | 46 +++++++ data/anchore/2024/CVE-2024-23821.json | 44 +++++++ data/anchore/2024/CVE-2024-23823.json | 34 +++++ data/anchore/2024/CVE-2024-23830.json | 35 ++++++ data/anchore/2024/CVE-2024-23833.json | 34 +++++ data/anchore/2024/CVE-2024-23835.json | 38 ++++++ data/anchore/2024/CVE-2024-23836.json | 57 +++++++++ data/anchore/2024/CVE-2024-23837.json | 37 ++++++ data/anchore/2024/CVE-2024-23839.json | 37 ++++++ data/anchore/2024/CVE-2024-24562.json | 34 +++++ data/anchore/2024/CVE-2024-24564.json | 33 +++++ data/anchore/2024/CVE-2024-24568.json | 37 ++++++ data/anchore/2024/CVE-2024-24576.json | 44 +++++++ data/anchore/2024/CVE-2024-24748.json | 40 ++++++ data/anchore/2024/CVE-2024-24750.json | 35 ++++++ data/anchore/2024/CVE-2024-24758.json | 42 +++++++ data/anchore/2024/CVE-2024-24761.json | 34 +++++ data/anchore/2024/CVE-2024-24763.json | 35 ++++++ data/anchore/2024/CVE-2024-24770.json | 35 ++++++ data/anchore/2024/CVE-2024-24809.json | 34 +++++ data/anchore/2024/CVE-2024-24813.json | 33 +++++ data/anchore/2024/CVE-2024-24814.json | 36 ++++++ data/anchore/2024/CVE-2024-24817.json | 35 ++++++ data/anchore/2024/CVE-2024-24818.json | 34 +++++ data/anchore/2024/CVE-2024-24826.json | 34 +++++ data/anchore/2024/CVE-2024-24827.json | 40 ++++++ data/anchore/2024/CVE-2024-25108.json | 34 +++++ data/anchore/2024/CVE-2024-25110.json | 34 +++++ data/anchore/2024/CVE-2024-25111.json | 36 ++++++ data/anchore/2024/CVE-2024-25112.json | 34 +++++ data/anchore/2024/CVE-2024-25114.json | 47 +++++++ data/anchore/2024/CVE-2024-25117.json | 35 ++++++ data/anchore/2024/CVE-2024-25118.json | 64 ++++++++++ data/anchore/2024/CVE-2024-25119.json | 64 ++++++++++ data/anchore/2024/CVE-2024-25120.json | 65 ++++++++++ data/anchore/2024/CVE-2024-25121.json | 64 ++++++++++ data/anchore/2024/CVE-2024-25122.json | 40 ++++++ data/anchore/2024/CVE-2024-25124.json | 40 ++++++ data/anchore/2024/CVE-2024-25126.json | 44 +++++++ data/anchore/2024/CVE-2024-25128.json | 34 +++++ data/anchore/2024/CVE-2024-25130.json | 57 +++++++++ data/anchore/2024/CVE-2024-25617.json | 35 ++++++ data/anchore/2024/CVE-2024-25618.json | 52 ++++++++ data/anchore/2024/CVE-2024-25619.json | 52 ++++++++ data/anchore/2024/CVE-2024-25620.json | 34 +++++ data/anchore/2024/CVE-2024-25623.json | 52 ++++++++ data/anchore/2024/CVE-2024-25624.json | 33 +++++ data/anchore/2024/CVE-2024-25625.json | 34 +++++ data/anchore/2024/CVE-2024-25627.json | 34 +++++ data/anchore/2024/CVE-2024-25628.json | 34 +++++ data/anchore/2024/CVE-2024-25629.json | 38 ++++++ data/anchore/2024/CVE-2024-25630.json | 35 ++++++ data/anchore/2024/CVE-2024-25631.json | 36 ++++++ data/anchore/2024/CVE-2024-25634.json | 34 +++++ data/anchore/2024/CVE-2024-25635.json | 34 +++++ data/anchore/2024/CVE-2024-25636.json | 37 ++++++ data/anchore/2024/CVE-2024-25640.json | 33 +++++ data/anchore/2024/CVE-2024-25641.json | 34 +++++ data/anchore/2024/CVE-2024-26128.json | 38 ++++++ data/anchore/2024/CVE-2024-26129.json | 35 ++++++ data/anchore/2024/CVE-2024-26130.json | 35 ++++++ data/anchore/2024/CVE-2024-26141.json | 44 +++++++ data/anchore/2024/CVE-2024-26142.json | 37 ++++++ data/anchore/2024/CVE-2024-26143.json | 43 +++++++ data/anchore/2024/CVE-2024-26144.json | 43 +++++++ data/anchore/2024/CVE-2024-26145.json | 36 ++++++ data/anchore/2024/CVE-2024-26146.json | 58 +++++++++ data/anchore/2024/CVE-2024-26147.json | 34 +++++ data/anchore/2024/CVE-2024-26148.json | 35 ++++++ data/anchore/2024/CVE-2024-26149.json | 33 +++++ data/anchore/2024/CVE-2024-26150.json | 49 ++++++++ data/anchore/2024/CVE-2024-26152.json | 36 ++++++ data/anchore/2024/CVE-2024-27082.json | 33 +++++ data/anchore/2024/CVE-2024-27083.json | 34 +++++ data/anchore/2024/CVE-2024-27085.json | 40 ++++++ data/anchore/2024/CVE-2024-27087.json | 34 +++++ data/anchore/2024/CVE-2024-27091.json | 34 +++++ data/anchore/2024/CVE-2024-27092.json | 35 ++++++ data/anchore/2024/CVE-2024-27094.json | 46 +++++++ data/anchore/2024/CVE-2024-27096.json | 35 ++++++ data/anchore/2024/CVE-2024-27097.json | 40 ++++++ data/anchore/2024/CVE-2024-27098.json | 35 ++++++ data/anchore/2024/CVE-2024-27099.json | 34 +++++ data/anchore/2024/CVE-2024-27100.json | 40 ++++++ data/anchore/2024/CVE-2024-27101.json | 34 +++++ data/anchore/2024/CVE-2024-27102.json | 34 +++++ data/anchore/2024/CVE-2024-27103.json | 34 +++++ data/anchore/2024/CVE-2024-27104.json | 35 ++++++ data/anchore/2024/CVE-2024-27105.json | 39 ++++++ data/anchore/2024/CVE-2024-27286.json | 35 ++++++ data/anchore/2024/CVE-2024-27288.json | 34 +++++ data/anchore/2024/CVE-2024-27295.json | 34 +++++ data/anchore/2024/CVE-2024-27296.json | 35 ++++++ data/anchore/2024/CVE-2024-27297.json | 53 ++++++++ data/anchore/2024/CVE-2024-27298.json | 44 +++++++ data/anchore/2024/CVE-2024-27299.json | 35 ++++++ data/anchore/2024/CVE-2024-27300.json | 35 ++++++ data/anchore/2024/CVE-2024-27306.json | 38 ++++++ data/anchore/2024/CVE-2024-27914.json | 35 ++++++ data/anchore/2024/CVE-2024-27915.json | 40 ++++++ data/anchore/2024/CVE-2024-27917.json | 36 ++++++ data/anchore/2024/CVE-2024-27919.json | 36 ++++++ data/anchore/2024/CVE-2024-27920.json | 37 ++++++ data/anchore/2024/CVE-2024-27921.json | 34 +++++ data/anchore/2024/CVE-2024-27923.json | 34 +++++ data/anchore/2024/CVE-2024-27926.json | 34 +++++ data/anchore/2024/CVE-2024-27927.json | 38 ++++++ data/anchore/2024/CVE-2024-27930.json | 36 ++++++ data/anchore/2024/CVE-2024-27931.json | 33 +++++ data/anchore/2024/CVE-2024-27932.json | 35 ++++++ data/anchore/2024/CVE-2024-27933.json | 42 +++++++ data/anchore/2024/CVE-2024-27934.json | 33 +++++ data/anchore/2024/CVE-2024-27935.json | 35 ++++++ data/anchore/2024/CVE-2024-27936.json | 35 ++++++ data/anchore/2024/CVE-2024-27937.json | 36 ++++++ data/anchore/2024/CVE-2024-28101.json | 35 ++++++ data/anchore/2024/CVE-2024-28105.json | 34 +++++ data/anchore/2024/CVE-2024-28106.json | 34 +++++ data/anchore/2024/CVE-2024-28107.json | 34 +++++ data/anchore/2024/CVE-2024-28108.json | 34 +++++ data/anchore/2024/CVE-2024-28111.json | 35 ++++++ data/anchore/2024/CVE-2024-28116.json | 34 +++++ data/anchore/2024/CVE-2024-28117.json | 34 +++++ data/anchore/2024/CVE-2024-28118.json | 34 +++++ data/anchore/2024/CVE-2024-28119.json | 35 ++++++ data/anchore/2024/CVE-2024-28122.json | 41 ++++++ data/anchore/2024/CVE-2024-28175.json | 79 ++++++++++++ data/anchore/2024/CVE-2024-28176.json | 95 ++++++++++++++ data/anchore/2024/CVE-2024-28179.json | 42 +++++++ data/anchore/2024/CVE-2024-28180.json | 80 ++++++++++++ data/anchore/2024/CVE-2024-28182.json | 40 ++++++ data/anchore/2024/CVE-2024-28183.json | 58 +++++++++ data/anchore/2024/CVE-2024-28187.json | 36 ++++++ data/anchore/2024/CVE-2024-28190.json | 42 +++++++ data/anchore/2024/CVE-2024-28191.json | 42 +++++++ data/anchore/2024/CVE-2024-28197.json | 39 ++++++ data/anchore/2024/CVE-2024-28198.json | 35 ++++++ data/anchore/2024/CVE-2024-28231.json | 52 ++++++++ data/anchore/2024/CVE-2024-28233.json | 34 +++++ data/anchore/2024/CVE-2024-28234.json | 42 +++++++ data/anchore/2024/CVE-2024-28235.json | 43 +++++++ data/anchore/2024/CVE-2024-28236.json | 34 +++++ data/anchore/2024/CVE-2024-28237.json | 34 +++++ data/anchore/2024/CVE-2024-28238.json | 34 +++++ data/anchore/2024/CVE-2024-28239.json | 36 ++++++ data/anchore/2024/CVE-2024-28240.json | 34 +++++ data/anchore/2024/CVE-2024-28241.json | 34 +++++ data/anchore/2024/CVE-2024-28242.json | 40 ++++++ data/anchore/2024/CVE-2024-28247.json | 34 +++++ data/anchore/2024/CVE-2024-28248.json | 49 ++++++++ data/anchore/2024/CVE-2024-28249.json | 48 ++++++++ data/anchore/2024/CVE-2024-28250.json | 42 +++++++ data/anchore/2024/CVE-2024-28251.json | 34 +++++ data/anchore/2024/CVE-2024-28849.json | 38 ++++++ data/anchore/2024/CVE-2024-28852.json | 34 +++++ data/anchore/2024/CVE-2024-28853.json | 33 +++++ data/anchore/2024/CVE-2024-28855.json | 74 +++++++++++ data/anchore/2024/CVE-2024-28860.json | 49 ++++++++ data/anchore/2024/CVE-2024-28865.json | 34 +++++ data/anchore/2024/CVE-2024-28866.json | 36 ++++++ data/anchore/2024/CVE-2024-28868.json | 34 +++++ data/anchore/2024/CVE-2024-28869.json | 43 +++++++ data/anchore/2024/CVE-2024-28870.json | 39 ++++++ data/anchore/2024/CVE-2024-28871.json | 35 ++++++ data/anchore/2024/CVE-2024-29018.json | 47 +++++++ data/anchore/2024/CVE-2024-29020.json | 34 +++++ data/anchore/2024/CVE-2024-29022.json | 42 +++++++ data/anchore/2024/CVE-2024-29023.json | 44 +++++++ data/anchore/2024/CVE-2024-29024.json | 34 +++++ data/anchore/2024/CVE-2024-29025.json | 37 ++++++ data/anchore/2024/CVE-2024-29026.json | 35 ++++++ data/anchore/2024/CVE-2024-29027.json | 44 +++++++ data/anchore/2024/CVE-2024-29028.json | 34 +++++ data/anchore/2024/CVE-2024-29029.json | 35 ++++++ data/anchore/2024/CVE-2024-29030.json | 35 ++++++ data/anchore/2024/CVE-2024-29033.json | 35 ++++++ data/anchore/2024/CVE-2024-29034.json | 40 ++++++ data/anchore/2024/CVE-2024-29035.json | 34 +++++ data/anchore/2024/CVE-2024-29179.json | 33 +++++ data/anchore/2024/CVE-2024-29182.json | 34 +++++ data/anchore/2024/CVE-2024-29186.json | 34 +++++ data/anchore/2024/CVE-2024-29187.json | 41 ++++++ data/anchore/2024/CVE-2024-29188.json | 41 ++++++ data/anchore/2024/CVE-2024-29196.json | 34 +++++ data/anchore/2024/CVE-2024-29197.json | 40 ++++++ data/anchore/2024/CVE-2024-29199.json | 45 +++++++ data/anchore/2024/CVE-2024-29200.json | 33 +++++ data/anchore/2024/CVE-2024-29201.json | 34 +++++ data/anchore/2024/CVE-2024-29202.json | 34 +++++ data/anchore/2024/CVE-2024-29203.json | 36 ++++++ data/anchore/2024/CVE-2024-29881.json | 36 ++++++ data/anchore/2024/CVE-2024-29882.json | 40 ++++++ data/anchore/2024/CVE-2024-29883.json | 36 ++++++ data/anchore/2024/CVE-2024-29888.json | 74 +++++++++++ data/anchore/2024/CVE-2024-29889.json | 34 +++++ data/anchore/2024/CVE-2024-29891.json | 76 ++++++++++++ data/anchore/2024/CVE-2024-29892.json | 76 ++++++++++++ data/anchore/2024/CVE-2024-29893.json | 81 ++++++++++++ data/anchore/2024/CVE-2024-29894.json | 34 +++++ data/anchore/2024/CVE-2024-29895.json | 35 ++++++ data/anchore/2024/CVE-2024-29897.json | 37 ++++++ data/anchore/2024/CVE-2024-29898.json | 36 ++++++ data/anchore/2024/CVE-2024-29902.json | 37 ++++++ data/anchore/2024/CVE-2024-29903.json | 37 ++++++ data/anchore/2024/CVE-2024-29904.json | 34 +++++ data/anchore/2024/CVE-2024-29905.json | 34 +++++ data/anchore/2024/CVE-2024-30246.json | 99 +++++++++++++++ data/anchore/2024/CVE-2024-30249.json | 33 +++++ data/anchore/2024/CVE-2024-30251.json | 37 ++++++ data/anchore/2024/CVE-2024-30255.json | 53 ++++++++ data/anchore/2024/CVE-2024-30257.json | 34 +++++ data/anchore/2024/CVE-2024-30258.json | 52 ++++++++ data/anchore/2024/CVE-2024-30259.json | 52 ++++++++ data/anchore/2024/CVE-2024-30260.json | 44 +++++++ data/anchore/2024/CVE-2024-30261.json | 45 +++++++ data/anchore/2024/CVE-2024-30262.json | 34 +++++ data/anchore/2024/CVE-2024-30266.json | 37 ++++++ data/anchore/2024/CVE-2024-30268.json | 36 ++++++ data/anchore/2024/CVE-2024-30269.json | 34 +++++ data/anchore/2024/CVE-2024-30270.json | 36 ++++++ data/anchore/2024/CVE-2024-31204.json | 35 ++++++ data/anchore/2024/CVE-2024-31205.json | 65 ++++++++++ data/anchore/2024/CVE-2024-31207.json | 69 +++++++++++ data/anchore/2024/CVE-2024-31210.json | 171 ++++++++++++++++++++++++++ data/anchore/2024/CVE-2024-31211.json | 33 +++++ data/anchore/2024/CVE-2024-31214.json | 36 ++++++ data/anchore/2024/CVE-2024-31219.json | 35 ++++++ data/anchore/2024/CVE-2024-31224.json | 35 ++++++ data/anchore/2024/CVE-2024-31441.json | 33 +++++ data/anchore/2024/CVE-2024-31443.json | 34 +++++ data/anchore/2024/CVE-2024-31444.json | 33 +++++ data/anchore/2024/CVE-2024-31445.json | 36 ++++++ data/anchore/2024/CVE-2024-31446.json | 34 +++++ data/anchore/2024/CVE-2024-31447.json | 41 ++++++ data/anchore/2024/CVE-2024-31450.json | 36 ++++++ data/anchore/2024/CVE-2024-31452.json | 34 +++++ data/anchore/2024/CVE-2024-31456.json | 34 +++++ data/anchore/2024/CVE-2024-31457.json | 35 ++++++ data/anchore/2024/CVE-2024-31458.json | 33 +++++ data/anchore/2024/CVE-2024-31459.json | 35 ++++++ data/anchore/2024/CVE-2024-31460.json | 34 +++++ data/anchore/2024/CVE-2024-31463.json | 35 ++++++ data/anchore/2024/CVE-2024-31464.json | 52 ++++++++ data/anchore/2024/CVE-2024-31465.json | 52 ++++++++ data/anchore/2024/CVE-2024-31981.json | 52 ++++++++ data/anchore/2024/CVE-2024-31982.json | 51 ++++++++ data/anchore/2024/CVE-2024-31983.json | 51 ++++++++ data/anchore/2024/CVE-2024-31984.json | 54 ++++++++ data/anchore/2024/CVE-2024-31985.json | 52 ++++++++ data/anchore/2024/CVE-2024-31986.json | 51 ++++++++ data/anchore/2024/CVE-2024-31987.json | 52 ++++++++ data/anchore/2024/CVE-2024-31988.json | 52 ++++++++ data/anchore/2024/CVE-2024-31990.json | 81 ++++++++++++ data/anchore/2024/CVE-2024-31996.json | 53 ++++++++ data/anchore/2024/CVE-2024-31997.json | 51 ++++++++ data/anchore/2024/CVE-2024-32000.json | 35 ++++++ data/anchore/2024/CVE-2024-32001.json | 35 ++++++ data/anchore/2024/CVE-2024-32002.json | 73 +++++++++++ data/anchore/2024/CVE-2024-32004.json | 72 +++++++++++ data/anchore/2024/CVE-2024-32019.json | 40 ++++++ data/anchore/2024/CVE-2024-32020.json | 72 +++++++++++ data/anchore/2024/CVE-2024-32021.json | 70 +++++++++++ data/anchore/2024/CVE-2024-32038.json | 33 +++++ data/anchore/2024/CVE-2024-32039.json | 42 +++++++ data/anchore/2024/CVE-2024-32040.json | 42 +++++++ data/anchore/2024/CVE-2024-32041.json | 42 +++++++ data/anchore/2024/CVE-2024-32458.json | 42 +++++++ data/anchore/2024/CVE-2024-32459.json | 42 +++++++ data/anchore/2024/CVE-2024-32460.json | 42 +++++++ data/anchore/2024/CVE-2024-32461.json | 35 ++++++ data/anchore/2024/CVE-2024-32462.json | 59 +++++++++ data/anchore/2024/CVE-2024-32465.json | 73 +++++++++++ data/anchore/2024/CVE-2024-32466.json | 34 +++++ data/anchore/2024/CVE-2024-32467.json | 33 +++++ data/anchore/2024/CVE-2024-32470.json | 35 ++++++ data/anchore/2024/CVE-2024-32472.json | 41 ++++++ data/anchore/2024/CVE-2024-32473.json | 35 ++++++ data/anchore/2024/CVE-2024-32474.json | 37 ++++++ data/anchore/2024/CVE-2024-32475.json | 52 ++++++++ data/anchore/2024/CVE-2024-32476.json | 81 ++++++++++++ data/anchore/2024/CVE-2024-32477.json | 34 +++++ data/anchore/2024/CVE-2024-32479.json | 35 ++++++ data/anchore/2024/CVE-2024-32480.json | 34 +++++ data/anchore/2024/CVE-2024-32481.json | 36 ++++++ data/anchore/2024/CVE-2024-32644.json | 35 ++++++ data/anchore/2024/CVE-2024-32645.json | 33 +++++ data/anchore/2024/CVE-2024-32646.json | 33 +++++ data/anchore/2024/CVE-2024-32647.json | 34 +++++ data/anchore/2024/CVE-2024-32648.json | 35 ++++++ data/anchore/2024/CVE-2024-32649.json | 33 +++++ data/anchore/2024/CVE-2024-32651.json | 35 ++++++ data/anchore/2024/CVE-2024-32652.json | 35 ++++++ data/anchore/2024/CVE-2024-32653.json | 35 ++++++ data/anchore/2024/CVE-2024-32658.json | 42 +++++++ data/anchore/2024/CVE-2024-32659.json | 41 ++++++ data/anchore/2024/CVE-2024-32660.json | 41 ++++++ data/anchore/2024/CVE-2024-32661.json | 40 ++++++ data/anchore/2024/CVE-2024-32662.json | 41 ++++++ data/anchore/2024/CVE-2024-32663.json | 45 +++++++ data/anchore/2024/CVE-2024-32664.json | 41 ++++++ data/anchore/2024/CVE-2024-32867.json | 48 ++++++++ data/anchore/2024/CVE-2024-32868.json | 34 +++++ data/anchore/2024/CVE-2024-32869.json | 34 +++++ data/anchore/2024/CVE-2024-32874.json | 34 +++++ data/anchore/2024/CVE-2024-32875.json | 35 ++++++ data/anchore/2024/CVE-2024-32880.json | 34 +++++ data/anchore/2024/CVE-2024-32882.json | 37 ++++++ data/anchore/2024/CVE-2024-32886.json | 51 ++++++++ data/anchore/2024/CVE-2024-32887.json | 35 ++++++ data/anchore/2024/CVE-2024-32890.json | 35 ++++++ data/anchore/2024/CVE-2024-32963.json | 33 +++++ data/anchore/2024/CVE-2024-32964.json | 34 +++++ data/anchore/2024/CVE-2024-32967.json | 70 +++++++++++ data/anchore/2024/CVE-2024-32971.json | 37 ++++++ data/anchore/2024/CVE-2024-32972.json | 34 +++++ data/anchore/2024/CVE-2024-32977.json | 34 +++++ data/anchore/2024/CVE-2024-32979.json | 42 +++++++ data/anchore/2024/CVE-2024-34061.json | 34 +++++ data/anchore/2024/CVE-2024-34064.json | 34 +++++ data/anchore/2024/CVE-2024-34066.json | 34 +++++ data/anchore/2024/CVE-2024-34067.json | 36 ++++++ data/anchore/2024/CVE-2024-34068.json | 35 ++++++ data/anchore/2024/CVE-2024-34069.json | 34 +++++ data/anchore/2024/CVE-2024-34070.json | 34 +++++ data/anchore/2024/CVE-2024-34074.json | 41 ++++++ data/anchore/2024/CVE-2024-34077.json | 35 ++++++ data/anchore/2024/CVE-2024-34080.json | 36 ++++++ data/anchore/2024/CVE-2024-34081.json | 35 ++++++ data/anchore/2024/CVE-2024-34340.json | 33 +++++ data/anchore/2024/CVE-2024-34346.json | 34 +++++ data/anchore/2024/CVE-2024-34347.json | 34 +++++ data/anchore/2024/CVE-2024-34349.json | 40 ++++++ data/anchore/2024/CVE-2024-34350.json | 33 +++++ data/anchore/2024/CVE-2024-34351.json | 35 ++++++ data/anchore/2024/CVE-2024-34352.json | 33 +++++ data/anchore/2024/CVE-2024-34355.json | 35 ++++++ data/anchore/2024/CVE-2024-34356.json | 61 +++++++++ data/anchore/2024/CVE-2024-34357.json | 61 +++++++++ data/anchore/2024/CVE-2024-34358.json | 61 +++++++++ data/anchore/2024/CVE-2024-34701.json | 39 ++++++ data/anchore/2024/CVE-2024-34707.json | 43 +++++++ data/anchore/2024/CVE-2024-34708.json | 35 ++++++ data/anchore/2024/CVE-2024-34709.json | 35 ++++++ data/anchore/2024/CVE-2024-34716.json | 34 +++++ data/anchore/2024/CVE-2024-34717.json | 34 +++++ 406 files changed, 16922 insertions(+) create mode 100644 data/anchore/2022/CVE-2022-24805.json create mode 100644 data/anchore/2022/CVE-2022-24806.json create mode 100644 data/anchore/2022/CVE-2022-24807.json create mode 100644 data/anchore/2022/CVE-2022-24808.json create mode 100644 data/anchore/2022/CVE-2022-24809.json create mode 100644 data/anchore/2022/CVE-2022-24810.json create mode 100644 data/anchore/2022/CVE-2022-36028.json create mode 100644 data/anchore/2022/CVE-2022-36029.json create mode 100644 data/anchore/2023/CVE-2023-38511.json create mode 100644 data/anchore/2023/CVE-2023-41038.json create mode 100644 data/anchore/2023/CVE-2023-41877.json create mode 100644 data/anchore/2023/CVE-2023-43790.json create mode 100644 data/anchore/2023/CVE-2023-44379.json create mode 100644 data/anchore/2023/CVE-2023-44396.json create mode 100644 data/anchore/2023/CVE-2023-45808.json create mode 100644 data/anchore/2023/CVE-2023-45824.json create mode 100644 data/anchore/2023/CVE-2023-47123.json create mode 100644 data/anchore/2023/CVE-2023-47622.json create mode 100644 data/anchore/2023/CVE-2023-47626.json create mode 100644 data/anchore/2023/CVE-2023-47634.json create mode 100644 data/anchore/2023/CVE-2023-47635.json create mode 100644 data/anchore/2023/CVE-2023-48220.json create mode 100644 data/anchore/2023/CVE-2023-48229.json create mode 100644 data/anchore/2023/CVE-2023-48296.json create mode 100644 data/anchore/2023/CVE-2023-48703.json create mode 100644 data/anchore/2023/CVE-2023-48709.json create mode 100644 data/anchore/2023/CVE-2023-48710.json create mode 100644 data/anchore/2023/CVE-2023-49275.json create mode 100644 data/anchore/2023/CVE-2023-49781.json create mode 100644 data/anchore/2023/CVE-2023-50257.json create mode 100644 data/anchore/2023/CVE-2023-50260.json create mode 100644 data/anchore/2023/CVE-2023-50716.json create mode 100644 data/anchore/2023/CVE-2023-50717.json create mode 100644 data/anchore/2023/CVE-2023-50718.json create mode 100644 data/anchore/2023/CVE-2023-50726.json create mode 100644 data/anchore/2023/CVE-2023-50926.json create mode 100644 data/anchore/2023/CVE-2023-50927.json create mode 100644 data/anchore/2023/CVE-2023-51388.json create mode 100644 data/anchore/2023/CVE-2023-51389.json create mode 100644 data/anchore/2023/CVE-2023-51444.json create mode 100644 data/anchore/2023/CVE-2023-51445.json create mode 100644 data/anchore/2023/CVE-2023-51447.json create mode 100644 data/anchore/2023/CVE-2023-51450.json create mode 100644 data/anchore/2023/CVE-2023-51653.json create mode 100644 data/anchore/2023/CVE-2023-51699.json create mode 100644 data/anchore/2024/CVE-2024-21652.json create mode 100644 data/anchore/2024/CVE-2024-21661.json create mode 100644 data/anchore/2024/CVE-2024-21662.json create mode 100644 data/anchore/2024/CVE-2024-22189.json create mode 100644 data/anchore/2024/CVE-2024-22412.json create mode 100644 data/anchore/2024/CVE-2024-22423.json create mode 100644 data/anchore/2024/CVE-2024-23328.json create mode 100644 data/anchore/2024/CVE-2024-23333.json create mode 100644 data/anchore/2024/CVE-2024-23335.json create mode 100644 data/anchore/2024/CVE-2024-23336.json create mode 100644 data/anchore/2024/CVE-2024-23346.json create mode 100644 data/anchore/2024/CVE-2024-23634.json create mode 100644 data/anchore/2024/CVE-2024-23640.json create mode 100644 data/anchore/2024/CVE-2024-23642.json create mode 100644 data/anchore/2024/CVE-2024-23643.json create mode 100644 data/anchore/2024/CVE-2024-23818.json create mode 100644 data/anchore/2024/CVE-2024-23819.json create mode 100644 data/anchore/2024/CVE-2024-23821.json create mode 100644 data/anchore/2024/CVE-2024-23823.json create mode 100644 data/anchore/2024/CVE-2024-23830.json create mode 100644 data/anchore/2024/CVE-2024-23833.json create mode 100644 data/anchore/2024/CVE-2024-23835.json create mode 100644 data/anchore/2024/CVE-2024-23836.json create mode 100644 data/anchore/2024/CVE-2024-23837.json create mode 100644 data/anchore/2024/CVE-2024-23839.json create mode 100644 data/anchore/2024/CVE-2024-24562.json create mode 100644 data/anchore/2024/CVE-2024-24564.json create mode 100644 data/anchore/2024/CVE-2024-24568.json create mode 100644 data/anchore/2024/CVE-2024-24576.json create mode 100644 data/anchore/2024/CVE-2024-24748.json create mode 100644 data/anchore/2024/CVE-2024-24750.json create mode 100644 data/anchore/2024/CVE-2024-24758.json create mode 100644 data/anchore/2024/CVE-2024-24761.json create mode 100644 data/anchore/2024/CVE-2024-24763.json create mode 100644 data/anchore/2024/CVE-2024-24770.json create mode 100644 data/anchore/2024/CVE-2024-24809.json create mode 100644 data/anchore/2024/CVE-2024-24813.json create mode 100644 data/anchore/2024/CVE-2024-24814.json create mode 100644 data/anchore/2024/CVE-2024-24817.json create mode 100644 data/anchore/2024/CVE-2024-24818.json create mode 100644 data/anchore/2024/CVE-2024-24826.json create mode 100644 data/anchore/2024/CVE-2024-24827.json create mode 100644 data/anchore/2024/CVE-2024-25108.json create mode 100644 data/anchore/2024/CVE-2024-25110.json create mode 100644 data/anchore/2024/CVE-2024-25111.json create mode 100644 data/anchore/2024/CVE-2024-25112.json create mode 100644 data/anchore/2024/CVE-2024-25114.json create mode 100644 data/anchore/2024/CVE-2024-25117.json create mode 100644 data/anchore/2024/CVE-2024-25118.json create mode 100644 data/anchore/2024/CVE-2024-25119.json create mode 100644 data/anchore/2024/CVE-2024-25120.json create mode 100644 data/anchore/2024/CVE-2024-25121.json create mode 100644 data/anchore/2024/CVE-2024-25122.json create mode 100644 data/anchore/2024/CVE-2024-25124.json create mode 100644 data/anchore/2024/CVE-2024-25126.json create mode 100644 data/anchore/2024/CVE-2024-25128.json create mode 100644 data/anchore/2024/CVE-2024-25130.json create mode 100644 data/anchore/2024/CVE-2024-25617.json create mode 100644 data/anchore/2024/CVE-2024-25618.json create mode 100644 data/anchore/2024/CVE-2024-25619.json create mode 100644 data/anchore/2024/CVE-2024-25620.json create mode 100644 data/anchore/2024/CVE-2024-25623.json create mode 100644 data/anchore/2024/CVE-2024-25624.json create mode 100644 data/anchore/2024/CVE-2024-25625.json create mode 100644 data/anchore/2024/CVE-2024-25627.json create mode 100644 data/anchore/2024/CVE-2024-25628.json create mode 100644 data/anchore/2024/CVE-2024-25629.json create mode 100644 data/anchore/2024/CVE-2024-25630.json create mode 100644 data/anchore/2024/CVE-2024-25631.json create mode 100644 data/anchore/2024/CVE-2024-25634.json create mode 100644 data/anchore/2024/CVE-2024-25635.json create mode 100644 data/anchore/2024/CVE-2024-25636.json create mode 100644 data/anchore/2024/CVE-2024-25640.json create mode 100644 data/anchore/2024/CVE-2024-25641.json create mode 100644 data/anchore/2024/CVE-2024-26128.json create mode 100644 data/anchore/2024/CVE-2024-26129.json create mode 100644 data/anchore/2024/CVE-2024-26130.json create mode 100644 data/anchore/2024/CVE-2024-26141.json create mode 100644 data/anchore/2024/CVE-2024-26142.json create mode 100644 data/anchore/2024/CVE-2024-26143.json create mode 100644 data/anchore/2024/CVE-2024-26144.json create mode 100644 data/anchore/2024/CVE-2024-26145.json create mode 100644 data/anchore/2024/CVE-2024-26146.json create mode 100644 data/anchore/2024/CVE-2024-26147.json create mode 100644 data/anchore/2024/CVE-2024-26148.json create mode 100644 data/anchore/2024/CVE-2024-26149.json create mode 100644 data/anchore/2024/CVE-2024-26150.json create mode 100644 data/anchore/2024/CVE-2024-26152.json create mode 100644 data/anchore/2024/CVE-2024-27082.json create mode 100644 data/anchore/2024/CVE-2024-27083.json create mode 100644 data/anchore/2024/CVE-2024-27085.json create mode 100644 data/anchore/2024/CVE-2024-27087.json create mode 100644 data/anchore/2024/CVE-2024-27091.json create mode 100644 data/anchore/2024/CVE-2024-27092.json create mode 100644 data/anchore/2024/CVE-2024-27094.json create mode 100644 data/anchore/2024/CVE-2024-27096.json create mode 100644 data/anchore/2024/CVE-2024-27097.json create mode 100644 data/anchore/2024/CVE-2024-27098.json create mode 100644 data/anchore/2024/CVE-2024-27099.json create mode 100644 data/anchore/2024/CVE-2024-27100.json create mode 100644 data/anchore/2024/CVE-2024-27101.json create mode 100644 data/anchore/2024/CVE-2024-27102.json create mode 100644 data/anchore/2024/CVE-2024-27103.json create mode 100644 data/anchore/2024/CVE-2024-27104.json create mode 100644 data/anchore/2024/CVE-2024-27105.json create mode 100644 data/anchore/2024/CVE-2024-27286.json create mode 100644 data/anchore/2024/CVE-2024-27288.json create mode 100644 data/anchore/2024/CVE-2024-27295.json create mode 100644 data/anchore/2024/CVE-2024-27296.json create mode 100644 data/anchore/2024/CVE-2024-27297.json create mode 100644 data/anchore/2024/CVE-2024-27298.json create mode 100644 data/anchore/2024/CVE-2024-27299.json create mode 100644 data/anchore/2024/CVE-2024-27300.json create mode 100644 data/anchore/2024/CVE-2024-27306.json create mode 100644 data/anchore/2024/CVE-2024-27914.json create mode 100644 data/anchore/2024/CVE-2024-27915.json create mode 100644 data/anchore/2024/CVE-2024-27917.json create mode 100644 data/anchore/2024/CVE-2024-27919.json create mode 100644 data/anchore/2024/CVE-2024-27920.json create mode 100644 data/anchore/2024/CVE-2024-27921.json create mode 100644 data/anchore/2024/CVE-2024-27923.json create mode 100644 data/anchore/2024/CVE-2024-27926.json create mode 100644 data/anchore/2024/CVE-2024-27927.json create mode 100644 data/anchore/2024/CVE-2024-27930.json create mode 100644 data/anchore/2024/CVE-2024-27931.json create mode 100644 data/anchore/2024/CVE-2024-27932.json create mode 100644 data/anchore/2024/CVE-2024-27933.json create mode 100644 data/anchore/2024/CVE-2024-27934.json create mode 100644 data/anchore/2024/CVE-2024-27935.json create mode 100644 data/anchore/2024/CVE-2024-27936.json create mode 100644 data/anchore/2024/CVE-2024-27937.json create mode 100644 data/anchore/2024/CVE-2024-28101.json create mode 100644 data/anchore/2024/CVE-2024-28105.json create mode 100644 data/anchore/2024/CVE-2024-28106.json create mode 100644 data/anchore/2024/CVE-2024-28107.json create mode 100644 data/anchore/2024/CVE-2024-28108.json create mode 100644 data/anchore/2024/CVE-2024-28111.json create mode 100644 data/anchore/2024/CVE-2024-28116.json create mode 100644 data/anchore/2024/CVE-2024-28117.json create mode 100644 data/anchore/2024/CVE-2024-28118.json create mode 100644 data/anchore/2024/CVE-2024-28119.json create mode 100644 data/anchore/2024/CVE-2024-28122.json create mode 100644 data/anchore/2024/CVE-2024-28175.json create mode 100644 data/anchore/2024/CVE-2024-28176.json create mode 100644 data/anchore/2024/CVE-2024-28179.json create mode 100644 data/anchore/2024/CVE-2024-28180.json create mode 100644 data/anchore/2024/CVE-2024-28182.json create mode 100644 data/anchore/2024/CVE-2024-28183.json create mode 100644 data/anchore/2024/CVE-2024-28187.json create mode 100644 data/anchore/2024/CVE-2024-28190.json create mode 100644 data/anchore/2024/CVE-2024-28191.json create mode 100644 data/anchore/2024/CVE-2024-28197.json create mode 100644 data/anchore/2024/CVE-2024-28198.json create mode 100644 data/anchore/2024/CVE-2024-28231.json create mode 100644 data/anchore/2024/CVE-2024-28233.json create mode 100644 data/anchore/2024/CVE-2024-28234.json create mode 100644 data/anchore/2024/CVE-2024-28235.json create mode 100644 data/anchore/2024/CVE-2024-28236.json create mode 100644 data/anchore/2024/CVE-2024-28237.json create mode 100644 data/anchore/2024/CVE-2024-28238.json create mode 100644 data/anchore/2024/CVE-2024-28239.json create mode 100644 data/anchore/2024/CVE-2024-28240.json create mode 100644 data/anchore/2024/CVE-2024-28241.json create mode 100644 data/anchore/2024/CVE-2024-28242.json create mode 100644 data/anchore/2024/CVE-2024-28247.json create mode 100644 data/anchore/2024/CVE-2024-28248.json create mode 100644 data/anchore/2024/CVE-2024-28249.json create mode 100644 data/anchore/2024/CVE-2024-28250.json create mode 100644 data/anchore/2024/CVE-2024-28251.json create mode 100644 data/anchore/2024/CVE-2024-28849.json create mode 100644 data/anchore/2024/CVE-2024-28852.json create mode 100644 data/anchore/2024/CVE-2024-28853.json create mode 100644 data/anchore/2024/CVE-2024-28855.json create mode 100644 data/anchore/2024/CVE-2024-28860.json create mode 100644 data/anchore/2024/CVE-2024-28865.json create mode 100644 data/anchore/2024/CVE-2024-28866.json create mode 100644 data/anchore/2024/CVE-2024-28868.json create mode 100644 data/anchore/2024/CVE-2024-28869.json create mode 100644 data/anchore/2024/CVE-2024-28870.json create mode 100644 data/anchore/2024/CVE-2024-28871.json create mode 100644 data/anchore/2024/CVE-2024-29018.json create mode 100644 data/anchore/2024/CVE-2024-29020.json create mode 100644 data/anchore/2024/CVE-2024-29022.json create mode 100644 data/anchore/2024/CVE-2024-29023.json create mode 100644 data/anchore/2024/CVE-2024-29024.json create mode 100644 data/anchore/2024/CVE-2024-29025.json create mode 100644 data/anchore/2024/CVE-2024-29026.json create mode 100644 data/anchore/2024/CVE-2024-29027.json create mode 100644 data/anchore/2024/CVE-2024-29028.json create mode 100644 data/anchore/2024/CVE-2024-29029.json create mode 100644 data/anchore/2024/CVE-2024-29030.json create mode 100644 data/anchore/2024/CVE-2024-29033.json create mode 100644 data/anchore/2024/CVE-2024-29034.json create mode 100644 data/anchore/2024/CVE-2024-29035.json create mode 100644 data/anchore/2024/CVE-2024-29179.json create mode 100644 data/anchore/2024/CVE-2024-29182.json create mode 100644 data/anchore/2024/CVE-2024-29186.json create mode 100644 data/anchore/2024/CVE-2024-29187.json create mode 100644 data/anchore/2024/CVE-2024-29188.json create mode 100644 data/anchore/2024/CVE-2024-29196.json create mode 100644 data/anchore/2024/CVE-2024-29197.json create mode 100644 data/anchore/2024/CVE-2024-29199.json create mode 100644 data/anchore/2024/CVE-2024-29200.json create mode 100644 data/anchore/2024/CVE-2024-29201.json create mode 100644 data/anchore/2024/CVE-2024-29202.json create mode 100644 data/anchore/2024/CVE-2024-29203.json create mode 100644 data/anchore/2024/CVE-2024-29881.json create mode 100644 data/anchore/2024/CVE-2024-29882.json create mode 100644 data/anchore/2024/CVE-2024-29883.json create mode 100644 data/anchore/2024/CVE-2024-29888.json create mode 100644 data/anchore/2024/CVE-2024-29889.json create mode 100644 data/anchore/2024/CVE-2024-29891.json create mode 100644 data/anchore/2024/CVE-2024-29892.json create mode 100644 data/anchore/2024/CVE-2024-29893.json create mode 100644 data/anchore/2024/CVE-2024-29894.json create mode 100644 data/anchore/2024/CVE-2024-29895.json create mode 100644 data/anchore/2024/CVE-2024-29897.json create mode 100644 data/anchore/2024/CVE-2024-29898.json create mode 100644 data/anchore/2024/CVE-2024-29902.json create mode 100644 data/anchore/2024/CVE-2024-29903.json create mode 100644 data/anchore/2024/CVE-2024-29904.json create mode 100644 data/anchore/2024/CVE-2024-29905.json create mode 100644 data/anchore/2024/CVE-2024-30246.json create mode 100644 data/anchore/2024/CVE-2024-30249.json create mode 100644 data/anchore/2024/CVE-2024-30251.json create mode 100644 data/anchore/2024/CVE-2024-30255.json create mode 100644 data/anchore/2024/CVE-2024-30257.json create mode 100644 data/anchore/2024/CVE-2024-30258.json create mode 100644 data/anchore/2024/CVE-2024-30259.json create mode 100644 data/anchore/2024/CVE-2024-30260.json create mode 100644 data/anchore/2024/CVE-2024-30261.json create mode 100644 data/anchore/2024/CVE-2024-30262.json create mode 100644 data/anchore/2024/CVE-2024-30266.json create mode 100644 data/anchore/2024/CVE-2024-30268.json create mode 100644 data/anchore/2024/CVE-2024-30269.json create mode 100644 data/anchore/2024/CVE-2024-30270.json create mode 100644 data/anchore/2024/CVE-2024-31204.json create mode 100644 data/anchore/2024/CVE-2024-31205.json create mode 100644 data/anchore/2024/CVE-2024-31207.json create mode 100644 data/anchore/2024/CVE-2024-31210.json create mode 100644 data/anchore/2024/CVE-2024-31211.json create mode 100644 data/anchore/2024/CVE-2024-31214.json create mode 100644 data/anchore/2024/CVE-2024-31219.json create mode 100644 data/anchore/2024/CVE-2024-31224.json create mode 100644 data/anchore/2024/CVE-2024-31441.json create mode 100644 data/anchore/2024/CVE-2024-31443.json create mode 100644 data/anchore/2024/CVE-2024-31444.json create mode 100644 data/anchore/2024/CVE-2024-31445.json create mode 100644 data/anchore/2024/CVE-2024-31446.json create mode 100644 data/anchore/2024/CVE-2024-31447.json create mode 100644 data/anchore/2024/CVE-2024-31450.json create mode 100644 data/anchore/2024/CVE-2024-31452.json create mode 100644 data/anchore/2024/CVE-2024-31456.json create mode 100644 data/anchore/2024/CVE-2024-31457.json create mode 100644 data/anchore/2024/CVE-2024-31458.json create mode 100644 data/anchore/2024/CVE-2024-31459.json create mode 100644 data/anchore/2024/CVE-2024-31460.json create mode 100644 data/anchore/2024/CVE-2024-31463.json create mode 100644 data/anchore/2024/CVE-2024-31464.json create mode 100644 data/anchore/2024/CVE-2024-31465.json create mode 100644 data/anchore/2024/CVE-2024-31981.json create mode 100644 data/anchore/2024/CVE-2024-31982.json create mode 100644 data/anchore/2024/CVE-2024-31983.json create mode 100644 data/anchore/2024/CVE-2024-31984.json create mode 100644 data/anchore/2024/CVE-2024-31985.json create mode 100644 data/anchore/2024/CVE-2024-31986.json create mode 100644 data/anchore/2024/CVE-2024-31987.json create mode 100644 data/anchore/2024/CVE-2024-31988.json create mode 100644 data/anchore/2024/CVE-2024-31990.json create mode 100644 data/anchore/2024/CVE-2024-31996.json create mode 100644 data/anchore/2024/CVE-2024-31997.json create mode 100644 data/anchore/2024/CVE-2024-32000.json create mode 100644 data/anchore/2024/CVE-2024-32001.json create mode 100644 data/anchore/2024/CVE-2024-32002.json create mode 100644 data/anchore/2024/CVE-2024-32004.json create mode 100644 data/anchore/2024/CVE-2024-32019.json create mode 100644 data/anchore/2024/CVE-2024-32020.json create mode 100644 data/anchore/2024/CVE-2024-32021.json create mode 100644 data/anchore/2024/CVE-2024-32038.json create mode 100644 data/anchore/2024/CVE-2024-32039.json create mode 100644 data/anchore/2024/CVE-2024-32040.json create mode 100644 data/anchore/2024/CVE-2024-32041.json create mode 100644 data/anchore/2024/CVE-2024-32458.json create mode 100644 data/anchore/2024/CVE-2024-32459.json create mode 100644 data/anchore/2024/CVE-2024-32460.json create mode 100644 data/anchore/2024/CVE-2024-32461.json create mode 100644 data/anchore/2024/CVE-2024-32462.json create mode 100644 data/anchore/2024/CVE-2024-32465.json create mode 100644 data/anchore/2024/CVE-2024-32466.json create mode 100644 data/anchore/2024/CVE-2024-32467.json create mode 100644 data/anchore/2024/CVE-2024-32470.json create mode 100644 data/anchore/2024/CVE-2024-32472.json create mode 100644 data/anchore/2024/CVE-2024-32473.json create mode 100644 data/anchore/2024/CVE-2024-32474.json create mode 100644 data/anchore/2024/CVE-2024-32475.json create mode 100644 data/anchore/2024/CVE-2024-32476.json create mode 100644 data/anchore/2024/CVE-2024-32477.json create mode 100644 data/anchore/2024/CVE-2024-32479.json create mode 100644 data/anchore/2024/CVE-2024-32480.json create mode 100644 data/anchore/2024/CVE-2024-32481.json create mode 100644 data/anchore/2024/CVE-2024-32644.json create mode 100644 data/anchore/2024/CVE-2024-32645.json create mode 100644 data/anchore/2024/CVE-2024-32646.json create mode 100644 data/anchore/2024/CVE-2024-32647.json create mode 100644 data/anchore/2024/CVE-2024-32648.json create mode 100644 data/anchore/2024/CVE-2024-32649.json create mode 100644 data/anchore/2024/CVE-2024-32651.json create mode 100644 data/anchore/2024/CVE-2024-32652.json create mode 100644 data/anchore/2024/CVE-2024-32653.json create mode 100644 data/anchore/2024/CVE-2024-32658.json create mode 100644 data/anchore/2024/CVE-2024-32659.json create mode 100644 data/anchore/2024/CVE-2024-32660.json create mode 100644 data/anchore/2024/CVE-2024-32661.json create mode 100644 data/anchore/2024/CVE-2024-32662.json create mode 100644 data/anchore/2024/CVE-2024-32663.json create mode 100644 data/anchore/2024/CVE-2024-32664.json create mode 100644 data/anchore/2024/CVE-2024-32867.json create mode 100644 data/anchore/2024/CVE-2024-32868.json create mode 100644 data/anchore/2024/CVE-2024-32869.json create mode 100644 data/anchore/2024/CVE-2024-32874.json create mode 100644 data/anchore/2024/CVE-2024-32875.json create mode 100644 data/anchore/2024/CVE-2024-32880.json create mode 100644 data/anchore/2024/CVE-2024-32882.json create mode 100644 data/anchore/2024/CVE-2024-32886.json create mode 100644 data/anchore/2024/CVE-2024-32887.json create mode 100644 data/anchore/2024/CVE-2024-32890.json create mode 100644 data/anchore/2024/CVE-2024-32963.json create mode 100644 data/anchore/2024/CVE-2024-32964.json create mode 100644 data/anchore/2024/CVE-2024-32967.json create mode 100644 data/anchore/2024/CVE-2024-32971.json create mode 100644 data/anchore/2024/CVE-2024-32972.json create mode 100644 data/anchore/2024/CVE-2024-32977.json create mode 100644 data/anchore/2024/CVE-2024-32979.json create mode 100644 data/anchore/2024/CVE-2024-34061.json create mode 100644 data/anchore/2024/CVE-2024-34064.json create mode 100644 data/anchore/2024/CVE-2024-34066.json create mode 100644 data/anchore/2024/CVE-2024-34067.json create mode 100644 data/anchore/2024/CVE-2024-34068.json create mode 100644 data/anchore/2024/CVE-2024-34069.json create mode 100644 data/anchore/2024/CVE-2024-34070.json create mode 100644 data/anchore/2024/CVE-2024-34074.json create mode 100644 data/anchore/2024/CVE-2024-34077.json create mode 100644 data/anchore/2024/CVE-2024-34080.json create mode 100644 data/anchore/2024/CVE-2024-34081.json create mode 100644 data/anchore/2024/CVE-2024-34340.json create mode 100644 data/anchore/2024/CVE-2024-34346.json create mode 100644 data/anchore/2024/CVE-2024-34347.json create mode 100644 data/anchore/2024/CVE-2024-34349.json create mode 100644 data/anchore/2024/CVE-2024-34350.json create mode 100644 data/anchore/2024/CVE-2024-34351.json create mode 100644 data/anchore/2024/CVE-2024-34352.json create mode 100644 data/anchore/2024/CVE-2024-34355.json create mode 100644 data/anchore/2024/CVE-2024-34356.json create mode 100644 data/anchore/2024/CVE-2024-34357.json create mode 100644 data/anchore/2024/CVE-2024-34358.json create mode 100644 data/anchore/2024/CVE-2024-34701.json create mode 100644 data/anchore/2024/CVE-2024-34707.json create mode 100644 data/anchore/2024/CVE-2024-34708.json create mode 100644 data/anchore/2024/CVE-2024-34709.json create mode 100644 data/anchore/2024/CVE-2024-34716.json create mode 100644 data/anchore/2024/CVE-2024-34717.json diff --git a/data/anchore/2022/CVE-2022-24805.json b/data/anchore/2022/CVE-2022-24805.json new file mode 100644 index 00000000..bdfae63d --- /dev/null +++ b/data/anchore/2022/CVE-2022-24805.json @@ -0,0 +1,41 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2022-24805", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://security.gentoo.org/glsa/202210-29", + "https://www.debian.org/security/2022/dsa-5209", + "https://bugzilla.redhat.com/show_bug.cgi?id=2105238", + "https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775", + "https://bugzilla.redhat.com/show_bug.cgi?id=2103225", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/", + "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937", + "https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*" + ], + "product": "net-snmp", + "repo": "https://github.com/net-snmp/net-snmp", + "vendor": "net-snmp", + "versions": [ + { + "lessThan": "5.9.2", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2022/CVE-2022-24806.json b/data/anchore/2022/CVE-2022-24806.json new file mode 100644 index 00000000..398ba65a --- /dev/null +++ b/data/anchore/2022/CVE-2022-24806.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2022-24806", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://security.gentoo.org/glsa/202210-29", + "https://www.debian.org/security/2022/dsa-5209", + "https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775", + "https://bugzilla.redhat.com/show_bug.cgi?id=2103225", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/", + "https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*" + ], + "product": "net-snmp", + "repo": "https://github.com/net-snmp/net-snmp", + "vendor": "net-snmp", + "versions": [ + { + "lessThan": "5.9.2", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2022/CVE-2022-24807.json b/data/anchore/2022/CVE-2022-24807.json new file mode 100644 index 00000000..15d5f7b3 --- /dev/null +++ b/data/anchore/2022/CVE-2022-24807.json @@ -0,0 +1,41 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2022-24807", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://security.gentoo.org/glsa/202210-29", + "https://bugzilla.redhat.com/show_bug.cgi?id=2105239", + "https://www.debian.org/security/2022/dsa-5209", + "https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775", + "https://bugzilla.redhat.com/show_bug.cgi?id=2103225", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/", + "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937", + "https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*" + ], + "product": "net-snmp", + "repo": "https://github.com/net-snmp/net-snmp", + "vendor": "net-snmp", + "versions": [ + { + "lessThan": "5.9.2", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2022/CVE-2022-24808.json b/data/anchore/2022/CVE-2022-24808.json new file mode 100644 index 00000000..c04c3891 --- /dev/null +++ b/data/anchore/2022/CVE-2022-24808.json @@ -0,0 +1,41 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2022-24808", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://security.gentoo.org/glsa/202210-29", + "https://bugzilla.redhat.com/show_bug.cgi?id=2105240", + "https://www.debian.org/security/2022/dsa-5209", + "https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775", + "https://bugzilla.redhat.com/show_bug.cgi?id=2103225", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/", + "https://github.com/net-snmp/net-snmp/commit/67ebb43e9038b2dae6e74ae8838b36fcc10fc937", + "https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*" + ], + "product": "net-snmp", + "repo": "https://github.com/net-snmp/net-snmp", + "vendor": "net-snmp", + "versions": [ + { + "lessThan": "5.9.2", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2022/CVE-2022-24809.json b/data/anchore/2022/CVE-2022-24809.json new file mode 100644 index 00000000..f2949ffd --- /dev/null +++ b/data/anchore/2022/CVE-2022-24809.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2022-24809", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://security.gentoo.org/glsa/202210-29", + "https://www.debian.org/security/2022/dsa-5209", + "https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775", + "https://bugzilla.redhat.com/show_bug.cgi?id=2103225", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/", + "https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html", + "https://bugzilla.redhat.com/show_bug.cgi?id=2105242" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*" + ], + "product": "net-snmp", + "repo": "https://github.com/net-snmp/net-snmp", + "vendor": "net-snmp", + "versions": [ + { + "lessThan": "5.9.2", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2022/CVE-2022-24810.json b/data/anchore/2022/CVE-2022-24810.json new file mode 100644 index 00000000..4b42dbdc --- /dev/null +++ b/data/anchore/2022/CVE-2022-24810.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2022-24810", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://security.gentoo.org/glsa/202210-29", + "https://bugzilla.redhat.com/show_bug.cgi?id=2105241", + "https://www.debian.org/security/2022/dsa-5209", + "https://github.com/net-snmp/net-snmp/commit/ce66eb97c17aa9a48bc079be7b65895266fa6775", + "https://bugzilla.redhat.com/show_bug.cgi?id=2103225", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FX75KKGMO5XMV6JMQZF6KOG3JPFNQBY7/", + "https://lists.debian.org/debian-lts-announce/2022/08/msg00020.html" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:net-snmp:net-snmp:*:*:*:*:*:*:*:*" + ], + "product": "net-snmp", + "repo": "https://github.com/net-snmp/net-snmp", + "vendor": "net-snmp", + "versions": [ + { + "lessThan": "5.9.2", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2022/CVE-2022-36028.json b/data/anchore/2022/CVE-2022-36028.json new file mode 100644 index 00000000..bcb787d2 --- /dev/null +++ b/data/anchore/2022/CVE-2022-36028.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2022-36028", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/bigbluebutton/greenlight/commit/20fe1ee71b5703fcc4ed698a959ad224fed19623", + "https://huntr.com/bounties/ba5834bd-1f04-4936-8e93-2442d45403bahttps://" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:bigbluebutton:greenlight:*:*:*:*:*:*:*:*" + ], + "packageName": "greenlight", + "product": "greenlight", + "repo": "https://github.com/bigbluebutton/greenlight", + "vendor": "bigbluebutton", + "versions": [ + { + "lessThan": "2.13.0", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2022/CVE-2022-36029.json b/data/anchore/2022/CVE-2022-36029.json new file mode 100644 index 00000000..72df6016 --- /dev/null +++ b/data/anchore/2022/CVE-2022-36029.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2022-36029", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/bigbluebutton/greenlight/commit/20fe1ee71b5703fcc4ed698a959ad224fed19623", + "https://huntr.com/bounties/ba5834bd-1f04-4936-8e93-2442d45403bahttps://" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:bigbluebutton:greenlight:*:*:*:*:*:*:*:*" + ], + "packageName": "greenlight", + "product": "greenlight", + "repo": "https://github.com/bigbluebutton/greenlight", + "vendor": "bigbluebutton", + "versions": [ + { + "lessThan": "2.13.0", + "status": "affected", + "version": "0", + "versionType": "semver" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-38511.json b/data/anchore/2023/CVE-2023-38511.json new file mode 100644 index 00000000..da72472f --- /dev/null +++ b/data/anchore/2023/CVE-2023-38511.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-38511", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://www.synacktiv.com/advisories/file-read-in-itop", + "https://github.com/Combodo/iTop/security/advisories/GHSA-323r-chx5-m9gm", + "https://github.com/Combodo/iTop/commit/89145593ef2e077529a6f7ee7cde712db637e1ab", + "https://github.com/Combodo/iTop/commit/343e87a8d4fc8253fd81aeaf0dcc424b9dc4eda7" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" + ], + "product": "iTop", + "vendor": "Combodo", + "versions": [ + { + "lessThan": "3.0.4", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "3.1.1", + "status": "affected", + "version": "3.1.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-41038.json b/data/anchore/2023/CVE-2023-41038.json new file mode 100644 index 00000000..93d46169 --- /dev/null +++ b/data/anchore/2023/CVE-2023-41038.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-41038", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/FirebirdSQL/firebird/security/advisories/GHSA-6fv8-8rwr-9692", + "https://firebirdsql.org/en/snapshot-builds" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:firebirdsql:firebird:*:*:*:*:*:*:*:*" + ], + "product": "firebird", + "vendor": "FirebirdSQL", + "versions": [ + { + "lessThan": "4.0.4.2981", + "status": "affected", + "version": "4.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.0.0.1176", + "status": "affected", + "version": "5.0-beta1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-41877.json b/data/anchore/2023/CVE-2023-41877.json new file mode 100644 index 00000000..4de25de7 --- /dev/null +++ b/data/anchore/2023/CVE-2023-41877.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-41877", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/geoserver/geoserver/security/advisories/GHSA-8g7v-vjrc-x4g5", + "https://docs.geoserver.org/latest/en/user/configuration/globalsettings.html#log-location" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://repo.osgeo.org", + "packageName": "org.geoserver:gs-main", + "cpes": [ + "cpe:2.3:a:osgeo:geoserver:*:*:*:*:*:*:*:*", + "cpe:2.3:a:org.geoserver:gs-main:*:*:*:*:*:*:*:*" + ], + "product": "geoserver", + "vendor": "geoserver", + "repo": "https://github.com/geoserver/geoserver", + "versions": [ + { + "lessThanOrEqual": "2.23.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-43790.json b/data/anchore/2023/CVE-2023-43790.json new file mode 100644 index 00000000..e955d8b5 --- /dev/null +++ b/data/anchore/2023/CVE-2023-43790.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-43790", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Combodo/iTop/commit/03c9ffc0334fd44f3f0e82477264087064e1c732", + "https://github.com/Combodo/iTop/security/advisories/GHSA-96xm-p83r-hm97" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" + ], + "product": "iTop", + "vendor": "Combodo", + "versions": [ + { + "lessThan": "3.1.1", + "status": "affected", + "version": "3.1.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-44379.json b/data/anchore/2023/CVE-2023-44379.json new file mode 100644 index 00000000..c3a4ea11 --- /dev/null +++ b/data/anchore/2023/CVE-2023-44379.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-44379", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/baserproject/basercms/commit/18549396e5a9b8294306a54a876af164b0b57da4", + "https://basercms.net/security/JVN_73283159", + "https://github.com/baserproject/basercms/security/advisories/GHSA-66c2-p8rh-qx87" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://packagist.org", + "packageName": "baserproject/basercms", + "cpes": [ + "cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*" + ], + "repo": "https://github.com/baserproject/basercms", + "product": "basercms", + "vendor": "baserproject", + "versions": [ + { + "lessThan": "5.0.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-44396.json b/data/anchore/2023/CVE-2023-44396.json new file mode 100644 index 00000000..b053114f --- /dev/null +++ b/data/anchore/2023/CVE-2023-44396.json @@ -0,0 +1,47 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-44396", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Combodo/iTop/security/advisories/GHSA-gqqj-jgh6-3x35", + "https://github.com/Combodo/iTop/commit/c72cb7e70ebf469ce0ec01f5f9b524e39afe6c7f", + "https://github.com/Combodo/iTop/commit/9df92665e08c4bf5d4d8a5a9fe21fd3fb26fb273" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" + ], + "product": "iTop", + "vendor": "Combodo", + "versions": [ + { + "lessThan": "2.7.1", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "3.0.4", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "3.1.1", + "status": "affected", + "version": "3.1.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-45808.json b/data/anchore/2023/CVE-2023-45808.json new file mode 100644 index 00000000..36fa9eff --- /dev/null +++ b/data/anchore/2023/CVE-2023-45808.json @@ -0,0 +1,47 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-45808", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Combodo/iTop/security/advisories/GHSA-245j-66p9-pwmh", + "https://github.com/Combodo/iTop/commit/5a434486443a2cf8b8a288475aada54d0a068ca7", + "https://github.com/Combodo/iTop/commit/8f61c02cbe17badff87bff9b8ada85e783c47385" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" + ], + "product": "iTop", + "vendor": "Combodo", + "versions": [ + { + "lessThan": "2.7.10", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "3.0.4", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "3.1.1", + "status": "affected", + "version": "3.1.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-45824.json b/data/anchore/2023/CVE-2023-45824.json new file mode 100644 index 00000000..312f854d --- /dev/null +++ b/data/anchore/2023/CVE-2023-45824.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-45824", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/oroinc/platform/commit/cf94df7595afca052796e26b299d2ce031e289cd", + "https://github.com/oroinc/platform/security/advisories/GHSA-vxq2-p937-3px3" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://packagist.org/packages", + "packageName": "oro/platform", + "cpes": [ + "cpe:2.3:a:oroinc:oroplatform:*:*:*:*:*:*:*:*" + ], + "product": "platform", + "vendor": "oroinc", + "versions": [ + { + "lessThan": "5.1.4", + "status": "affected", + "version": "4.2.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-47123.json b/data/anchore/2023/CVE-2023-47123.json new file mode 100644 index 00000000..4e1d97ff --- /dev/null +++ b/data/anchore/2023/CVE-2023-47123.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-47123", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Combodo/iTop/security/advisories/GHSA-mx8x-693w-9hjp", + "https://github.com/Combodo/iTop/commit/34ba4fa0ce99534f751d9f170fe0eda103e20c72" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" + ], + "product": "iTop", + "vendor": "Combodo", + "versions": [ + { + "lessThan": "3.1.1", + "status": "affected", + "version": "3.1.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-47622.json b/data/anchore/2023/CVE-2023-47622.json new file mode 100644 index 00000000..49efb599 --- /dev/null +++ b/data/anchore/2023/CVE-2023-47622.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-47622", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Combodo/iTop/commit/09be84f69da0fe44221f63b8c2db041bdf7dd7f9", + "https://github.com/Combodo/iTop/security/advisories/GHSA-q9cm-q7fc-frxh" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" + ], + "product": "iTop", + "vendor": "Combodo", + "versions": [ + { + "lessThan": "3.0.4", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "3.1.1", + "status": "affected", + "version": "3.1.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-47626.json b/data/anchore/2023/CVE-2023-47626.json new file mode 100644 index 00000000..e8de195b --- /dev/null +++ b/data/anchore/2023/CVE-2023-47626.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-47626", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Combodo/iTop/security/advisories/GHSA-vv3v-9vrv-h95h" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" + ], + "product": "iTop", + "vendor": "Combodo", + "versions": [ + { + "lessThan": "3.1.1", + "status": "affected", + "version": "3.1.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-47634.json b/data/anchore/2023/CVE-2023-47634.json new file mode 100644 index 00000000..4ac82de8 --- /dev/null +++ b/data/anchore/2023/CVE-2023-47634.json @@ -0,0 +1,50 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-47634", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/decidim/decidim/security/advisories/GHSA-r275-j57c-7mf2", + "https://github.com/decidim/decidim/releases/tag/v0.26.9", + "https://github.com/decidim/decidim/releases/tag/v0.28.0", + "https://github.com/decidim/decidim/releases/tag/v0.27.5" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://rubygems.org/gems", + "packageName": "decidim", + "cpes": [ + "cpe:2.3:a:decidim:decidim:*:*:*:*:*:ruby:*:*" + ], + "product": "decidim", + "vendor": "decidim", + "versions": [ + { + "lessThan": "0.26.9", + "status": "affected", + "version": "0.10.0", + "versionType": "custom" + }, + { + "lessThan": "0.27.5", + "status": "affected", + "version": "0.27.0", + "versionType": "custom" + }, + { + "lessThan": "0.28.0", + "status": "affected", + "version": "0.28.0.rc0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-47635.json b/data/anchore/2023/CVE-2023-47635.json new file mode 100644 index 00000000..12a14dd3 --- /dev/null +++ b/data/anchore/2023/CVE-2023-47635.json @@ -0,0 +1,48 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-47635", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/decidim/decidim/commit/5542227be66e3b6d7530f5b536069bce09376660", + "https://github.com/decidim/decidim/pull/6247", + "https://github.com/decidim/decidim/commit/57a4b467787448307b5d9b01ce6e2c8502e121ac", + "https://github.com/decidim/decidim/releases/tag/v0.27.5", + "https://github.com/decidim/decidim/pull/11743", + "https://github.com/decidim/decidim/blob/3187bdfd40ea1c57c2c12512b09a7fec0b2bed08/decidim-templates/app/controllers/decidim/templates/admin/questionnaire_templates_controller.rb#L11", + "https://github.com/decidim/decidim/security/advisories/GHSA-f3qm-vfc3-jg6v", + "https://github.com/decidim/decidim/releases/tag/v0.28.0" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://rubygems.org/gems", + "packageName": "decidim-templates", + "cpes": [ + "cpe:2.3:a:decidim:decidim-templates:*:*:*:*:*:ruby:*:*" + ], + "product": "decidim-templates", + "vendor": "decidim", + "versions": [ + { + "lessThan": "0.27.5", + "status": "affected", + "version": "0.23.0", + "versionType": "custom" + }, + { + "lessThan": "0.28.0", + "status": "affected", + "version": "0.28.0.rc0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-48220.json b/data/anchore/2023/CVE-2023-48220.json new file mode 100644 index 00000000..0df29ec4 --- /dev/null +++ b/data/anchore/2023/CVE-2023-48220.json @@ -0,0 +1,130 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-48220", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/decidim/decidim/releases/tag/v0.26.9", + "https://github.com/scambra/devise_invitable/commit/94d859c7de0829bf63f679ae5dd3cab2b866a098", + "https://github.com/decidim/decidim/releases/tag/v0.28.0", + "https://github.com/decidim/decidim/commit/073e60e2e4224dd81815a784002ebba30f2ebb34", + "https://github.com/decidim/decidim/releases/tag/v0.27.5", + "https://github.com/decidim/decidim/security/advisories/GHSA-w3q8-m492-4pwp", + "https://github.com/scambra/devise_invitable/blob/41f58970ff76fb64382a9b9ea1bd530f7c3adab2/lib/devise_invitable/models.rb#L198", + "https://github.com/decidim/decidim/blob/d2d390578050772d1bdb6d731395f1afc39dcbfc/decidim-core/config/initializers/devise.rb#L134", + "https://github.com/decidim/decidim/commit/b12800717a689c295a9ea680a38ca9f823d2c454" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://rubygems.org/gems", + "packageName": "decidim", + "cpes": [ + "cpe:2.3:a:decidim:decidim:*:*:*:*:*:ruby:*:*" + ], + "product": "decidim", + "vendor": "decidim", + "versions": [ + { + "lessThan": "0.26.9", + "status": "affected", + "version": "0.0.1.alpha3", + "versionType": "custom" + }, + { + "lessThan": "0.27.5", + "status": "affected", + "version": "0.27.0", + "versionType": "custom" + }, + { + "lessThan": "0.28.0", + "status": "affected", + "version": "0.28.0.rc0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://rubygems.org/gems", + "packageName": "decidim-admin", + "cpes": [ + "cpe:2.3:a:decidim:decidim-admin:*:*:*:*:*:ruby:*:*" + ], + "product": "decidim-admin", + "vendor": "decidim", + "versions": [ + { + "lessThan": "0.26.9", + "status": "affected", + "version": "0.0.1.alpha3", + "versionType": "custom" + }, + { + "lessThan": "0.27.5", + "status": "affected", + "version": "0.27.0", + "versionType": "custom" + }, + { + "lessThan": "0.28.0", + "status": "affected", + "version": "0.28.0.rc0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://rubygems.org/gems", + "packageName": "decidim-system", + "cpes": [ + "cpe:2.3:a:decidim:decidim-system:*:*:*:*:*:ruby:*:*" + ], + "product": "decidim-system", + "vendor": "decidim", + "versions": [ + { + "lessThan": "0.26.9", + "status": "affected", + "version": "0.0.1.alpha3", + "versionType": "custom" + }, + { + "lessThan": "0.27.5", + "status": "affected", + "version": "0.27.0", + "versionType": "custom" + }, + { + "lessThan": "0.28.0", + "status": "affected", + "version": "0.28.0.rc0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://rubygems.org/gems", + "packageName": "devise_invitable", + "cpes": [ + "cpe:2.3:a:scambra:devise_invitable:*:*:*:*:*:ruby:*:*" + ], + "product": "devise_invitable", + "vendor": "scambra", + "versions": [ + { + "lessThan": "2.0.9", + "status": "affected", + "version": "0.4.rc3", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-48229.json b/data/anchore/2023/CVE-2023-48229.json new file mode 100644 index 00000000..69a231fe --- /dev/null +++ b/data/anchore/2023/CVE-2023-48229.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-48229", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-rcwv-xwc9-5hp2", + "https://github.com/contiki-ng/contiki-ng/pull/2741" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*" + ], + "product": "contiki-ng", + "vendor": "contiki-ng", + "versions": [ + { + "lessThanOrEqual": "4.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-48296.json b/data/anchore/2023/CVE-2023-48296.json new file mode 100644 index 00000000..dabdfcdd --- /dev/null +++ b/data/anchore/2023/CVE-2023-48296.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-48296", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/oroinc/orocommerce/security/advisories/GHSA-v7px-46v9-5qwp", + "https://github.com/oroinc/orocommerce/commit/41c526498012d44cd88852c63697f1ef53b61db8" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://packagist.org/packages", + "packageName": "oro/customer-portal", + "cpes": [ + "cpe:2.3:a:oroinc:orocommerce:*:*:*:*:*:*:*:*" + ], + "product": "orocommerce", + "vendor": "oroinc", + "versions": [ + { + "lessThan": "5.1.4", + "status": "affected", + "version": "4.1.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-48703.json b/data/anchore/2023/CVE-2023-48703.json new file mode 100644 index 00000000..94a91ec1 --- /dev/null +++ b/data/anchore/2023/CVE-2023-48703.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-48703", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://securitylab.github.com/advisories/GHSL-2023-121_go-saml__archived_/" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/RobotsAndPencils/go-saml", + "repo": "https://github.com/RobotsAndPencils/go-saml", + "cpes": [ + "cpe:2.3:a:robotsandpencils:go-saml:*:*:*:*:*:go:*:*" + ], + "product": "go-saml", + "vendor": "RobotsAndPencils", + "versions": [ + { + "lessThanOrEqual": "*", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-48709.json b/data/anchore/2023/CVE-2023-48709.json new file mode 100644 index 00000000..eca46280 --- /dev/null +++ b/data/anchore/2023/CVE-2023-48709.json @@ -0,0 +1,47 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-48709", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Combodo/iTop/commit/083a0b79bfa2c106735b5c10eddb35a05ec7f04a", + "https://github.com/Combodo/iTop/security/advisories/GHSA-9q3x-9987-53x9", + "https://github.com/Combodo/iTop/commit/b10bcb976dfe8e55aa0f659bfbcdd18334a1b17c" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" + ], + "product": "iTop", + "vendor": "Combodo", + "versions": [ + { + "lessThan": "2.7.9", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "3.0.4", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "3.1.1", + "status": "affected", + "version": "3.1.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-48710.json b/data/anchore/2023/CVE-2023-48710.json new file mode 100644 index 00000000..1869314e --- /dev/null +++ b/data/anchore/2023/CVE-2023-48710.json @@ -0,0 +1,46 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-48710", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Combodo/iTop/commit/3b2da39469f7a4636ed250ed0d33f4efff38be26", + "https://github.com/Combodo/iTop/security/advisories/GHSA-g652-q7cc-7hfc" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" + ], + "product": "iTop", + "vendor": "Combodo", + "versions": [ + { + "lessThan": "2.7.10", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "3.0.4", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "3.1.1", + "status": "affected", + "version": "3.1.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-49275.json b/data/anchore/2023/CVE-2023-49275.json new file mode 100644 index 00000000..140208ed --- /dev/null +++ b/data/anchore/2023/CVE-2023-49275.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-49275", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1578", + "https://github.com/wazuh/wazuh/blob/e1d5231b31b68a75f3b8b33f833155b362411078/src/analysisd/decoders/syscollector.c#L1573", + "https://github.com/wazuh/wazuh/security/advisories/GHSA-4mq7-w9r6-9975" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*" + ], + "product": "wazuh", + "vendor": "wazuh", + "versions": [ + { + "lessThan": "4.7.1", + "status": "affected", + "version": "3.2.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-49781.json b/data/anchore/2023/CVE-2023-49781.json new file mode 100644 index 00000000..a021e1e6 --- /dev/null +++ b/data/anchore/2023/CVE-2023-49781.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-49781", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/nocodb/nocodb/commit/7f58ce3726dfec71537d8b80474a0f95a48a1574", + "https://github.com/nocodb/nocodb/security/advisories/GHSA-h6r4-xvw6-jc5h" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://www.npmjs.com/package", + "packageName": "nocodb", + "repo": "https://github.com/nocodb/nocodb", + "cpes": [ + "cpe:2.3:a:xgenecloud:nocodb:*:*:*:*:*:*:*:*", + "cpe:2.3:a:nocodb:nocodb:*:*:*:*:*:*:*:*" + ], + "product": "nocodb", + "vendor": "nocodb", + "versions": [ + { + "lessThan": "0.202.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-50257.json b/data/anchore/2023/CVE-2023-50257.json new file mode 100644 index 00000000..65b6accc --- /dev/null +++ b/data/anchore/2023/CVE-2023-50257.json @@ -0,0 +1,55 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-50257", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/eProsima/Fast-DDS/commit/072cbc9d6a71d869a5cbed1873c0cdd6cf67cda4", + "https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-v5r6-8mvh-cp98", + "https://github.com/eProsima/Fast-DDS/commit/f07a0213e655202188840b864be4438ae1067a13", + "https://github.com/eProsima/Fast-DDS/commit/f2e5ceae8fbea0a6c9445a366faaca0b98a8ef86", + "https://github.com/eProsima/Fast-DDS/commit/e1869863c06db7fbb366ae53760fbe6e754be026" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*" + ], + "product": "Fast-DDS", + "vendor": "eProsima", + "versions": [ + { + "lessThan": "2.12.2", + "status": "affected", + "version": "2.12.0", + "versionType": "custom" + }, + { + "lessThan": "2.11.3", + "status": "affected", + "version": "2.11.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.3", + "status": "affected", + "version": "2.7.0", + "versionType": "custom" + }, + { + "lessThan": "2.6.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-50260.json b/data/anchore/2023/CVE-2023-50260.json new file mode 100644 index 00000000..80c8f8db --- /dev/null +++ b/data/anchore/2023/CVE-2023-50260.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-50260", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/wazuh/wazuh/security/advisories/GHSA-mjq2-xf8g-68vw" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*" + ], + "product": "wazuh", + "vendor": "wazuh", + "versions": [ + { + "lessThan": "4.7.2", + "status": "affected", + "version": "4.2.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-50716.json b/data/anchore/2023/CVE-2023-50716.json new file mode 100644 index 00000000..a0f31248 --- /dev/null +++ b/data/anchore/2023/CVE-2023-50716.json @@ -0,0 +1,51 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-50716", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-5m2f-hvj2-cx2h" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*" + ], + "product": "Fast-DDS", + "vendor": "eProsima", + "versions": [ + { + "lessThan": "2.12.2", + "status": "affected", + "version": "2.12.0", + "versionType": "custom" + }, + { + "lessThan": "2.11.3", + "status": "affected", + "version": "2.11.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.3", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + }, + { + "lessThan": "2.6.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-50717.json b/data/anchore/2023/CVE-2023-50717.json new file mode 100644 index 00000000..85cfa5b3 --- /dev/null +++ b/data/anchore/2023/CVE-2023-50717.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-50717", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/nocodb/nocodb/security/advisories/GHSA-qg73-g3cf-vhhh" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://www.npmjs.com/package", + "packageName": "nocodb", + "repo": "https://github.com/nocodb/nocodb", + "cpes": [ + "cpe:2.3:a:xgenecloud:nocodb:*:*:*:*:*:*:*:*", + "cpe:2.3:a:nocodb:nocodb:*:*:*:*:*:*:*:*" + ], + "product": "nocodb", + "vendor": "nocodb", + "versions": [ + { + "lessThan": "0.202.10", + "status": "affected", + "version": "0.202.6", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-50718.json b/data/anchore/2023/CVE-2023-50718.json new file mode 100644 index 00000000..a4b361b7 --- /dev/null +++ b/data/anchore/2023/CVE-2023-50718.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-50718", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/nocodb/nocodb/security/advisories/GHSA-8fxg-mr34-jqr8" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://www.npmjs.com/package", + "packageName": "nocodb", + "repo": "https://github.com/nocodb/nocodb", + "cpes": [ + "cpe:2.3:a:xgenecloud:nocodb:*:*:*:*:*:*:*:*", + "cpe:2.3:a:nocodb:nocodb:*:*:*:*:*:*:*:*" + ], + "product": "nocodb", + "vendor": "nocodb", + "versions": [ + { + "lessThan": "0.202.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-50726.json b/data/anchore/2023/CVE-2023-50726.json new file mode 100644 index 00000000..deefb8d0 --- /dev/null +++ b/data/anchore/2023/CVE-2023-50726.json @@ -0,0 +1,80 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-50726", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/argoproj/argo-cd/security/advisories/GHSA-g623-jcgg-mhmm", + "https://github.com/argoproj/argo-cd/commit/3b8f673f06c2d228e01cbc830e5cb57cef008978", + "https://argo-cd.readthedocs.io/en/latest/operator-manual/rbac" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/argoproj/argo-cd", + "cpes": [ + "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", + "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*" + ], + "product": "argo-cd", + "vendor": "argoproj", + "versions": [ + { + "lessThan": "2.8.12", + "status": "affected", + "version": "1.2.0-rc1", + "versionType": "custom" + }, + { + "lessThan": "2.9.8", + "status": "affected", + "version": "2.9.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.3", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/argoproj/argo-cd/v2", + "cpes": [ + "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", + "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*" + ], + "product": "argo-cd", + "vendor": "argoproj", + "versions": [ + { + "lessThan": "2.8.12", + "status": "affected", + "version": "1.2.0-rc1", + "versionType": "custom" + }, + { + "lessThan": "2.9.8", + "status": "affected", + "version": "2.9.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.3", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-50926.json b/data/anchore/2023/CVE-2023-50926.json new file mode 100644 index 00000000..55e07b36 --- /dev/null +++ b/data/anchore/2023/CVE-2023-50926.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-50926", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-jp4p-fq85-jch2", + "https://github.com/contiki-ng/contiki-ng/pull/2721" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*" + ], + "product": "contiki-ng", + "vendor": "contiki-ng", + "versions": [ + { + "lessThanOrEqual": "4.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-50927.json b/data/anchore/2023/CVE-2023-50927.json new file mode 100644 index 00000000..bbfa115c --- /dev/null +++ b/data/anchore/2023/CVE-2023-50927.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-50927", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/contiki-ng/contiki-ng/pull/2484", + "https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-9423-rgj4-wjfw" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*" + ], + "product": "contiki-ng", + "vendor": "contiki-ng", + "versions": [ + { + "lessThan": "4.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51388.json b/data/anchore/2023/CVE-2023-51388.json new file mode 100644 index 00000000..d33eec7e --- /dev/null +++ b/data/anchore/2023/CVE-2023-51388.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-51388", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/dromara/hertzbeat/security/advisories/GHSA-mcqg-gqxr-hqgj", + "https://github.com/dromara/hertzbeat/commit/8dcf050e27ca95d15460a7ba98a3df8a9cd1d3d2" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:dromara:hertzbeat:*:*:*:*:*:*:*:*" + ], + "product": "hertzbeat", + "vendor": "dromara", + "versions": [ + { + "lessThan": "1.4.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51389.json b/data/anchore/2023/CVE-2023-51389.json new file mode 100644 index 00000000..a54fd63f --- /dev/null +++ b/data/anchore/2023/CVE-2023-51389.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-51389", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/dromara/hertzbeat/security/advisories/GHSA-rmvr-9p5x-mm96", + "https://github.com/dromara/hertzbeat/commit/97c3f14446d1c96d1fc993df111684926b6cce17" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:dromara:hertzbeat:*:*:*:*:*:*:*:*" + ], + "product": "hertzbeat", + "vendor": "dromara", + "versions": [ + { + "lessThan": "1.4.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51444.json b/data/anchore/2023/CVE-2023-51444.json new file mode 100644 index 00000000..9d7d9e8c --- /dev/null +++ b/data/anchore/2023/CVE-2023-51444.json @@ -0,0 +1,73 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-51444", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/geoserver/geoserver/commit/ca683170c669718cb6ad4c79e01b0451065e13b8", + "https://github.com/geoserver/geoserver/security/advisories/GHSA-9v5q-2gwq-q9hq", + "https://osgeo-org.atlassian.net/browse/GEOS-11176", + "https://github.com/geoserver/geoserver/pull/7222", + "https://github.com/geoserver/geoserver/commit/fe235b3bb1d7f05751a4a2ef5390c36f5c9e78ae" + ], + "todos": [ + "investigate additional maven repo URLs" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://repo.osgeo.org", + "packageName": "org.geoserver:gs-platform", + "cpes": [ + "cpe:2.3:a:org.geoserver:gs-platform:*:*:*:*:*:*:*:*" + ], + "product": "gs-platform", + "vendor": "geoserver", + "repo": "https://github.com/geoserver/geoserver", + "versions": [ + { + "lessThan": "2.23.4", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.24.1", + "status": "affected", + "version": "2.24", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://repo.osgeo.org", + "packageName": "org.geoserver:gs-restconfig", + "cpes": [ + "cpe:2.3:a:org.geoserver:gs-restconfig:*:*:*:*:*:*:*:*" + ], + "product": "gs-restconfig", + "vendor": "geoserver", + "repo": "https://github.com/geoserver/geoserver", + "versions": [ + { + "lessThan": "2.23.4", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.24.1", + "status": "affected", + "version": "2.24", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51445.json b/data/anchore/2023/CVE-2023-51445.json new file mode 100644 index 00000000..052bbc7f --- /dev/null +++ b/data/anchore/2023/CVE-2023-51445.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-51445", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/geoserver/geoserver/commit/7db985738ff2422019ccac974cf547bae5770cad", + "https://osgeo-org.atlassian.net/browse/GEOS-11148", + "https://github.com/geoserver/geoserver/security/advisories/GHSA-fh7p-5f6g-vj2w", + "https://github.com/geoserver/geoserver/pull/7161" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://repo.osgeo.org", + "packageName": "org.geoserver:gs-restconfig", + "cpes": [ + "cpe:2.3:a:org.geoserver:gs-restconfig:*:*:*:*:*:*:*:*" + ], + "product": "gs-restconfig", + "vendor": "geoserver", + "repo": "https://github.com/geoserver/geoserver", + "versions": [ + { + "lessThan": "2.23.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51447.json b/data/anchore/2023/CVE-2023-51447.json new file mode 100644 index 00000000..5b45a094 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51447.json @@ -0,0 +1,69 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-51447", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/decidim/decidim/security/advisories/GHSA-9w99-78rj-hmxq", + "https://github.com/decidim/decidim/releases/tag/v0.27.5", + "https://github.com/decidim/decidim/pull/11612", + "https://github.com/decidim/decidim/commit/aaf72787cf18beeeb6a771c1f7cbb7654b073423", + "https://github.com/decidim/decidim/releases/tag/v0.28.0", + "https://github.com/rails/rails/blob/a967d355c6fee9ad9b8bd115d43bc8b0fc207e7e/activestorage/app/controllers/active_storage/direct_uploads_controller.rb#L14" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://rubygems.org/gems", + "packageName": "decidim", + "cpes": [ + "cpe:2.3:a:decidim:decidim:*:*:*:*:*:ruby:*:*" + ], + "product": "decidim", + "vendor": "decidim", + "versions": [ + { + "lessThan": "0.27.5", + "status": "affected", + "version": "0.27.0", + "versionType": "custom" + }, + { + "lessThan": "0.28.0", + "status": "affected", + "version": "0.28.0.rc0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://rubygems.org/gems", + "packageName": "decidim-core", + "cpes": [ + "cpe:2.3:a:decidim:decidim-core:*:*:*:*:*:ruby:*:*" + ], + "product": "decidim-core", + "vendor": "decidim", + "versions": [ + { + "lessThan": "0.27.5", + "status": "affected", + "version": "0.27.0", + "versionType": "custom" + }, + { + "lessThan": "0.28.0", + "status": "affected", + "version": "0.28.0.rc0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51450.json b/data/anchore/2023/CVE-2023-51450.json new file mode 100644 index 00000000..db579a59 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51450.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-51450", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/baserproject/basercms/commit/18f426d63e752b4d22c40e9ea8d1f6e692ef601c", + "https://github.com/baserproject/basercms/security/advisories/GHSA-77fc-4cv5-hmfr", + "https://basercms.net/security/JVN_09767360" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://packagist.org", + "packageName": "baserproject/basercms", + "cpes": [ + "cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*" + ], + "repo": "https://github.com/baserproject/basercms", + "product": "basercms", + "vendor": "baserproject", + "versions": [ + { + "lessThan": "5.0.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51653.json b/data/anchore/2023/CVE-2023-51653.json new file mode 100644 index 00000000..c5d78d2b --- /dev/null +++ b/data/anchore/2023/CVE-2023-51653.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-51653", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/dromara/hertzbeat/security/advisories/GHSA-gcmp-vf6v-59gg", + "https://github.com/dromara/hertzbeat/commit/f794b0d82be49c596c04a042976446559eb315ef" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:dromara:hertzbeat:*:*:*:*:*:*:*:*" + ], + "product": "hertzbeat", + "vendor": "dromara", + "versions": [ + { + "lessThan": "1.4.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2023/CVE-2023-51699.json b/data/anchore/2023/CVE-2023-51699.json new file mode 100644 index 00000000..b508d5a1 --- /dev/null +++ b/data/anchore/2023/CVE-2023-51699.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2023-51699", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/fluid-cloudnative/fluid/security/advisories/GHSA-wx8q-4gm9-rj2g", + "https://github.com/fluid-cloudnative/fluid/commit/e0184cff8790ad000c3e8943392c7f544fad7d66" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/fluid-cloudnative/fluid", + "repo": "https://github.com/fluid-cloudnative/fluid", + "cpes": [ + "cpe:2.3:a:linuxfoundation:fluid:*:*:*:*:*:*:*:*" + ], + "product": "fluid", + "vendor": "fluid-cloudnative", + "versions": [ + { + "lessThan": "0.9.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-21652.json b/data/anchore/2024/CVE-2024-21652.json new file mode 100644 index 00000000..a9a4fa66 --- /dev/null +++ b/data/anchore/2024/CVE-2024-21652.json @@ -0,0 +1,78 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-21652", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/argoproj/argo-cd/security/advisories/GHSA-x32m-mvfj-52xv" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/argoproj/argo-cd", + "cpes": [ + "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", + "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*" + ], + "product": "argo-cd", + "vendor": "argoproj", + "versions": [ + { + "lessThan": "2.8.13", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.9.9", + "status": "affected", + "version": "2.9.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.4", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/argoproj/argo-cd/v2", + "cpes": [ + "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", + "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*" + ], + "product": "argo-cd", + "vendor": "argoproj", + "versions": [ + { + "lessThan": "2.8.13", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.9.9", + "status": "affected", + "version": "2.9.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.4", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-21661.json b/data/anchore/2024/CVE-2024-21661.json new file mode 100644 index 00000000..29394624 --- /dev/null +++ b/data/anchore/2024/CVE-2024-21661.json @@ -0,0 +1,82 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-21661", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/argoproj/argo-cd/commit/5bbb51ab423f273dda74ab956469843d2db2e208", + "https://github.com/argoproj/argo-cd/blob/54601c8fd30b86a4c4b7eb449956264372c8bde0/util/session/sessionmanager.go#L302-L311", + "https://github.com/argoproj/argo-cd/commit/2a22e19e06aaf6a1e734443043310a66c234e345", + "https://github.com/argoproj/argo-cd/commit/ce04dc5c6f6e92033221ec6d96b74403b065ca8b", + "https://github.com/argoproj/argo-cd/security/advisories/GHSA-6v85-wr92-q4p7" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/argoproj/argo-cd", + "cpes": [ + "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", + "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*" + ], + "product": "argo-cd", + "vendor": "argoproj", + "versions": [ + { + "lessThan": "2.8.13", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.9.9", + "status": "affected", + "version": "2.9.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.4", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/argoproj/argo-cd/v2", + "cpes": [ + "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", + "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*" + ], + "product": "argo-cd", + "vendor": "argoproj", + "versions": [ + { + "lessThan": "2.8.13", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.9.9", + "status": "affected", + "version": "2.9.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.4", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-21662.json b/data/anchore/2024/CVE-2024-21662.json new file mode 100644 index 00000000..63d5fce9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-21662.json @@ -0,0 +1,82 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-21662", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2vgg-9h6w-m454", + "https://github.com/argoproj/argo-cd/commit/6e181d72b31522f886a2afa029d5b26d7912ec7b", + "https://github.com/argoproj/argo-cd/commit/cebb6538f7944c87ca2fecb5d17f8baacc431456", + "https://argo-cd.readthedocs.io/en/stable/security_considerations/#cve-2020-8827-insufficient-anti-automationanti-brute-force", + "https://github.com/argoproj/argo-cd/commit/17b0df1168a4c535f6f37e95f25ed7cd81e1fa4d" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/argoproj/argo-cd", + "cpes": [ + "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", + "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*" + ], + "product": "argo-cd", + "vendor": "argoproj", + "versions": [ + { + "lessThan": "2.8.13", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.9.9", + "status": "affected", + "version": "2.9.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.4", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/argoproj/argo-cd/v2", + "cpes": [ + "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", + "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*" + ], + "product": "argo-cd", + "vendor": "argoproj", + "versions": [ + { + "lessThan": "2.8.13", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.9.9", + "status": "affected", + "version": "2.9.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.4", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-22189.json b/data/anchore/2024/CVE-2024-22189.json new file mode 100644 index 00000000..fb0bb018 --- /dev/null +++ b/data/anchore/2024/CVE-2024-22189.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-22189", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/quic-go/quic-go/commit/4a99b816ae3ab03ae5449d15aac45147c85ed47a", + "https://seemann.io/posts/2024-03-19-exploiting-quics-connection-id-management", + "https://github.com/quic-go/quic-go/security/advisories/GHSA-c33x-xqrf-c478", + "https://www.youtube.com/watch?v=JqXtYcZAtIA&t=3683s" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/quic-go/quic-go", + "repo": "https://github.com/quic-go/quic-go", + "cpes": [ + "cpe:2.3:a:quic-go_project:quic-go:*:*:*:*:*:*:*:*" + ], + "product": "quic-go", + "vendor": "quic-go", + "versions": [ + { + "lessThan": "0.42.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-22412.json b/data/anchore/2024/CVE-2024-22412.json new file mode 100644 index 00000000..9d2db956 --- /dev/null +++ b/data/anchore/2024/CVE-2024-22412.json @@ -0,0 +1,69 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-22412", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/ClickHouse/ClickHouse/blob/bd17ee769e337906c4b1f404861e042ad72fcbfc/src/Interpreters/executeQuery.cpp#L1013-L1015", + "https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-45h5-f7g3-gr8r", + "https://github.com/ClickHouse/ClickHouse/pull/58611" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:clickhouse:clickhouse:*:*:*:*:*:*:*:*", + "cpe:2.3:a:yandex:clickhouse:*:*:*:*:*:*:*:*" + ], + "product": "ClickHouse", + "vendor": "ClickHouse", + "versions": [ + { + "lessThan": "24.1.1.2048", + "status": "affected", + "version": "23.13", + "versionType": "custom" + }, + { + "lessThan": "23.12.6.19", + "status": "affected", + "version": "23.9", + "versionType": "custom" + }, + { + "lessThan": "23.8.12.13", + "status": "affected", + "version": "23.4", + "versionType": "custom" + }, + { + "lessThan": "23.3.22.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + }, + { + "cpes": [ + "cpe:2.3:a:clickhouse:clickhouse_cloud:*:*:*:*:*:*:*:*" + ], + "product": "ClickHouse Cloud", + "vendor": "ClickHouse", + "versions": [ + { + "lessThan": "24.0.2.54535", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-22423.json b/data/anchore/2024/CVE-2024-22423.json new file mode 100644 index 00000000..84fa020e --- /dev/null +++ b/data/anchore/2024/CVE-2024-22423.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-22423", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/yt-dlp/yt-dlp/releases/tag/2024.04.09", + "https://github.com/yt-dlp/yt-dlp/releases/tag/2021.04.11", + "https://github.com/yt-dlp/yt-dlp/commit/ff07792676f404ffff6ee61b5638c9dc1a33a37a", + "https://www.kb.cert.org/vuls/id/123335", + "https://github.com/yt-dlp/yt-dlp/commit/de015e930747165dbb8fcd360f8775fd973b7d6e", + "https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-42h4-v29r-42qg", + "https://github.com/yt-dlp/yt-dlp/security/advisories/GHSA-hjq6-52gw-2g7p" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pypi.org", + "packageName": "yt-dlp", + "repo": "https://github.com/yt-dlp/yt-dlp", + "cpes": [ + "cpe:2.3:a:yt-dlp_project:yt-dlp:*:*:*:*:*:*:*:*" + ], + "product": "yt-dlp", + "vendor": "yt-dlp", + "versions": [ + { + "lessThan": "2024.04.09", + "status": "affected", + "version": "2021.04.11", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23328.json b/data/anchore/2024/CVE-2024-23328.json new file mode 100644 index 00000000..93198cbd --- /dev/null +++ b/data/anchore/2024/CVE-2024-23328.json @@ -0,0 +1,41 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23328", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/dataease/dataease/commit/4128adf5fc4592b55fa1722a53b178967545d46a", + "https://github.com/dataease/dataease/commit/bb540e6dc83df106ac3253f331066129a7487d1a", + "https://github.com/dataease/dataease/security/advisories/GHSA-8x8q-p622-jf25" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*" + ], + "product": "dataease", + "vendor": "dataease", + "versions": [ + { + "lessThan": "1.18.15", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.3.0", + "status": "affected", + "version": "2.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23333.json b/data/anchore/2024/CVE-2024-23333.json new file mode 100644 index 00000000..6f8412be --- /dev/null +++ b/data/anchore/2024/CVE-2024-23333.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23333", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/LDAPAccountManager/lam/security/advisories/GHSA-fm9w-7m7v-wxqv", + "https://github.com/LDAPAccountManager/lam/releases/tag/8.7" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:ldap-account-manager:ldap_account_manager:*:*:*:*:*:*:*:*" + ], + "product": "lam", + "vendor": "LDAPAccountManager", + "versions": [ + { + "lessThan": "8.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23335.json b/data/anchore/2024/CVE-2024-23335.json new file mode 100644 index 00000000..67ed7710 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23335.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23335", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/mybb/mybb/security/advisories/GHSA-94xr-g4ww-j47r", + "https://github.com/mybb/mybb/commit/450259e501b94c9d483efb167cb2bf875605e111.patch", + "https://mybb.com/versions/1.8.38" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*" + ], + "product": "mybb", + "vendor": "mybb", + "versions": [ + { + "lessThan": "1.8.38", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23336.json b/data/anchore/2024/CVE-2024-23336.json new file mode 100644 index 00000000..e3ac67b5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23336.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23336", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://mybb.com/versions/1.8.38", + "https://github.com/mybb/mybb/security/advisories/GHSA-qfrj-65mv-h75h", + "https://github.com/mybb/mybb/commit/d6a96019025de9149014e06b1df252e6122e5630", + "https://docs.mybb.com/1.8/administration/configuration-file" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*" + ], + "product": "mybb", + "vendor": "mybb", + "versions": [ + { + "lessThan": "1.8.38", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23346.json b/data/anchore/2024/CVE-2024-23346.json new file mode 100644 index 00000000..fecaa345 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23346.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23346", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/materialsproject/pymatgen/commit/c231cbd3d5147ee920a37b6ee9dd236b376bcf5a", + "https://github.com/materialsproject/pymatgen/blob/master/pymatgen/symmetry/settings.py#L97C1-L111C108", + "https://github.com/materialsproject/pymatgen/security/advisories/GHSA-vgv8-5cpj-qj2f" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:pymatgen:pymatgen:*:*:*:*:*:*:*:*" + ], + "product": "pymatgen", + "vendor": "materialsproject", + "versions": [ + { + "lessThan": "2024.2.20", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23634.json b/data/anchore/2024/CVE-2024-23634.json new file mode 100644 index 00000000..1c4f0d52 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23634.json @@ -0,0 +1,46 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23634", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/geoserver/geoserver/security/advisories/GHSA-75m5-hh4r-q9gx", + "https://osgeo-org.atlassian.net/browse/GEOS-11213", + "https://github.com/geoserver/geoserver/pull/7289", + "https://github.com/geoserver/geoserver/commit/5d6af2f8ba9ad7dffae59575504a867159698772", + "https://github.com/geoserver/geoserver/commit/c37f58fbacdfa0d581a6f99195585f70b1201f0a" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://repo.osgeo.org", + "packageName": "org.geoserver:gs-restconfig", + "cpes": [ + "cpe:2.3:a:org.geoserver:gs-restconfig:*:*:*:*:*:*:*:*" + ], + "product": "gs-restconfig", + "vendor": "geoserver", + "repo": "https://github.com/geoserver/geoserver", + "versions": [ + { + "lessThan": "2.23.5", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.24.2", + "status": "affected", + "version": "2.24.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23640.json b/data/anchore/2024/CVE-2024-23640.json new file mode 100644 index 00000000..0b33a03d --- /dev/null +++ b/data/anchore/2024/CVE-2024-23640.json @@ -0,0 +1,59 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23640", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/geoserver/geoserver/pull/7181", + "https://github.com/geoserver/geoserver/security/advisories/GHSA-9rfr-pf2x-g4xf", + "https://github.com/geoserver/geoserver/pull/7162", + "https://osgeo-org.atlassian.net/browse/GEOS-11149", + "https://osgeo-org.atlassian.net/browse/GEOS-11155" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://repo.osgeo.org", + "packageName": "org.geoserver:gs-main", + "cpes": [ + "cpe:2.3:a:osgeo:geoserver:*:*:*:*:*:*:*:*", + "cpe:2.3:a:org.geoserver:gs-main:*:*:*:*:*:*:*:*" + ], + "product": "geoserver", + "vendor": "geoserver", + "repo": "https://github.com/geoserver/geoserver", + "versions": [ + { + "lessThan": "2.23.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://repo.osgeo.org", + "packageName": "org.geoserver:gs-ows", + "cpes": [ + "cpe:2.3:a:org.geoserver:gs-ows:*:*:*:*:*:*:*:*" + ], + "product": "gs-ows", + "vendor": "geoserver", + "repo": "https://github.com/geoserver/geoserver", + "versions": [ + { + "lessThan": "2.23.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23642.json b/data/anchore/2024/CVE-2024-23642.json new file mode 100644 index 00000000..a3f5a714 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23642.json @@ -0,0 +1,46 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23642", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://osgeo-org.atlassian.net/browse/GEOS-11152", + "https://github.com/geoserver/geoserver/pull/7173", + "https://github.com/geoserver/geoserver/security/advisories/GHSA-fg9v-56hw-g525", + "https://github.com/geoserver/geoserver/commit/9f40265febb5939f23e2c53930c9c35e93970afe", + "https://github.com/geoserver/geoserver/commit/1b1835afbb9c282d1840786259aeda81c1d22b00" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://repo.osgeo.org", + "packageName": "org.geoserver:gs-wms", + "cpes": [ + "cpe:2.3:a:org.geoserver:gs-wms:*:*:*:*:*:*:*:*" + ], + "product": "gs-wms", + "vendor": "geoserver", + "repo": "https://github.com/geoserver/geoserver", + "versions": [ + { + "lessThan": "2.23.4", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.24.1", + "status": "affected", + "version": "2.24", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23643.json b/data/anchore/2024/CVE-2024-23643.json new file mode 100644 index 00000000..f6c1e551 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23643.json @@ -0,0 +1,45 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23643", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/GeoWebCache/geowebcache/issues/1172", + "https://github.com/geoserver/geoserver/security/advisories/GHSA-56r3-f536-5gf7", + "https://github.com/GeoWebCache/geowebcache/pull/1174", + "https://github.com/GeoWebCache/geowebcache/commit/9d010e09c784690ada8af43f594461a2553a62f0" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://repo.osgeo.org", + "packageName": "org.geoserver:gs-gwc-rest", + "cpes": [ + "cpe:2.3:a:org.geoserver:gs-gwc-rest:*:*:*:*:*:*:*:*" + ], + "product": "gs-gwc-rest", + "vendor": "geoserver", + "repo": "https://github.com/GeoWebCache/geowebcache", + "versions": [ + { + "lessThan": "2.23.2", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.24.1", + "status": "affected", + "version": "2.24", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23818.json b/data/anchore/2024/CVE-2024-23818.json new file mode 100644 index 00000000..afdf434b --- /dev/null +++ b/data/anchore/2024/CVE-2024-23818.json @@ -0,0 +1,46 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23818", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/geoserver/geoserver/security/advisories/GHSA-fcpm-hchj-mh72", + "https://github.com/geoserver/geoserver/commit/4557a832eed19ec18b9753cb97e8aa85269741d2", + "https://osgeo-org.atlassian.net/browse/GEOS-11153", + "https://github.com/geoserver/geoserver/commit/a26c32a469ee4c599236380452ffb4260361bd6f", + "https://github.com/geoserver/geoserver/pull/7174" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://repo.osgeo.org", + "packageName": "org.geoserver:gs-wms", + "cpes": [ + "cpe:2.3:a:org.geoserver:gs-wms:*:*:*:*:*:*:*:*" + ], + "product": "gs-wms", + "vendor": "geoserver", + "repo": "https://github.com/geoserver/geoserver", + "versions": [ + { + "lessThan": "2.23.3", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.24.1", + "status": "affected", + "version": "2.24", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23819.json b/data/anchore/2024/CVE-2024-23819.json new file mode 100644 index 00000000..24636675 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23819.json @@ -0,0 +1,46 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23819", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://osgeo-org.atlassian.net/browse/GEOS-11154", + "https://github.com/geoserver/geoserver/security/advisories/GHSA-7x76-57fr-m5r5", + "https://github.com/geoserver/geoserver/commit/6f04adbdc6c289f5cb815b1462a6bd790e3fb6ef", + "https://github.com/geoserver/geoserver/commit/df65ff05250cbb498c78af906d66e0c084ace8a1", + "https://github.com/geoserver/geoserver/pull/7175" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://repo.osgeo.org", + "packageName": "org.geoserver.extension:gs-mapml", + "cpes": [ + "cpe:2.3:a:org.geoserver.extension:gs-mapml:*:*:*:*:*:*:*:*" + ], + "product": "geoserver", + "vendor": "geoserver", + "repo": "https://github.com/geoserver/geoserver", + "versions": [ + { + "lessThan": "2.23.4", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.24.1", + "status": "affected", + "version": "2.24", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23821.json b/data/anchore/2024/CVE-2024-23821.json new file mode 100644 index 00000000..a271eae5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23821.json @@ -0,0 +1,44 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23821", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/GeoWebCache/geowebcache/pull/1173", + "https://github.com/GeoWebCache/geowebcache/issues/1171", + "https://github.com/geoserver/geoserver/security/advisories/GHSA-88wc-fcj9-q3r9" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://repo.osgeo.org", + "packageName": "org.geoserver:gs-gwc", + "cpes": [ + "cpe:2.3:a:org.geoserver:gs-gwc:*:*:*:*:*:*:*:*" + ], + "product": "gs-gwc", + "vendor": "geoserver", + "repo": "https://github.com/GeoWebCache/geowebcache", + "versions": [ + { + "lessThan": "2.23.4", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.24.1", + "status": "affected", + "version": "2.24", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23823.json b/data/anchore/2024/CVE-2024-23823.json new file mode 100644 index 00000000..906a7b31 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23823.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23823", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/vantage6/vantage6/security/advisories/GHSA-4946-85pr-fvxh", + "https://github.com/vantage6/vantage6/commit/70bb4e1d889230a841eb364d6c03accd7dd01a41" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:vantage6:vantage6:*:*:*:*:*:*:*:*" + ], + "product": "vantage6", + "vendor": "vantage6", + "versions": [ + { + "lessThan": "4.3.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23830.json b/data/anchore/2024/CVE-2024-23830.json new file mode 100644 index 00000000..ff2b6eee --- /dev/null +++ b/data/anchore/2024/CVE-2024-23830.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23830", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/mantisbt/mantisbt/commit/7055731d09ff12b2781410a372f790172e279744", + "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-mcqj-7p29-9528", + "https://mantisbt.org/bugs/view.php?id=19381" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*" + ], + "product": "mantisbt", + "vendor": "mantisbt", + "versions": [ + { + "lessThan": "2.26.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23833.json b/data/anchore/2024/CVE-2024-23833.json new file mode 100644 index 00000000..0689f460 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23833.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23833", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/OpenRefine/OpenRefine/commit/41ccf574847d856e22488a7c0987ad8efa12a84a", + "https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-6p92-qfqf-qwx4" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*" + ], + "product": "OpenRefine", + "vendor": "OpenRefine", + "versions": [ + { + "lessThan": "3.7.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23835.json b/data/anchore/2024/CVE-2024-23835.json new file mode 100644 index 00000000..c494b2d5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23835.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23835", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/OISF/suricata/security/advisories/GHSA-8583-353f-mvwc", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/", + "https://github.com/OISF/suricata/commit/86de7cffa7e8f06fe9d600127e7dabe89c7e81dd", + "https://redmine.openinfosecfoundation.org/issues/6411", + "https://github.com/OISF/suricata/commit/f52c033e566beafb4480c139eb18662a2870464f" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*" + ], + "product": "suricata", + "vendor": "OISF", + "versions": [ + { + "lessThan": "7.0.3", + "status": "affected", + "version": "7.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23836.json b/data/anchore/2024/CVE-2024-23836.json new file mode 100644 index 00000000..8afcf3d7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23836.json @@ -0,0 +1,57 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23836", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/", + "https://github.com/OISF/suricata/commit/b1549e930f6426eeff43f12b672337cbcda566b8", + "https://github.com/OISF/suricata/commit/8efaebe293e2a74c8e323fa85a6f5fadf82801bc", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/", + "https://redmine.openinfosecfoundation.org/issues/6532", + "https://github.com/OISF/suricata/commit/97953998d2d60673ed6c30ddfb6a2d59b4230f97", + "https://github.com/OISF/suricata/commit/e7e28822f473320658d6125f16ac3f0524baff01", + "https://github.com/OISF/suricata/commit/cd035d59e3df157b606f4fe67324ea8e437be786", + "https://redmine.openinfosecfoundation.org/issues/6658", + "https://github.com/OISF/suricata/commit/18841a58da71e735ddf4e52cbfa6989755ecbeb7", + "https://github.com/OISF/suricata/commit/ce9b90326949c94a46611d6394e28600ee5e8bd5", + "https://github.com/OISF/suricata/security/advisories/GHSA-q33q-45cr-3cpc", + "https://github.com/OISF/suricata/commit/83c5567ea7b0b28376f57dcfee9c6301448c7bc7", + "https://redmine.openinfosecfoundation.org/issues/6660", + "https://redmine.openinfosecfoundation.org/issues/6659", + "https://github.com/OISF/suricata/commit/f9de1cca6182e571f1c02387dca6e695e55608af", + "https://redmine.openinfosecfoundation.org/issues/6531", + "https://github.com/OISF/suricata/commit/2a2120ecf10c5b5713ec2bf59469fe57f7b5b747", + "https://redmine.openinfosecfoundation.org/issues/6540" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*" + ], + "product": "suricata", + "vendor": "OISF", + "versions": [ + { + "lessThan": "6.0.16", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "7.0.3", + "status": "affected", + "version": "7.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23837.json b/data/anchore/2024/CVE-2024-23837.json new file mode 100644 index 00000000..9d13c352 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23837.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23837", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/OISF/libhtp/security/advisories/GHSA-f9wf-rrjj-qx8m", + "https://redmine.openinfosecfoundation.org/issues/6444", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/", + "https://github.com/OISF/libhtp/commit/20ac301d801cdf01b3f021cca08a22a87f477c4a" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:oisf:libhtp:*:*:*:*:*:*:*:*" + ], + "product": "libhtp", + "vendor": "OISF", + "versions": [ + { + "lessThan": "0.5.46", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-23839.json b/data/anchore/2024/CVE-2024-23839.json new file mode 100644 index 00000000..53b0ed22 --- /dev/null +++ b/data/anchore/2024/CVE-2024-23839.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-23839", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/", + "https://github.com/OISF/suricata/commit/cd731fcaf42e5f7078c9be643bfa0cee2ad53e8f", + "https://github.com/OISF/suricata/security/advisories/GHSA-qxj6-hr2p-mmc7", + "https://redmine.openinfosecfoundation.org/issues/6657" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*" + ], + "product": "suricata", + "vendor": "OISF", + "versions": [ + { + "lessThan": "7.0.3", + "status": "affected", + "version": "7.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24562.json b/data/anchore/2024/CVE-2024-24562.json new file mode 100644 index 00000000..26581e39 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24562.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24562", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/vantage6/vantage6-UI/security/advisories/GHSA-gwq3-pvwq-4c9w", + "https://github.com/vantage6/vantage6-UI/commit/68dfa661415182da0e5717bd58db3d00aedcbd2e" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:vantage6:vantage6-ui:*:*:*:*:*:*:*:*" + ], + "product": "vantage6-UI", + "vendor": "vantage6", + "versions": [ + { + "lessThanOrEqual": "4.2.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24564.json b/data/anchore/2024/CVE-2024-24564.json new file mode 100644 index 00000000..df6065e5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24564.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24564", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/vyperlang/vyper/security/advisories/GHSA-4hwq-4cpm-8vmx" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*" + ], + "product": "vyper", + "vendor": "vyperlang", + "versions": [ + { + "lessThanOrEqual": "0.3.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24568.json b/data/anchore/2024/CVE-2024-24568.json new file mode 100644 index 00000000..16273126 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24568.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24568", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/OISF/suricata/commit/478a2a38f54e2ae235f8486bff87d7d66b6307f0", + "https://github.com/OISF/suricata/security/advisories/GHSA-gv29-5hqw-5h8c", + "https://redmine.openinfosecfoundation.org/issues/6717", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXJIT7R53ZXROO3I256RFUWTIW4ECK6P/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GOCOBFUTIFHOP2PZOH4ENRFXRBHIRKK4/" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*" + ], + "product": "suricata", + "vendor": "OISF", + "versions": [ + { + "lessThan": "7.0.3", + "status": "affected", + "version": "7.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24576.json b/data/anchore/2024/CVE-2024-24576.json new file mode 100644 index 00000000..d4e20ce6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24576.json @@ -0,0 +1,44 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24576", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/rust-lang/rust/issues", + "https://doc.rust-lang.org/std/process/struct.Command.html#method.arg", + "http://www.openwall.com/lists/oss-security/2024/04/09/16", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPH3PF7DVSS2LVIRLW254VWUPVKJN46P/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W7WRFOIAZXYUPGXGR5UEEW7VTTOD4SZ3/", + "https://doc.rust-lang.org/std/process/struct.Command.html#method.args", + "https://doc.rust-lang.org/std/io/enum.ErrorKind.html#variant.InvalidInput", + "https://doc.rust-lang.org/std/process/struct.Command.html", + "https://www.rust-lang.org/policies/security", + "https://doc.rust-lang.org/std/os/windows/process/trait.CommandExt.html#tymethod.raw_arg", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N323QAEEUVTJ354BTVQ7UB6LYXUX2BCL/", + "https://github.com/rust-lang/rust/security/advisories/GHSA-q455-m56c-85mh" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*" + ], + "product": "rust", + "vendor": "rust-lang", + "versions": [ + { + "lessThan": "1.77.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24748.json b/data/anchore/2024/CVE-2024-24748.json new file mode 100644 index 00000000..2d2d5faf --- /dev/null +++ b/data/anchore/2024/CVE-2024-24748.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24748", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/discourse/discourse/commit/819361ba28f86a1347059af300bb5cca690f9193", + "https://github.com/discourse/discourse/security/advisories/GHSA-3qh8-xw23-cq4x" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*" + ], + "product": "discourse", + "vendor": "discourse", + "versions": [ + { + "lessThan": "3.2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "3.3.0-beta2", + "status": "affected", + "version": "3.3", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24750.json b/data/anchore/2024/CVE-2024-24750.json new file mode 100644 index 00000000..3f6c7ca1 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24750.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24750", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/nodejs/undici/commit/87a48113f1f68f60aa09abb07276d7c35467c663", + "https://github.com/nodejs/undici/security/advisories/GHSA-9f24-jqhm-jfcw", + "https://security.netapp.com/advisory/ntap-20240419-0006/" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*" + ], + "product": "undici", + "vendor": "nodejs", + "versions": [ + { + "lessThan": "6.6.1", + "status": "affected", + "version": "6.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24758.json b/data/anchore/2024/CVE-2024-24758.json new file mode 100644 index 00000000..3f52ba62 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24758.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24758", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/nodejs/undici/commit/b9da3e40f1f096a06b4caedbb27c2568730434ef", + "http://www.openwall.com/lists/oss-security/2024/03/11/1", + "https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3", + "https://security.netapp.com/advisory/ntap-20240419-0007/" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*" + ], + "product": "undici", + "vendor": "nodejs", + "versions": [ + { + "lessThan": "5.28.3", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "6.6.1", + "status": "affected", + "version": "6.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24761.json b/data/anchore/2024/CVE-2024-24761.json new file mode 100644 index 00000000..8353f2fa --- /dev/null +++ b/data/anchore/2024/CVE-2024-24761.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24761", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/galette/galette/security/advisories/GHSA-jrqg-mpwv-pxpv", + "https://github.com/galette/galette/commit/a5c18bb9819b8da1b3ef58f3e79577083c657fbb" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:galette:galette:*:*:*:*:*:*:*:*" + ], + "product": "galette", + "vendor": "galette", + "versions": [ + { + "lessThan": "1.0.2", + "status": "affected", + "version": "1.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24763.json b/data/anchore/2024/CVE-2024-24763.json new file mode 100644 index 00000000..437893de --- /dev/null +++ b/data/anchore/2024/CVE-2024-24763.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24763", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/jumpserver/jumpserver/releases/tag/v3.10.0", + "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-p2mq-cm25-g4m5" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*", + "cpe:2.3:a:jumpserver:jumpserver:*:*:*:*:*:*:*:*" + ], + "product": "jumpserver", + "vendor": "jumpserver", + "versions": [ + { + "lessThan": "3.10.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24770.json b/data/anchore/2024/CVE-2024-24770.json new file mode 100644 index 00000000..a7ae6f06 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24770.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24770", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/vantage6/vantage6/commit/aecfd6d0e83165a41a60ebd52d2287b0217be26b", + "https://github.com/vantage6/vantage6/security/advisories/GHSA-5h3x-6gwf-73jm", + "https://github.com/vantage6/vantage6/security/advisories/GHSA-45gq-q4xh-cp53" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:vantage6:vantage6:*:*:*:*:*:*:*:*" + ], + "product": "vantage6", + "vendor": "vantage6", + "versions": [ + { + "lessThanOrEqual": "4.2.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24809.json b/data/anchore/2024/CVE-2024-24809.json new file mode 100644 index 00000000..b8b50b00 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24809.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24809", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/traccar/traccar/security/advisories/GHSA-vhrw-72f6-gwp5", + "https://github.com/traccar/traccar/commit/b099b298f90074c825ba68ce73532933c7b9d901" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:traccar:traccar:*:*:*:*:*:*:*:*" + ], + "product": "traccar", + "vendor": "traccar", + "versions": [ + { + "lessThan": "6.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24813.json b/data/anchore/2024/CVE-2024-24813.json new file mode 100644 index 00000000..6d9af155 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24813.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24813", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/frappe/frappe/security/advisories/GHSA-fxfv-7gwx-54jh" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*" + ], + "product": "frappe", + "vendor": "frappe", + "versions": [ + { + "lessThan": "14.64.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24814.json b/data/anchore/2024/CVE-2024-24814.json new file mode 100644 index 00000000..a2cc1780 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24814.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24814", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://lists.debian.org/debian-lts-announce/2024/03/msg00004.html", + "https://github.com/OpenIDC/mod_auth_openidc/commit/4022c12f314bd89d127d1be008b1a80a08e1203d", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7DKVEVREYAI4F46CQAVOTPL75WLOZOE/", + "https://github.com/OpenIDC/mod_auth_openidc/security/advisories/GHSA-hxr6-w4gc-7vvv" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:openidc:mod_auth_openidc:*:*:*:*:*:*:*:*" + ], + "product": "mod_auth_openidc", + "vendor": "OpenIDC", + "versions": [ + { + "lessThan": "2.4.15.2", + "status": "affected", + "version": "2.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24817.json b/data/anchore/2024/CVE-2024-24817.json new file mode 100644 index 00000000..6b8704df --- /dev/null +++ b/data/anchore/2024/CVE-2024-24817.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24817", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-wwq5-g5cp-c69f", + "https://github.com/discourse/discourse-calendar/commit/84ef46a38cf02748ecacad16c5d9c6fec12dc8da" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:discourse:calendar:*:*:*:*:*:*:*:*", + "cpe:2.3:a:discourse:discourse_calendar:*:*:*:*:*:discourse:*:*" + ], + "product": "discourse-calendar", + "vendor": "discourse", + "versions": [ + { + "lessThan": "0.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24818.json b/data/anchore/2024/CVE-2024-24818.json new file mode 100644 index 00000000..3c8db219 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24818.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24818", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/espocrm/espocrm/security/advisories/GHSA-8gv6-8r33-fm7j", + "https://github.com/espocrm/espocrm/commit/3babdfa3399e328fb1bd83a1b4ed03d509f4c8e7" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:espocrm:espocrm:*:*:*:*:*:*:*:*" + ], + "product": "espocrm", + "vendor": "espocrm", + "versions": [ + { + "lessThan": "8.1.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24826.json b/data/anchore/2024/CVE-2024-24826.json new file mode 100644 index 00000000..e7324c03 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24826.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24826", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Exiv2/exiv2/pull/2337", + "https://github.com/Exiv2/exiv2/security/advisories/GHSA-g9xm-7538-mq8w" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*" + ], + "product": "exiv2", + "vendor": "Exiv2", + "versions": [ + { + "lessThan": "0.28.2", + "status": "affected", + "version": "0.28.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-24827.json b/data/anchore/2024/CVE-2024-24827.json new file mode 100644 index 00000000..34f53c78 --- /dev/null +++ b/data/anchore/2024/CVE-2024-24827.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-24827", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/discourse/discourse/commit/003b80e62f97cd8c0114d6b9d3f93c10443e6fae", + "https://github.com/discourse/discourse/security/advisories/GHSA-58vw-246g-fjj4" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*" + ], + "product": "discourse", + "vendor": "discourse", + "versions": [ + { + "lessThan": "3.2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "3.3.0-beta2", + "status": "affected", + "version": "3.3", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25108.json b/data/anchore/2024/CVE-2024-25108.json new file mode 100644 index 00000000..8651e439 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25108.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25108", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/pixelfed/pixelfed/commit/7e47d6dccb0393a2e95c42813c562c854882b037", + "https://github.com/pixelfed/pixelfed/security/advisories/GHSA-gccq-h3xj-jgvf" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:pixelfed:pixelfed:*:*:*:*:*:*:*:*" + ], + "product": "pixelfed", + "vendor": "pixelfed", + "versions": [ + { + "lessThan": "0.11.11", + "status": "affected", + "version": "0.10.4", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25110.json b/data/anchore/2024/CVE-2024-25110.json new file mode 100644 index 00000000..6d758b6d --- /dev/null +++ b/data/anchore/2024/CVE-2024-25110.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25110", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Azure/azure-uamqp-c/security/advisories/GHSA-c646-4whf-r67v", + "https://github.com/Azure/azure-uamqp-c/commit/30865c9ccedaa32ddb036e87a8ebb52c3f18f695" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:microsoft:azure_uamqp:*:*:*:*:*:*:*:*" + ], + "product": "azure-uamqp-c", + "vendor": "Azure", + "versions": [ + { + "lessThan": "2024-01-01", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25111.json b/data/anchore/2024/CVE-2024-25111.json new file mode 100644 index 00000000..844f7962 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25111.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25111", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "http://www.squid-cache.org/Versions/v6/SQUID-2024_1.patch", + "https://github.com/squid-cache/squid/security/advisories/GHSA-72c2-c3wm-8qxc", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7R4KPSO3MQT3KAOZV7LC2GG3CYMCGK7H/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWQHRDRHDM5PQTU6BHH4C5KGL37X6TVI/" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*" + ], + "product": "squid", + "vendor": "squid-cache", + "versions": [ + { + "lessThan": "6.8", + "status": "affected", + "version": "3.5.27", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25112.json b/data/anchore/2024/CVE-2024-25112.json new file mode 100644 index 00000000..9006a12a --- /dev/null +++ b/data/anchore/2024/CVE-2024-25112.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25112", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Exiv2/exiv2/pull/2337", + "https://github.com/Exiv2/exiv2/security/advisories/GHSA-crmj-qh74-2r36" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*" + ], + "product": "exiv2", + "vendor": "Exiv2", + "versions": [ + { + "lessThan": "0.28.2", + "status": "affected", + "version": "0.28.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25114.json b/data/anchore/2024/CVE-2024-25114.json new file mode 100644 index 00000000..5fe8a700 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25114.json @@ -0,0 +1,47 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25114", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/LibreOffice/online/blob/master/wsd/README", + "https://github.com/CollaboraOnline/online/security/advisories/GHSA-2fh2-ppjf-p3xv" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:collabora:online:*:*:*:*:*:*:*:*", + "cpe:2.3:a:collaboraoffice:collabora_online:*:*:*:*:*:*:*:*" + ], + "product": "online", + "vendor": "CollaboraOnline", + "versions": [ + { + "lessThan": "23.05.9", + "status": "affected", + "version": "23.0.0", + "versionType": "custom" + }, + { + "lessThan": "22.05.22", + "status": "affected", + "version": "22.0.0", + "versionType": "custom" + }, + { + "lessThan": "21.11.9.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25117.json b/data/anchore/2024/CVE-2024-25117.json new file mode 100644 index 00000000..bb848b0d --- /dev/null +++ b/data/anchore/2024/CVE-2024-25117.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25117", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/dompdf/php-svg-lib/commit/8ffcc41bbde39f09f94b9760768086f12bbdce42", + "https://github.com/dompdf/php-svg-lib/security/advisories/GHSA-f3qr-qr4x-j273", + "https://github.com/dompdf/php-svg-lib/commit/732faa9fb4309221e2bd9b2fda5de44f947133aa" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:dompdf:php-svg-lib:*:*:*:*:*:*:*:*" + ], + "product": "php-svg-lib", + "vendor": "dompdf", + "versions": [ + { + "lessThan": "0.5.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25118.json b/data/anchore/2024/CVE-2024-25118.json new file mode 100644 index 00000000..c3e98116 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25118.json @@ -0,0 +1,64 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25118", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://typo3.org/security/advisory/typo3-core-sa-2024-003", + "https://github.com/TYPO3/typo3/security/advisories/GHSA-38r2-5695-334w" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" + ], + "product": "typo3", + "vendor": "TYPO3", + "versions": [ + { + "lessThan": "13.0.1", + "status": "affected", + "version": "13.0.0", + "versionType": "custom" + }, + { + "lessThan": "12.4.11", + "status": "affected", + "version": "12.0.0", + "versionType": "custom" + }, + { + "lessThan": "11.5.35", + "status": "affected", + "version": "11.0.0", + "versionType": "custom" + }, + { + "lessThan": "10.4.43", + "status": "affected", + "version": "10.0.0", + "versionType": "custom" + }, + { + "lessThan": "9.5.46", + "status": "affected", + "version": "9.0.0", + "versionType": "custom" + }, + { + "lessThan": "8.7.57", + "status": "affected", + "version": "8.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25119.json b/data/anchore/2024/CVE-2024-25119.json new file mode 100644 index 00000000..1d217a23 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25119.json @@ -0,0 +1,64 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25119", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/TYPO3/typo3/security/advisories/GHSA-h47m-3f78-qp9g", + "https://typo3.org/security/advisory/typo3-core-sa-2024-004" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" + ], + "product": "typo3", + "vendor": "TYPO3", + "versions": [ + { + "lessThan": "13.0.1", + "status": "affected", + "version": "13.0.0", + "versionType": "custom" + }, + { + "lessThan": "12.4.11", + "status": "affected", + "version": "12.0.0", + "versionType": "custom" + }, + { + "lessThan": "11.5.35", + "status": "affected", + "version": "11.0.0", + "versionType": "custom" + }, + { + "lessThan": "10.4.43", + "status": "affected", + "version": "10.0.0", + "versionType": "custom" + }, + { + "lessThan": "9.5.46", + "status": "affected", + "version": "9.0.0", + "versionType": "custom" + }, + { + "lessThan": "8.7.57", + "status": "affected", + "version": "8.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25120.json b/data/anchore/2024/CVE-2024-25120.json new file mode 100644 index 00000000..dbd92a9f --- /dev/null +++ b/data/anchore/2024/CVE-2024-25120.json @@ -0,0 +1,65 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25120", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://docs.typo3.org/m/typo3/reference-typoscript/main/en-us/Functions/Typolink.html#resource-references", + "https://typo3.org/security/advisory/typo3-core-sa-2024-005", + "https://github.com/TYPO3/typo3/security/advisories/GHSA-wf85-8hx9-gj7c" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" + ], + "product": "typo3", + "vendor": "TYPO3", + "versions": [ + { + "lessThan": "13.0.1", + "status": "affected", + "version": "13.0.0", + "versionType": "custom" + }, + { + "lessThan": "12.4.11", + "status": "affected", + "version": "12.0.0", + "versionType": "custom" + }, + { + "lessThan": "11.5.35", + "status": "affected", + "version": "11.0.0", + "versionType": "custom" + }, + { + "lessThan": "10.4.43", + "status": "affected", + "version": "10.0.0", + "versionType": "custom" + }, + { + "lessThan": "9.5.46", + "status": "affected", + "version": "9.0.0", + "versionType": "custom" + }, + { + "lessThan": "8.7.57", + "status": "affected", + "version": "8.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25121.json b/data/anchore/2024/CVE-2024-25121.json new file mode 100644 index 00000000..fc4b0605 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25121.json @@ -0,0 +1,64 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25121", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://typo3.org/security/advisory/typo3-core-sa-2024-006", + "https://github.com/TYPO3/typo3/security/advisories/GHSA-rj3x-wvc6-5j66" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" + ], + "product": "typo3", + "vendor": "TYPO3", + "versions": [ + { + "lessThan": "13.0.1", + "status": "affected", + "version": "13.0.0", + "versionType": "custom" + }, + { + "lessThan": "12.4.11", + "status": "affected", + "version": "12.0.0", + "versionType": "custom" + }, + { + "lessThan": "11.5.35", + "status": "affected", + "version": "11.0.0", + "versionType": "custom" + }, + { + "lessThan": "10.4.43", + "status": "affected", + "version": "10.0.0", + "versionType": "custom" + }, + { + "lessThan": "9.5.46", + "status": "affected", + "version": "9.0.0", + "versionType": "custom" + }, + { + "lessThan": "8.7.57", + "status": "affected", + "version": "8.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25122.json b/data/anchore/2024/CVE-2024-25122.json new file mode 100644 index 00000000..60e3f6c2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25122.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25122", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/mhenrixon/sidekiq-unique-jobs/security/advisories/GHSA-cmh9-rx85-xj38", + "https://github.com/mhenrixon/sidekiq-unique-jobs/commit/ec3afd920c1b55843c72f748a87baac7f8be82ed" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:mhenrixon:sidekiq-unique-jobs:*:*:*:*:*:ruby:*:*" + ], + "product": "sidekiq-unique-jobs", + "vendor": "mhenrixon", + "versions": [ + { + "lessThan": "7.1.33", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "8.0.7", + "status": "affected", + "version": "8.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25124.json b/data/anchore/2024/CVE-2024-25124.json new file mode 100644 index 00000000..b945f39f --- /dev/null +++ b/data/anchore/2024/CVE-2024-25124.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25124", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://saturncloud.io/blog/cors-cannot-use-wildcard-in-accesscontrolalloworigin-when-credentials-flag-is-true", + "https://github.com/gofiber/fiber/releases/tag/v2.52.1", + "https://github.com/gofiber/fiber/commit/f0cd3b44b086544a37886232d0530601f2406c23", + "https://codeql.github.com/codeql-query-help/javascript/js-cors-misconfiguration-for-credentials", + "https://github.com/gofiber/fiber/security/advisories/GHSA-fmg4-x8pw-hjhg", + "http://blog.portswigger.net/2016/10/exploiting-cors-misconfigurations-for.html", + "https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS/Errors/CORSNotSupportingCredentials", + "https://fetch.spec.whatwg.org/#cors-protocol-and-credentials" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:gofiber:fiber:*:*:*:*:*:go:*:*" + ], + "product": "fiber", + "vendor": "gofiber", + "versions": [ + { + "lessThan": "2.52.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25126.json b/data/anchore/2024/CVE-2024-25126.json new file mode 100644 index 00000000..1ecd9920 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25126.json @@ -0,0 +1,44 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25126", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://discuss.rubyonrails.org/t/denial-of-service-vulnerability-in-rack-content-type-parsing/84941", + "https://github.com/rack/rack/commit/6efb2ceea003c4b195815a614e00438cbd543462", + "https://github.com/rack/rack/commit/d9c163a443b8cadf4711d84bd2c58cb9ef89cf49", + "https://github.com/rack/rack/security/advisories/GHSA-22f2-v57c-j9cx", + "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-25126.yml", + "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*" + ], + "product": "rack", + "vendor": "rack", + "versions": [ + { + "lessThan": "3.0.9.1", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.2.8.1", + "status": "affected", + "version": "0.4", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25128.json b/data/anchore/2024/CVE-2024-25128.json new file mode 100644 index 00000000..d58c21ce --- /dev/null +++ b/data/anchore/2024/CVE-2024-25128.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25128", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-j2pw-vp55-fqqj", + "https://github.com/dpgaspar/Flask-AppBuilder/commit/6336456d83f8f111c842b2b53d1e89627f2502c8" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:flask-appbuilder_project:flask-appbuilder:*:*:*:*:*:*:*:*" + ], + "product": "Flask-AppBuilder", + "vendor": "dpgaspar", + "versions": [ + { + "lessThan": "4.3.11", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25130.json b/data/anchore/2024/CVE-2024-25130.json new file mode 100644 index 00000000..c1a47d5b --- /dev/null +++ b/data/anchore/2024/CVE-2024-25130.json @@ -0,0 +1,57 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25130", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Enalean/tuleap/security/advisories/GHSA-mq7f-m6mj-hjj5", + "https://github.com/Enalean/tuleap/commit/57978a32508f5c6d0365419b6eaeb368aee20667", + "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=57978a32508f5c6d0365419b6eaeb368aee20667", + "https://tuleap.net/plugins/tracker/?aid=36803" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*" + ], + "product": "tuleap community", + "vendor": "Enalean", + "versions": [ + { + "lessThan": "15.5.99.76", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + }, + { + "cpes": [ + "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*" + ], + "product": "tuleap enteprise", + "vendor": "Enalean", + "versions": [ + { + "lessThan": "15.5-4", + "status": "affected", + "version": "15.5", + "versionType": "custom" + }, + { + "lessThan": "15.4-7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25617.json b/data/anchore/2024/CVE-2024-25617.json new file mode 100644 index 00000000..8f33bdca --- /dev/null +++ b/data/anchore/2024/CVE-2024-25617.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25617", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/squid-cache/squid/security/advisories/GHSA-h5x6-w8mv-xfpr", + "https://github.com/squid-cache/squid/commit/72a3bbd5e431597c3fdb56d752bc56b010ba3817", + "https://security.netapp.com/advisory/ntap-20240322-0006/" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*" + ], + "product": "squid", + "vendor": "squid-cache", + "versions": [ + { + "lessThan": "6.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25618.json b/data/anchore/2024/CVE-2024-25618.json new file mode 100644 index 00000000..c69503f2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25618.json @@ -0,0 +1,52 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25618", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/mastodon/mastodon/security/advisories/GHSA-vm39-j3vx-pch3", + "https://github.com/mastodon/mastodon/commit/b31af34c9716338e4a32a62cc812d1ca59e88d15" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*" + ], + "product": "mastodon", + "vendor": "mastodon", + "versions": [ + { + "lessThan": "4.2.6", + "status": "affected", + "version": "4.2.0", + "versionType": "custom" + }, + { + "lessThan": "4.1.14", + "status": "affected", + "version": "4.1.0", + "versionType": "custom" + }, + { + "lessThan": "4.0.14", + "status": "affected", + "version": "4.0.0", + "versionType": "custom" + }, + { + "lessThan": "3.5.18", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25619.json b/data/anchore/2024/CVE-2024-25619.json new file mode 100644 index 00000000..2ea63500 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25619.json @@ -0,0 +1,52 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25619", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/mastodon/mastodon/commit/68eaa804c9bafdc5f798e114e9ba00161425dd71", + "https://github.com/mastodon/mastodon/security/advisories/GHSA-7w3c-p9j8-mq3x" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*" + ], + "product": "mastodon", + "vendor": "mastodon", + "versions": [ + { + "lessThan": "4.2.6", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "4.1.14", + "status": "affected", + "version": "4.1.0", + "versionType": "custom" + }, + { + "lessThan": "4.0.14", + "status": "affected", + "version": "4.0.0", + "versionType": "custom" + }, + { + "lessThan": "3.5.18", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25620.json b/data/anchore/2024/CVE-2024-25620.json new file mode 100644 index 00000000..99cc2a8e --- /dev/null +++ b/data/anchore/2024/CVE-2024-25620.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25620", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/helm/helm/security/advisories/GHSA-v53g-5gjp-272r", + "https://github.com/helm/helm/commit/0d0f91d1ce277b2c8766cdc4c7aa04dbafbf2503" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*" + ], + "product": "helm", + "vendor": "helm", + "versions": [ + { + "lessThan": "3.14.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25623.json b/data/anchore/2024/CVE-2024-25623.json new file mode 100644 index 00000000..f221b15f --- /dev/null +++ b/data/anchore/2024/CVE-2024-25623.json @@ -0,0 +1,52 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25623", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/mastodon/mastodon/commit/9fee5e852669e26f970e278021302e1a203fc022", + "https://github.com/mastodon/mastodon/security/advisories/GHSA-jhrq-qvrm-qr36" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*" + ], + "product": "mastodon", + "vendor": "mastodon", + "versions": [ + { + "lessThan": "3.5.19", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "4.0.15", + "status": "affected", + "version": "4.0.0", + "versionType": "custom" + }, + { + "lessThan": "4.1.15", + "status": "affected", + "version": "4.1.0", + "versionType": "custom" + }, + { + "lessThan": "4.2.7", + "status": "affected", + "version": "4.2.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25624.json b/data/anchore/2024/CVE-2024-25624.json new file mode 100644 index 00000000..228a8aac --- /dev/null +++ b/data/anchore/2024/CVE-2024-25624.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25624", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/dfir-iris/iris-web/security/advisories/GHSA-m64w-f7fg-hpcr" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:dfir-iris:iris:*:*:*:*:*:*:*:*" + ], + "product": "iris-web", + "vendor": "dfir-iris", + "versions": [ + { + "lessThan": "2.4.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25625.json b/data/anchore/2024/CVE-2024-25625.json new file mode 100644 index 00000000..377585c3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25625.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25625", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/pimcore/admin-ui-classic-bundle/commit/b9fee9d383fc73dbd5e1d98dbb0ff3266d6b5a82", + "https://github.com/pimcore/admin-ui-classic-bundle/security/advisories/GHSA-3qpq-6w89-f7mx" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:pimcore:admin_classic_bundle:*:*:*:*:*:pimcore:*:*" + ], + "product": "admin-ui-classic-bundle", + "vendor": "pimcore", + "versions": [ + { + "lessThan": "1.3.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25627.json b/data/anchore/2024/CVE-2024-25627.json new file mode 100644 index 00000000..1a51f850 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25627.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25627", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/alfio-event/alf.io/security/advisories/GHSA-gpmg-8f92-37cf" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:alf:alf:*:*:*:*:*:*:*:*", + "cpe:2.3:a:opencollective:alf.io:*:*:*:*:*:*:*:*" + ], + "product": "alf.io", + "vendor": "alfio-event", + "versions": [ + { + "lessThan": "2.0-M4-2304", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25628.json b/data/anchore/2024/CVE-2024-25628.json new file mode 100644 index 00000000..84b26235 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25628.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25628", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/alfio-event/alf.io/security/advisories/GHSA-8p6m-mm22-q893" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:alf:alf:*:*:*:*:*:*:*:*", + "cpe:2.3:a:opencollective:alf.io:*:*:*:*:*:*:*:*" + ], + "product": "alf.io", + "vendor": "alfio-event", + "versions": [ + { + "lessThan": "2.0-M4-2402", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25629.json b/data/anchore/2024/CVE-2024-25629.json new file mode 100644 index 00000000..6762999b --- /dev/null +++ b/data/anchore/2024/CVE-2024-25629.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25629", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/c-ares/c-ares/commit/a804c04ddc8245fc8adf0e92368709639125e183", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CSCMTSPDIE2UHU34TIXQQHZ6JTE3Y3VF/", + "https://github.com/c-ares/c-ares/security/advisories/GHSA-mg26-v6qh-x48q", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2P76QYINQNPEHUTEEDOUYIRZ2X6UVZ5K/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GX37LFPFQ3T6FFMMFYQTEGIQXXN7F27U/" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:c-ares:c-ares:*:*:*:*:*:*:*:*", + "cpe:2.3:a:c-ares_project:c-ares:*:*:*:*:*:*:*:*" + ], + "product": "c-ares", + "vendor": "c-ares", + "versions": [ + { + "lessThan": "1.27.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25630.json b/data/anchore/2024/CVE-2024-25630.json new file mode 100644 index 00000000..05f93181 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25630.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25630", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/cilium/cilium/releases/tag/v1.14.7", + "https://github.com/cilium/cilium/security/advisories/GHSA-7496-fgv9-xw82", + "https://docs.cilium.io/en/stable/security/network/encryption-wireguard/#encryption-wg" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*" + ], + "product": "cilium", + "vendor": "cilium", + "versions": [ + { + "lessThan": "1.14.7", + "status": "affected", + "version": "1.14.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25631.json b/data/anchore/2024/CVE-2024-25631.json new file mode 100644 index 00000000..1692fee2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25631.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25631", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/cilium/cilium/releases/tag/v1.14.7", + "https://docs.cilium.io/en/stable/installation/k8s-install-external-etcd/#when-do-i-need-to-use-a-kvstore", + "https://docs.cilium.io/en/stable/security/network/encryption-wireguard/#encryption-wg", + "https://github.com/cilium/cilium/security/advisories/GHSA-x989-52fc-4vr4" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*" + ], + "product": "cilium", + "vendor": "cilium", + "versions": [ + { + "lessThan": "1.14.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25634.json b/data/anchore/2024/CVE-2024-25634.json new file mode 100644 index 00000000..81e99c2c --- /dev/null +++ b/data/anchore/2024/CVE-2024-25634.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25634", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/alfio-event/alf.io/security/advisories/GHSA-5wcv-pjc6-mxvv" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:alf:alf:*:*:*:*:*:*:*:*", + "cpe:2.3:a:opencollective:alf.io:*:*:*:*:*:*:*:*" + ], + "product": "alf.io", + "vendor": "alfio-event", + "versions": [ + { + "lessThan": "2.0-M4-2402", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25635.json b/data/anchore/2024/CVE-2024-25635.json new file mode 100644 index 00000000..4384d1af --- /dev/null +++ b/data/anchore/2024/CVE-2024-25635.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25635", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/alfio-event/alf.io/security/advisories/GHSA-ffr5-g3qg-gp4f" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:alf:alf:*:*:*:*:*:*:*:*", + "cpe:2.3:a:opencollective:alf.io:*:*:*:*:*:*:*:*" + ], + "product": "alf.io", + "vendor": "alfio-event", + "versions": [ + { + "lessThan": "2.0-M4-2402", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25636.json b/data/anchore/2024/CVE-2024-25636.json new file mode 100644 index 00000000..4ece0732 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25636.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25636", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/misskey-dev/misskey/blob/2024.2.0-beta.10/packages/backend/src/core/activitypub/models/ApNoteService.ts#L112-L308", + "https://github.com/misskey-dev/misskey/commit/9a70ce8f5ea9df00001894809f5ce7bc69b14c8a", + "https://github.com/misskey-dev/misskey/security/advisories/GHSA-qqrm-9grj-6v32", + "https://github.com/misskey-dev/misskey/blob/2024.2.0-beta.10/packages/backend/src/server/api/endpoints/ap/show.ts#L125-L143", + "https://github.com/misskey-dev/misskey/blob/2024.2.0-beta.10/packages/backend/src/core/activitypub/ApResolverService.ts#L69-L119" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:misskey:misskey:*:*:*:*:*:*:*:*" + ], + "product": "misskey", + "vendor": "misskey-dev", + "versions": [ + { + "lessThan": "2024.2.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25640.json b/data/anchore/2024/CVE-2024-25640.json new file mode 100644 index 00000000..b2f4cb8d --- /dev/null +++ b/data/anchore/2024/CVE-2024-25640.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25640", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/dfir-iris/iris-web/security/advisories/GHSA-2xq6-qc74-w5vp" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:dfir-iris:iris:*:*:*:*:*:*:*:*" + ], + "product": "iris-web", + "vendor": "dfir-iris", + "versions": [ + { + "lessThan": "2.4.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-25641.json b/data/anchore/2024/CVE-2024-25641.json new file mode 100644 index 00000000..75f6c540 --- /dev/null +++ b/data/anchore/2024/CVE-2024-25641.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-25641", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Cacti/cacti/security/advisories/GHSA-7cmj-g5qc-pj88", + "https://github.com/Cacti/cacti/commit/eff35b0ff26cc27c82d7880469ed6d5e3bef6210" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*" + ], + "product": "cacti", + "vendor": "Cacti", + "versions": [ + { + "lessThan": "1.2.27", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-26128.json b/data/anchore/2024/CVE-2024-26128.json new file mode 100644 index 00000000..63c739b7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-26128.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-26128", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/baserproject/basercms/commit/18f426d63e752b4d22c40e9ea8d1f6e692ef601c", + "https://github.com/baserproject/basercms/security/advisories/GHSA-jjxq-m8h3-4vw5", + "https://basercms.net/security/JVN_73283159" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://packagist.org", + "packageName": "baserproject/basercms", + "cpes": [ + "cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*" + ], + "repo": "https://github.com/baserproject/basercms", + "product": "basercms", + "vendor": "baserproject", + "versions": [ + { + "lessThan": "5.0.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-26129.json b/data/anchore/2024/CVE-2024-26129.json new file mode 100644 index 00000000..02b4ef9b --- /dev/null +++ b/data/anchore/2024/CVE-2024-26129.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-26129", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/PrestaShop/PrestaShop/commit/444bd0dea581659918fe2067541b9863cf099dd5", + "https://owasp.org/www-community/attacks/Full_Path_Disclosure", + "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-3366-9287-7qpr" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*" + ], + "product": "PrestaShop", + "vendor": "PrestaShop", + "versions": [ + { + "lessThan": "8.1.4", + "status": "affected", + "version": "8.1.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-26130.json b/data/anchore/2024/CVE-2024-26130.json new file mode 100644 index 00000000..9c3679f5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-26130.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-26130", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/pyca/cryptography/security/advisories/GHSA-6vqw-3v5j-54x4", + "https://github.com/pyca/cryptography/commit/97d231672763cdb5959a3b191e692a362f1b9e55", + "https://github.com/pyca/cryptography/pull/10423" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cryptography_project:cryptography:*:*:*:*:*:python:*:*" + ], + "product": "cryptography", + "vendor": "pyca", + "versions": [ + { + "lessThan": "42.0.4", + "status": "affected", + "version": "38.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-26141.json b/data/anchore/2024/CVE-2024-26141.json new file mode 100644 index 00000000..d352ab21 --- /dev/null +++ b/data/anchore/2024/CVE-2024-26141.json @@ -0,0 +1,44 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-26141", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://discuss.rubyonrails.org/t/possible-dos-vulnerability-with-range-header-in-rack/84944", + "https://github.com/rack/rack/commit/4849132bef471adb21131980df745f4bb84de2d9", + "https://github.com/rack/rack/security/advisories/GHSA-xj5v-6v4g-jfw6", + "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26141.yml", + "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html", + "https://github.com/rack/rack/commit/62457686b26d33a15a254c7768c2076e8e02b48b" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*" + ], + "product": "rack", + "vendor": "rack", + "versions": [ + { + "lessThan": "3.0.9.1", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.2.8.1", + "status": "affected", + "version": "1.3.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-26142.json b/data/anchore/2024/CVE-2024-26142.json new file mode 100644 index 00000000..dcb04950 --- /dev/null +++ b/data/anchore/2024/CVE-2024-26142.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-26142", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://security.netapp.com/advisory/ntap-20240503-0003/", + "https://discuss.rubyonrails.org/t/possible-redos-vulnerability-in-accept-header-parsing-in-action-dispatch/84946", + "https://github.com/rails/rails/security/advisories/GHSA-jjhx-jhvp-74wq", + "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26142.yml", + "https://github.com/rails/rails/commit/b4d3bfb5ed8a5b5a90aad3a3b28860c7a931e272" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*" + ], + "product": "rails", + "vendor": "rails", + "versions": [ + { + "lessThan": "7.1.3.1", + "status": "affected", + "version": "7.1.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-26143.json b/data/anchore/2024/CVE-2024-26143.json new file mode 100644 index 00000000..4618a091 --- /dev/null +++ b/data/anchore/2024/CVE-2024-26143.json @@ -0,0 +1,43 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-26143", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2024-26143.yml", + "https://github.com/rails/rails/security/advisories/GHSA-9822-6m93-xqf4", + "https://discuss.rubyonrails.org/t/possible-xss-vulnerability-in-action-controller/84947", + "https://github.com/rails/rails/commit/4c83b331092a79d58e4adffe4be5f250fa5782cc", + "https://github.com/rails/rails/commit/5187a9ef51980ad1b8e81945ebe0462d28f84f9e" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*" + ], + "product": "rails", + "vendor": "rails", + "versions": [ + { + "lessThan": "7.0.8.1", + "status": "affected", + "version": "7.0.0", + "versionType": "custom" + }, + { + "lessThan": "7.1.3.1", + "status": "affected", + "version": "7.1.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-26144.json b/data/anchore/2024/CVE-2024-26144.json new file mode 100644 index 00000000..736581a3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-26144.json @@ -0,0 +1,43 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-26144", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/activestorage/CVE-2024-26144.yml", + "https://discuss.rubyonrails.org/t/possible-sensitive-session-information-leak-in-active-storage/84945", + "https://github.com/rails/rails/security/advisories/GHSA-8h22-8cf7-hq6g", + "https://github.com/rails/rails/commit/78fe149509fac5b05e54187aaaef216fbb5fd0d3", + "https://github.com/rails/rails/commit/723f54566023e91060a67b03353e7c03e7436433" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*" + ], + "product": "rails", + "vendor": "rails", + "versions": [ + { + "lessThan": "6.1.7.7", + "status": "affected", + "version": "5.2.0", + "versionType": "custom" + }, + { + "lessThan": "7.0.8.1", + "status": "affected", + "version": "7.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-26145.json b/data/anchore/2024/CVE-2024-26145.json new file mode 100644 index 00000000..c149fde2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-26145.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-26145", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/discourse/discourse-calendar/commit/dfc4fa15f340189f177a1d1ab2cc94ffed3c1190", + "https://github.com/discourse/discourse-calendar/security/advisories/GHSA-4hh7-6m34-p2jp" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:discourse:calendar:*:*:*:*:*:*:*:*", + "cpe:2.3:a:discourse:discourse_calendar:*:*:*:*:*:discourse:*:*" + ], + "repo": "https://github.com/discourse/discourse-calendar", + "product": "discourse-calendar", + "vendor": "discourse", + "versions": [ + { + "lessThan": "dfc4fa15f340189f177a1d1ab2cc94ffed3c1190", + "status": "affected", + "version": "2201b254", + "versionType": "git" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-26146.json b/data/anchore/2024/CVE-2024-26146.json new file mode 100644 index 00000000..0bd046f6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-26146.json @@ -0,0 +1,58 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-26146", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/rack/rack/commit/30b8e39a578b25d4bdcc082c1c52c6f164b59716", + "https://discuss.rubyonrails.org/t/possible-denial-of-service-vulnerability-in-rack-header-parsing/84942", + "https://github.com/rack/rack/commit/e4c117749ba24a66f8ec5a08eddf68deeb425ccd", + "https://github.com/rack/rack/security/advisories/GHSA-54rr-7fvw-6x8f", + "https://github.com/rack/rack/commit/6c5d90bdcec0949f7ba06db62fb740dab394b582", + "https://github.com/rack/rack/commit/a227cd793778c7c3a827d32808058571569cda6f", + "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rack/CVE-2024-26146.yml", + "https://lists.debian.org/debian-lts-announce/2024/04/msg00022.html" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*" + ], + "product": "rack", + "vendor": "rack", + "versions": [ + { + "lessThan": "3.0.9.1", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.2.8.1", + "status": "affected", + "version": "2.2.0", + "versionType": "custom" + }, + { + "lessThan": "2.1.4.4", + "status": "affected", + "version": "2.1.0", + "versionType": "custom" + }, + { + "lessThan": "2.0.9.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-26147.json b/data/anchore/2024/CVE-2024-26147.json new file mode 100644 index 00000000..436d49b0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-26147.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-26147", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/helm/helm/security/advisories/GHSA-r53h-jv2g-vpx6", + "https://github.com/helm/helm/commit/bb4cc9125503a923afb7988f3eb478722a8580af" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*" + ], + "product": "helm", + "vendor": "helm", + "versions": [ + { + "lessThan": "3.14.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-26148.json b/data/anchore/2024/CVE-2024-26148.json new file mode 100644 index 00000000..452d4dff --- /dev/null +++ b/data/anchore/2024/CVE-2024-26148.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-26148", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/pinterest/querybook/commit/bc620dabaaf13ff1dcb30af0b46a490403fb9908", + "https://github.com/pinterest/querybook/security/advisories/GHSA-fh6g-gvvp-587f", + "https://github.com/pinterest/querybook/pull/1412" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:pinterest:querybook:*:*:*:*:*:*:*:*" + ], + "product": "querybook", + "vendor": "pinterest", + "versions": [ + { + "lessThan": "3.31.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-26149.json b/data/anchore/2024/CVE-2024-26149.json new file mode 100644 index 00000000..344ec1c5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-26149.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-26149", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/vyperlang/vyper/security/advisories/GHSA-9p8r-4xp4-gw5w" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*" + ], + "product": "vyper", + "vendor": "vyperlang", + "versions": [ + { + "lessThanOrEqual": "0.3.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-26150.json b/data/anchore/2024/CVE-2024-26150.json new file mode 100644 index 00000000..c797ce97 --- /dev/null +++ b/data/anchore/2024/CVE-2024-26150.json @@ -0,0 +1,49 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-26150", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/backstage/backstage/security/advisories/GHSA-2fc9-xpp8-2g9h", + "https://github.com/backstage/backstage/commit/edf65d7d31e027599c2415f597d085ee84807871", + "https://github.com/backstage/backstage/commit/78f892b3a84d63de2ba167928f171154c447b717", + "https://github.com/backstage/backstage/commit/1ad2b1b61ebb430051f7d804b0cc7ebfe7922b6f" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://www.npmjs.com", + "pacakgeName": "@backstage/backend-common", + "cpes": [ + "cpe:2.3:a:linuxfoundation:\\@backstage\\/backend-common:*:*:*:*:*:node.js:*:*" + ], + "product": "backstage", + "vendor": "backstage", + "versions": [ + { + "status": "affected", + "version": "0.21.0", + "versionType": "custom" + }, + { + "lessThan": "0.19.10", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "0.20.2", + "status": "affected", + "version": "0.20.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-26152.json b/data/anchore/2024/CVE-2024-26152.json new file mode 100644 index 00000000..962004b8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-26152.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-26152", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/HumanSignal/label-studio/pull/5232", + "https://github.com/HumanSignal/label-studio/security/advisories/GHSA-6xv9-957j-qfhg", + "https://github.com/HumanSignal/label-studio/releases/tag/1.11.0", + "https://github.com/HumanSignal/label-studio/commit/5df9ae3828b98652e9fa290a19f4deedf51ef6c8" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:humansignal:label_studio:*:*:*:*:*:*:*:*" + ], + "product": "label-studio", + "vendor": "HumanSignal", + "versions": [ + { + "lessThan": "1.11.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27082.json b/data/anchore/2024/CVE-2024-27082.json new file mode 100644 index 00000000..49641d64 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27082.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27082", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Cacti/cacti/security/advisories/GHSA-j868-7vjp-rp9h" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*" + ], + "product": "cacti", + "vendor": "Cacti", + "versions": [ + { + "lessThan": "1.2.27", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27083.json b/data/anchore/2024/CVE-2024-27083.json new file mode 100644 index 00000000..38664590 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27083.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27083", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/dpgaspar/Flask-AppBuilder/commit/3d17741886e4b3c384d0570de69689e4117aa812", + "https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-fqxj-46wg-9v84" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:flask-appbuilder_project:flask-appbuilder:*:*:*:*:*:*:*:*" + ], + "product": "Flask-AppBuilder", + "vendor": "dpgaspar", + "versions": [ + { + "lessThan": "4.2.1", + "status": "affected", + "version": "4.1.4", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27085.json b/data/anchore/2024/CVE-2024-27085.json new file mode 100644 index 00000000..4bfdd615 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27085.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27085", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/discourse/discourse/security/advisories/GHSA-cvp5-h7p8-mjj6", + "https://github.com/discourse/discourse/commit/62ea382247c1f87361d186392c45ca74c83be295" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*" + ], + "product": "discourse", + "vendor": "discourse", + "versions": [ + { + "lessThan": "3.2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "3.3.0-beta2", + "status": "affected", + "version": "3.3", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27087.json b/data/anchore/2024/CVE-2024-27087.json new file mode 100644 index 00000000..b469a3ca --- /dev/null +++ b/data/anchore/2024/CVE-2024-27087.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27087", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/getkirby/kirby/security/advisories/GHSA-63h4-w25c-3qv4", + "https://github.com/getkirby/kirby/commit/cda3dd9a15228d35e62ff86cfa87a67e7c687437" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*" + ], + "product": "kirby", + "vendor": "getkirby", + "versions": [ + { + "lessThan": "4.1.1", + "status": "affected", + "version": "4.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27091.json b/data/anchore/2024/CVE-2024-27091.json new file mode 100644 index 00000000..3a2fbead --- /dev/null +++ b/data/anchore/2024/CVE-2024-27091.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27091", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/GeoNode/geonode/commit/e53bdeff331f4b577918927d60477d4b50cca02f", + "https://github.com/GeoNode/geonode/security/advisories/GHSA-rwcv-whm8-fmxm" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*" + ], + "product": "geonode", + "vendor": "GeoNode", + "versions": [ + { + "lessThan": "4.2.3", + "status": "affected", + "version": "3.2.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27092.json b/data/anchore/2024/CVE-2024-27092.json new file mode 100644 index 00000000..58e82693 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27092.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27092", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-8r6h-8r68-q3pp", + "https://github.com/hoppscotch/hoppscotch/blob/main/packages/hoppscotch-backend/src/team-invitation/team-invitation.service.ts#L153", + "https://github.com/hoppscotch/hoppscotch/commit/6827e97ec583b2534cdc1c2f33fa44973a0c2bf5" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:hoppscotch:hoppscotch:*:*:*:*:*:*:*:*" + ], + "product": "hoppscotch", + "vendor": "hoppscotch", + "versions": [ + { + "lessThan": "2023.12.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27094.json b/data/anchore/2024/CVE-2024-27094.json new file mode 100644 index 00000000..987c9a68 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27094.json @@ -0,0 +1,46 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27094", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/OpenZeppelin/openzeppelin-contracts/commit/a6286d0fded8771b3a645e5813e51993c490399c", + "https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/commit/2d081f24cac1a867f6f73d512f2022e1fa987854", + "https://github.com/OpenZeppelin/openzeppelin-contracts/commit/92224533b1263772b0774eec3134e132a3d7b2a6", + "https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/commit/723f8cab09cdae1aca9ec9cc1cfa040c2d4b06c1", + "https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9vx6-7xxf-x967" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:openzeppelin:contracts:*:*:*:*:*:node.js:*:*", + "cpe:2.3:a:openzeppelin:contracts_upgradeable:*:*:*:*:*:node.js:*:*", + "cpe:2.3:a:openzeppelin:openzeppelin_contracts-upgradable:*:*:*:*:*:node.js:*:*", + "cpe:2.3:a:openzeppelin:openzeppelin_contracts:*:*:*:*:*:node.js:*:*" + ], + "product": "openzeppelin-contracts", + "vendor": "OpenZeppelin", + "versions": [ + { + "lessThan": "4.9.6", + "status": "affected", + "version": "4.5.0", + "versionType": "custom" + }, + { + "lessThan": "5.0.2", + "status": "affected", + "version": "5.0.0-rc.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27096.json b/data/anchore/2024/CVE-2024-27096.json new file mode 100644 index 00000000..489a3cbb --- /dev/null +++ b/data/anchore/2024/CVE-2024-27096.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27096", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/glpi-project/glpi/security/advisories/GHSA-2x8m-vrcm-2jqv", + "https://github.com/glpi-project/glpi/commit/61a0c2302b4f633f5065358adc36058e1abc37f9", + "https://github.com/glpi-project/glpi/releases/tag/10.0.13" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" + ], + "product": "glpi", + "vendor": "glpi-project", + "versions": [ + { + "lessThan": "10.0.13", + "status": "affected", + "version": "0.65", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27097.json b/data/anchore/2024/CVE-2024-27097.json new file mode 100644 index 00000000..09ddf094 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27097.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27097", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/ckan/ckan/security/advisories/GHSA-8g38-3m6v-232j", + "https://github.com/ckan/ckan/commit/81b56c55e5e3651d7fcf9642cd5a489a9b62212c" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:okfn:ckan:*:*:*:*:*:*:*:*" + ], + "product": "ckan", + "vendor": "ckan", + "versions": [ + { + "lessThan": "2.9.11", + "status": "affected", + "version": "2.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.4", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27098.json b/data/anchore/2024/CVE-2024-27098.json new file mode 100644 index 00000000..e604bc1f --- /dev/null +++ b/data/anchore/2024/CVE-2024-27098.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27098", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/glpi-project/glpi/commit/3b6bc1b4aa1f3693b20ada3425d2de5108522484", + "https://github.com/glpi-project/glpi/releases/tag/10.0.13", + "https://github.com/glpi-project/glpi/security/advisories/GHSA-92x4-q9w5-837w" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" + ], + "product": "glpi", + "vendor": "glpi-project", + "versions": [ + { + "lessThan": "10.0.13", + "status": "affected", + "version": "9.5.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27099.json b/data/anchore/2024/CVE-2024-27099.json new file mode 100644 index 00000000..ba06aeb2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27099.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27099", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Azure/azure-uamqp-c/commit/2ca42b6e4e098af2d17e487814a91d05f6ae4987", + "https://github.com/Azure/azure-uamqp-c/security/advisories/GHSA-6rh4-fj44-v4jj" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:microsoft:azure_uamqp:*:*:*:*:*:*:*:*" + ], + "product": "azure-uamqp-c", + "vendor": "Azure", + "versions": [ + { + "lessThan": "2023-2-08", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27100.json b/data/anchore/2024/CVE-2024-27100.json new file mode 100644 index 00000000..4247518c --- /dev/null +++ b/data/anchore/2024/CVE-2024-27100.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27100", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/discourse/discourse/security/advisories/GHSA-xq4v-qg27-gxgc", + "https://github.com/discourse/discourse/commit/8cade1e825e90a66f440e820992d43c6905f4b47" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*" + ], + "product": "discourse", + "vendor": "discourse", + "versions": [ + { + "lessThan": "3.2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "3.3.0-beta2", + "status": "affected", + "version": "3.3", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27101.json b/data/anchore/2024/CVE-2024-27101.json new file mode 100644 index 00000000..0f304313 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27101.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27101", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/authzed/spicedb/commit/ef443c442b96909694390324a99849b0407007fe", + "https://github.com/authzed/spicedb/security/advisories/GHSA-h3m7-rqc4-7h9p" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:authzed:spicedb:*:*:*:*:*:*:*:*" + ], + "product": "spicedb", + "vendor": "authzed", + "versions": [ + { + "lessThan": "1.29.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27102.json b/data/anchore/2024/CVE-2024-27102.json new file mode 100644 index 00000000..9cbd7d5d --- /dev/null +++ b/data/anchore/2024/CVE-2024-27102.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27102", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/pterodactyl/wings/commit/d1c0ca526007113a0f74f56eba99511b4e989287", + "https://github.com/pterodactyl/wings/security/advisories/GHSA-494h-9924-xww9" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:pterodactyl:wings:*:*:*:*:*:*:*:*" + ], + "product": "wings", + "vendor": "pterodactyl", + "versions": [ + { + "lessThan": "1.11.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27103.json b/data/anchore/2024/CVE-2024-27103.json new file mode 100644 index 00000000..8d39f61c --- /dev/null +++ b/data/anchore/2024/CVE-2024-27103.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27103", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/pinterest/querybook/security/advisories/GHSA-3hjm-9277-5c88", + "https://github.com/pinterest/querybook/commit/449bdc9e7d679e042c3718b7ed07d2ffa3c46a8f" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:pinterest:querybook:*:*:*:*:*:*:*:*" + ], + "product": "querybook", + "vendor": "pinterest", + "versions": [ + { + "lessThan": "3.31.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27104.json b/data/anchore/2024/CVE-2024-27104.json new file mode 100644 index 00000000..1d8ce66f --- /dev/null +++ b/data/anchore/2024/CVE-2024-27104.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27104", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/glpi-project/glpi/commit/b409ca437864607b03c2014b9e3293b7f141af65", + "https://github.com/glpi-project/glpi/security/advisories/GHSA-prc3-cx5m-h5mj", + "https://github.com/glpi-project/glpi/releases/tag/10.0.13" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" + ], + "product": "glpi", + "vendor": "glpi-project", + "versions": [ + { + "lessThan": "10.0.13", + "status": "affected", + "version": "9.5.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27105.json b/data/anchore/2024/CVE-2024-27105.json new file mode 100644 index 00000000..b86d705b --- /dev/null +++ b/data/anchore/2024/CVE-2024-27105.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27105", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/frappe/frappe/security/advisories/GHSA-hq5v-q29v-7rcw" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*" + ], + "product": "frappe", + "vendor": "frappe", + "versions": [ + { + "lessThan": "14.66.3", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "15.16.0", + "status": "affected", + "version": "15.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27286.json b/data/anchore/2024/CVE-2024-27286.json new file mode 100644 index 00000000..1e631f13 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27286.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27286", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/zulip/zulip/commit/3db1733310ddd944c2e690ba673232345c928eec", + "https://github.com/zulip/zulip/security/advisories/GHSA-478x-rfqr-w4jf" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:zulip:zulip:*:*:*:*:*:*:*:*", + "cpe:2.3:a:zulip:zulip_server:*:*:*:*:*:*:*:*" + ], + "product": "zulip", + "vendor": "zulip", + "versions": [ + { + "lessThan": "8.3", + "status": "affected", + "version": "3.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27288.json b/data/anchore/2024/CVE-2024-27288.json new file mode 100644 index 00000000..e6a958b4 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27288.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27288", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/1Panel-dev/1Panel/releases/tag/v1.10.1-lts", + "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-26w3-q4j8-4xjp" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*" + ], + "product": "1Panel", + "vendor": "1Panel-dev", + "versions": [ + { + "lessThan": "1.10.1-lts", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27295.json b/data/anchore/2024/CVE-2024-27295.json new file mode 100644 index 00000000..871b1769 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27295.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27295", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/directus/directus/security/advisories/GHSA-qw9g-7549-7wg5" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", + "cpe:2.3:a:rangerstudio:directus:*:*:*:*:*:node.js:*:*" + ], + "product": "directus", + "vendor": "directus", + "versions": [ + { + "lessThan": "10.8.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27296.json b/data/anchore/2024/CVE-2024-27296.json new file mode 100644 index 00000000..0a850141 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27296.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27296", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/directus/directus/commit/a5a1c26ac48795ed3212a4c51b9523588aff4fa0", + "https://github.com/directus/directus/security/advisories/GHSA-5mhg-wv8w-p59j" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", + "cpe:2.3:a:rangerstudio:directus:*:*:*:*:*:node.js:*:*" + ], + "product": "directus", + "vendor": "directus", + "versions": [ + { + "lessThan": "10.8.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27297.json b/data/anchore/2024/CVE-2024-27297.json new file mode 100644 index 00000000..51f911b7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27297.json @@ -0,0 +1,53 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27297", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/NixOS/nix/commit/f8170ce9f119e5e6724eb81ff1b5a2d4c0024000", + "https://github.com/NixOS/nix/security/advisories/GHSA-2ffj-w4mj-pg37", + "https://hackmd.io/03UGerewRcy3db44JQoWvw" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:nixos:nix:*:*:*:*:*:*:*:*" + ], + "product": "nix", + "vendor": "NixOS", + "versions": [ + { + "lessThan": "2.3.18", + "status": "affected", + "version": "2.3.0", + "versionType": "custom" + }, + { + "lessThan": "2.18.2", + "status": "affected", + "version": "2.4.0", + "versionType": "custom" + }, + { + "lessThan": "2.19.4", + "status": "affected", + "version": "2.19.0", + "versionType": "custom" + }, + { + "lessThan": "2.20.5", + "status": "affected", + "version": "2.20.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27298.json b/data/anchore/2024/CVE-2024-27298.json new file mode 100644 index 00000000..2d4ecc59 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27298.json @@ -0,0 +1,44 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27298", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/parse-community/parse-server/releases/tag/6.5.0", + "https://github.com/parse-community/parse-server/commit/a6e654943536932904a69b51e513507fcf90a504", + "https://github.com/parse-community/parse-server/security/advisories/GHSA-6927-3vr9-fxf2", + "https://github.com/parse-community/parse-server/commit/cbefe770a7260b54748a058b8a7389937dc35833", + "https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.20" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*", + "cpe:2.3:a:parseplatform:parse_server:*:*:*:*:*:node.js:*:*" + ], + "product": "parse-server", + "vendor": "parse-community", + "versions": [ + { + "lessThan": "6.5.0", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "7.0.0-alpha.20", + "status": "affected", + "version": "7.0.0-alpha.1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27299.json b/data/anchore/2024/CVE-2024-27299.json new file mode 100644 index 00000000..1aed2f03 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27299.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27299", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/thorsten/phpMyFAQ/commit/1b68a5f89fb65996c56285fa636b818de8608011", + "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-qgxx-4xv5-6hcw", + "https://drive.google.com/drive/folders/1BFL8GHIBxSUxu0TneYf66KjFA0A4RZga?usp=sharing" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*" + ], + "product": "phpMyFAQ", + "vendor": "thorsten", + "versions": [ + { + "lessThan": "3.2.6", + "status": "affected", + "version": "3.2.5", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27300.json b/data/anchore/2024/CVE-2024-27300.json new file mode 100644 index 00000000..438b9dc2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27300.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27300", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-q7g6-xfh2-vhpx", + "https://github.com/thorsten/phpMyFAQ/commit/de90315c9bd4ead5fe6ba5586f6b016843aa8209", + "https://github.com/thorsten/phpMyFAQ/commit/09336b0ff0e0a04aa0c97c5975651af4769d2459" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*" + ], + "product": "phpMyFAQ", + "vendor": "thorsten", + "versions": [ + { + "lessThan": "3.2.6", + "status": "affected", + "version": "3.2.5", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27306.json b/data/anchore/2024/CVE-2024-27306.json new file mode 100644 index 00000000..c13b95ad --- /dev/null +++ b/data/anchore/2024/CVE-2024-27306.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27306", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/aio-libs/aiohttp/commit/28335525d1eac015a7e7584137678cbb6ff19397", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWEI6NIHZ3G7DURDZVMRK7ZEFC2BTD3U/", + "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-7gpw-8wmc-pm8g", + "https://github.com/aio-libs/aiohttp/pull/8319", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZIVBMPEY7WWOFMC3CWXFBRQPFECV4SW3/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2EXRGTN2WG7VZLUZ7WOXU5GQJKCPPHKP/" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:aiohttp:aiohttp:*:*:*:*:*:*:*:*" + ], + "product": "aiohttp", + "vendor": "aio-libs", + "versions": [ + { + "lessThan": "3.9.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27914.json b/data/anchore/2024/CVE-2024-27914.json new file mode 100644 index 00000000..836df856 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27914.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27914", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/glpi-project/glpi/security/advisories/GHSA-rcxj-fqr4-q34r", + "https://github.com/glpi-project/glpi/releases/tag/10.0.13", + "https://github.com/glpi-project/glpi/commit/69e0dee8de0c0df139b42dbfa1a8997888c2af95" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" + ], + "product": "glpi", + "vendor": "glpi-project", + "versions": [ + { + "lessThan": "10.0.13", + "status": "affected", + "version": "10.0.8", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27915.json b/data/anchore/2024/CVE-2024-27915.json new file mode 100644 index 00000000..30f03806 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27915.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27915", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/sulu/sulu/security/advisories/GHSA-jr83-m233-gg6p", + "https://github.com/sulu/sulu/commit/ec9c3f99e15336dc4f6877f512300f231c17c6da" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:sulu:sulu:*:*:*:*:*:*:*:*" + ], + "product": "sulu", + "vendor": "sulu", + "versions": [ + { + "lessThan": "2.4.17", + "status": "affected", + "version": "2.2.0", + "versionType": "custom" + }, + { + "lessThan": "2.5.13", + "status": "affected", + "version": "2.5.0-alpha1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27917.json b/data/anchore/2024/CVE-2024-27917.json new file mode 100644 index 00000000..f5d15876 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27917.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27917", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/shopware/shopware/security/advisories/GHSA-c2f9-4jmm-v45m", + "https://github.com/shopware/storefront/commit/3477e4a425d3c54b4bfae82d703fe3838dc21d3e", + "https://github.com/shopware/shopware/commit/7d9cb03225efca5f97e69b800d8747598dd15ce3", + "https://github.com/shopware/shopware/releases/tag/v6.5.8.7" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*" + ], + "product": "shopware", + "vendor": "shopware", + "versions": [ + { + "lessThan": "6.5.8.7", + "status": "affected", + "version": "6.5.8.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27919.json b/data/anchore/2024/CVE-2024-27919.json new file mode 100644 index 00000000..870cf164 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27919.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27919", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/envoyproxy/envoy/security/advisories/GHSA-gghf-vfxp-799r", + "http://www.openwall.com/lists/oss-security/2024/04/05/3", + "https://github.com/envoyproxy/envoy/commit/57a02565532c18eb9df972a3e8974be3ae59f2d5", + "http://www.openwall.com/lists/oss-security/2024/04/03/16" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*" + ], + "product": "envoy", + "vendor": "envoyproxy", + "versions": [ + { + "lessThan": "1.29.2", + "status": "affected", + "version": "1.29.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27920.json b/data/anchore/2024/CVE-2024-27920.json new file mode 100644 index 00000000..b3b0211f --- /dev/null +++ b/data/anchore/2024/CVE-2024-27920.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27920", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://docs.projectdiscovery.io/templates/protocols/code", + "https://docs.projectdiscovery.io/templates/workflows/overview", + "https://docs.projectdiscovery.io/templates/reference/template-signing", + "https://github.com/projectdiscovery/nuclei/pull/4822", + "https://github.com/projectdiscovery/nuclei/security/advisories/GHSA-w5wx-6g2r-r78q" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:projectdiscovery:nuclei:*:*:*:*:*:go:*:*" + ], + "product": "nuclei", + "vendor": "projectdiscovery", + "versions": [ + { + "lessThan": "3.2.0", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27921.json b/data/anchore/2024/CVE-2024-27921.json new file mode 100644 index 00000000..df9f0b4f --- /dev/null +++ b/data/anchore/2024/CVE-2024-27921.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27921", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/getgrav/grav/security/advisories/GHSA-m7hx-hw6h-mqmc", + "https://github.com/getgrav/grav/commit/5928411b86bab05afca2b33db4e7386a44858e99" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*" + ], + "product": "grav", + "vendor": "getgrav", + "versions": [ + { + "lessThan": "1.7.45", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27923.json b/data/anchore/2024/CVE-2024-27923.json new file mode 100644 index 00000000..6ab424b9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27923.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27923", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/getgrav/grav/commit/e3b0aa0c502aad251c1b79d1ee973dcd93711f07", + "https://github.com/getgrav/grav/security/advisories/GHSA-f6g2-h7qv-3m5v" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*" + ], + "product": "grav", + "vendor": "getgrav", + "versions": [ + { + "lessThan": "1.7.43", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27926.json b/data/anchore/2024/CVE-2024-27926.json new file mode 100644 index 00000000..1c9b8553 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27926.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27926", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/DIYgod/RSSHub/security/advisories/GHSA-2wqw-hr4f-xrhh", + "https://github.com/DIYgod/RSSHub/commit/4d3e5d79c1c17837e931b4cd253d2013b487aa87" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:rsshub:rsshub:*:*:*:*:*:node.js:*:*" + ], + "product": "RSSHub", + "vendor": "DIYgod", + "versions": [ + { + "lessThan": "1.0.0-master.d8ca915", + "status": "affected", + "version": "1.0.0-master.cbbd829", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27927.json b/data/anchore/2024/CVE-2024-27927.json new file mode 100644 index 00000000..7fb43b51 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27927.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27927", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/DIYgod/RSSHub/commit/a42947231104a9ec3436fc52cedb31740c9a7069", + "https://github.com/DIYgod/RSSHub/blob/172f6cfd2b69ea6affdbdedf61e6dde1671f3796/lib/routes/zjol/paper.js#L7-L13", + "https://github.com/DIYgod/RSSHub/blob/5928c5db2472e101c2f5c3bafed77a2f72edd40a/lib/routes/mastodon/utils.js#L85-L105", + "https://github.com/DIYgod/RSSHub/blob/5928c5db2472e101c2f5c3bafed77a2f72edd40a/lib/routes/mastodon/acct.js#L4-L7", + "https://github.com/DIYgod/RSSHub/blob/172f6cfd2b69ea6affdbdedf61e6dde1671f3796/lib/routes/m4/index.js#L10-L14", + "https://github.com/DIYgod/RSSHub/security/advisories/GHSA-3p3p-cgj7-vgw3" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:rsshub:rsshub:*:*:*:*:*:node.js:*:*" + ], + "product": "RSSHub", + "vendor": "DIYgod", + "versions": [ + { + "lessThan": "1.0.0-master.a429472", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27930.json b/data/anchore/2024/CVE-2024-27930.json new file mode 100644 index 00000000..9f72d906 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27930.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27930", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/glpi-project/glpi/security/advisories/GHSA-82vv-j9pr-qmwq", + "https://borelenzo.github.io/stuff/2024/02/29/glpi-pwned.html", + "https://github.com/glpi-project/glpi/commit/1942b70b2422fff51822f6eb3af500c94760871e", + "https://github.com/glpi-project/glpi/releases/tag/10.0.13" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" + ], + "product": "glpi", + "vendor": "glpi-project", + "versions": [ + { + "lessThan": "10.0.13", + "status": "affected", + "version": "0.78", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27931.json b/data/anchore/2024/CVE-2024-27931.json new file mode 100644 index 00000000..4a6819a4 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27931.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27931", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/denoland/deno/security/advisories/GHSA-hrqr-jv8w-v9jh" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*" + ], + "product": "deno", + "vendor": "denoland", + "versions": [ + { + "lessThan": "1.41.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27932.json b/data/anchore/2024/CVE-2024-27932.json new file mode 100644 index 00000000..cd52a8d0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27932.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27932", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/denoland/deno/blob/3f4639c330a31741b0efda2f93ebbb833f4f95bc/cli/auth_tokens.rs#L89", + "https://github.com/denoland/deno/security/advisories/GHSA-5frw-4rwq-xhcr", + "https://github.com/denoland/deno/commit/de23e3b60b066481cc390f459497d5bef42a899b" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*" + ], + "product": "deno", + "vendor": "denoland", + "versions": [ + { + "lessThan": "1.40.4", + "status": "affected", + "version": "1.8.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27933.json b/data/anchore/2024/CVE-2024-27933.json new file mode 100644 index 00000000..4c816065 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27933.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27933", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L256", + "https://github.com/denoland/deno/security/advisories/GHSA-6q4w-9x56-rmwq", + "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L241", + "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L265", + "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L225", + "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L99", + "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L214", + "https://github.com/denoland/deno/commit/5a91a065b882215dde209baf626247e54c21a392", + "https://github.com/denoland/deno/commit/55fac9f5ead6d30996400e8597c969b675c5a22b", + "https://github.com/denoland/deno/blob/v1.39.0/runtime/permissions/prompter.rs#L220" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:deno:deno_runtime:*:*:*:*:*:rust:*:*" + ], + "product": "deno", + "vendor": "denoland", + "versions": [ + { + "lessThan": "1.39.1", + "status": "affected", + "version": "1.39.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27934.json b/data/anchore/2024/CVE-2024-27934.json new file mode 100644 index 00000000..4d4802e8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27934.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27934", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/denoland/deno/security/advisories/GHSA-3j27-563v-28wf" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*" + ], + "product": "deno", + "vendor": "denoland", + "versions": [ + { + "lessThan": "1.40.3", + "status": "affected", + "version": "1.36.2", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27935.json b/data/anchore/2024/CVE-2024-27935.json new file mode 100644 index 00000000..2058f10f --- /dev/null +++ b/data/anchore/2024/CVE-2024-27935.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27935", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/denoland/deno/issues/20188", + "https://github.com/denoland/deno/security/advisories/GHSA-wrqv-pf6j-mqjp", + "https://github.com/denoland/deno/commit/3e9fb8aafd9834ebacd27734cea4310caaf794c6" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*" + ], + "product": "deno", + "vendor": "denoland", + "versions": [ + { + "lessThan": "1.36.3", + "status": "affected", + "version": "1.35.1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27936.json b/data/anchore/2024/CVE-2024-27936.json new file mode 100644 index 00000000..010ab64f --- /dev/null +++ b/data/anchore/2024/CVE-2024-27936.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27936", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/denoland/deno/commit/78d430103a8f6931154ddbbe19d36f3b8630286d", + "https://github.com/denoland/deno/commit/7e6b94231290020b55f1d08fb03ea8132781abc5", + "https://github.com/denoland/deno/security/advisories/GHSA-m4pq-fv2w-6hrw" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:deno:deno_runtime:*:*:*:*:*:rust:*:*" + ], + "product": "deno", + "vendor": "denoland", + "versions": [ + { + "lessThan": "1.41", + "status": "affected", + "version": "1.32.1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-27937.json b/data/anchore/2024/CVE-2024-27937.json new file mode 100644 index 00000000..ebf01431 --- /dev/null +++ b/data/anchore/2024/CVE-2024-27937.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-27937", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/glpi-project/glpi/commit/d02c537d23cbb729fe18b87f71b3c6e84e9892da", + "https://borelenzo.github.io/stuff/2024/02/29/glpi-pwned.html", + "https://github.com/glpi-project/glpi/releases/tag/10.0.13", + "https://github.com/glpi-project/glpi/security/advisories/GHSA-98qw-hpg3-2hpj" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" + ], + "product": "glpi", + "vendor": "glpi-project", + "versions": [ + { + "lessThan": "10.0.13", + "status": "affected", + "version": "10.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28101.json b/data/anchore/2024/CVE-2024-28101.json new file mode 100644 index 00000000..554d05d0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28101.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28101", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/apollographql/router/commit/9e9527c73c8f34fc8438b09066163cd42520f413", + "https://github.com/apollographql/router/security/advisories/GHSA-cgqf-3cq5-wvcj" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:apollographql:apollo_helms-charts_router:*:*:*:*:*:*:*:*", + "cpe:2.3:a:apollographql:apollo_router:*:*:*:*:*:*:*:*" + ], + "product": "router", + "vendor": "apollographql", + "versions": [ + { + "lessThan": "1.40.2", + "status": "affected", + "version": "0.9.5", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28105.json b/data/anchore/2024/CVE-2024-28105.json new file mode 100644 index 00000000..a3c1c50f --- /dev/null +++ b/data/anchore/2024/CVE-2024-28105.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28105", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-pwh2-fpfr-x5gf", + "https://github.com/thorsten/phpMyFAQ/commit/9136883776af67dfdb0e8cf14f5e0ca22bf4f2e7" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*" + ], + "product": "phpMyFAQ", + "vendor": "thorsten", + "versions": [ + { + "lessThan": "3.2.6", + "status": "affected", + "version": "3.2.5", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28106.json b/data/anchore/2024/CVE-2024-28106.json new file mode 100644 index 00000000..ce49c05a --- /dev/null +++ b/data/anchore/2024/CVE-2024-28106.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28106", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/thorsten/phpMyFAQ/commit/c94b3deadd87789389e1fad162bc3dd595c0e15a", + "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-6p68-36m6-392r" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*" + ], + "product": "phpMyFAQ", + "vendor": "thorsten", + "versions": [ + { + "lessThan": "3.2.6", + "status": "affected", + "version": "3.2.5", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28107.json b/data/anchore/2024/CVE-2024-28107.json new file mode 100644 index 00000000..b453a083 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28107.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28107", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/thorsten/phpMyFAQ/commit/d0fae62a72615d809e6710861c1a7f67ac893007", + "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-2grw-mc9r-822r" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*" + ], + "product": "phpMyFAQ", + "vendor": "thorsten", + "versions": [ + { + "lessThan": "3.2.6", + "status": "affected", + "version": "3.2.5", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28108.json b/data/anchore/2024/CVE-2024-28108.json new file mode 100644 index 00000000..be302343 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28108.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28108", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-48vw-jpf8-hwqh", + "https://github.com/thorsten/phpMyFAQ/commit/4fed1d9602f0635260f789fe85995789d94d6634" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*" + ], + "product": "phpMyFAQ", + "vendor": "thorsten", + "versions": [ + { + "lessThan": "3.2.6", + "status": "affected", + "version": "3.2.5", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28111.json b/data/anchore/2024/CVE-2024-28111.json new file mode 100644 index 00000000..6d1816da --- /dev/null +++ b/data/anchore/2024/CVE-2024-28111.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28111", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/thinkst/canarytokens/security/advisories/GHSA-fqh6-v4qp-65fv", + "https://github.com/thinkst/canarytokens/commit/c595a1f884b986da2ca05aa5bff9ae5f93c6a4aa" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:thinkst:canarytokens:*:*:*:*:*:*:*:*" + ], + "product": "canarytokens", + "vendor": "thinkst", + "repo": "https://github.com/thinkst/canarytokens", + "versions": [ + { + "lessThan": "c595a1f884b986da2ca05aa5bff9ae5f93c6a4aa", + "status": "affected", + "version": "0", + "versionType": "git" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28116.json b/data/anchore/2024/CVE-2024-28116.json new file mode 100644 index 00000000..693eaf98 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28116.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28116", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/getgrav/grav/security/advisories/GHSA-c9gp-64c4-2rrh", + "https://github.com/getgrav/grav/commit/4149c81339274130742831422de2685f298f3a6e" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*" + ], + "product": "grav", + "vendor": "getgrav", + "versions": [ + { + "lessThan": "1.7.45", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28117.json b/data/anchore/2024/CVE-2024-28117.json new file mode 100644 index 00000000..ffbdde18 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28117.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28117", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/getgrav/grav/commit/de1ccfa12dbcbf526104d68c1a6bc202a98698fe", + "https://github.com/getgrav/grav/security/advisories/GHSA-qfv4-q44r-g7rv" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*" + ], + "product": "grav", + "vendor": "getgrav", + "versions": [ + { + "lessThan": "1.7.45", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28118.json b/data/anchore/2024/CVE-2024-28118.json new file mode 100644 index 00000000..4a82c471 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28118.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28118", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/getgrav/grav/commit/de1ccfa12dbcbf526104d68c1a6bc202a98698fe", + "https://github.com/getgrav/grav/security/advisories/GHSA-r6vw-8v8r-pmp4" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*" + ], + "product": "grav", + "vendor": "getgrav", + "versions": [ + { + "lessThan": "1.7.45", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28119.json b/data/anchore/2024/CVE-2024-28119.json new file mode 100644 index 00000000..af8e560f --- /dev/null +++ b/data/anchore/2024/CVE-2024-28119.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28119", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/getgrav/grav/commit/de1ccfa12dbcbf526104d68c1a6bc202a98698fe", + "https://github.com/getgrav/grav/security/advisories/GHSA-2m7x-c7px-hp58", + "https://github.com/twigphp/Twig/blob/3.x/src/Extension/EscaperExtension.php#L99" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*" + ], + "product": "grav", + "vendor": "getgrav", + "versions": [ + { + "lessThan": "1.7.45", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28122.json b/data/anchore/2024/CVE-2024-28122.json new file mode 100644 index 00000000..cbb4f365 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28122.json @@ -0,0 +1,41 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28122", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/lestrrat-go/jwx/releases/tag/v2.0.21", + "https://github.com/lestrrat-go/jwx/security/advisories/GHSA-hj3v-m684-v259", + "https://github.com/lestrrat-go/jwx/releases/tag/v1.2.29" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:lestrrat-go:jwx:*:*:*:*:*:*:*:*" + ], + "product": "jwx", + "vendor": "lestrrat-go", + "versions": [ + { + "lessThan": "2.0.21", + "status": "affected", + "version": "2.0.0", + "versionType": "custom" + }, + { + "lessThan": "1.2.29", + "status": "affected", + "version": "1.2.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28175.json b/data/anchore/2024/CVE-2024-28175.json new file mode 100644 index 00000000..21f02ae6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28175.json @@ -0,0 +1,79 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28175", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/argoproj/argo-cd/security/advisories/GHSA-jwv5-8mqv-g387", + "https://github.com/argoproj/argo-cd/commit/479b5544b57dc9ef767d49f7003f39602c480b71" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/argoproj/argo-cd", + "cpes": [ + "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", + "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*" + ], + "product": "argo-cd", + "vendor": "argoproj", + "versions": [ + { + "lessThan": "2.8.12", + "status": "affected", + "version": "1.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.9.8", + "status": "affected", + "version": "2.9.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.3", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/argoproj/argo-cd/v2", + "cpes": [ + "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", + "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*" + ], + "product": "argo-cd", + "vendor": "argoproj", + "versions": [ + { + "lessThan": "2.8.12", + "status": "affected", + "version": "1.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.9.8", + "status": "affected", + "version": "2.9.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.3", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28176.json b/data/anchore/2024/CVE-2024-28176.json new file mode 100644 index 00000000..2d3631cf --- /dev/null +++ b/data/anchore/2024/CVE-2024-28176.json @@ -0,0 +1,95 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28176", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/panva/jose/commit/1b91d88d2f8233f3477a5f4579aa5f8057b2ee8b", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG/", + "https://github.com/panva/jose/security/advisories/GHSA-hhhv-q57g-882q", + "https://github.com/panva/jose/commit/02a65794f7873cdaf12e81e80ad076fcdc4a9314", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG/" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://www.npmjs.com", + "packageName": "jose", + "cpes": [ + "cpe:2.3:a:jose-node-cjs-runtime_project:jose-node-cjs-runtime:*:*:*:*:*:node.js:*:*", + "cpe:2.3:a:jose_project:jose:*:*:*:*:*:node.js:*:*" + ], + "product": "jose", + "vendor": "panva", + "versions": [ + { + "lessThan": "4.15.5", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.0.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://www.npmjs.com", + "packageName": "jose-node-cjs-runtime", + "cpes": [ + "cpe:2.3:a:jose-node-cjs-runtime_project:jose-node-cjs-runtime:*:*:*:*:*:node.js:*:*" + ], + "product": "jose-node-cjs-runtime", + "vendor": "panva", + "versions": [ + { + "lessThan": "4.15.5", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.0.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://www.npmjs.com", + "packageName": "jose-node-esm-runtime", + "cpes": [ + "cpe:2.3:a:jose-node-esm-runtime_project:jose-node-esm-runtime:*:*:*:*:*:node.js:*:*" + ], + "product": "jose-node-esm-runtime", + "vendor": "panva", + "versions": [ + { + "lessThan": "4.15.5", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.0.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28179.json b/data/anchore/2024/CVE-2024-28179.json new file mode 100644 index 00000000..98e6b3ca --- /dev/null +++ b/data/anchore/2024/CVE-2024-28179.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28179", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/jupyterhub/jupyter-server-proxy/commit/764e499f61a87641916a7a427d4c4b1ac3f321a9", + "https://github.com/jupyterhub/jupyter-server-proxy/blob/9b624c4d9507176334b46a85d94a4aa3bcd29bed/jupyter_server_proxy/handlers.py#L433", + "https://github.com/jupyterhub/jupyter-server-proxy/commit/bead903b7c0354b6efd8b4cde94b89afab653e03", + "https://github.com/jupyterhub/jupyter-server-proxy/security/advisories/GHSA-w3vc-fx9p-wp4v" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:jupyter:jupyter_server_proxy:*:*:*:*:*:*:*:*" + ], + "product": "jupyter-server-proxy", + "vendor": "jupyterhub", + "versions": [ + { + "lessThan": "4.1.1", + "status": "affected", + "version": "4.0.0", + "versionType": "custom" + }, + { + "lessThan": "3.2.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28180.json b/data/anchore/2024/CVE-2024-28180.json new file mode 100644 index 00000000..4473d15f --- /dev/null +++ b/data/anchore/2024/CVE-2024-28180.json @@ -0,0 +1,80 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28180", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXKGNCRU7OTM5AHC7YIYBNOWI742PRMY/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XJDO5VSIAOGT2WP63AXAAWNRSVJCNCRH/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MSOMHDKRPU3A2JEMRODT2IREDFBLVPGS/", + "https://github.com/go-jose/go-jose/commit/0dd4dd541c665fb292d664f77604ba694726f298", + "https://github.com/go-jose/go-jose/commit/f4c051a0653d78199a053892f7619ebf96339502", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I6MMWFBOXJA6ZCXNVPDFJ4XMK5PVG5RG/", + "https://github.com/go-jose/go-jose/security/advisories/GHSA-c5q2-7r4c-mv6g", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJO2U5ACZVACNQXJ5EBRFLFW6DP5BROY/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UG5FSEYJ3GP27FZXC5YAAMMEC5XWKJHG/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JNPMXL36YGS3GQEVI3Q5HKHJ7YAAQXL5/", + "https://github.com/go-jose/go-jose/commit/add6a284ea0f844fd6628cba637be5451fe4b28a", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IJ6LAJJ2FTA2JVVOACCV5RZTOIZLXUNJ/" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pkg.go.dev", + "packageName": "gopkg.in/go-jose/go-jose.v2", + "cpes": [ + "cpe:2.3:a:go-jose_project:go-jose:*:*:*:*:*:*:*:*" + ], + "product": "go-jose", + "vendor": "go-jose", + "versions": [ + { + "lessThan": "2.6.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/go-jose/go-jose/v3", + "cpes": [ + "cpe:2.3:a:go-jose_project:go-jose:*:*:*:*:*:*:*:*" + ], + "product": "go-jose", + "vendor": "go-jose", + "versions": [ + { + "lessThan": "3.0.3", + "status": "affected", + "version": "3", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/go-jose/go-jose/v4", + "cpes": [ + "cpe:2.3:a:go-jose_project:go-jose:*:*:*:*:*:*:*:*" + ], + "product": "go-jose", + "vendor": "go-jose", + "versions": [ + { + "lessThan": "4.0.1", + "status": "affected", + "version": "4", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28182.json b/data/anchore/2024/CVE-2024-28182.json new file mode 100644 index 00000000..c3f3dc3d --- /dev/null +++ b/data/anchore/2024/CVE-2024-28182.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28182", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXJO2EASHM2OQQLGVDY5ZSO7UVDVHTDK/", + "https://lists.debian.org/debian-lts-announce/2024/04/msg00026.html", + "https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0", + "https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGOME6ZXJG7664IPQNVE3DL67E3YP3HY/", + "https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9", + "http://www.openwall.com/lists/oss-security/2024/04/03/16", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J6ZMXUGB66VAXDW5J6QSTHM5ET25FGSA/" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*" + ], + "product": "nghttp2", + "vendor": "nghttp2", + "versions": [ + { + "lessThan": "1.61.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28183.json b/data/anchore/2024/CVE-2024-28183.json new file mode 100644 index 00000000..1618e6e6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28183.json @@ -0,0 +1,58 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28183", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/espressif/esp-idf/commit/b2cdc0678965790f49afeb6e6b0737cd24433a05", + "https://github.com/espressif/esp-idf/commit/7003f1ef0dffc73c34eb153d1b0710babb078149", + "https://github.com/espressif/esp-idf/commit/4c95aa445d4e84f01f86b6f3a552aa299276abf3", + "https://github.com/espressif/esp-idf/commit/534e3ad1fa68526a5f989fb2163856d6b7cd2c87", + "https://github.com/espressif/esp-idf/commit/f327ddf6adab0c28d395975785727b2feef57803", + "https://github.com/espressif/esp-idf/security/advisories/GHSA-22x6-3756-pfp8", + "https://github.com/espressif/esp-idf/commit/c33b9e1426121ce8cccf1a94241740be9cff68de", + "https://github.com/espressif/esp-idf/commit/3305cb4d235182067936f8e940e6db174e25b4b2" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:espressif:esp-idf:*:*:*:*:*:*:*:*" + ], + "product": "esp-idf", + "vendor": "espressif", + "versions": [ + { + "lessThan": "4.4.7", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThanOrEqual": "5.0.6", + "status": "affected", + "version": "5.0", + "versionType": "custom" + }, + { + "lessThanOrEqual": "5.1.3", + "status": "affected", + "version": "5.1", + "versionType": "custom" + }, + { + "lessThan": "5.2.1", + "status": "affected", + "version": "5.2", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28187.json b/data/anchore/2024/CVE-2024-28187.json new file mode 100644 index 00000000..b9317808 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28187.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28187", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/inunosinsi/soycms/security/advisories/GHSA-qg3q-hfgc-5jmm", + "https://github.com/inunosinsi/soycms/commit/9b0e452f628df28dec69cd72b6b55db21066cbf8" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:brassica:soy_cms:*:*:*:*:*:*:*:*", + "cpe:2.3:a:soy_cms_project:soy_cms:*:*:*:*:*:*:*:*", + "cpe:2.3:a:soycms_project:soycms:*:*:*:*:*:*:*:*" + ], + "product": "soycms", + "vendor": "inunosinsi", + "versions": [ + { + "lessThan": "3.14.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28190.json b/data/anchore/2024/CVE-2024-28190.json new file mode 100644 index 00000000..3cfe677d --- /dev/null +++ b/data/anchore/2024/CVE-2024-28190.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28190", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/contao/contao/commit/b794e14fff070101bf6a885da9b1a83395093b4d", + "https://github.com/contao/contao/commit/878d28dbe0f408740555d6fc8b634bd3f8febfce", + "https://contao.org/en/security-advisories/cross-site-scripting-in-the-file-manager", + "https://github.com/contao/contao/security/advisories/GHSA-v24p-7p4j-qvvf" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*" + ], + "product": "contao", + "vendor": "contao", + "versions": [ + { + "lessThan": "4.13.40", + "status": "affected", + "version": "4.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.3.4", + "status": "affected", + "version": "5.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28191.json b/data/anchore/2024/CVE-2024-28191.json new file mode 100644 index 00000000..a7f82cca --- /dev/null +++ b/data/anchore/2024/CVE-2024-28191.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28191", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/contao/contao/commit/388859dcf110ca70e0fae68a2a5579ab6a702919", + "https://github.com/contao/contao/security/advisories/GHSA-747v-52c4-8vj8", + "https://contao.org/en/security-advisories/insert-tag-injection-via-the-form-generator", + "https://github.com/contao/contao/commit/474a2fc25f1d84d786aba8c6d234af99e64d016b" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*" + ], + "product": "contao", + "vendor": "contao", + "versions": [ + { + "lessThan": "4.13.40", + "status": "affected", + "version": "4.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.3.4", + "status": "affected", + "version": "5.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28197.json b/data/anchore/2024/CVE-2024-28197.json new file mode 100644 index 00000000..76188300 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28197.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28197", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/zitadel/zitadel/security/advisories/GHSA-mq4x-r2w3-j7mr" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*" + ], + "product": "zitadel", + "vendor": "zitadel", + "versions": [ + { + "lessThan": "2.44.3", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.45.1", + "status": "affected", + "version": "2.45.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28198.json b/data/anchore/2024/CVE-2024-28198.json new file mode 100644 index 00000000..74a8a37d --- /dev/null +++ b/data/anchore/2024/CVE-2024-28198.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28198", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://track.frentix.com/issue/OO-7553/XXE-injection-in-draw.io-endpoint", + "https://github.com/OpenOLAT/OpenOLAT/security/advisories/GHSA-pqvm-h9mg-434c", + "https://github.com/OpenOLAT/OpenOLAT/commit/23e6212e9412c3b099436159b8c8935321c91872" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:frentix:openolat:*:*:*:*:*:*:*:*" + ], + "product": "OpenOLAT", + "vendor": "OpenOLAT", + "versions": [ + { + "lessThan": "18.1.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28231.json b/data/anchore/2024/CVE-2024-28231.json new file mode 100644 index 00000000..e664e54e --- /dev/null +++ b/data/anchore/2024/CVE-2024-28231.json @@ -0,0 +1,52 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28231", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/eProsima/Fast-DDS/commit/355706386f4af9ce74125eeec3c449b06113112b", + "https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-9m2j-qw67-ph4w" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*" + ], + "product": "Fast-DDS", + "vendor": "eProsima", + "versions": [ + { + "lessThan": "2.6.8", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.10.4", + "status": "affected", + "version": "2.7.0", + "versionType": "custom" + }, + { + "lessThan": "2.12.2", + "status": "affected", + "version": "2.11.0", + "versionType": "custom" + }, + { + "lessThan": "2.13.4", + "status": "affected", + "version": "2.13.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28233.json b/data/anchore/2024/CVE-2024-28233.json new file mode 100644 index 00000000..81261723 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28233.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28233", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/jupyterhub/jupyterhub/security/advisories/GHSA-7r3h-4ph8-w38g", + "https://github.com/jupyterhub/jupyterhub/commit/e2798a088f5ad45340fe79cdf1386198e664f77f" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:jupyter:jupyterhub:*:*:*:*:*:*:*:*" + ], + "product": "jupyterhub", + "vendor": "jupyterhub", + "versions": [ + { + "lessThan": "4.1.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28234.json b/data/anchore/2024/CVE-2024-28234.json new file mode 100644 index 00000000..0a7133a8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28234.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28234", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/contao/contao/commit/6d42e667177c972ae7c219645593c262d7764ce2", + "https://github.com/contao/contao/security/advisories/GHSA-j55w-hjpj-825g", + "https://github.com/contao/contao/commit/55b995d8d35da0d36bc6a22c53fe6423ab0c4ae2", + "https://contao.org/en/security-advisories/insufficient-bbcode-sanitization" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*" + ], + "product": "contao", + "vendor": "contao", + "versions": [ + { + "lessThan": "4.13.40", + "status": "affected", + "version": "2.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.3.4", + "status": "affected", + "version": "5.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28235.json b/data/anchore/2024/CVE-2024-28235.json new file mode 100644 index 00000000..22606b3f --- /dev/null +++ b/data/anchore/2024/CVE-2024-28235.json @@ -0,0 +1,43 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28235", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/contao/contao/commit/79b7620d01ce8f46ce2b331455e0d95e5208de3d", + "https://github.com/contao/contao/commit/73a2770e2d3535ec9f1b03d54be00e56ebb8ff16", + "https://github.com/contao/contao/security/advisories/GHSA-9jh5-qf84-x6pr", + "https://github.com/contao/contao/blob/14e9ef4bc8b82936ba2d0e04164581145a075e2a/core-bundle/src/Resources/contao/classes/Crawl.php#L129", + "https://contao.org/en/security-advisories/session-cookie-disclosure-in-the-crawler" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*" + ], + "product": "contao", + "vendor": "contao", + "versions": [ + { + "lessThan": "4.13.40", + "status": "affected", + "version": "4.9.0", + "versionType": "custom" + }, + { + "lessThan": "5.3.4", + "status": "affected", + "version": "5.0.0-rc1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28236.json b/data/anchore/2024/CVE-2024-28236.json new file mode 100644 index 00000000..6eed617f --- /dev/null +++ b/data/anchore/2024/CVE-2024-28236.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28236", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/go-vela/worker/commit/e1572743b008e4fbce31ebb1dcd23bf6a1a30297", + "https://github.com/go-vela/worker/security/advisories/GHSA-pwx5-6wxg-px5h" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:go-vela:worker:*:*:*:*:*:*:*:*" + ], + "product": "worker", + "vendor": "go-vela", + "versions": [ + { + "lessThan": "0.23.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28237.json b/data/anchore/2024/CVE-2024-28237.json new file mode 100644 index 00000000..2a399101 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28237.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28237", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-x7mf-wrh9-r76c", + "https://github.com/OctoPrint/OctoPrint/commit/779894c1bc6478332d14bc9ed1006df1354eb517" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:*" + ], + "product": "OctoPrint", + "vendor": "OctoPrint", + "versions": [ + { + "lessThan": "1.10.0-rc3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28238.json b/data/anchore/2024/CVE-2024-28238.json new file mode 100644 index 00000000..aa26ef42 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28238.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28238", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/directus/directus/security/advisories/GHSA-2ccr-g2rv-h677" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", + "cpe:2.3:a:rangerstudio:directus:*:*:*:*:*:node.js:*:*" + ], + "product": "directus", + "vendor": "directus", + "versions": [ + { + "lessThan": "10.10.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28239.json b/data/anchore/2024/CVE-2024-28239.json new file mode 100644 index 00000000..f701cc4e --- /dev/null +++ b/data/anchore/2024/CVE-2024-28239.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28239", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://docs.directus.io/reference/authentication.html#login-using-sso-providers", + "https://github.com/directus/directus/security/advisories/GHSA-fr3w-2p22-6w7p", + "https://github.com/directus/directus/commit/5477d7d61babd7ffc2f835d399bf79611b15b203" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", + "cpe:2.3:a:rangerstudio:directus:*:*:*:*:*:node.js:*:*" + ], + "product": "directus", + "vendor": "directus", + "versions": [ + { + "lessThan": "10.10.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28240.json b/data/anchore/2024/CVE-2024-28240.json new file mode 100644 index 00000000..d1c56956 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28240.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28240", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/glpi-project/glpi-agent/security/advisories/GHSA-hx3x-mmqg-h3jp", + "https://github.com/glpi-project/glpi-agent/commit/41bbb1169e899bd15350a9e2fdbf9269a3b7a14f" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:glpi-project:glpi_agent:*:*:*:*:*:*:*:*" + ], + "product": "glpi-agent", + "vendor": "glpi-project", + "versions": [ + { + "lessThan": "1.7.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28241.json b/data/anchore/2024/CVE-2024-28241.json new file mode 100644 index 00000000..7f29dd66 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28241.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28241", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/glpi-project/glpi-agent/commit/9a97114f595562c91b0833b4a800dd51e9df65e9", + "https://github.com/glpi-project/glpi-agent/security/advisories/GHSA-3268-p58w-86hw" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:glpi-project:glpi_agent:*:*:*:*:*:*:*:*" + ], + "product": "glpi-agent", + "vendor": "glpi-project", + "versions": [ + { + "lessThan": "1.7.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28242.json b/data/anchore/2024/CVE-2024-28242.json new file mode 100644 index 00000000..8ade087d --- /dev/null +++ b/data/anchore/2024/CVE-2024-28242.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28242", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/discourse/discourse/security/advisories/GHSA-c7q7-7f6q-2c23", + "https://github.com/discourse/discourse/commit/b425fbc2a28341a5627928f963519006712c3d39" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*" + ], + "product": "discourse", + "vendor": "discourse", + "versions": [ + { + "lessThan": "3.2.1", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "3.3.0-beta2", + "status": "affected", + "version": "3.3", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28247.json b/data/anchore/2024/CVE-2024-28247.json new file mode 100644 index 00000000..c89ccff8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28247.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28247", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/pi-hole/pi-hole/commit/f3af03174e676c20e502a92ed7842159f2fdeb7e", + "https://github.com/pi-hole/pi-hole/security/advisories/GHSA-95g6-7q26-mp9x" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:pi-hole:pi-hole:*:*:*:*:*:*:*:*" + ], + "product": "pi-hole", + "vendor": "pi-hole", + "versions": [ + { + "lessThan": "5.18", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28248.json b/data/anchore/2024/CVE-2024-28248.json new file mode 100644 index 00000000..56df1075 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28248.json @@ -0,0 +1,49 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28248", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/cilium/cilium/releases/tag/v1.13.13", + "https://github.com/cilium/cilium/releases/tag/v1.15.2", + "https://docs.cilium.io/en/stable/security/policy/language/#http", + "https://github.com/cilium/cilium/releases/tag/v1.14.8", + "https://github.com/cilium/cilium/security/advisories/GHSA-68mj-9pjq-mc85" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*" + ], + "product": "cilium", + "vendor": "cilium", + "versions": [ + { + "lessThan": "1.13.13", + "status": "affected", + "version": "1.13.9", + "versionType": "custom" + }, + { + "lessThan": "1.14.8", + "status": "affected", + "version": "1.14.0", + "versionType": "custom" + }, + { + "lessThan": "1.15.2", + "status": "affected", + "version": "1.15.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28249.json b/data/anchore/2024/CVE-2024-28249.json new file mode 100644 index 00000000..813fc083 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28249.json @@ -0,0 +1,48 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28249", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/cilium/cilium/releases/tag/v1.13.13", + "https://github.com/cilium/cilium/releases/tag/v1.14.8", + "https://github.com/cilium/cilium/releases/tag/v1.15.2", + "https://github.com/cilium/cilium/security/advisories/GHSA-j89h-qrvr-xc36" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*" + ], + "product": "cilium", + "vendor": "cilium", + "versions": [ + { + "lessThan": "1.13.13", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "1.14.8", + "status": "affected", + "version": "1.14.0", + "versionType": "custom" + }, + { + "lessThan": "1.15.2", + "status": "affected", + "version": "1.15.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28250.json b/data/anchore/2024/CVE-2024-28250.json new file mode 100644 index 00000000..d5e1a625 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28250.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28250", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/cilium/cilium/releases/tag/v1.13.13", + "https://github.com/cilium/cilium/releases/tag/v1.14.8", + "https://github.com/cilium/cilium/releases/tag/v1.15.2", + "https://github.com/cilium/cilium/security/advisories/GHSA-v6q2-4qr3-5cw6" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*" + ], + "product": "cilium", + "vendor": "cilium", + "versions": [ + { + "lessThan": "1.14.8", + "status": "affected", + "version": "1.14.0", + "versionType": "custom" + }, + { + "lessThan": "1.15.2", + "status": "affected", + "version": "1.15.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28251.json b/data/anchore/2024/CVE-2024-28251.json new file mode 100644 index 00000000..075bb5d8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28251.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28251", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/pinterest/querybook/security/advisories/GHSA-5349-j4c9-x767", + "https://github.com/pinterest/querybook/pull/1425" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:pinterest:querybook:*:*:*:*:*:*:*:*" + ], + "product": "querybook", + "vendor": "pinterest", + "versions": [ + { + "lessThan": "3.32.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28849.json b/data/anchore/2024/CVE-2024-28849.json new file mode 100644 index 00000000..a93a46ba --- /dev/null +++ b/data/anchore/2024/CVE-2024-28849.json @@ -0,0 +1,38 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28849", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/follow-redirects/follow-redirects/commit/c4f847f85176991f95ab9c88af63b1294de8649b", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOIF4EPQUCKDBEVTGRQDZ3CGTYQHPO7Z/", + "https://hackerone.com/reports/2390009", + "https://fetch.spec.whatwg.org/#authentication-entries", + "https://github.com/psf/requests/issues/1885", + "https://github.com/follow-redirects/follow-redirects/security/advisories/GHSA-cxjh-pqwp-8mfp" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:follow-redirects:follow_redirects:*:*:*:*:*:node.js:*:*" + ], + "product": "follow-redirects", + "vendor": "follow-redirects", + "versions": [ + { + "lessThan": "1.15.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28852.json b/data/anchore/2024/CVE-2024-28852.json new file mode 100644 index 00000000..2f57a9f4 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28852.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28852", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/ampache/ampache/security/advisories/GHSA-g7hx-hm68-f639", + "https://github.com/ampache/ampache/blob/bcaa9a4624acf8c8cc4c135be77b846731fb1ba2/src/Repository/Model/Search.php#L1732-L1740" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*" + ], + "product": "ampache", + "vendor": "ampache", + "versions": [ + { + "lessThan": "6.3.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28853.json b/data/anchore/2024/CVE-2024-28853.json new file mode 100644 index 00000000..2b8687fd --- /dev/null +++ b/data/anchore/2024/CVE-2024-28853.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28853", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/ampache/ampache/security/advisories/GHSA-prw2-7cr3-5mx8" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:ampache:ampache:*:*:*:*:*:*:*:*" + ], + "product": "ampache", + "vendor": "ampache", + "versions": [ + { + "lessThan": "6.3.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28855.json b/data/anchore/2024/CVE-2024-28855.json new file mode 100644 index 00000000..84e35b12 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28855.json @@ -0,0 +1,74 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28855", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/zitadel/zitadel/releases/tag/v2.45.1", + "https://github.com/zitadel/zitadel/releases/tag/v2.47.3", + "https://github.com/zitadel/zitadel/security/advisories/GHSA-hfrg-4jwr-jfpj", + "https://github.com/zitadel/zitadel/releases/tag/v2.44.3", + "https://github.com/zitadel/zitadel/releases/tag/v2.41.15", + "https://github.com/zitadel/zitadel/releases/tag/v2.46.1", + "https://github.com/zitadel/zitadel/releases/tag/v2.42.15", + "https://github.com/zitadel/zitadel/releases/tag/v2.43.9" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*" + ], + "product": "zitadel", + "vendor": "zitadel", + "versions": [ + { + "lessThan": "2.41.15", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.42.15", + "status": "affected", + "version": "2.42.0", + "versionType": "custom" + }, + { + "lessThan": "2.43.9", + "status": "affected", + "version": "2.43.0", + "versionType": "custom" + }, + { + "lessThan": "2.44.3", + "status": "affected", + "version": "2.44.0", + "versionType": "custom" + }, + { + "status": "affected", + "version": "2.45.0", + "versionType": "custom" + }, + { + "status": "affected", + "version": "2.46.0", + "versionType": "custom" + }, + { + "lessThan": "2.47.4", + "status": "affected", + "version": "2.47.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28860.json b/data/anchore/2024/CVE-2024-28860.json new file mode 100644 index 00000000..ebbdd574 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28860.json @@ -0,0 +1,49 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28860", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/cilium/cilium/commit/a652c123331852cca90c74202f993d4170fd37fa", + "https://docs.cilium.io/en/stable/security/network/encryption-ipsec", + "https://github.com/cilium/cilium/commit/a1742b478306fa256cd27df1039dfae0537b4149", + "https://github.com/cilium/cilium/commit/311fbce5280491cddceab178d83b06fa23688c72", + "https://github.com/cilium/cilium/security/advisories/GHSA-pwqm-x5x6-5586" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*" + ], + "product": "cilium", + "vendor": "cilium", + "versions": [ + { + "lessThanOrEqual": "1.13.14", + "status": "affected", + "version": "1.4.0", + "versionType": "custom" + }, + { + "lessThan": "1.14.9", + "status": "affected", + "version": "1.14.0", + "versionType": "custom" + }, + { + "lessThan": "1.15.3", + "status": "affected", + "version": "1.15.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28865.json b/data/anchore/2024/CVE-2024-28865.json new file mode 100644 index 00000000..d20e8568 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28865.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28865", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/django-wiki/django-wiki/commit/8e280fd6c0bd27ce847c67b2d216c6cbf920f88c", + "https://github.com/django-wiki/django-wiki/security/advisories/GHSA-wj85-w4f4-xh8h" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:django-wiki_project:django-wiki:*:*:*:*:*:*:*:*" + ], + "product": "django-wiki", + "vendor": "django-wiki", + "versions": [ + { + "lessThan": "0.10.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28866.json b/data/anchore/2024/CVE-2024-28866.json new file mode 100644 index 00000000..aee0d20d --- /dev/null +++ b/data/anchore/2024/CVE-2024-28866.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28866", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/gocd/gocd/commit/388d8893ec4cac51d2b76e923cc9b55c7703e402", + "https://github.com/gocd/gocd/security/advisories/GHSA-q882-q6mm-mgvh", + "https://www.gocd.org/releases/#24-1-0", + "https://github.com/gocd/gocd/releases/tag/24.1.0" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:thoughtworks:gocd:*:*:*:*:*:*:*:*" + ], + "product": "gocd", + "vendor": "gocd", + "versions": [ + { + "lessThan": "24.1.0", + "status": "affected", + "version": "19.4.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28868.json b/data/anchore/2024/CVE-2024-28868.json new file mode 100644 index 00000000..7eadc59f --- /dev/null +++ b/data/anchore/2024/CVE-2024-28868.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28868", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/umbraco/Umbraco-CMS/commit/7e1d1a1968000226cd882fff078b122b8d46c44d", + "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-552f-97wf-pmpq" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*" + ], + "product": "Umbraco-CMS", + "vendor": "umbraco", + "versions": [ + { + "lessThan": "10.8.5", + "status": "affected", + "version": "10.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28869.json b/data/anchore/2024/CVE-2024-28869.json new file mode 100644 index 00000000..69d489ea --- /dev/null +++ b/data/anchore/2024/CVE-2024-28869.json @@ -0,0 +1,43 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28869", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/traefik/traefik/commit/240b83b77351dfd8cadb91c305b84e9d22e0f9c6", + "https://doc.traefik.io/traefik/routing/entrypoints/#respondingtimeouts", + "https://github.com/traefik/traefik/releases/tag/v2.11.2", + "https://github.com/traefik/traefik/releases/tag/v3.0.0-rc5", + "https://github.com/traefik/traefik/security/advisories/GHSA-4vwx-54mw-vqfw" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*" + ], + "product": "traefik", + "vendor": "traefik", + "versions": [ + { + "lessThan": "2.11.2", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "3.0.0-rc5", + "status": "affected", + "version": "3.0.0-rc1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28870.json b/data/anchore/2024/CVE-2024-28870.json new file mode 100644 index 00000000..638f1526 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28870.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28870", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/OISF/suricata/security/advisories/GHSA-mhhx-xw7r-r5c8" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*" + ], + "product": "suricata", + "vendor": "OISF", + "versions": [ + { + "lessThan": "6.0.11", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "7.0.4", + "status": "affected", + "version": "7.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-28871.json b/data/anchore/2024/CVE-2024-28871.json new file mode 100644 index 00000000..8ecf8c97 --- /dev/null +++ b/data/anchore/2024/CVE-2024-28871.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-28871", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://redmine.openinfosecfoundation.org/issues/6757", + "https://github.com/OISF/libhtp/security/advisories/GHSA-ffr2-45w9-7wmg", + "https://github.com/OISF/libhtp/commit/bf618ec7f243cebfb0f7e84c3cb158955cb32b4d", + "https://github.com/OISF/libhtp/commit/79e713f3e527593a45f545e854cd9e6fbb3cd3ed" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:oisf:libhtp:*:*:*:*:*:*:*:*" + ], + "product": "libhtp", + "vendor": "OISF", + "versions": [ + { + "status": "affected", + "version": "0.5.46", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29018.json b/data/anchore/2024/CVE-2024-29018.json new file mode 100644 index 00000000..2054811a --- /dev/null +++ b/data/anchore/2024/CVE-2024-29018.json @@ -0,0 +1,47 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29018", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/moby/moby/security/advisories/GHSA-mq39-4gv4-mvpx", + "https://github.com/moby/moby/pull/46609" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*", + "cpe:2.3:a:mobyproject:moby:*:*:*:*:*:*:*:*" + ], + "product": "moby", + "vendor": "moby", + "versions": [ + { + "lessThan": "26.0.0-rc3", + "status": "affected", + "version": "26.0.0-rc1", + "versionType": "custom" + }, + { + "lessThan": "25.0.5", + "status": "affected", + "version": "25.0.0", + "versionType": "custom" + }, + { + "lessThan": "23.0.11", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29020.json b/data/anchore/2024/CVE-2024-29020.json new file mode 100644 index 00000000..34495738 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29020.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29020", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-7mqc-23hr-cr62" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*", + "cpe:2.3:a:jumpserver:jumpserver:*:*:*:*:*:*:*:*" + ], + "product": "jumpserver", + "vendor": "jumpserver", + "versions": [ + { + "lessThan": "3.10.6", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29022.json b/data/anchore/2024/CVE-2024-29022.json new file mode 100644 index 00000000..4e4112d8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29022.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29022", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://xibosignage.com/blog/security-advisory-2024-04", + "https://github.com/xibosignage/xibo-cms/commit/ebeccd000b51f00b9a25f56a2f252d6812ebf850.diff", + "https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-xchw-pf2w-rpgq", + "https://github.com/dasgarner/xibo-cms/commit/a81044e6ccdd92cc967e34c125bd8162432e51bc.diff" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:*" + ], + "product": "xibo-cms", + "vendor": "xibosignage", + "versions": [ + { + "lessThan": "3.3.10", + "status": "affected", + "version": "1.8.0", + "versionType": "custom" + }, + { + "lessThan": "4.0.9", + "status": "affected", + "version": "4.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29023.json b/data/anchore/2024/CVE-2024-29023.json new file mode 100644 index 00000000..464dd5c6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29023.json @@ -0,0 +1,44 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29023", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/xibosignage/xibo-cms/commit/ebeccd000b51f00b9a25f56a2f252d6812ebf850.diff", + "https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-xmc6-cfq5-hg39", + "https://github.com/dasgarner/xibo-cms/commit/a81044e6ccdd92cc967e34c125bd8162432e51bc.diff", + "https://xibosignage.com/blog/security-advisory-2024-04", + "https://github.com/xibosignage/xibo-cms/commit/3b93636aa7aea07d1f7dfa36b63b773ac16d7cde", + "https://github.com/xibosignage/xibo-cms/commit/49f018fd9fe64fcd417d7c2ef96078bd7b2b88b7" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:xibosignage:xibo:*:*:*:*:*:*:*:*" + ], + "product": "xibo-cms", + "vendor": "xibosignage", + "versions": [ + { + "lessThan": "3.3.10", + "status": "affected", + "version": "1.8.0", + "versionType": "custom" + }, + { + "lessThan": "4.0.9", + "status": "affected", + "version": "4.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29024.json b/data/anchore/2024/CVE-2024-29024.json new file mode 100644 index 00000000..65605e99 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29024.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29024", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-8wqm-rfc7-q27q" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*", + "cpe:2.3:a:jumpserver:jumpserver:*:*:*:*:*:*:*:*" + ], + "product": "jumpserver", + "vendor": "jumpserver", + "versions": [ + { + "lessThan": "3.10.6", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29025.json b/data/anchore/2024/CVE-2024-29025.json new file mode 100644 index 00000000..575cd0b6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29025.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29025", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/netty/netty/security/advisories/GHSA-5jpm-x58v-624v", + "https://github.com/netty/netty/commit/0d0c6ed782d13d423586ad0c71737b2c7d02058c", + "https://gist.github.com/vietj/f558b8ea81ec6505f1e9a6ca283c9ae3" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://repo.maven.apache.org", + "packageName": "io.netty:netty-codec-http", + "cpes": [ + "cpe:2.3:a:io.netty:netty-codec-http:*:*:*:*:*:*:*:*" + ], + "product": "netty", + "vendor": "netty", + "versions": [ + { + "lessThan": "4.1.108.FINAL", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29026.json b/data/anchore/2024/CVE-2024-29026.json new file mode 100644 index 00000000..90665e5f --- /dev/null +++ b/data/anchore/2024/CVE-2024-29026.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29026", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/owncast/owncast/blob/v0.1.2/router/middleware/auth.go#L32", + "https://securitylab.github.com/advisories/GHSL-2023-261_Owncast/", + "https://github.com/owncast/owncast/commit/9215d9ba0f29d62201d3feea9e77dcd274581624" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:owncast_project:owncast:*:*:*:*:*:*:*:*" + ], + "product": "owncast", + "vendor": "owncast", + "versions": [ + { + "lessThanOrEqual": "0.1.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29027.json b/data/anchore/2024/CVE-2024-29027.json new file mode 100644 index 00000000..08f9687b --- /dev/null +++ b/data/anchore/2024/CVE-2024-29027.json @@ -0,0 +1,44 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29027", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/parse-community/parse-server/commit/5ae6d6a36d75c4511029f0ba5673ae4b2999179b", + "https://github.com/parse-community/parse-server/commit/9f6e3429d3b326cf4e2994733c618d08032fac6e", + "https://github.com/parse-community/parse-server/releases/tag/7.0.0-alpha.29", + "https://github.com/parse-community/parse-server/releases/tag/6.5.5", + "https://github.com/parse-community/parse-server/security/advisories/GHSA-6hh7-46r2-vf29" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:parseplatform:parse-server:*:*:*:*:*:node.js:*:*", + "cpe:2.3:a:parseplatform:parse_server:*:*:*:*:*:node.js:*:*" + ], + "product": "parse-server", + "vendor": "parse-community", + "versions": [ + { + "lessThan": "6.5.5", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "7.0.0-alpha.29", + "status": "affected", + "version": "7.0.0-alpha.1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29028.json b/data/anchore/2024/CVE-2024-29028.json new file mode 100644 index 00000000..fd65fbc8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29028.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29028", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos", + "https://github.com/usememos/memos/commit/6ffc09d86a1302c384ef085aa70c7bddb3ce7ba9" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:usememos:memos:*:*:*:*:*:*:*:*" + ], + "product": "memos", + "vendor": "usememos", + "versions": [ + { + "lessThan": "0.16.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29029.json b/data/anchore/2024/CVE-2024-29029.json new file mode 100644 index 00000000..52a580f5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29029.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29029", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5", + "https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/http_getter.go#L29", + "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:usememos:memos:*:*:*:*:*:*:*:*" + ], + "product": "memos", + "vendor": "usememos", + "versions": [ + { + "lessThanOrEqual": "0.13.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29030.json b/data/anchore/2024/CVE-2024-29030.json new file mode 100644 index 00000000..e0662c72 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29030.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29030", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/usememos/memos/commit/bbd206e8930281eb040cc8c549641455892b9eb5", + "https://securitylab.github.com/advisories/GHSL-2023-154_GHSL-2023-156_memos/", + "https://github.com/usememos/memos/blob/06dbd8731161245444f4b50f4f9ed267f7c3cf63/api/v1/resource.go#L83" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:usememos:memos:*:*:*:*:*:*:*:*" + ], + "product": "memos", + "vendor": "usememos", + "versions": [ + { + "lessThanOrEqual": "0.13.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29033.json b/data/anchore/2024/CVE-2024-29033.json new file mode 100644 index 00000000..ab4212aa --- /dev/null +++ b/data/anchore/2024/CVE-2024-29033.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29033", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/jupyterhub/oauthenticator/commit/5246b09675501b09fb6ed64022099b7644812f60", + "https://github.com/jupyterhub/oauthenticator/security/advisories/GHSA-55m3-44xf-hg4h", + "https://trufflesecurity.com/blog/google-oauth-is-broken-sort-of" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:jupyter:oauthenticator:*:*:*:*:*:*:*:*" + ], + "product": "oauthenticator", + "vendor": "jupyterhub", + "versions": [ + { + "lessThan": "16.3.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29034.json b/data/anchore/2024/CVE-2024-29034.json new file mode 100644 index 00000000..5f26210e --- /dev/null +++ b/data/anchore/2024/CVE-2024-29034.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29034", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/carrierwaveuploader/carrierwave/security/advisories/GHSA-vfmv-jfc5-pjjw", + "https://github.com/carrierwaveuploader/carrierwave/commit/25b1c800d45ef8e78dc445ebe3bd8a6e3f0a3477" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:carrierwave_project:carrierwave:*:*:*:*:*:ruby:*:*" + ], + "product": "carrierwave", + "vendor": "carrierwaveuploader", + "versions": [ + { + "lessThan": "3.0.7", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.2.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29035.json b/data/anchore/2024/CVE-2024-29035.json new file mode 100644 index 00000000..a53431bd --- /dev/null +++ b/data/anchore/2024/CVE-2024-29035.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29035", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-74p6-39f2-23v3", + "https://github.com/umbraco/Umbraco-CMS/commit/6b8067815c02ae43161966a8075a3585e1bc4de0" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*" + ], + "product": "Umbraco-CMS", + "vendor": "umbraco", + "versions": [ + { + "lessThan": "13.1.1", + "status": "affected", + "version": "13.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29179.json b/data/anchore/2024/CVE-2024-29179.json new file mode 100644 index 00000000..9f348584 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29179.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29179", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-hm8r-95g3-5hj9" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*" + ], + "product": "phpMyFAQ", + "vendor": "thorsten", + "versions": [ + { + "lessThan": "3.2.6", + "status": "affected", + "version": "3.2.5", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29182.json b/data/anchore/2024/CVE-2024-29182.json new file mode 100644 index 00000000..b558de0c --- /dev/null +++ b/data/anchore/2024/CVE-2024-29182.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29182", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/CollaboraOnline/online/security/advisories/GHSA-9gmw-5q2c-4398" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:collabora:online:*:*:*:*:*:*:*:*", + "cpe:2.3:a:collaboraoffice:collabora_online:*:*:*:*:*:*:*:*" + ], + "product": "online", + "vendor": "CollaboraOnline", + "versions": [ + { + "lessThan": "23.05.10.1", + "status": "affected", + "version": "23", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29186.json b/data/anchore/2024/CVE-2024-29186.json new file mode 100644 index 00000000..e134ef3c --- /dev/null +++ b/data/anchore/2024/CVE-2024-29186.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29186", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/brefphp/bref/security/advisories/GHSA-j4hq-f63x-f39r", + "https://github.com/brefphp/bref/commit/5f7c0294628dbcec6305f638ff7e2dba8a1c2f45" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:mnapoli:bref:*:*:*:*:*:*:*:*" + ], + "product": "bref", + "vendor": "brefphp", + "versions": [ + { + "lessThan": "2.1.17", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29187.json b/data/anchore/2024/CVE-2024-29187.json new file mode 100644 index 00000000..dd9ab5eb --- /dev/null +++ b/data/anchore/2024/CVE-2024-29187.json @@ -0,0 +1,41 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29187", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/wixtoolset/wix3/commit/6d372e5169f1a334a395cdf496443bc0732098e9", + "https://github.com/wixtoolset/wix/commit/75a8c75d4e02ea219008dc5af7d03869291d61f7", + "https://github.com/wixtoolset/issues/security/advisories/GHSA-rf39-3f98-xr7r" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:firegiant:wix_toolset:*:*:*:*:*:*:*:*" + ], + "product": "issues", + "vendor": "wixtoolset", + "versions": [ + { + "lessThan": "3.14.1", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "4.0.5", + "status": "affected", + "version": "4.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29188.json b/data/anchore/2024/CVE-2024-29188.json new file mode 100644 index 00000000..592e4932 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29188.json @@ -0,0 +1,41 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29188", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/wixtoolset/issues/security/advisories/GHSA-jx4p-m4wm-vvjg", + "https://github.com/wixtoolset/wix3/commit/93eeb5f6835776694021f66d4226c262c67d487a", + "https://github.com/wixtoolset/wix/commit/2e5960b575881567a8807e6b8b9c513138b19742" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:firegiant:wix_toolset:*:*:*:*:*:*:*:*" + ], + "product": "issues", + "vendor": "wixtoolset", + "versions": [ + { + "lessThan": "3.14.1", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "4.0.5", + "status": "affected", + "version": "4.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29196.json b/data/anchore/2024/CVE-2024-29196.json new file mode 100644 index 00000000..5b24c111 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29196.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29196", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/thorsten/phpMyFAQ/commit/7ae2559f079cd5fc9948b6fdfb87581f93840f62", + "https://github.com/thorsten/phpMyFAQ/security/advisories/GHSA-mmh6-5cpf-2c72" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*" + ], + "product": "phpMyFAQ", + "vendor": "thorsten", + "versions": [ + { + "lessThan": "3.2.6", + "status": "affected", + "version": "3.2.5", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29197.json b/data/anchore/2024/CVE-2024-29197.json new file mode 100644 index 00000000..a76992ae --- /dev/null +++ b/data/anchore/2024/CVE-2024-29197.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29197", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/pimcore/pimcore/security/advisories/GHSA-5737-rqv4-v445", + "https://github.com/pimcore/pimcore/commit/3ae43fb1065f9eb62ad2f542b883858d36d57e53" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*" + ], + "product": "pimcore", + "vendor": "pimcore", + "versions": [ + { + "lessThan": "11.1.6.1", + "status": "affected", + "version": "11.0.0", + "versionType": "custom" + }, + { + "lessThan": "11.2.2", + "status": "affected", + "version": "11.2.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29199.json b/data/anchore/2024/CVE-2024-29199.json new file mode 100644 index 00000000..f83b4abf --- /dev/null +++ b/data/anchore/2024/CVE-2024-29199.json @@ -0,0 +1,45 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29199", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/nautobot/nautobot/commit/dd623e6c3307f48b6357fcc91925bcad5192abfb", + "https://github.com/nautobot/nautobot/commit/2fd95c365f8477b26e06d60b999ddd36882d5750", + "https://github.com/nautobot/nautobot/pull/5464", + "https://github.com/nautobot/nautobot/security/advisories/GHSA-m732-wvh2-7cq4", + "https://github.com/nautobot/nautobot/releases/tag/v1.6.16", + "https://github.com/nautobot/nautobot/releases/tag/v2.1.9", + "https://github.com/nautobot/nautobot/pull/5465" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:*" + ], + "product": "nautobot", + "vendor": "nautobot", + "versions": [ + { + "lessThan": "1.6.16", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.1.9", + "status": "affected", + "version": "2.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29200.json b/data/anchore/2024/CVE-2024-29200.json new file mode 100644 index 00000000..cce70901 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29200.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29200", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/kimai/kimai/security/advisories/GHSA-cj3c-5xpm-cx94" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:kimai:kimai:*:*:*:*:*:*:*:*" + ], + "product": "kimai", + "vendor": "kimai", + "versions": [ + { + "lessThan": "2.13.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29201.json b/data/anchore/2024/CVE-2024-29201.json new file mode 100644 index 00000000..5285a57d --- /dev/null +++ b/data/anchore/2024/CVE-2024-29201.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29201", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-pjpp-cm9x-6rwj" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*", + "cpe:2.3:a:jumpserver:jumpserver:*:*:*:*:*:*:*:*" + ], + "product": "jumpserver", + "vendor": "jumpserver", + "versions": [ + { + "lessThan": "3.10.7", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29202.json b/data/anchore/2024/CVE-2024-29202.json new file mode 100644 index 00000000..3a2992a0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29202.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29202", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/jumpserver/jumpserver/security/advisories/GHSA-2vvr-vmvx-73ch" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:fit2cloud:jumpserver:*:*:*:*:*:*:*:*", + "cpe:2.3:a:jumpserver:jumpserver:*:*:*:*:*:*:*:*" + ], + "product": "jumpserver", + "vendor": "jumpserver", + "versions": [ + { + "lessThan": "3.10.7", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29203.json b/data/anchore/2024/CVE-2024-29203.json new file mode 100644 index 00000000..9e29bebe --- /dev/null +++ b/data/anchore/2024/CVE-2024-29203.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29203", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://www.tiny.cloud/docs/tinymce/7/7.0-release-notes/#sandbox_iframes-editor-option-is-now-defaulted-to-true", + "https://www.tiny.cloud/docs/tinymce/6/6.8.1-release-notes/#new-convert_unsafe_embeds-option-that-controls-whether-object-and-embed-elements-will-be-converted-to-more-restrictive-alternatives-namely-img-for-image-mime-types-video-for-video-mime-types-audio-audio-mime-types-or-iframe-for-other-or-unspecified-mime-types", + "https://github.com/tinymce/tinymce/security/advisories/GHSA-438c-3975-5x3f", + "https://github.com/tinymce/tinymce/commit/bcdea2ad14e3c2cea40743fb48c63bba067ae6d1" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:tiny:tinymce:*:*:*:*:*:*:*:*" + ], + "product": "tinymce", + "vendor": "tinymce", + "versions": [ + { + "lessThan": "6.8.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29881.json b/data/anchore/2024/CVE-2024-29881.json new file mode 100644 index 00000000..42f13467 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29881.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29881", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/tinymce/tinymce/commit/bcdea2ad14e3c2cea40743fb48c63bba067ae6d1", + "https://www.tiny.cloud/docs/tinymce/7/7.0-release-notes/#convert_unsafe_embeds-editor-option-is-now-defaulted-to-true", + "https://www.tiny.cloud/docs/tinymce/6/6.8.1-release-notes/#new-convert_unsafe_embeds-option-that-controls-whether-object-and-embed-elements-will-be-converted-to-more-restrictive-alternatives-namely-img-for-image-mime-types-video-for-video-mime-types-audio-audio-mime-types-or-iframe-for-other-or-unspecified-mime-types", + "https://github.com/tinymce/tinymce/security/advisories/GHSA-5359-pvf2-pw78" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:tiny:tinymce:*:*:*:*:*:*:*:*" + ], + "product": "tinymce", + "vendor": "tinymce", + "versions": [ + { + "lessThan": "7.0.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29882.json b/data/anchore/2024/CVE-2024-29882.json new file mode 100644 index 00000000..5c26b3a9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29882.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29882", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/ossrs/srs/commit/244ce7bc013a0b805274a65132a2980680ba6b9d", + "https://github.com/ossrs/srs/security/advisories/GHSA-gv9r-qcjc-5hj7" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:ossrs:simple_realtime_server:*:*:*:*:*:*:*:*" + ], + "product": "srs", + "vendor": "ossrs", + "versions": [ + { + "lessThan": "5.0.210", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "6.0.121", + "status": "affected", + "version": "6.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29883.json b/data/anchore/2024/CVE-2024-29883.json new file mode 100644 index 00000000..d794545f --- /dev/null +++ b/data/anchore/2024/CVE-2024-29883.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29883", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://issue-tracker.miraheze.org/T11993", + "https://github.com/miraheze/CreateWiki/security/advisories/GHSA-8wjf-mxjg-j8p9", + "https://gist.githubusercontent.com/redbluegreenhat/0da1ebb7185b241ce1ac6ba1e8f0b98d/raw/44c4a229aacc8233808c767a79af9e4fd581ae68/T11993.patch" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:miraheze:createwiki:*:*:*:*:*:*:*:*" + ], + "product": "CreateWiki", + "vendor": "miraheze", + "repo": "https://github.com/miraheze/CreateWiki", + "versions": [ + { + "lessThan": "0c7c4f93834349be8f5c2a678e9a85b4b1aa7bab", + "status": "affected", + "version": "0", + "versionType": "git" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29888.json b/data/anchore/2024/CVE-2024-29888.json new file mode 100644 index 00000000..8b6b176a --- /dev/null +++ b/data/anchore/2024/CVE-2024-29888.json @@ -0,0 +1,74 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29888", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/saleor/saleor/commit/ef003c76a304c89ddb2dc65b7f1d5b3b2ba1c640", + "https://github.com/saleor/saleor/security/advisories/GHSA-mrj3-f2h4-7w45", + "https://github.com/saleor/saleor/commit/997f7ea4f576543ec88679a86bfe1b14f7f2ff26", + "https://github.com/saleor/saleor/commit/47cedfd7d6524d79bdb04708edcdbb235874de6b", + "https://github.com/saleor/saleor/pull/15697", + "https://github.com/saleor/saleor/pull/15694", + "https://github.com/saleor/saleor/commit/d8ba545c16ad3153febc5b5be8fd2ef75da9fc95", + "https://github.com/saleor/saleor/commit/39abb0f4e4fe6503f81bfbb871227e4f70bcdd5c", + "https://github.com/saleor/saleor/commit/b7cecda8b603f7472790150bb4508c7b655946d4", + "https://github.com/saleor/saleor/commit/dccc2c842b4e2e09470929c80f07dc137e439182", + "https://github.com/saleor/saleor/commit/22a1aa3ef0bc54156405f69146788016a7f3f761" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:mirumee:saleor:*:*:*:*:*:*:*:*", + "cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*" + ], + "product": "saleor", + "vendor": "saleor", + "versions": [ + { + "lessThan": "3.14.61", + "status": "affected", + "version": "3.14.56", + "versionType": "custom" + }, + { + "lessThan": "3.15.37", + "status": "affected", + "version": "3.15.31", + "versionType": "custom" + }, + { + "lessThan": "3.16.34", + "status": "affected", + "version": "3.16.27", + "versionType": "custom" + }, + { + "lessThan": "3.17.32", + "status": "affected", + "version": "3.17.25", + "versionType": "custom" + }, + { + "lessThan": "3.18.28", + "status": "affected", + "version": "3.18.19", + "versionType": "custom" + }, + { + "lessThan": "3.19.15", + "status": "affected", + "version": "3.19.5", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29889.json b/data/anchore/2024/CVE-2024-29889.json new file mode 100644 index 00000000..d364ddf3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29889.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29889", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/glpi-project/glpi/commit/0a6b28be4c0f848106c60b554c703ec2e178d6c7", + "https://github.com/glpi-project/glpi/security/advisories/GHSA-8xvf-v6vv-r75g" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" + ], + "product": "glpi", + "vendor": "glpi-project", + "versions": [ + { + "lessThan": "10.0.15", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29891.json b/data/anchore/2024/CVE-2024-29891.json new file mode 100644 index 00000000..c6cee157 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29891.json @@ -0,0 +1,76 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29891", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/zitadel/zitadel/releases/tag/v2.48.3", + "https://github.com/zitadel/zitadel/releases/tag/v2.47.8", + "https://github.com/zitadel/zitadel/releases/tag/v2.44.7", + "https://github.com/zitadel/zitadel/releases/tag/v2.43.11", + "https://github.com/zitadel/zitadel/releases/tag/v2.45.5", + "https://github.com/zitadel/zitadel/releases/tag/v2.42.17", + "https://github.com/zitadel/zitadel/security/advisories/GHSA-hr5w-cwwq-2v4m", + "https://github.com/zitadel/zitadel/releases/tag/v2.46.5" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*" + ], + "product": "zitadel", + "vendor": "zitadel", + "versions": [ + { + "lessThan": "2.42.17", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.43.11", + "status": "affected", + "version": "2.43.0", + "versionType": "custom" + }, + { + "lessThan": "2.44.7", + "status": "affected", + "version": "2.44.0", + "versionType": "custom" + }, + { + "lessThan": "2.45.5", + "status": "affected", + "version": "2.45.0", + "versionType": "custom" + }, + { + "lessThan": "2.46.5", + "status": "affected", + "version": "2.46.0", + "versionType": "custom" + }, + { + "lessThan": "2.47.8", + "status": "affected", + "version": "2.47.0", + "versionType": "custom" + }, + { + "lessThan": "2.48.3", + "status": "affected", + "version": "2.48.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29892.json b/data/anchore/2024/CVE-2024-29892.json new file mode 100644 index 00000000..066b4e7b --- /dev/null +++ b/data/anchore/2024/CVE-2024-29892.json @@ -0,0 +1,76 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29892", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/zitadel/zitadel/releases/tag/v2.48.3", + "https://github.com/zitadel/zitadel/releases/tag/v2.47.8", + "https://github.com/zitadel/zitadel/releases/tag/v2.44.7", + "https://github.com/zitadel/zitadel/releases/tag/v2.43.11", + "https://github.com/zitadel/zitadel/security/advisories/GHSA-gp8g-f42f-95q2", + "https://github.com/zitadel/zitadel/releases/tag/v2.45.5", + "https://github.com/zitadel/zitadel/releases/tag/v2.42.17", + "https://github.com/zitadel/zitadel/releases/tag/v2.46.5" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*" + ], + "product": "zitadel", + "vendor": "zitadel", + "versions": [ + { + "lessThan": "2.42.17", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.43.11", + "status": "affected", + "version": "2.43.0", + "versionType": "custom" + }, + { + "lessThan": "2.44.7", + "status": "affected", + "version": "2.44.0", + "versionType": "custom" + }, + { + "lessThan": "2.45.5", + "status": "affected", + "version": "2.45.0", + "versionType": "custom" + }, + { + "lessThan": "2.46.5", + "status": "affected", + "version": "2.46.0", + "versionType": "custom" + }, + { + "lessThan": "2.47.8", + "status": "affected", + "version": "2.47.0", + "versionType": "custom" + }, + { + "lessThan": "2.48.3", + "status": "affected", + "version": "2.48.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29893.json b/data/anchore/2024/CVE-2024-29893.json new file mode 100644 index 00000000..2460ea96 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29893.json @@ -0,0 +1,81 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29893", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/argoproj/argo-cd/commit/3e5a878f6e30d935fa149723ea2a2e93748fcddd", + "https://github.com/argoproj/argo-cd/commit/14f681e3ee7c38731943b98f92277e88a3db109d", + "https://github.com/argoproj/argo-cd/security/advisories/GHSA-jhwx-mhww-rgc3", + "https://github.com/argoproj/argo-cd/commit/36b8a12a38f8d92d55bffc81deed44389bf6eb59" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/argoproj/argo-cd", + "cpes": [ + "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", + "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*" + ], + "product": "argo-cd", + "vendor": "argoproj", + "versions": [ + { + "lessThan": "2.8.14", + "status": "affected", + "version": "2.4.0", + "versionType": "custom" + }, + { + "lessThan": "2.9.10", + "status": "affected", + "version": "2.9.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.5", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/argoproj/argo-cd/v2", + "cpes": [ + "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", + "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*" + ], + "product": "argo-cd", + "vendor": "argoproj", + "versions": [ + { + "lessThan": "2.8.14", + "status": "affected", + "version": "2.4.0", + "versionType": "custom" + }, + { + "lessThan": "2.9.10", + "status": "affected", + "version": "2.9.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.5", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29894.json b/data/anchore/2024/CVE-2024-29894.json new file mode 100644 index 00000000..e17ba98e --- /dev/null +++ b/data/anchore/2024/CVE-2024-29894.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29894", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Cacti/cacti/security/advisories/GHSA-grj5-8fcj-34gh", + "https://github.com/Cacti/cacti/security/advisories/GHSA-xwqc-7jc4-xm73" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*" + ], + "product": "cacti", + "vendor": "Cacti", + "versions": [ + { + "lessThan": "1.2.27", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29895.json b/data/anchore/2024/CVE-2024-29895.json new file mode 100644 index 00000000..2a1ea7f1 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29895.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29895", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Cacti/cacti/commit/99633903cad0de5ace636249de16f77e57a3c8fc", + "https://github.com/Cacti/cacti/security/advisories/GHSA-cr28-x256-xf5m", + "https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/cmd_realtime.php#L119", + "https://github.com/Cacti/cacti/commit/53e8014d1f082034e0646edc6286cde3800c683d" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*" + ], + "product": "cacti", + "vendor": "Cacti", + "versions": [ + { + "status": "affected", + "version": "1.3.x dev", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29897.json b/data/anchore/2024/CVE-2024-29897.json new file mode 100644 index 00000000..ff1fc819 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29897.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29897", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/miraheze/CreateWiki/security/advisories/GHSA-4rcf-3cj2-46mq", + "https://github.com/miraheze/mw-config/commit/fb3e68bcef459e9cf2a415241b28042a6c9727e8", + "https://issue-tracker.miraheze.org/T11999", + "https://issue-tracker.miraheze.org/F3093343" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:miraheze:createwiki:*:*:*:*:*:*:*:*" + ], + "product": "CreateWiki", + "vendor": "miraheze", + "repo": "https://github.com/miraheze/CreateWiki", + "versions": [ + { + "lessThan": "23415c17ffb4832667c06abcf1eadadefd4c8937", + "status": "affected", + "version": "0", + "versionType": "git" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29898.json b/data/anchore/2024/CVE-2024-29898.json new file mode 100644 index 00000000..224d5fd7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29898.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29898", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/miraheze/CreateWiki/security/advisories/GHSA-4rcf-3cj2-46mq", + "https://github.com/miraheze/CreateWiki/security/advisories/GHSA-5rcv-cf88-gv8v", + "https://github.com/miraheze/CreateWiki/commit/8f8442ed5299510ea3e58416004b9334134c149c" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:miraheze:createwiki:*:*:*:*:*:*:*:*" + ], + "product": "CreateWiki", + "vendor": "miraheze", + "repo": "https://github.com/miraheze/CreateWiki", + "versions": [ + { + "lessThan": "8f8442ed5299510ea3e58416004b9334134c149c", + "status": "affected", + "version": "23415c17ffb4832667c06abcf1eadadefd4c8937", + "versionType": "git" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29902.json b/data/anchore/2024/CVE-2024-29902.json new file mode 100644 index 00000000..79df5563 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29902.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29902", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/google/go-containerregistry/blob/a0658aa1d0cc7a7f1bcc4a3af9155335b6943f40/pkg/v1/remote/layer.go#L36-L40", + "https://github.com/sigstore/cosign/commit/629f5f8fa672973503edde75f84dcd984637629e", + "https://github.com/sigstore/cosign/blob/9bc3ee309bf35d2f6e17f5d23f231a3d8bf580bc/pkg/oci/remote/remote.go#L228-L239", + "https://github.com/sigstore/cosign/releases/tag/v2.2.4", + "https://github.com/sigstore/cosign/security/advisories/GHSA-88jx-383q-w4qc" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:sigstore:cosign:*:*:*:*:*:*:*:*" + ], + "product": "cosign", + "vendor": "sigstore", + "versions": [ + { + "lessThan": "2.2.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29903.json b/data/anchore/2024/CVE-2024-29903.json new file mode 100644 index 00000000..acab8530 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29903.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29903", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/sigstore/cosign/commit/629f5f8fa672973503edde75f84dcd984637629e", + "https://github.com/sigstore/cosign/blob/14795db16417579fac0c00c11e166868d7976b61/pkg/cosign/verify.go#L948-L955", + "https://github.com/sigstore/cosign/releases/tag/v2.2.4", + "https://github.com/sigstore/cosign/blob/286a98a4a99c1b2f32f84b0d560e324100312280/pkg/oci/remote/signatures.go#L56-L70", + "https://github.com/sigstore/cosign/security/advisories/GHSA-95pr-fxf5-86gv" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:sigstore:cosign:*:*:*:*:*:*:*:*" + ], + "product": "cosign", + "vendor": "sigstore", + "versions": [ + { + "lessThan": "2.2.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29904.json b/data/anchore/2024/CVE-2024-29904.json new file mode 100644 index 00000000..1bc89787 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29904.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29904", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/codeigniter4/CodeIgniter4/commit/fa851acbae7ae4c5a97f8f38ae87aa0822a334c0", + "https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-39fp-mqmm-gxj6" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*" + ], + "product": "CodeIgniter4", + "vendor": "codeigniter4", + "versions": [ + { + "lessThan": "4.4.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-29905.json b/data/anchore/2024/CVE-2024-29905.json new file mode 100644 index 00000000..e9f69ea9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-29905.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-29905", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/DIRACGrid/DIRAC/commit/1faa709341969a6321e29c843ca94039d33b2c3d", + "https://github.com/DIRACGrid/DIRAC/security/advisories/GHSA-v6f3-gh5h-mqwx" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:diracgrid:dirac:*:*:*:*:*:*:*:*" + ], + "product": "DIRAC", + "vendor": "DIRACGrid", + "versions": [ + { + "lessThan": "8.0.41", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30246.json b/data/anchore/2024/CVE-2024-30246.json new file mode 100644 index 00000000..81afc053 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30246.json @@ -0,0 +1,99 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-30246", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=a0ba0ae82a29eb8bfacef286778e5e49954f5316", + "https://github.com/Enalean/tuleap/commit/a0ba0ae82a29eb8bfacef286778e5e49954f5316", + "https://tuleap.net/plugins/tracker/?aid=37545", + "https://github.com/Enalean/tuleap/security/advisories/GHSA-jc7g-4pcv-8jcj" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*" + ], + "product": "tuleap community", + "vendor": "Enalean", + "versions": [ + { + "lessThan": "15.7.99.6", + "status": "affected", + "version": "14.11.99.34", + "versionType": "custom" + } + ] + }, + { + "cpes": [ + "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*" + ], + "product": "tuleap enteprise", + "vendor": "Enalean", + "versions": [ + { + "lessThan": "15.7-2", + "status": "affected", + "version": "15.7", + "versionType": "custom" + }, + { + "lessThan": "15.6-5", + "status": "affected", + "version": "15.6", + "versionType": "custom" + }, + { + "lessThan": "15.5-6", + "status": "affected", + "version": "15.5", + "versionType": "custom" + }, + { + "lessThan": "15.4-8", + "status": "affected", + "version": "15.4", + "versionType": "custom" + }, + { + "lessThan": "15.3-6", + "status": "affected", + "version": "15.3", + "versionType": "custom" + }, + { + "lessThan": "15.2-5", + "status": "affected", + "version": "15.2", + "versionType": "custom" + }, + { + "lessThan": "15.1-9", + "status": "affected", + "version": "15.1", + "versionType": "custom" + }, + { + "lessThan": "15.0-9", + "status": "affected", + "version": "15.0", + "versionType": "custom" + }, + { + "lessThan": "14.12-6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30249.json b/data/anchore/2024/CVE-2024-30249.json new file mode 100644 index 00000000..edb3c1d8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30249.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-30249", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/CloudburstMC/Network/security/advisories/GHSA-6h3m-c6fv-8hvh" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:org.cloudburstmc.netty:netty-transport-raknet:*:*:*:*:*:maven:*:*" + ], + "product": "Network", + "vendor": "CloudburstMC", + "versions": [ + { + "lessThan": "1.0.0.CR1-20240330.101522-15", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30251.json b/data/anchore/2024/CVE-2024-30251.json new file mode 100644 index 00000000..15cd9103 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30251.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-30251", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/aio-libs/aiohttp/commit/f21c6f2ca512a026ce7f0f6c6311f62d6a638866", + "https://github.com/aio-libs/aiohttp/commit/7eecdff163ccf029fbb1ddc9de4169d4aaeb6597", + "http://www.openwall.com/lists/oss-security/2024/05/02/4", + "https://github.com/aio-libs/aiohttp/commit/cebe526b9c34dc3a3da9140409db63014bc4cf19", + "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-5m98-qgg9-wh84" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:aiohttp:aiohttp:*:*:*:*:*:*:*:*" + ], + "product": "aiohttp", + "vendor": "aio-libs", + "versions": [ + { + "lessThan": "3.9.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30255.json b/data/anchore/2024/CVE-2024-30255.json new file mode 100644 index 00000000..10f8a817 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30255.json @@ -0,0 +1,53 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-30255", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "http://www.openwall.com/lists/oss-security/2024/04/05/3", + "https://github.com/envoyproxy/envoy/security/advisories/GHSA-j654-3ccm-vfmm", + "http://www.openwall.com/lists/oss-security/2024/04/03/16" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*" + ], + "product": "envoy", + "vendor": "envoyproxy", + "versions": [ + { + "lessThan": "1.29.3", + "status": "affected", + "version": "1.29.0", + "versionType": "custom" + }, + { + "lessThan": "1.28.2", + "status": "affected", + "version": "1.28.0", + "versionType": "custom" + }, + { + "lessThan": "1.27.4", + "status": "affected", + "version": "1.27.0", + "versionType": "custom" + }, + { + "lessThan": "1.26.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30257.json b/data/anchore/2024/CVE-2024-30257.json new file mode 100644 index 00000000..d43edcf8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30257.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-30257", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/1Panel-dev/1Panel/blob/dev/backend/app/service/auth.go#L81C5-L81C26", + "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*" + ], + "product": "1Panel", + "vendor": "1Panel-dev", + "versions": [ + { + "lessThan": "1.10.3-lts", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30258.json b/data/anchore/2024/CVE-2024-30258.json new file mode 100644 index 00000000..235c89f9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30258.json @@ -0,0 +1,52 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-30258", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/eProsima/Fast-DDS/commit/65236f93e9c4ea3ff9a49fba4dfd9e43eb94037b", + "https://drive.google.com/file/d/19W5UC52hPnAqVq_boZWO45d1TJ4WoCSh/view?usp=sharing", + "https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-53xw-465j-rxfh" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*" + ], + "product": "Fast-DDS", + "vendor": "eProsima", + "versions": [ + { + "status": "affected", + "version": "2.14.0", + "versionType": "custom" + }, + { + "lessThan": "2.13.5", + "status": "affected", + "version": "2.13.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.4", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + }, + { + "lessThan": "2.6.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30259.json b/data/anchore/2024/CVE-2024-30259.json new file mode 100644 index 00000000..11592450 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30259.json @@ -0,0 +1,52 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-30259", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://vimeo.com/907641887?share=copy", + "https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662", + "https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/view?usp=sharing" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*" + ], + "product": "Fast-DDS", + "vendor": "eProsima", + "versions": [ + { + "status": "affected", + "version": "2.14.0", + "versionType": "custom" + }, + { + "lessThan": "2.13.5", + "status": "affected", + "version": "2.13.0", + "versionType": "custom" + }, + { + "lessThan": "2.10.4", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + }, + { + "lessThan": "2.6.8", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30260.json b/data/anchore/2024/CVE-2024-30260.json new file mode 100644 index 00000000..b836ad82 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30260.json @@ -0,0 +1,44 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-30260", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/nodejs/undici/security/advisories/GHSA-m4v8-wqvr-p9f7", + "https://github.com/nodejs/undici/commit/6805746680d27a5369d7fb67bc05f95a28247d75", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/", + "https://github.com/nodejs/undici/commit/64e3402da4e032e68de46acb52800c9a06aaea3f" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*" + ], + "product": "undici", + "vendor": "nodejs", + "versions": [ + { + "lessThan": "5.28.4", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "6.11.1", + "status": "affected", + "version": "6.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30261.json b/data/anchore/2024/CVE-2024-30261.json new file mode 100644 index 00000000..3b12ac73 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30261.json @@ -0,0 +1,45 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-30261", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/nodejs/undici/commit/2b39440bd9ded841c93dd72138f3b1763ae26055", + "https://github.com/nodejs/undici/security/advisories/GHSA-9qxr-qj54-h672", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P6Q4RGETHVYVHDIQGTJGU5AV6NJEI67E/", + "https://github.com/nodejs/undici/commit/d542b8cd39ec1ba303f038ea26098c3f355974f3", + "https://hackerone.com/reports/2377760", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQVHWAS6WDXXIU7F72XI55VZ2LTZUB33/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NC3V3HFZ5MOJRZDY5ZELL6REIRSPFROJ/" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:nodejs:undici:*:*:*:*:*:node.js:*:*" + ], + "product": "undici", + "vendor": "nodejs", + "versions": [ + { + "lessThan": "6.11.1", + "status": "affected", + "version": "6.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.28.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30262.json b/data/anchore/2024/CVE-2024-30262.json new file mode 100644 index 00000000..c54bfdc4 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30262.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-30262", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/contao/contao/security/advisories/GHSA-r4r6-j2j3-7pp5", + "https://github.com/contao/contao/commit/3032baa456f607169ffae82a8920354adb338fe9" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:contao:contao:*:*:*:*:*:*:*:*" + ], + "product": "contao", + "vendor": "contao", + "versions": [ + { + "lessThan": "4.13.40", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30266.json b/data/anchore/2024/CVE-2024-30266.json new file mode 100644 index 00000000..e0dea1d6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30266.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-30266", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/bytecodealliance/wasmtime/pull/8283", + "https://github.com/bytecodealliance/wasmtime/issues/8281", + "https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-75hq-h6g9-h4q5", + "https://github.com/bytecodealliance/wasmtime/commit/7f57d0bb0948fa56cc950278d0db230ed10e8664", + "https://github.com/bytecodealliance/wasmtime/pull/8018" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:bytecodealliance:wasmtime:*:*:*:*:*:*:*:*" + ], + "product": "wasmtime", + "vendor": "bytecodealliance", + "versions": [ + { + "lessThan": "19.0.1", + "status": "affected", + "version": "19.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30268.json b/data/anchore/2024/CVE-2024-30268.json new file mode 100644 index 00000000..459c6de1 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30268.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-30268", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Cacti/cacti/security/advisories/GHSA-9m3v-whmr-pc2q", + "https://github.com/Cacti/cacti/blob/08497b8bcc6a6037f7b1aae303ad8f7dfaf7364e/settings.php#L66", + "https://github.com/Cacti/cacti/commit/a38b9046e9772612fda847b46308f9391a49891e" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*" + ], + "product": "cacti", + "vendor": "Cacti", + "repo": "https://github.com/Cacti/cacti", + "versions": [ + { + "lessThan": "a38b9046e9772612fda847b46308f9391a49891e", + "status": "affected", + "version": "0", + "versionType": "git" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30269.json b/data/anchore/2024/CVE-2024-30269.json new file mode 100644 index 00000000..e3be85d3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30269.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-30269", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/dataease/dataease/security/advisories/GHSA-8gvx-4qvj-6vv5", + "https://github.com/dataease/dataease/releases/tag/v2.5.0" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*" + ], + "product": "dataease", + "vendor": "dataease", + "versions": [ + { + "lessThan": "2.5.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-30270.json b/data/anchore/2024/CVE-2024-30270.json new file mode 100644 index 00000000..5ac08317 --- /dev/null +++ b/data/anchore/2024/CVE-2024-30270.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-30270", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://mailcow.email/posts/2024/release-2024-04", + "https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-4m8r-87gc-3vvp" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:mailcow:mailcow_dockerized:*:*:*:*:*:*:*:*:*", + "cpe:2.3:a:mailcow:mailcow-dockerized:*:*:*:*:*:*:*:*:*", + "cpe:2.3:a:mailcow:mailcow\\:_dockerized:*:*:*:*:*:*:*:*:*" + ], + "product": "mailcow-dockerized", + "vendor": "mailcow", + "versions": [ + { + "lessThan": "2024-04", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31204.json b/data/anchore/2024/CVE-2024-31204.json new file mode 100644 index 00000000..6f2e062b --- /dev/null +++ b/data/anchore/2024/CVE-2024-31204.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31204", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-fp6h-63w4-5hcm" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:mailcow:mailcow_dockerized:*:*:*:*:*:*:*:*:*", + "cpe:2.3:a:mailcow:mailcow-dockerized:*:*:*:*:*:*:*:*:*", + "cpe:2.3:a:mailcow:mailcow\\:_dockerized:*:*:*:*:*:*:*:*:*" + ], + "product": "mailcow-dockerized", + "vendor": "mailcow", + "versions": [ + { + "lessThan": "2024-04", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31205.json b/data/anchore/2024/CVE-2024-31205.json new file mode 100644 index 00000000..e716b789 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31205.json @@ -0,0 +1,65 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31205", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/saleor/saleor/security/advisories/GHSA-ff69-fwjf-3c9w", + "https://github.com/saleor/saleor/commit/36699c6f5c99590d24f46e3d5c5b1a3c2fd072e7" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:mirumee:saleor:*:*:*:*:*:*:*:*", + "cpe:2.3:a:saleor:saleor:*:*:*:*:*:*:*:*" + ], + "product": "saleor", + "vendor": "saleor", + "versions": [ + { + "lessThan": "3.14.64", + "status": "affected", + "version": "3.10.0", + "versionType": "custom" + }, + { + "lessThan": "3.15.39", + "status": "affected", + "version": "3.15.0", + "versionType": "custom" + }, + { + "lessThan": "3.16.39", + "status": "affected", + "version": "3.16.0", + "versionType": "custom" + }, + { + "lessThan": "3.17.35", + "status": "affected", + "version": "3.17.0", + "versionType": "custom" + }, + { + "lessThan": "3.18.31", + "status": "affected", + "version": "3.18.0", + "versionType": "custom" + }, + { + "lessThan": "3.19.19", + "status": "affected", + "version": "3.19.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31207.json b/data/anchore/2024/CVE-2024-31207.json new file mode 100644 index 00000000..ddd01286 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31207.json @@ -0,0 +1,69 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31207", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/vitejs/vite/commit/89c7c645f09d16a38f146ef4a1528f218e844d67", + "https://github.com/vitejs/vite/commit/d2db33f7d4b96750b35370c70dd2c35ec3b9b649", + "https://github.com/vitejs/vite/commit/011bbca350e447d1b499d242804ce62738c12bc0", + "https://github.com/vitejs/vite/commit/5a056dd2fc80dbafed033062fe6aaf4717309f48", + "https://github.com/vitejs/vite/commit/96a7f3a41ef2f9351c46f3ab12489bb4efa03cc9", + "https://github.com/vitejs/vite/commit/ba5269cca81de3f5fbb0f49d58a1c55688043258", + "https://github.com/vitejs/vite/security/advisories/GHSA-8jhw-289h-jh2g" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:vitejs:vite:*:*:*:*:*:node.js:*:*" + ], + "product": "vite", + "vendor": "vitejs", + "versions": [ + { + "lessThan": "2.9.18", + "status": "affected", + "version": "2.7.0", + "versionType": "custom" + }, + { + "lessThan": "3.2.10", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "4.5.3", + "status": "affected", + "version": "4.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.0.13", + "status": "affected", + "version": "5.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.1.7", + "status": "affected", + "version": "5.1.0", + "versionType": "custom" + }, + { + "lessThan": "5.2.6", + "status": "affected", + "version": "5.2.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31210.json b/data/anchore/2024/CVE-2024-31210.json new file mode 100644 index 00000000..56f9fd11 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31210.json @@ -0,0 +1,171 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31210", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-x79f-xrjv-jx5r" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*" + ], + "product": "wordpress-develop", + "vendor": "WordPress", + "versions": [ + { + "lessThan": "6.4.3", + "status": "affected", + "version": "6.4.0", + "versionType": "custom" + }, + { + "lessThan": "6.3.3", + "status": "affected", + "version": "6.3.0", + "versionType": "custom" + }, + { + "lessThan": "6.2.4", + "status": "affected", + "version": "6.2.0", + "versionType": "custom" + }, + { + "lessThan": "6.1.5", + "status": "affected", + "version": "6.1.0", + "versionType": "custom" + }, + { + "lessThan": "6.0.7", + "status": "affected", + "version": "6.0.0", + "versionType": "custom" + }, + { + "lessThan": "5.9.9", + "status": "affected", + "version": "5.9.0", + "versionType": "custom" + }, + { + "lessThan": "5.8.9", + "status": "affected", + "version": "5.8.0", + "versionType": "custom" + }, + { + "lessThan": "5.7.11", + "status": "affected", + "version": "5.7.0", + "versionType": "custom" + }, + { + "lessThan": "5.6.13", + "status": "affected", + "version": "5.6.0", + "versionType": "custom" + }, + { + "lessThan": "5.5.14", + "status": "affected", + "version": "5.5.0", + "versionType": "custom" + }, + { + "lessThan": "5.4.15", + "status": "affected", + "version": "5.4.0", + "versionType": "custom" + }, + { + "lessThan": "5.3.17", + "status": "affected", + "version": "5.3.0", + "versionType": "custom" + }, + { + "lessThan": "5.2.20", + "status": "affected", + "version": "5.2.0", + "versionType": "custom" + }, + { + "lessThan": "5.1.18", + "status": "affected", + "version": "5.1.0", + "versionType": "custom" + }, + { + "lessThan": "5.0.21", + "status": "affected", + "version": "5.0.0", + "versionType": "custom" + }, + { + "lessThan": "4.9.25", + "status": "affected", + "version": "4.9.0", + "versionType": "custom" + }, + { + "lessThan": "4.8.24", + "status": "affected", + "version": "4.8.0", + "versionType": "custom" + }, + { + "lessThan": "4.7.28", + "status": "affected", + "version": "4.7.0", + "versionType": "custom" + }, + { + "lessThan": "4.6.28", + "status": "affected", + "version": "4.6.0", + "versionType": "custom" + }, + { + "lessThan": "4.5.31", + "status": "affected", + "version": "4.5.0", + "versionType": "custom" + }, + { + "lessThan": "4.4.32", + "status": "affected", + "version": "4.4.0", + "versionType": "custom" + }, + { + "lessThan": "4.3.33", + "status": "affected", + "version": "4.3.0", + "versionType": "custom" + }, + { + "lessThan": "4.2.37", + "status": "affected", + "version": "4.2.0", + "versionType": "custom" + }, + { + "lessThan": "4.1.40", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31211.json b/data/anchore/2024/CVE-2024-31211.json new file mode 100644 index 00000000..5c5e9efe --- /dev/null +++ b/data/anchore/2024/CVE-2024-31211.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31211", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-m257-q4m5-j653" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*" + ], + "product": "wordpress-develop", + "vendor": "WordPress", + "versions": [ + { + "lessThan": "6.4.2", + "status": "affected", + "version": "6.4.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31214.json b/data/anchore/2024/CVE-2024-31214.json new file mode 100644 index 00000000..7784257d --- /dev/null +++ b/data/anchore/2024/CVE-2024-31214.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31214", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/traccar/traccar/blob/master/src/main/java/org/traccar/model/Device.java#L56", + "https://github.com/traccar/traccar/commit/3fbdcd81566bc72e319ec05c77cf8a4120b87b8f", + "https://github.com/traccar/traccar/blob/v5.12/src/main/java/org/traccar/api/resource/DeviceResource.java#L191", + "https://github.com/traccar/traccar/security/advisories/GHSA-3gxq-f2qj-c8v9" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:traccar:traccar:*:*:*:*:*:*:*:*" + ], + "product": "traccar", + "vendor": "traccar", + "versions": [ + { + "lessThan": "6.0", + "status": "affected", + "version": "5.1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31219.json b/data/anchore/2024/CVE-2024-31219.json new file mode 100644 index 00000000..3bae2299 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31219.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31219", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/discourse/discourse-reactions/security/advisories/GHSA-7cqc-5xrw-xh67", + "https://github.com/discourse/discourse-reactions/commit/6a5a8dacd7e5cbbbbe7d2288b1df9c1062994dbe" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:discourse:discourse_reactions:*:*:*:*:*:discourse:*:*", + "cpe:2.3:a:discourse:reactions:*:*:*:*:*:*:*:*" + ], + "product": "discourse-reactions", + "vendor": "discourse", + "versions": [ + { + "lessThan": "0.5", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31224.json b/data/anchore/2024/CVE-2024-31224.json new file mode 100644 index 00000000..79f595ec --- /dev/null +++ b/data/anchore/2024/CVE-2024-31224.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31224", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/binary-husky/gpt_academic/security/advisories/GHSA-jcjc-89wr-vv7g", + "https://github.com/binary-husky/gpt_academic/pull/1648", + "https://github.com/binary-husky/gpt_academic/commit/8af6c0cab6d96f5c4520bec85b24802e6e823f35" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:gpt_academic_project:gpt_academic:*:*:*:*:*:*:*:*" + ], + "product": "gpt_academic", + "vendor": "binary-husky", + "versions": [ + { + "lessThan": "3.74", + "status": "affected", + "version": "3.64", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31441.json b/data/anchore/2024/CVE-2024-31441.json new file mode 100644 index 00000000..3a891b84 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31441.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31441", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/dataease/dataease/security/advisories/GHSA-h7hj-7wg6-p5wh" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*" + ], + "product": "dataease", + "vendor": "dataease", + "versions": [ + { + "lessThan": "1.18.19", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31443.json b/data/anchore/2024/CVE-2024-31443.json new file mode 100644 index 00000000..85eee419 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31443.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31443", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Cacti/cacti/security/advisories/GHSA-rqc8-78cm-85j3", + "https://github.com/Cacti/cacti/commit/f946fa537d19678f938ddbd784a10e3290d275cf" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*" + ], + "product": "cacti", + "vendor": "Cacti", + "versions": [ + { + "lessThan": "1.2.27", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31444.json b/data/anchore/2024/CVE-2024-31444.json new file mode 100644 index 00000000..68cda8ac --- /dev/null +++ b/data/anchore/2024/CVE-2024-31444.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31444", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Cacti/cacti/security/advisories/GHSA-p4ch-7hjw-6m87" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*" + ], + "product": "cacti", + "vendor": "Cacti", + "versions": [ + { + "lessThan": "1.2.27", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31445.json b/data/anchore/2024/CVE-2024-31445.json new file mode 100644 index 00000000..912c4ecd --- /dev/null +++ b/data/anchore/2024/CVE-2024-31445.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31445", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Cacti/cacti/security/advisories/GHSA-vjph-r677-6pcc", + "https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L856", + "https://github.com/Cacti/cacti/commit/fd93c6e47651958b77c3bbe6a01fff695f81e886", + "https://github.com/Cacti/cacti/blob/501712998589763d411a68d35e3cda98fd9cfd18/lib/api_automation.php#L717" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*" + ], + "product": "cacti", + "vendor": "Cacti", + "versions": [ + { + "lessThan": "1.2.27", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31446.json b/data/anchore/2024/CVE-2024-31446.json new file mode 100644 index 00000000..361e7a53 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31446.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31446", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/MightyPirates/OpenComputers/security/advisories/GHSA-54j4-xpgj-cq4g", + "https://github.com/MightyPirates/OpenComputers/commit/9d4f7ea297953c2fd8ccfd24fe549d5e9576400f" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:opencomputers:opencomputers:*:*:*:*:*:minecraft:*:*" + ], + "product": "OpenComputers", + "vendor": "MightyPirates", + "versions": [ + { + "lessThan": "1.8.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31447.json b/data/anchore/2024/CVE-2024-31447.json new file mode 100644 index 00000000..ec2d37c3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31447.json @@ -0,0 +1,41 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31447", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/shopware/shopware/security/advisories/GHSA-5297-wrrp-rcj7", + "https://github.com/shopware/shopware/commit/5cc84ddd817ad0c1d07f9b3c79ab346d50514a77", + "https://github.com/shopware/shopware/commit/d29775aa758f70d08e0c5999795c7c26d230e7d3" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:shopware:shopware:*:*:*:*:*:*:*:*" + ], + "product": "shopware", + "vendor": "shopware", + "versions": [ + { + "lessThan": "6.5.8.8", + "status": "affected", + "version": "6.3.5.0", + "versionType": "custom" + }, + { + "lessThan": "6.6.1.0", + "status": "affected", + "version": "6.6.0.0-rc1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31450.json b/data/anchore/2024/CVE-2024-31450.json new file mode 100644 index 00000000..4e64e004 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31450.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31450", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/owncast/owncast/blob/v0.1.2/controllers/admin/emoji.go#L63", + "https://securitylab.github.com/advisories/GHSL-2023-277_Owncast/", + "https://github.com/owncast/owncast/releases/tag/v0.1.3", + "https://github.com/owncast/owncast/commit/1b14800c7d7f54be14ed4d130bfe7f480645076e" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:owncast_project:owncast:*:*:*:*:*:*:*:*" + ], + "product": "owncast", + "vendor": "owncast", + "versions": [ + { + "lessThan": "0.1.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31452.json b/data/anchore/2024/CVE-2024-31452.json new file mode 100644 index 00000000..eb853554 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31452.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31452", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/openfga/openfga/security/advisories/GHSA-8cph-m685-6v6r", + "https://github.com/openfga/openfga/commit/b6a6d99b2bdbf8c3781503989576076289f48ed2" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:openfga:openfga:*:*:*:*:*:*:*:*" + ], + "product": "openfga", + "vendor": "openfga", + "versions": [ + { + "lessThan": "1.5.3", + "status": "affected", + "version": "1.5.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31456.json b/data/anchore/2024/CVE-2024-31456.json new file mode 100644 index 00000000..cf0c01a8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31456.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31456", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/glpi-project/glpi/commit/730c3db29a1edc32f9b9d1e2a940e90a0211ab26", + "https://github.com/glpi-project/glpi/security/advisories/GHSA-gcj4-2cp3-6h5j" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*" + ], + "product": "glpi", + "vendor": "glpi-project", + "versions": [ + { + "lessThan": "10.0.15", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31457.json b/data/anchore/2024/CVE-2024-31457.json new file mode 100644 index 00000000..895d8e48 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31457.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31457", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/flipped-aurora/gin-vue-admin/security/advisories/GHSA-gv3w-m57p-3wc4", + "https://github.com/flipped-aurora/gin-vue-admin/commit/b1b7427c6ea6c7a027fa188c6be557f3795e732b", + "https://pkg.go.dev/github.com/flipped-aurora/gin-vue-admin/server?tab=versions" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:gin-vue-admin_project:gin-vue-admin:*:*:*:*:*:*:*:*" + ], + "product": "gin-vue-admin", + "vendor": "flipped-aurora", + "versions": [ + { + "lessThan": "0.0.0-20240409100909-b1b7427c6ea6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31458.json b/data/anchore/2024/CVE-2024-31458.json new file mode 100644 index 00000000..b08c1a75 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31458.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31458", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Cacti/cacti/security/advisories/GHSA-jrxg-8wh8-943x" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*" + ], + "product": "cacti", + "vendor": "Cacti", + "versions": [ + { + "lessThan": "1.2.27", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31459.json b/data/anchore/2024/CVE-2024-31459.json new file mode 100644 index 00000000..bd9ff600 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31459.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31459", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv", + "https://github.com/Cacti/cacti/security/advisories/GHSA-pfh9-gwm6-86vp", + "https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*" + ], + "product": "cacti", + "vendor": "Cacti", + "versions": [ + { + "lessThan": "1.2.27", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31460.json b/data/anchore/2024/CVE-2024-31460.json new file mode 100644 index 00000000..3df2d5e2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31460.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31460", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Cacti/cacti/security/advisories/GHSA-cx8g-hvq8-p2rv", + "https://github.com/Cacti/cacti/security/advisories/GHSA-gj3f-p326-gh8r" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*" + ], + "product": "cacti", + "vendor": "Cacti", + "versions": [ + { + "lessThan": "1.2.27", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31463.json b/data/anchore/2024/CVE-2024-31463.json new file mode 100644 index 00000000..737bba62 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31463.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31463", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/metal3-io/ironic-image/security/advisories/GHSA-g2cm-9v5f-qg7r", + "https://github.com/metal3-io/ironic-image/pull/494", + "https://github.com/metal3-io/ironic-image/commit/48e40bd30d49aefabac6fc80204a8650b13d10b4" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:metal3:ironic-image:*:*:*:*:*:*:*:*" + ], + "product": "ironic-image", + "vendor": "metal3-io", + "versions": [ + { + "lessThan": "24.1.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31464.json b/data/anchore/2024/CVE-2024-31464.json new file mode 100644 index 00000000..e74f64af --- /dev/null +++ b/data/anchore/2024/CVE-2024-31464.json @@ -0,0 +1,52 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31464", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/xwiki/xwiki-platform/commit/955fb097e02a2a7153f527522ee9eef42447e5d7", + "https://jira.xwiki.org/browse/XWIKI-19948", + "https://github.com/xwiki/xwiki-platform/commit/9075668a4135cce114ef2a4b72eba3161a9e94c4", + "https://github.com/xwiki/xwiki-platform/commit/f1eaec1e512220fabd970d053c627e435a1652cf", + "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-v782-xr4w-3vqx" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://maven.xwiki.org", + "packageName": "org.xwiki.platform:xwiki-platform-oldcore", + "cpes": [ + "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "cpe:2.3:a:org.xwiki.platform:xwiki-platform-oldcore:*:*:*:*:*:*:*:*" + ], + "product": "xwiki-platform", + "vendor": "xwiki", + "versions": [ + { + "lessThan": "14.10.19", + "status": "affected", + "version": "5.0-rc-1", + "versionType": "custom" + }, + { + "lessThan": "15.5.4", + "status": "affected", + "version": "15.0-rc-1", + "versionType": "custom" + }, + { + "lessThan": "15.9-rc-1", + "status": "affected", + "version": "15.6-rc-1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31465.json b/data/anchore/2024/CVE-2024-31465.json new file mode 100644 index 00000000..b988fb2c --- /dev/null +++ b/data/anchore/2024/CVE-2024-31465.json @@ -0,0 +1,52 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31465", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/xwiki/xwiki-platform/commit/6a7f19f6424036fce3d703413137adde950ae809", + "https://github.com/xwiki/xwiki-platform/commit/0317a3aa78065e66c86fc725976b06bf7f9b446e", + "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-34fj-r5gq-7395", + "https://github.com/xwiki/xwiki-platform/commit/2740974c32dbb7cc565546d0f04e2374b32b36f7", + "https://github.com/xwiki/xwiki-platform/commit/6a7f19f6424036fce3d703413137adde950ae809#diff-67b473d2b6397d65b7726c6a13555850b11b10128321adf9e627e656e1d130a5", + "https://jira.xwiki.org/browse/XWIKI-21474" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://maven.xwiki.org", + "packageName": " org.xwiki.platform:xwiki-platform-search-ui", + "cpes": [ + "cpe:2.3:a:org.xwiki.platform:xwiki-platform-search-ui:*:*:*:*:*:*:*:*" + ], + "product": "xwiki-platform", + "vendor": "xwiki", + "versions": [ + { + "lessThan": "14.10.20", + "status": "affected", + "version": "5.2-milestone-2", + "versionType": "custom" + }, + { + "lessThan": "15.5.4", + "status": "affected", + "version": "15.0-rc-1", + "versionType": "custom" + }, + { + "lessThan": "15.10-rc-1", + "status": "affected", + "version": "15.6-rc-1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31981.json b/data/anchore/2024/CVE-2024-31981.json new file mode 100644 index 00000000..03d4a440 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31981.json @@ -0,0 +1,52 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31981", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vxwr-wpjv-qjq7", + "https://github.com/xwiki/xwiki-platform/commit/d28e21a670c69880b951e415dd2ddd69d273eae9", + "https://github.com/xwiki/xwiki-platform/commit/480186f9d2fca880513da8bc5a609674d106cbd3", + "https://github.com/xwiki/xwiki-platform/commit/a4ad14d9c1605a5ab957237e505ebbb29f5b9d73", + "https://jira.xwiki.org/browse/XWIKI-21337" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://maven.xwiki.org", + "packageName": "org.xwiki.platform:xwiki-platform-oldcore", + "cpes": [ + "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "cpe:2.3:a:org.xwiki.platform:xwiki-platform-oldcore:*:*:*:*:*:*:*:*" + ], + "product": "xwiki-platform", + "vendor": "xwiki", + "versions": [ + { + "lessThan": "14.10.20", + "status": "affected", + "version": "3.0.1", + "versionType": "custom" + }, + { + "lessThan": "15.5.4", + "status": "affected", + "version": "15.0-rc-1", + "versionType": "custom" + }, + { + "lessThan": "15.10-rc-1", + "status": "affected", + "version": "15.6-rc-1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31982.json b/data/anchore/2024/CVE-2024-31982.json new file mode 100644 index 00000000..91af8dcb --- /dev/null +++ b/data/anchore/2024/CVE-2024-31982.json @@ -0,0 +1,51 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31982", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/xwiki/xwiki-platform/commit/3c9e4bb04286de94ad24854026a09fa967538e31", + "https://github.com/xwiki/xwiki-platform/commit/95bdd6cc6298acdf7f8f21298d40eeb8390a8565", + "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2858-8cfx-69m9", + "https://jira.xwiki.org/browse/XWIKI-21472", + "https://github.com/xwiki/xwiki-platform/commit/459e968be8740c8abc2a168196ce21e5ba93cfb8" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://maven.xwiki.org", + "packageName": "org.xwiki.platform:xwiki-platform-search-ui", + "cpes": [ + "cpe:2.3:a:org.xwiki.platform:xwiki-platform-search-ui:*:*:*:*:*:*:*:*" + ], + "product": "xwiki-platform", + "vendor": "xwiki", + "versions": [ + { + "lessThan": "14.10.20", + "status": "affected", + "version": "2.4-milestone-1", + "versionType": "custom" + }, + { + "lessThan": "15.5.4", + "status": "affected", + "version": "15.0-rc-1", + "versionType": "custom" + }, + { + "lessThan": "15.10-rc-1", + "status": "affected", + "version": "15.6-rc-1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31983.json b/data/anchore/2024/CVE-2024-31983.json new file mode 100644 index 00000000..b1c862e3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31983.json @@ -0,0 +1,51 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31983", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://jira.xwiki.org/browse/XWIKI-21411", + "https://github.com/xwiki/xwiki-platform/commit/c4c8d61c30de72298d805ccc82df2a307f131c54", + "https://github.com/xwiki/xwiki-platform/commit/73aef9648bbff04b697837f1b906932f0d5caacb", + "https://github.com/xwiki/xwiki-platform/commit/2a9ce88f33663c53c9c63b2ea573f4720ea2efb9", + "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xxp2-9c9g-7wmj" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://maven.xwiki.org", + "packageName": "org.xwiki.platform:xwiki-platform-localization-source-wiki", + "cpes": [ + "cpe:2.3:a:org.xwiki.platform:xwiki-platform-localization-source-wiki:*:*:*:*:*:*:*:*" + ], + "product": "xwiki-platform", + "vendor": "xwiki", + "versions": [ + { + "lessThan": "14.10.20", + "status": "affected", + "version": "4.3-milestone-2", + "versionType": "custom" + }, + { + "lessThan": "15.5.4", + "status": "affected", + "version": "15.0-rc-1", + "versionType": "custom" + }, + { + "lessThan": "15.10-rc-1", + "status": "affected", + "version": "15.6-rc-1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31984.json b/data/anchore/2024/CVE-2024-31984.json new file mode 100644 index 00000000..aedffbd9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31984.json @@ -0,0 +1,54 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31984", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/xwiki/xwiki-platform/commit/94fc12db87c2431eb1335ecb9c2954b1905bde62", + "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xm4h-3jxr-m3c6", + "https://jira.xwiki.org/browse/XWIKI-21471", + "https://github.com/xwiki/xwiki-platform/commit/74e301c481e69eeea674dac7fed6af3614cf08c5", + "https://github.com/xwiki/xwiki-platform/commit/5ef9d294d37be92ee22b2549e38663b29dce8767", + "https://github.com/xwiki/xwiki-platform/commit/ef55105d6eeec5635fd693f0070c5aaaf3bdd940", + "https://github.com/xwiki/xwiki-platform/commit/43c9d551e3c11e9d8f176b556dd33bbe31fc66e0", + "https://github.com/xwiki/xwiki-platform/commit/acba74c149a041345b24dcca52c586f872ba97fb" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://maven.xwiki.org", + "packageName": "org.xwiki.platform:xwiki-platform-search-solr-ui", + "cpes": [ + "cpe:2.3:a:org.xwiki.platform:xwiki-platform-search-solr-ui:*:*:*:*:*:*:*:*" + ], + "product": "xwiki-platform", + "vendor": "xwiki", + "versions": [ + { + "lessThan": "14.10.20", + "status": "affected", + "version": "7.2-rc-1", + "versionType": "custom" + }, + { + "lessThan": "15.5.4", + "status": "affected", + "version": "15.0-rc-1", + "versionType": "custom" + }, + { + "lessThan": "15.10-rc-1", + "status": "affected", + "version": "15.6-rc-1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31985.json b/data/anchore/2024/CVE-2024-31985.json new file mode 100644 index 00000000..547e5bb2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31985.json @@ -0,0 +1,52 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31985", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://jira.xwiki.org/browse/XWIKI-20851", + "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-j2r6-r929-v6gf", + "https://github.com/xwiki/xwiki-platform/commit/efd3570f3e5e944ec0ad0899bf799bf9563aef87", + "https://github.com/xwiki/xwiki-platform/commit/f30d9c641750a3f034b5910c6a3a7724ae8f2269", + "https://github.com/xwiki/xwiki-platform/commit/f16ca4ef1513f84ce2e685d4a05d689bd3a2ab4c", + "https://github.com/xwiki/xwiki-platform/commit/8a92cb4bef7e5f244ae81eed3e64fe9be95827cf" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://maven.xwiki.org", + "packageName": "org.xwiki.platform:xwiki-platform-scheduler-ui", + "cpes": [ + "cpe:2.3:a:org.xwiki.platform:xwiki-platform-scheduler-ui:*:*:*:*:*:*:*:*" + ], + "product": "xwiki-platform", + "vendor": "xwiki", + "versions": [ + { + "lessThan": "14.10.19", + "status": "affected", + "version": "3.1", + "versionType": "custom" + }, + { + "lessThan": "15.5.4", + "status": "affected", + "version": "15.0-rc-1", + "versionType": "custom" + }, + { + "lessThan": "15.9", + "status": "affected", + "version": "15.6-rc-1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31986.json b/data/anchore/2024/CVE-2024-31986.json new file mode 100644 index 00000000..5ca31ca8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31986.json @@ -0,0 +1,51 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31986", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://jira.xwiki.org/browse/XWIKI-21416", + "https://github.com/xwiki/xwiki-platform/commit/efd3570f3e5e944ec0ad0899bf799bf9563aef87", + "https://github.com/xwiki/xwiki-platform/commit/f30d9c641750a3f034b5910c6a3a7724ae8f2269", + "https://github.com/xwiki/xwiki-platform/commit/8a92cb4bef7e5f244ae81eed3e64fe9be95827cf", + "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-37m4-hqxv-w26g" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://maven.xwiki.org", + "packageName": "org.xwiki.platform:xwiki-platform-scheduler-ui", + "cpes": [ + "cpe:2.3:a:org.xwiki.platform:xwiki-platform-scheduler-ui:*:*:*:*:*:*:*:*" + ], + "product": "xwiki-platform", + "vendor": "xwiki", + "versions": [ + { + "lessThan": "14.10.19", + "status": "affected", + "version": "3.1", + "versionType": "custom" + }, + { + "lessThan": "15.5.4", + "status": "affected", + "version": "15.0-rc-1", + "versionType": "custom" + }, + { + "lessThan": "15.9", + "status": "affected", + "version": "15.6-rc-1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31987.json b/data/anchore/2024/CVE-2024-31987.json new file mode 100644 index 00000000..de22167f --- /dev/null +++ b/data/anchore/2024/CVE-2024-31987.json @@ -0,0 +1,52 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31987", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-cv55-v6rw-7r5v", + "https://jira.xwiki.org/browse/XWIKI-21478", + "https://github.com/xwiki/xwiki-platform/commit/3d4dbb41f52d1a6e39835cfb1695ca6668605a39", + "https://github.com/xwiki/xwiki-platform/commit/626d2a5dbf95b4e719ae13bf1a0a9c76e4edd5a2", + "https://github.com/xwiki/xwiki-platform/commit/da177c3c972e797d92c1a31e278f946012c41b56" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://maven.xwiki.org", + "packageName": "org.xwiki.platform:xwiki-platform-oldcore", + "cpes": [ + "cpe:2.3:a:org.xwiki.platform:xwiki-platform-oldcore:*:*:*:*:*:*:*:*", + "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*" + ], + "product": "xwiki-platform", + "vendor": "xwiki", + "versions": [ + { + "lessThan": "14.10.19", + "status": "affected", + "version": "6.4-milestone-1", + "versionType": "custom" + }, + { + "lessThan": "15.5.4", + "status": "affected", + "version": "15.0-rc-1", + "versionType": "custom" + }, + { + "lessThan": "15.10-rc-1", + "status": "affected", + "version": "15.6-rc-1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31988.json b/data/anchore/2024/CVE-2024-31988.json new file mode 100644 index 00000000..c6522f8b --- /dev/null +++ b/data/anchore/2024/CVE-2024-31988.json @@ -0,0 +1,52 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31988", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/xwiki/xwiki-platform/commit/9f8cc88497418750b09ce9fde5d67d840f038fbf", + "https://github.com/xwiki/xwiki-platform/commit/d88da4572fb7d4f95e1f54bb0cce33fce3df08d9", + "https://jira.xwiki.org/browse/XWIKI-21424", + "https://github.com/xwiki/xwiki-platform/commit/4896712ee6483da623f131be2e618f1f2b79cb8d", + "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-r5vh-gc3r-r24w", + "https://github.com/xwiki/xwiki-platform/commit/d9f5043da289ff106f08e23576746fd8baf98794" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://maven.xwiki.org", + "packageName": "org.xwiki.platform:xwiki-platform-realtime-ui", + "cpes": [ + "cpe:2.3:a:org.xwiki.platform:xwiki-platform-realtime-ui:*:*:*:*:*:*:*:*" + ], + "product": "xwiki-platform", + "vendor": "xwiki", + "versions": [ + { + "lessThan": "14.10.19", + "status": "affected", + "version": "13.9-rc-1", + "versionType": "custom" + }, + { + "lessThan": "15.5.4", + "status": "affected", + "version": "15.0-rc-1", + "versionType": "custom" + }, + { + "lessThan": "15.9", + "status": "affected", + "version": "15.6-rc-1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31990.json b/data/anchore/2024/CVE-2024-31990.json new file mode 100644 index 00000000..eb7a929d --- /dev/null +++ b/data/anchore/2024/CVE-2024-31990.json @@ -0,0 +1,81 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31990", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/argoproj/argo-cd/commit/c514105af739eebedb9dbe89d8a6dd8dfc30bb2c", + "https://github.com/argoproj/argo-cd/commit/c5a252c4cc260e240e2074794aedb861d07e9ca5", + "https://github.com/argoproj/argo-cd/commit/e0ff56d89fbd7d066e9c862b30337f6520f13f17", + "https://github.com/argoproj/argo-cd/security/advisories/GHSA-2gvw-w6fj-7m3c" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/argoproj/argo-cd", + "cpes": [ + "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", + "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*" + ], + "product": "argo-cd", + "vendor": "argoproj", + "versions": [ + { + "lessThan": "2.10.7", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + }, + { + "lessThan": "2.9.12", + "status": "affected", + "version": "2.9.0", + "versionType": "custom" + }, + { + "lessThan": "2.8.16", + "status": "affected", + "version": "2.4.0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/argoproj/argo-cd/v2", + "cpes": [ + "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", + "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*" + ], + "product": "argo-cd", + "vendor": "argoproj", + "versions": [ + { + "lessThan": "2.10.7", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + }, + { + "lessThan": "2.9.12", + "status": "affected", + "version": "2.9.0", + "versionType": "custom" + }, + { + "lessThan": "2.8.16", + "status": "affected", + "version": "2.4.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31996.json b/data/anchore/2024/CVE-2024-31996.json new file mode 100644 index 00000000..dfea5f4d --- /dev/null +++ b/data/anchore/2024/CVE-2024-31996.json @@ -0,0 +1,53 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31996", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://jira.xwiki.org/browse/XWIKI-21438", + "https://github.com/xwiki/xwiki-commons/security/advisories/GHSA-hf43-47q4-fhq5", + "https://jira.xwiki.org/browse/XCOMMONS-2828", + "https://github.com/xwiki/xwiki-commons/commit/b0805160ec7b01ee12417e79cb384e60ae4817aa", + "https://github.com/xwiki/xwiki-commons/commit/b94142e2a66ec32e89eacab67c3da8d91f5ef93a", + "https://github.com/xwiki/xwiki-commons/commit/ed7ff515a2436a1c6dcbd0c6ca0c41e434d58915" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://maven.xwiki.org", + "packageName": "org.xwiki.commons:xwiki-commons-velocity", + "cpes": [ + "cpe:2.3:a:org.xwiki.commons:xwiki-commons-velocity:*:*:*:*:*:*:*:*", + "cpe:2.3:a:xwiki:xwiki-commons:*:*:*:*:*:*:*:*" + ], + "product": "xwiki-commons", + "vendor": "xwiki", + "versions": [ + { + "lessThan": "14.10.19", + "status": "affected", + "version": "3.0.1", + "versionType": "custom" + }, + { + "lessThan": "15.5.4", + "status": "affected", + "version": "15.0-rc-1", + "versionType": "custom" + }, + { + "lessThan": "15.9-rc-1", + "status": "affected", + "version": "15.6-rc-1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-31997.json b/data/anchore/2024/CVE-2024-31997.json new file mode 100644 index 00000000..1cf1cfa0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-31997.json @@ -0,0 +1,51 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-31997", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/xwiki/xwiki-platform/commit/56748e154a9011f0d6239bec0823eaaeab6ec3f7", + "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c2gg-4gq4-jv5j", + "https://github.com/xwiki/xwiki-platform/commit/1b2574eb966457ca4ef34e557376b8751d1be90d", + "https://jira.xwiki.org/browse/XWIKI-21335", + "https://github.com/xwiki/xwiki-platform/commit/171e7c7d0e56deaa7b3678657ae26ef95379b1ea" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://maven.xwiki.org", + "packageName": "org.xwiki.platform:xwiki-platform-uiextension-api", + "cpes": [ + "cpe:2.3:a:org.xwiki.platform:xwiki-platform-uiextension-api:*:*:*:*:*:*:*:*" + ], + "product": "xwiki-platform", + "vendor": "xwiki", + "versions": [ + { + "lessThan": "14.10.19", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "15.5.4", + "status": "affected", + "version": "15.0-rc-1", + "versionType": "custom" + }, + { + "lessThan": "15.9-rc-1", + "status": "affected", + "version": "15.6-rc-1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32000.json b/data/anchore/2024/CVE-2024-32000.json new file mode 100644 index 00000000..98a7290d --- /dev/null +++ b/data/anchore/2024/CVE-2024-32000.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32000", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/matrix-org/matrix-appservice-irc/blob/d5d67d1d3ea3f0f6962a0af2cc57b56af3ad2129/config.sample.yaml#L601-L604", + "https://github.com/matrix-org/matrix-appservice-irc/pull/1799", + "https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-wm4w-7h2q-3pf7" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:matrix:matrix_irc_bridge:*:*:*:*:*:node.js:*:*" + ], + "product": "matrix-appservice-irc", + "vendor": "matrix-org", + "versions": [ + { + "lessThan": "2.0.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32001.json b/data/anchore/2024/CVE-2024-32001.json new file mode 100644 index 00000000..12062b0c --- /dev/null +++ b/data/anchore/2024/CVE-2024-32001.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32001", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/authzed/spicedb/releases/tag/v1.30.1", + "https://github.com/authzed/spicedb/commit/a244ed1edfaf2382711dccdb699971ec97190c7b", + "https://github.com/authzed/spicedb/security/advisories/GHSA-j85q-46hg-36p2" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:authzed:spicedb:*:*:*:*:*:*:*:*" + ], + "product": "spicedb", + "vendor": "authzed", + "versions": [ + { + "lessThan": "1.30.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32002.json b/data/anchore/2024/CVE-2024-32002.json new file mode 100644 index 00000000..e44aeada --- /dev/null +++ b/data/anchore/2024/CVE-2024-32002.json @@ -0,0 +1,73 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32002", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://git-scm.com/docs/git-config#Documentation/git-config.txt-coresymlinks", + "https://github.com/git/git/security/advisories/GHSA-8h77-4q3w-gfgv", + "https://git-scm.com/docs/git-clone#Documentation/git-clone.txt---recurse-submodulesltpathspecgt", + "https://github.com/git/git/commit/97065761333fd62db1912d81b489db938d8c991d" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", + "cpe:2.3:a:git:git:*:*:*:*:*:*:*:*" + ], + "product": "git", + "vendor": "git", + "versions": [ + { + "lessThan": "2.45.1", + "status": "affected", + "version": "2.45.0", + "versionType": "custom" + }, + { + "lessThan": "2.44.1", + "status": "affected", + "version": "2.44.0", + "versionType": "custom" + }, + { + "lessThan": "2.43.4", + "status": "affected", + "version": "2.43.0", + "versionType": "custom" + }, + { + "lessThan": "2.42.2", + "status": "affected", + "version": "2.42.0", + "versionType": "custom" + }, + { + "lessThan": "2.41.1", + "status": "affected", + "version": "2.41.0", + "versionType": "custom" + }, + { + "lessThan": "2.40.2", + "status": "affected", + "version": "2.40.0", + "versionType": "custom" + }, + { + "lessThan": "2.39.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32004.json b/data/anchore/2024/CVE-2024-32004.json new file mode 100644 index 00000000..1b933a0a --- /dev/null +++ b/data/anchore/2024/CVE-2024-32004.json @@ -0,0 +1,72 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32004", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/git/git/security/advisories/GHSA-xfc6-vwr8-r389", + "https://git-scm.com/docs/git-clone", + "https://github.com/git/git/commit/f4aa8c8bb11dae6e769cd930565173808cbb69c8" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", + "cpe:2.3:a:git:git:*:*:*:*:*:*:*:*" + ], + "product": "git", + "vendor": "git", + "versions": [ + { + "lessThan": "2.45.1", + "status": "affected", + "version": "2.45.0", + "versionType": "custom" + }, + { + "lessThan": "2.44.1", + "status": "affected", + "version": "2.44.0", + "versionType": "custom" + }, + { + "lessThan": "2.43.4", + "status": "affected", + "version": "2.43.0", + "versionType": "custom" + }, + { + "lessThan": "2.42.2", + "status": "affected", + "version": "2.42.0", + "versionType": "custom" + }, + { + "lessThan": "2.41.1", + "status": "affected", + "version": "2.41.0", + "versionType": "custom" + }, + { + "lessThan": "2.40.2", + "status": "affected", + "version": "2.40.0", + "versionType": "custom" + }, + { + "lessThan": "2.39.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32019.json b/data/anchore/2024/CVE-2024-32019.json new file mode 100644 index 00000000..1ad07ccc --- /dev/null +++ b/data/anchore/2024/CVE-2024-32019.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32019", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/netdata/netdata/pull/17377", + "https://github.com/netdata/netdata/security/advisories/GHSA-pmhq-4cxq-wj93" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:netdata:netdata:*:*:*:*:*:*:*:*" + ], + "product": "netdata", + "vendor": "netdata", + "versions": [ + { + "lessThan": "1.45.3", + "status": "affected", + "version": "1.45.0", + "versionType": "custom" + }, + { + "lessThan": "1.45.0-169", + "status": "affected", + "version": "1.44.0-60", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32020.json b/data/anchore/2024/CVE-2024-32020.json new file mode 100644 index 00000000..af41ca1e --- /dev/null +++ b/data/anchore/2024/CVE-2024-32020.json @@ -0,0 +1,72 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32020", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/git/git/security/advisories/GHSA-5rfh-556j-fhgj", + "https://github.com/git/git/commit/1204e1a824c34071019fe106348eaa6d88f9528d", + "https://github.com/git/git/commit/9e65df5eab274bf74c7b570107aacd1303a1e703" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", + "cpe:2.3:a:git:git:*:*:*:*:*:*:*:*" + ], + "product": "git", + "vendor": "git", + "versions": [ + { + "lessThan": "2.45.1", + "status": "affected", + "version": "2.45.0", + "versionType": "custom" + }, + { + "lessThan": "2.44.1", + "status": "affected", + "version": "2.44.0", + "versionType": "custom" + }, + { + "lessThan": "2.43.4", + "status": "affected", + "version": "2.43.0", + "versionType": "custom" + }, + { + "lessThan": "2.42.2", + "status": "affected", + "version": "2.42.0", + "versionType": "custom" + }, + { + "lessThan": "2.41.1", + "status": "affected", + "version": "2.41.0", + "versionType": "custom" + }, + { + "lessThan": "2.40.2", + "status": "affected", + "version": "2.40.0", + "versionType": "custom" + }, + { + "lessThan": "2.39.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32021.json b/data/anchore/2024/CVE-2024-32021.json new file mode 100644 index 00000000..8b021b87 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32021.json @@ -0,0 +1,70 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32021", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/git/git/security/advisories/GHSA-mvxm-9j2h-qjx7" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", + "cpe:2.3:a:git:git:*:*:*:*:*:*:*:*" + ], + "product": "git", + "vendor": "git", + "versions": [ + { + "lessThan": "2.45.1", + "status": "affected", + "version": "2.45.0", + "versionType": "custom" + }, + { + "lessThan": "2.44.1", + "status": "affected", + "version": "2.44.0", + "versionType": "custom" + }, + { + "lessThan": "2.43.4", + "status": "affected", + "version": "2.43.0", + "versionType": "custom" + }, + { + "lessThan": "2.42.2", + "status": "affected", + "version": "2.42.0", + "versionType": "custom" + }, + { + "lessThan": "2.41.1", + "status": "affected", + "version": "2.41.0", + "versionType": "custom" + }, + { + "lessThan": "2.40.2", + "status": "affected", + "version": "2.40.0", + "versionType": "custom" + }, + { + "lessThan": "2.39.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32038.json b/data/anchore/2024/CVE-2024-32038.json new file mode 100644 index 00000000..7a15b093 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32038.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32038", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/wazuh/wazuh/security/advisories/GHSA-fcpw-v3pg-c327" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*" + ], + "product": "wazuh", + "vendor": "wazuh", + "versions": [ + { + "lessThan": "4.7.2", + "status": "affected", + "version": "3.8.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32039.json b/data/anchore/2024/CVE-2024-32039.json new file mode 100644 index 00000000..040c8ed6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32039.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32039", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/FreeRDP/FreeRDP/pull/10077", + "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5h8-7j42-j4r9", + "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", + "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" + ], + "product": "FreeRDP", + "vendor": "FreeRDP", + "versions": [ + { + "lessThan": "3.5.0", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.11.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32040.json b/data/anchore/2024/CVE-2024-32040.json new file mode 100644 index 00000000..cc47ccac --- /dev/null +++ b/data/anchore/2024/CVE-2024-32040.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32040", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/FreeRDP/FreeRDP/pull/10077", + "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-23c5-cp23-h2h5", + "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", + "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" + ], + "product": "FreeRDP", + "vendor": "FreeRDP", + "versions": [ + { + "lessThan": "3.5.0", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.11.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32041.json b/data/anchore/2024/CVE-2024-32041.json new file mode 100644 index 00000000..6019b548 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32041.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32041", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", + "https://github.com/FreeRDP/FreeRDP/pull/10077", + "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0", + "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5r4p-mfx2-m44r" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" + ], + "product": "FreeRDP", + "vendor": "FreeRDP", + "versions": [ + { + "lessThan": "3.5.0", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.11.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32458.json b/data/anchore/2024/CVE-2024-32458.json new file mode 100644 index 00000000..a8c7662f --- /dev/null +++ b/data/anchore/2024/CVE-2024-32458.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32458", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vvr6-h646-mp4p", + "https://github.com/FreeRDP/FreeRDP/pull/10077", + "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", + "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" + ], + "product": "FreeRDP", + "vendor": "FreeRDP", + "versions": [ + { + "lessThan": "3.5.0", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.11.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32459.json b/data/anchore/2024/CVE-2024-32459.json new file mode 100644 index 00000000..db088f42 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32459.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32459", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/FreeRDP/FreeRDP/pull/10077", + "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cp4q-p737-rmw9", + "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", + "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" + ], + "product": "FreeRDP", + "vendor": "FreeRDP", + "versions": [ + { + "lessThan": "3.5.0", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.11.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32460.json b/data/anchore/2024/CVE-2024-32460.json new file mode 100644 index 00000000..07b04918 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32460.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32460", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/FreeRDP/FreeRDP/releases/tag/2.11.6", + "https://github.com/FreeRDP/FreeRDP/pull/10077", + "https://github.com/FreeRDP/FreeRDP/releases/tag/3.5.0", + "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4rr8-gr65-vqrr" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" + ], + "product": "FreeRDP", + "vendor": "FreeRDP", + "versions": [ + { + "lessThan": "3.5.0", + "status": "affected", + "version": "3.0.0", + "versionType": "custom" + }, + { + "lessThan": "2.11.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32461.json b/data/anchore/2024/CVE-2024-32461.json new file mode 100644 index 00000000..da33ced3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32461.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32461", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/librenms/librenms/security/advisories/GHSA-cwx6-cx7x-4q34", + "https://github.com/librenms/librenms/commit/d29201fce134347f891102699fbde7070debee33", + "https://doc.clickup.com/9013166444/p/h/8ckm0bc-53/16811991bb5fff6" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*" + ], + "product": "librenms", + "vendor": "librenms", + "versions": [ + { + "lessThan": "24.4.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32462.json b/data/anchore/2024/CVE-2024-32462.json new file mode 100644 index 00000000..69c67f34 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32462.json @@ -0,0 +1,59 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32462", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/flatpak/flatpak/commit/b7c1a558e58aaeb1d007d29529bbb270dc4ff11e", + "https://github.com/flatpak/flatpak/commit/72016e3fce8fcbeab707daf4f1a02b931fcc004d", + "https://github.com/flatpak/flatpak/commit/bbab7ed1e672356d1a78b422462b210e8e875931", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IB6VQAF5S2YOBULDHPUKPOEIKONOP5KO/", + "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFNSCFJVMAQK5AF55JBN7OSJP3CREDBD/", + "https://github.com/flatpak/flatpak/security/advisories/GHSA-phv6-cpc2-2fgj", + "http://www.openwall.com/lists/oss-security/2024/04/18/5", + "https://github.com/flatpak/flatpak/commit/81abe2a37d363f5099c3d0bdcd0caad6efc5bf97" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:flatpak:flatpak-builder:*:*:*:*:*:*:*:*", + "cpe:2.3:a:flatpak:flatpak:*:*:*:*:*:*:*:*" + ], + "product": "flatpak", + "vendor": "flatpak", + "versions": [ + { + "lessThan": "1.10.9", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "1.12.9", + "status": "affected", + "version": "1.12.0", + "versionType": "custom" + }, + { + "lessThan": "1.14.6", + "status": "affected", + "version": "1.14.0", + "versionType": "custom" + }, + { + "lessThan": "1.15.8", + "status": "affected", + "version": "1.15.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32465.json b/data/anchore/2024/CVE-2024-32465.json new file mode 100644 index 00000000..6353a39b --- /dev/null +++ b/data/anchore/2024/CVE-2024-32465.json @@ -0,0 +1,73 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32465", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/git/git/commit/7b70e9efb18c2cc3f219af399bd384c5801ba1d7", + "https://git-scm.com/docs/git-clone", + "https://git-scm.com/docs/git#_security", + "https://github.com/git/git/security/advisories/GHSA-vm9j-46j9-qvq4" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:*", + "cpe:2.3:a:git:git:*:*:*:*:*:*:*:*" + ], + "product": "git", + "vendor": "git", + "versions": [ + { + "lessThan": "2.45.1", + "status": "affected", + "version": "2.45.0", + "versionType": "custom" + }, + { + "lessThan": "2.44.1", + "status": "affected", + "version": "2.44.0", + "versionType": "custom" + }, + { + "lessThan": "2.43.4", + "status": "affected", + "version": "2.43.0", + "versionType": "custom" + }, + { + "lessThan": "2.42.2", + "status": "affected", + "version": "2.42.0", + "versionType": "custom" + }, + { + "lessThan": "2.41.1", + "status": "affected", + "version": "2.41.0", + "versionType": "custom" + }, + { + "lessThan": "2.40.2", + "status": "affected", + "version": "2.40.0", + "versionType": "custom" + }, + { + "lessThan": "2.39.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32466.json b/data/anchore/2024/CVE-2024-32466.json new file mode 100644 index 00000000..381e94a8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32466.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32466", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/tolgee/tolgee-platform/security/advisories/GHSA-r95p-fqqv-fppc", + "https://github.com/tolgee/tolgee-platform/commit/f71213925d6f80019f841db0ead9baa7488c1821" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:tolgee:tolgee:*:*:*:*:*:*:*:*" + ], + "product": "tolgee-platform", + "vendor": "tolgee", + "versions": [ + { + "lessThan": "3.57.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32467.json b/data/anchore/2024/CVE-2024-32467.json new file mode 100644 index 00000000..5c35dd45 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32467.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32467", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/metersphere/metersphere/security/advisories/GHSA-7499-q88f-mxqp" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:metersphere:metersphere:*:*:*:*:*:*:*:*" + ], + "product": "metersphere", + "vendor": "metersphere", + "versions": [ + { + "lessThan": "2.10.14-lts", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32470.json b/data/anchore/2024/CVE-2024-32470.json new file mode 100644 index 00000000..7a780d04 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32470.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32470", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/tolgee/tolgee-platform/security/advisories/GHSA-r95p-fqqv-fppc", + "https://github.com/tolgee/tolgee-platform/security/advisories/GHSA-pm57-hcm8-38gw", + "https://github.com/tolgee/tolgee-platform/commit/a0d861028d931f8a54387770eaf3a75031b81234" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:tolgee:tolgee:*:*:*:*:*:*:*:*" + ], + "product": "tolgee-platform", + "vendor": "tolgee", + "versions": [ + { + "lessThan": "3.57.4", + "status": "affected", + "version": "3.57.2", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32472.json b/data/anchore/2024/CVE-2024-32472.json new file mode 100644 index 00000000..5f1b0eb2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32472.json @@ -0,0 +1,41 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32472", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/excalidraw/excalidraw/commit/988f81911ca58e3ca2583e0dd44a954dd00e09d0", + "https://github.com/excalidraw/excalidraw/security/advisories/GHSA-m64q-4jqh-f72f", + "https://github.com/excalidraw/excalidraw/commit/6be752e1b6d776ccfbd3bb9eea17463cb264121d" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:excalidraw:excalidraw:*:*:*:*:*:node.js:*:*" + ], + "product": "excalidraw", + "vendor": "excalidraw", + "versions": [ + { + "lessThan": "0.16.4", + "status": "affected", + "version": "0.16.0", + "versionType": "custom" + }, + { + "lessThan": "0.17.6", + "status": "affected", + "version": "0.17.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32473.json b/data/anchore/2024/CVE-2024-32473.json new file mode 100644 index 00000000..243507fc --- /dev/null +++ b/data/anchore/2024/CVE-2024-32473.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32473", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/moby/moby/security/advisories/GHSA-x84c-p2g9-rqv9", + "https://github.com/moby/moby/commit/7cef0d9cd1cf221d8c0b7b7aeda69552649e0642" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:docker:docker:*:*:*:*:*:*:*:*", + "cpe:2.3:a:mobyproject:moby:*:*:*:*:*:*:*:*" + ], + "product": "moby", + "vendor": "moby", + "versions": [ + { + "lessThan": "26.0.2", + "status": "affected", + "version": "26.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32474.json b/data/anchore/2024/CVE-2024-32474.json new file mode 100644 index 00000000..e1568924 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32474.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32474", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/getsentry/sentry/pull/66393", + "https://github.com/getsentry/sentry/commit/d5b34568d9f1c41362ccb62141532a0a2169512f", + "https://github.com/getsentry/sentry/pull/69148", + "https://github.com/getsentry/sentry/security/advisories/GHSA-6cjm-4pxw-7xp9" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:functional:sentry:*:*:*:*:*:*:*:*", + "cpe:2.3:a:sentry:sentry:*:*:*:*:*:*:*:*" + ], + "product": "sentry", + "vendor": "getsentry", + "versions": [ + { + "lessThan": "24.4.1", + "status": "affected", + "version": "24.3.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32475.json b/data/anchore/2024/CVE-2024-32475.json new file mode 100644 index 00000000..143ac792 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32475.json @@ -0,0 +1,52 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32475", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/envoyproxy/envoy/commit/b47fc6648d7c2dfe0093a601d44cb704b7bad382", + "https://github.com/envoyproxy/envoy/security/advisories/GHSA-3mh5-6q8v-25wj" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*" + ], + "product": "envoy", + "vendor": "envoyproxy", + "versions": [ + { + "lessThan": "11.30.1", + "status": "affected", + "version": "1.30.0", + "versionType": "custom" + }, + { + "lessThan": "1.29.4", + "status": "affected", + "version": "1.29.0", + "versionType": "custom" + }, + { + "lessThan": "1.28.3", + "status": "affected", + "version": "1.28.0", + "versionType": "custom" + }, + { + "lessThan": "1.27.5", + "status": "affected", + "version": "1.13.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32476.json b/data/anchore/2024/CVE-2024-32476.json new file mode 100644 index 00000000..b7e02b8f --- /dev/null +++ b/data/anchore/2024/CVE-2024-32476.json @@ -0,0 +1,81 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32476", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/argoproj/argo-cd/commit/7893979a1e78d59cedd0ba790ded24e30bb40657", + "https://github.com/argoproj/argo-cd/commit/e2df7315fb7d96652186bf7435773a27be330cac", + "https://github.com/argoproj/argo-cd/security/advisories/GHSA-9m6p-x4h2-6frq", + "https://github.com/argoproj/argo-cd/commit/9e5cc5a26ff0920a01816231d59fdb5eae032b5a" + ] + }, + "adp": { + "affected": [ + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/argoproj/argo-cd", + "cpes": [ + "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", + "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*" + ], + "product": "argo-cd", + "vendor": "argoproj", + "versions": [ + { + "lessThan": "2.10.8", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + }, + { + "lessThan": "2.9.13", + "status": "affected", + "version": "2.9.0", + "versionType": "custom" + }, + { + "lessThan": "2.8.17", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + }, + { + "collectionURL": "https://pkg.go.dev", + "packageName": "github.com/argoproj/argo-cd/v2", + "cpes": [ + "cpe:2.3:a:linuxfoundation:argo-cd:*:*:*:*:*:*:*:*", + "cpe:2.3:a:linuxfoundation:argo_continuous_delivery:*:*:*:*:*:kubernetes:*:*" + ], + "product": "argo-cd", + "vendor": "argoproj", + "versions": [ + { + "lessThan": "2.10.8", + "status": "affected", + "version": "2.10.0", + "versionType": "custom" + }, + { + "lessThan": "2.9.13", + "status": "affected", + "version": "2.9.0", + "versionType": "custom" + }, + { + "lessThan": "2.8.17", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32477.json b/data/anchore/2024/CVE-2024-32477.json new file mode 100644 index 00000000..f64f9b2c --- /dev/null +++ b/data/anchore/2024/CVE-2024-32477.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32477", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/denoland/deno/security/advisories/GHSA-95cj-3hr2-7j5j" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*", + "cpe:2.3:a:deno:deno_runtime:*:*:*:*:*:rust:*:*" + ], + "product": "deno", + "vendor": "denoland", + "versions": [ + { + "lessThan": "1.42.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32479.json b/data/anchore/2024/CVE-2024-32479.json new file mode 100644 index 00000000..471dd10e --- /dev/null +++ b/data/anchore/2024/CVE-2024-32479.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32479", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/librenms/librenms/blob/a61c11db7e8ef6a437ab55741658be2be7d14d34/app/Http/Controllers/ServiceTemplateController.php#L67C23-L67C23", + "https://github.com/librenms/librenms/commit/19344f0584d4d6d4526fdf331adc60530e3f685b", + "https://github.com/librenms/librenms/security/advisories/GHSA-72m9-7c8x-pmmw" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*" + ], + "product": "librenms", + "vendor": "librenms", + "versions": [ + { + "lessThan": "24.4.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32480.json b/data/anchore/2024/CVE-2024-32480.json new file mode 100644 index 00000000..7260c896 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32480.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32480", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/librenms/librenms/security/advisories/GHSA-jh57-j3vq-h438", + "https://github.com/librenms/librenms/commit/83fe4b10c440d69a47fe2f8616e290ba2bd3a27c" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*" + ], + "product": "librenms", + "vendor": "librenms", + "versions": [ + { + "lessThan": "24.4.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32481.json b/data/anchore/2024/CVE-2024-32481.json new file mode 100644 index 00000000..3b77e4b7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32481.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32481", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/vyperlang/vyper/commit/3de1415ee77a9244eb04bdb695e249d3ec9ed868", + "https://github.com/vyperlang/vyper/blob/9136169468f317a53b4e7448389aa315f90b95ba/vyper/codegen/stmt.py#L286-L287", + "https://github.com/vyperlang/vyper/security/advisories/GHSA-ppx5-q359-pvwj", + "https://github.com/vyperlang/vyper/commit/5319cfbe14951e007ccdb323257e5ada869b35d5" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*" + ], + "product": "vyper", + "vendor": "vyperlang", + "versions": [ + { + "lessThan": "0.4.0b1", + "status": "affected", + "version": "0.3.8", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32644.json b/data/anchore/2024/CVE-2024-32644.json new file mode 100644 index 00000000..89bd03bf --- /dev/null +++ b/data/anchore/2024/CVE-2024-32644.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32644", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/evmos/evmos/security/advisories/GHSA-3fp5-2xwh-fxm6", + "https://github.com/evmos/evmos/blob/b196a522ba4951890b40992e9f97aa610f8b5f9c/x/evm/statedb/statedb.go#L460-L465", + "https://github.com/evmos/evmos/commit/08982b5ee726b97bc50eaf58d1914829648b6a5f" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*" + ], + "product": "evmos", + "vendor": "evmos", + "versions": [ + { + "lessThan": "17.0.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32645.json b/data/anchore/2024/CVE-2024-32645.json new file mode 100644 index 00000000..c829e731 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32645.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32645", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/vyperlang/vyper/security/advisories/GHSA-xchq-w5r3-4wg3" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*" + ], + "product": "vyper", + "vendor": "vyperlang", + "versions": [ + { + "lessThanOrEqual": "0.3.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32646.json b/data/anchore/2024/CVE-2024-32646.json new file mode 100644 index 00000000..cff9cc70 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32646.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32646", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/vyperlang/vyper/security/advisories/GHSA-r56x-j438-vw5m" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*" + ], + "product": "vyper", + "vendor": "vyperlang", + "versions": [ + { + "lessThanOrEqual": "0.3.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32647.json b/data/anchore/2024/CVE-2024-32647.json new file mode 100644 index 00000000..7281b14a --- /dev/null +++ b/data/anchore/2024/CVE-2024-32647.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32647", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/vyperlang/vyper/blob/cedf7087e68e67c7bfbd47ae95dcb16b81ad2e02/vyper/builtins/functions.py#L1847", + "https://github.com/vyperlang/vyper/security/advisories/GHSA-3whq-64q2-qfj6" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*" + ], + "product": "vyper", + "vendor": "vyperlang", + "versions": [ + { + "lessThanOrEqual": "0.3.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32648.json b/data/anchore/2024/CVE-2024-32648.json new file mode 100644 index 00000000..a2c387ac --- /dev/null +++ b/data/anchore/2024/CVE-2024-32648.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32648", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/vyperlang/vyper/commit/93287e5ac184b53b395c907d40701f721daf8177", + "https://github.com/vyperlang/vyper/issues/2455", + "https://github.com/vyperlang/vyper/security/advisories/GHSA-m2v9-w374-5hj9" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*" + ], + "product": "vyper", + "vendor": "vyperlang", + "versions": [ + { + "lessThan": "0.3.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32649.json b/data/anchore/2024/CVE-2024-32649.json new file mode 100644 index 00000000..767f08e0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32649.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32649", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/vyperlang/vyper/security/advisories/GHSA-5jrj-52x8-m64h" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:vyperlang:vyper:*:*:*:*:*:python:*:*" + ], + "product": "vyper", + "vendor": "vyperlang", + "versions": [ + { + "lessThanOrEqual": "0.3.10", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32651.json b/data/anchore/2024/CVE-2024-32651.json new file mode 100644 index 00000000..6ee4b097 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32651.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32651", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/dgtlmoon/changedetection.io/releases/tag/0.45.21", + "https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-4r7v-whpg-8rx3", + "https://www.onsecurity.io/blog/server-side-template-injection-with-jinja2" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:changedetection:changedetection:*:*:*:*:*:*:*:*" + ], + "product": "changedetection.io", + "vendor": "dgtlmoon", + "versions": [ + { + "lessThanOrEqual": "0.45.20", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32652.json b/data/anchore/2024/CVE-2024-32652.json new file mode 100644 index 00000000..831fee3a --- /dev/null +++ b/data/anchore/2024/CVE-2024-32652.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32652", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/honojs/node-server/issues/159", + "https://github.com/honojs/node-server/security/advisories/GHSA-hgxw-5xg3-69jx", + "https://github.com/honojs/node-server/commit/d847e60249fd8183ba0998bc379ba20505643204" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:hono:node-server:*:*:*:*:*:node.js:*:*" + ], + "product": "node-server", + "vendor": "honojs", + "versions": [ + { + "lessThan": "1.10.1", + "status": "affected", + "version": "1.3.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32653.json b/data/anchore/2024/CVE-2024-32653.json new file mode 100644 index 00000000..f445aeef --- /dev/null +++ b/data/anchore/2024/CVE-2024-32653.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32653", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/skylot/jadx/blob/9114821fb12558874e01421bf38b0d34fb39df72/jadx-gui/src/main/java/jadx/gui/device/protocol/ADBDevice.java#L108-L109", + "https://github.com/skylot/jadx/releases/tag/v1.5.0", + "https://github.com/skylot/jadx/security/advisories/GHSA-3pp3-hg2q-9gpm" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:jadx_project:jadx:*:*:*:*:*:*:*:*" + ], + "product": "jadx", + "vendor": "skylot", + "versions": [ + { + "lessThan": "1.5.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32658.json b/data/anchore/2024/CVE-2024-32658.json new file mode 100644 index 00000000..d99d1538 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32658.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32658", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vpv3-m3m9-4c2v", + "https://oss-fuzz.com/testcase-detail/4852534033317888", + "https://oss-fuzz.com/testcase-detail/6196819496337408", + "https://github.com/FreeRDP/FreeRDP/commit/1a755d898ddc028cc818d0dd9d49d5acff4c44bf" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" + ], + "product": "FreeRDP", + "vendor": "FreeRDP", + "versions": [ + { + "lessThan": "3.5.1", + "status": "affected", + "version": "3", + "versionType": "custom" + }, + { + "lessThan": "2.11.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32659.json b/data/anchore/2024/CVE-2024-32659.json new file mode 100644 index 00000000..d777366b --- /dev/null +++ b/data/anchore/2024/CVE-2024-32659.json @@ -0,0 +1,41 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32659", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://oss-fuzz.com/testcase-detail/6156779722440704", + "https://github.com/FreeRDP/FreeRDP/commit/6430945ce003a5e24d454d8566f54aae1b6b617b", + "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8jgr-7r33-x87w" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" + ], + "product": "FreeRDP", + "vendor": "FreeRDP", + "versions": [ + { + "lessThan": "3.5.1", + "status": "affected", + "version": "3", + "versionType": "custom" + }, + { + "lessThan": "2.11.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32660.json b/data/anchore/2024/CVE-2024-32660.json new file mode 100644 index 00000000..4fd2861f --- /dev/null +++ b/data/anchore/2024/CVE-2024-32660.json @@ -0,0 +1,41 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32660", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mxv6-2cw6-m3mx", + "https://oss-fuzz.com/testcase-detail/5559242514825216", + "https://github.com/FreeRDP/FreeRDP/commit/5e5d27cf310e4c10b854be7667bfb7a5d774eb47" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" + ], + "product": "FreeRDP", + "vendor": "FreeRDP", + "versions": [ + { + "lessThan": "3.5.1", + "status": "affected", + "version": "3", + "versionType": "custom" + }, + { + "lessThan": "2.11.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32661.json b/data/anchore/2024/CVE-2024-32661.json new file mode 100644 index 00000000..722152bb --- /dev/null +++ b/data/anchore/2024/CVE-2024-32661.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32661", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-p5m5-342g-pv9m", + "https://github.com/FreeRDP/FreeRDP/commit/71e463e31b4d69f4022d36bfc814592f56600793" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" + ], + "product": "FreeRDP", + "vendor": "FreeRDP", + "versions": [ + { + "lessThan": "3.5.1", + "status": "affected", + "version": "3", + "versionType": "custom" + }, + { + "lessThan": "2.11.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32662.json b/data/anchore/2024/CVE-2024-32662.json new file mode 100644 index 00000000..2da7ab84 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32662.json @@ -0,0 +1,41 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32662", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/FreeRDP/FreeRDP/commit/626d10a94a88565d957ddc30768ed08b320049a7", + "https://oss-fuzz.com/testcase-detail/4985227207311360", + "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-vffh-j6hh-95f4" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" + ], + "product": "FreeRDP", + "vendor": "FreeRDP", + "versions": [ + { + "lessThan": "3.5.1", + "status": "affected", + "version": "3", + "versionType": "custom" + }, + { + "lessThan": "2.11.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32663.json b/data/anchore/2024/CVE-2024-32663.json new file mode 100644 index 00000000..7bb21604 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32663.json @@ -0,0 +1,45 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32663", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://redmine.openinfosecfoundation.org/issues/6892", + "https://github.com/OISF/suricata/commit/d24b37a103c04bb2667e449e080ba4c8e56bb019", + "https://github.com/OISF/suricata/commit/08d93f7c3762781b743f88f9fdc4389eb9c3eb64", + "https://github.com/OISF/suricata/commit/c0af92295e833d1db29b184d63cd3b829451d7fd", + "https://redmine.openinfosecfoundation.org/issues/6900", + "https://github.com/OISF/suricata/commit/e68ec4b227d19498f364a41eb25d3182f0383ca5", + "https://github.com/OISF/suricata/security/advisories/GHSA-9jxm-qw9v-266r" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*" + ], + "product": "suricata", + "vendor": "OISF", + "versions": [ + { + "lessThan": "7.0.5", + "status": "affected", + "version": "7.0.0", + "versionType": "custom" + }, + { + "lessThan": "6.0.19", + "status": "affected", + "version": "6.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32664.json b/data/anchore/2024/CVE-2024-32664.json new file mode 100644 index 00000000..d858663a --- /dev/null +++ b/data/anchore/2024/CVE-2024-32664.json @@ -0,0 +1,41 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32664", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/OISF/suricata/commit/311002baf288a225f62cf18a90c5fdd294447379", + "https://github.com/OISF/suricata/security/advisories/GHSA-79vh-hpwq-3jh7", + "https://github.com/OISF/suricata/commit/d5ffecf11ad2c6fe89265e518f5d7443caf26ba4" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*" + ], + "product": "suricata", + "vendor": "OISF", + "versions": [ + { + "lessThan": "6.0.19", + "status": "affected", + "version": "6.0.0", + "versionType": "custom" + }, + { + "lessThan": "7.0.5", + "status": "affected", + "version": "7.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32867.json b/data/anchore/2024/CVE-2024-32867.json new file mode 100644 index 00000000..68d3f435 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32867.json @@ -0,0 +1,48 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32867", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/OISF/suricata/security/advisories/GHSA-xvrx-88mv-xcq5", + "https://redmine.openinfosecfoundation.org/issues/6673", + "https://github.com/OISF/suricata/commit/2f39ba75f153ba9bdf8eedc2a839cc973dbaea66", + "https://github.com/OISF/suricata/commit/e6267758ed5da27f804f0c1c07f9423bdf4d72b8", + "https://github.com/OISF/suricata/commit/414f97c6695c5a2e1d378a36a6f50d7288767634", + "https://github.com/OISF/suricata/commit/d13bd2ae217a6d2ceb347f74d27cbfcd37b9bda9", + "https://github.com/OISF/suricata/commit/1e110d0a71db46571040b937e17a4bc9f91d6de9", + "https://redmine.openinfosecfoundation.org/issues/6677", + "https://github.com/OISF/suricata/commit/bf3d420fb709ebe074019a99e3bd3a2364524a4b", + "https://redmine.openinfosecfoundation.org/issues/6672" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:oisf:suricata:*:*:*:*:*:*:*:*" + ], + "product": "suricata", + "vendor": "OISF", + "versions": [ + { + "lessThan": "6.0.19", + "status": "affected", + "version": "6.0.0", + "versionType": "custom" + }, + { + "lessThan": "7.0.5", + "status": "affected", + "version": "7.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32868.json b/data/anchore/2024/CVE-2024-32868.json new file mode 100644 index 00000000..d8373e31 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32868.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32868", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/zitadel/zitadel/releases/tag/v2.50.0", + "https://github.com/zitadel/zitadel/security/advisories/GHSA-7j7j-66cv-m239" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*" + ], + "product": "zitadel", + "vendor": "zitadel", + "versions": [ + { + "lessThan": "2.50.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32869.json b/data/anchore/2024/CVE-2024-32869.json new file mode 100644 index 00000000..b1a56635 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32869.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32869", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/honojs/hono/commit/92e65fbb6e5e7372650e7690dbd84938432d9e65", + "https://github.com/honojs/hono/security/advisories/GHSA-3mpf-rcc7-5347" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:hono:hono:*:*:*:*:*:node.js:*:*" + ], + "product": "hono", + "vendor": "honojs", + "versions": [ + { + "lessThan": "4.2.7", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32874.json b/data/anchore/2024/CVE-2024-32874.json new file mode 100644 index 00000000..18fc7537 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32874.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32874", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/blakeblackshear/frigate/commit/cc851555e4029647986dccc8b8ecf54afee31442", + "https://github.com/blakeblackshear/frigate/security/advisories/GHSA-w4h6-9wrp-v5jq" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:frigate:frigate:*:*:*:*:*:*:*:*" + ], + "product": "frigate", + "vendor": "blakeblackshear", + "versions": [ + { + "lessThan": "0.13.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32875.json b/data/anchore/2024/CVE-2024-32875.json new file mode 100644 index 00000000..6a603ac6 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32875.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32875", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/gohugoio/hugo/security/advisories/GHSA-ppf8-hhpp-f5hj", + "https://github.com/gohugoio/hugo/releases/tag/v0.125.3", + "https://gohugo.io/getting-started/configuration-markup/#renderhooksimageenabledefault" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:gohugo:hugo:*:*:*:*:*:*:*:*" + ], + "product": "hugo", + "vendor": "gohugoio", + "versions": [ + { + "lessThan": "0.125.3", + "status": "affected", + "version": "0.123.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32880.json b/data/anchore/2024/CVE-2024-32880.json new file mode 100644 index 00000000..22eec62a --- /dev/null +++ b/data/anchore/2024/CVE-2024-32880.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32880", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/pyload/pyload/security/advisories/GHSA-3f7w-p8vr-4v5f" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:pyload-ng_project:pyload-ng:*:*:*:*:*:python:*:*", + "cpe:2.3:a:pyload:pyload:*:*:*:*:*:*:*:*" + ], + "product": "pyload", + "vendor": "pyload", + "versions": [ + { + "lessThanOrEqual": "4.2.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32882.json b/data/anchore/2024/CVE-2024-32882.json new file mode 100644 index 00000000..476821e7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32882.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32882", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://docs.wagtail.org/en/stable/extending/generic_views.html#modelviewset", + "https://docs.wagtail.org/en/stable/reference/pages/panels.html#wagtail.admin.panels.FieldPanel.permission", + "https://github.com/wagtail/wagtail/security/advisories/GHSA-w2v8-php4-p8hc", + "https://github.com/wagtail/wagtail/commit/ab2a5d82b4ee3c909d2456704388ccf90e367c9b", + "https://docs.wagtail.org/en/stable/reference/contrib/settings.html" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:torchbox:wagtail:*:*:*:*:*:*:*:*" + ], + "product": "wagtail", + "vendor": "wagtail", + "versions": [ + { + "lessThan": "6.0.3", + "status": "affected", + "version": "6.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32886.json b/data/anchore/2024/CVE-2024-32886.json new file mode 100644 index 00000000..2ce7e11a --- /dev/null +++ b/data/anchore/2024/CVE-2024-32886.json @@ -0,0 +1,51 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32886", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/vitessio/vitess/blob/8f6cfaaa643a08dc111395a75a2d250ee746cfa8/go/mysql/collations/charset/convert.go#L73-L79", + "https://github.com/vitessio/vitess/commit/d438adf7e34a6cf00fe441db80842ec669a99202", + "https://github.com/vitessio/vitess/commit/2fd5ba1dbf6e9b32fdfdaf869d130066b1b5c0df", + "https://github.com/vitessio/vitess/security/advisories/GHSA-649x-hxfx-57j2", + "https://github.com/vitessio/vitess/commit/c46dc5b6a4329a10589ca928392218d96031ac8d", + "https://github.com/vitessio/vitess/blob/8f6cfaaa643a08dc111395a75a2d250ee746cfa8/go/mysql/collations/charset/unicode/utf16.go#L69-L71", + "https://github.com/vitessio/vitess/commit/9df4b66550e46b5d7079e21ed0e1b0f49f92b055" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:linuxfoundation:vitess:*:*:*:*:*:*:*:*" + ], + "product": "vitess", + "vendor": "vitessio", + "versions": [ + { + "lessThan": "17.0.7", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "18.0.5", + "status": "affected", + "version": "18.0.0", + "versionType": "custom" + }, + { + "lessThan": "19.0.4", + "status": "affected", + "version": "19.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32887.json b/data/anchore/2024/CVE-2024-32887.json new file mode 100644 index 00000000..72a027cc --- /dev/null +++ b/data/anchore/2024/CVE-2024-32887.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32887", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/sidekiq/sidekiq/commit/30786e082c70349ab27ffa9eccc42fb0c696164d", + "https://github.com/sidekiq/sidekiq/security/advisories/GHSA-q655-3pj8-9fxq", + "https://github.com/sidekiq/sidekiq/releases/tag/v7.2.4" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:contribsys:sidekiq:*:*:*:*:*:*:*:*" + ], + "product": "sidekiq", + "vendor": "sidekiq", + "versions": [ + { + "lessThan": "7.2.4", + "status": "affected", + "version": "7.2.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32890.json b/data/anchore/2024/CVE-2024-32890.json new file mode 100644 index 00000000..a2791a7f --- /dev/null +++ b/data/anchore/2024/CVE-2024-32890.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32890", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/librespeed/speedtest/commit/3937b940e80b734acae36cd41a2a31819593e728", + "https://github.com/librespeed/speedtest/security/advisories/GHSA-3954-xrwh-fq4q", + "https://github.com/librespeed/speedtest/commit/dd1ce2cb8830d94dcaa0b8e70b9406144a0e5f8d" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:librespeed:speedtest:*:*:*:*:*:*:*:*" + ], + "product": "speedtest", + "vendor": "librespeed", + "versions": [ + { + "lessThan": "5.3.1", + "status": "affected", + "version": "5.2.5", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32963.json b/data/anchore/2024/CVE-2024-32963.json new file mode 100644 index 00000000..f101fca3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32963.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32963", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/navidrome/navidrome/security/advisories/GHSA-4jrx-5w4h-3gpm" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:navidrome:navidrome:*:*:*:*:*:*:*:*" + ], + "product": "navidrome", + "vendor": "navidrome", + "versions": [ + { + "lessThan": "0.52.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32964.json b/data/anchore/2024/CVE-2024-32964.json new file mode 100644 index 00000000..96aa1452 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32964.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32964", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/lobehub/lobe-chat/commit/465665a735556669ee30446c7ea9049a20cc7c37", + "https://github.com/lobehub/lobe-chat/security/advisories/GHSA-mxhq-xw3g-rphc" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:lobehub:lobe_chat:*:*:*:*:*:*:*:*" + ], + "product": "lobe-chat", + "vendor": "lobehub", + "versions": [ + { + "lessThan": "0.150.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32967.json b/data/anchore/2024/CVE-2024-32967.json new file mode 100644 index 00000000..398a04b5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32967.json @@ -0,0 +1,70 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32967", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/zitadel/zitadel/releases/tag/v2.45.7", + "https://github.com/zitadel/zitadel/releases/tag/v2.46.7", + "https://github.com/zitadel/zitadel/releases/tag/v2.47.10", + "https://github.com/zitadel/zitadel/security/advisories/GHSA-q5qj-x2h5-3945", + "https://github.com/zitadel/zitadel/commit/b918603b576d156a08b90917c14c2d019c82ffc6", + "https://github.com/zitadel/zitadel/releases/tag/v2.48.5", + "https://github.com/zitadel/zitadel/releases/tag/v2.49.5", + "https://github.com/zitadel/zitadel/releases/tag/v2.50.3" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*" + ], + "product": "zitadel", + "vendor": "zitadel", + "versions": [ + { + "lessThan": "2.45.7", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.46.7", + "status": "affected", + "version": "2.46.0", + "versionType": "custom" + }, + { + "lessThan": "2.47.10", + "status": "affected", + "version": "2.47.0", + "versionType": "custom" + }, + { + "lessThan": "2.48.5", + "status": "affected", + "version": "2.48.0", + "versionType": "custom" + }, + { + "lessThan": "2.49.5", + "status": "affected", + "version": "2.49.0", + "versionType": "custom" + }, + { + "lessThan": "2.50.3", + "status": "affected", + "version": "2.50.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32971.json b/data/anchore/2024/CVE-2024-32971.json new file mode 100644 index 00000000..b98eaefd --- /dev/null +++ b/data/anchore/2024/CVE-2024-32971.json @@ -0,0 +1,37 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32971", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://www.apollographql.com/docs/router/configuration/distributed-caching/#distributed-query-plan-caching", + "https://github.com/apollographql/router/security/advisories/GHSA-q9p4-hw9m-fj2v", + "https://github.com/apollographql/router/releases/tag/v1.45.1", + "https://github.com/apollographql/router/commit/ff9f666598cd17661880fe7fc6e9c9611316e529" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:apollographql:apollo_helms-charts_router:*:*:*:*:*:*:*:*", + "cpe:2.3:a:apollographql:apollo_router:*:*:*:*:*:*:*:*" + ], + "product": "router", + "vendor": "apollographql", + "versions": [ + { + "lessThan": "1.45.1", + "status": "affected", + "version": "1.44.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32972.json b/data/anchore/2024/CVE-2024-32972.json new file mode 100644 index 00000000..d9699f55 --- /dev/null +++ b/data/anchore/2024/CVE-2024-32972.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32972", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-4xc9-8hmq-j652", + "https://github.com/ethereum/go-ethereum/compare/v1.13.14...v1.13.15" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:ethereum:go_ethereum:*:*:*:*:*:*:*:*" + ], + "product": "go-ethereum", + "vendor": "ethereum", + "versions": [ + { + "lessThan": "1.13.15", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32977.json b/data/anchore/2024/CVE-2024-32977.json new file mode 100644 index 00000000..2199704a --- /dev/null +++ b/data/anchore/2024/CVE-2024-32977.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32977", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-2vjq-hg5w-5gm7", + "https://github.com/OctoPrint/OctoPrint/commit/5afbec8d23508edc25b0f1bdef1620580136add4" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:*" + ], + "product": "OctoPrint", + "vendor": "OctoPrint", + "versions": [ + { + "lessThan": "1.10.1", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-32979.json b/data/anchore/2024/CVE-2024-32979.json new file mode 100644 index 00000000..5e828dfb --- /dev/null +++ b/data/anchore/2024/CVE-2024-32979.json @@ -0,0 +1,42 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-32979", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/nautobot/nautobot/pull/5646", + "https://github.com/nautobot/nautobot/security/advisories/GHSA-jxgr-gcj5-cqqg", + "https://github.com/nautobot/nautobot/pull/5647", + "https://github.com/nautobot/nautobot/commit/42440ebd9b381534ad89d62420ebea00d703d64e" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:*" + ], + "product": "nautobot", + "vendor": "nautobot", + "versions": [ + { + "lessThan": "1.6.20", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.2.3", + "status": "affected", + "version": "2.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34061.json b/data/anchore/2024/CVE-2024-34061.json new file mode 100644 index 00000000..ecde1276 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34061.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34061", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/dgtlmoon/changedetection.io/commit/c0f000b1d1ce03733460805dbbedde445fe2c762", + "https://github.com/dgtlmoon/changedetection.io/security/advisories/GHSA-pwgc-w4x9-gw67" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:changedetection:changedetection:*:*:*:*:*:*:*:*" + ], + "product": "changedetection.io", + "vendor": "dgtlmoon", + "versions": [ + { + "lessThan": "0.45.22", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34064.json b/data/anchore/2024/CVE-2024-34064.json new file mode 100644 index 00000000..9f480333 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34064.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34064", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/pallets/jinja/commit/0668239dc6b44ef38e7a6c9f91f312fd4ca581cb", + "https://github.com/pallets/jinja/security/advisories/GHSA-h75v-3vvj-5mfj" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:palletsprojects:jinja:*:*:*:*:*:*:*:*" + ], + "product": "jinja", + "vendor": "pallets", + "versions": [ + { + "lessThan": "3.1.4", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34066.json b/data/anchore/2024/CVE-2024-34066.json new file mode 100644 index 00000000..02876037 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34066.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34066", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/pterodactyl/wings/security/advisories/GHSA-gqmf-jqgv-v8fw", + "https://github.com/pterodactyl/wings/commit/5415f8ae07f533623bd8169836dd7e0b933964de" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:pterodactyl:wings:*:*:*:*:*:*:*:*" + ], + "product": "wings", + "vendor": "pterodactyl", + "versions": [ + { + "lessThan": "1.11.12", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34067.json b/data/anchore/2024/CVE-2024-34067.json new file mode 100644 index 00000000..8351fcaa --- /dev/null +++ b/data/anchore/2024/CVE-2024-34067.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34067", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/pterodactyl/panel/commit/1172d71d31561c4e465dabdf6b838e64de48ad16", + "https://github.com/pterodactyl/panel/security/advisories/GHSA-384w-wffr-x63q", + "https://github.com/pterodactyl/panel/commit/0dad4c5a488661f9adc27dd311542516d9bfa0f2", + "https://github.com/pterodactyl/panel/commit/f671046947e4695b5e1c647df79305c1cefdf817" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:pterodactyl:panel:*:*:*:*:*:*:*:*" + ], + "product": "panel", + "vendor": "pterodactyl", + "versions": [ + { + "lessThan": "1.11.6", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34068.json b/data/anchore/2024/CVE-2024-34068.json new file mode 100644 index 00000000..426773db --- /dev/null +++ b/data/anchore/2024/CVE-2024-34068.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34068", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/pterodactyl/wings/security/advisories/GHSA-6rg3-8h8x-5xfv", + "https://github.com/pterodactyl/wings/commit/c152e36101aba45d8868a9a0eeb890995e8934b8", + "https://github.com/pterodactyl/wings/security/advisories/GHSA-qq22-jj8x-4wwv" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:pterodactyl:wings:*:*:*:*:*:*:*:*" + ], + "product": "wings", + "vendor": "pterodactyl", + "versions": [ + { + "lessThan": "1.11.12", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34069.json b/data/anchore/2024/CVE-2024-34069.json new file mode 100644 index 00000000..b3b55e65 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34069.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34069", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/pallets/werkzeug/security/advisories/GHSA-2g68-c3qc-8985", + "https://github.com/pallets/werkzeug/commit/3386395b24c7371db11a5b8eaac0c91da5362692" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:palletsprojects:werkzeug:*:*:*:*:*:*:*:*" + ], + "product": "werkzeug", + "vendor": "pallets", + "versions": [ + { + "lessThan": "3.0.3", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34070.json b/data/anchore/2024/CVE-2024-34070.json new file mode 100644 index 00000000..1969b3f0 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34070.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34070", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/froxlor/Froxlor/commit/a862307bce5cdfb1c208b835f3e8faddd23046e6", + "https://github.com/froxlor/Froxlor/security/advisories/GHSA-x525-54hf-xr53" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:froxlor:froxlor:*:*:*:*:*:*:*:*" + ], + "product": "Froxlor", + "vendor": "froxlor", + "versions": [ + { + "lessThan": "2.1.9", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34074.json b/data/anchore/2024/CVE-2024-34074.json new file mode 100644 index 00000000..65f35a50 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34074.json @@ -0,0 +1,41 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34074", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/frappe/frappe/pull/26304", + "https://github.com/frappe/frappe/security/advisories/GHSA-7g27-q225-j894", + "https://github.com/frappe/frappe/commit/65b3c42635038cdff17d3109be6c373bac004829" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:frappe:frappe:*:*:*:*:*:*:*:*" + ], + "product": "frappe", + "vendor": "frappe", + "versions": [ + { + "lessThan": "15.26.0", + "status": "affected", + "version": "15.0.0", + "versionType": "custom" + }, + { + "lessThan": "14.74.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34077.json b/data/anchore/2024/CVE-2024-34077.json new file mode 100644 index 00000000..cb095248 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34077.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34077", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://mantisbt.org/bugs/view.php?id=34433", + "https://github.com/mantisbt/mantisbt/commit/92d11a01b195a1b6717a2f205218089158ea6d00", + "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-93x3-m7pw-ppqm" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*" + ], + "product": "mantisbt", + "vendor": "mantisbt", + "versions": [ + { + "lessThan": "2.26.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34080.json b/data/anchore/2024/CVE-2024-34080.json new file mode 100644 index 00000000..9bb24689 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34080.json @@ -0,0 +1,36 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34080", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-99jc-wqmr-ff2q", + "https://github.com/mantisbt/mantisbt/commit/0a50562369d823689c9b946066d1e49d3c2df226", + "https://mantisbt.org/bugs/view.php?id=34434", + "https://github.com/mantisbt/mantisbt/pull/2000" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*" + ], + "product": "mantisbt", + "vendor": "mantisbt", + "versions": [ + { + "lessThan": "2.26.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34081.json b/data/anchore/2024/CVE-2024-34081.json new file mode 100644 index 00000000..a38bcdd9 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34081.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34081", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://mantisbt.org/bugs/view.php?id=34432", + "https://github.com/mantisbt/mantisbt/security/advisories/GHSA-wgx7-jp56-65mq", + "https://github.com/mantisbt/mantisbt/commit/447a521aae0f82f791b8116a14a20e276df739be" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*" + ], + "product": "mantisbt", + "vendor": "mantisbt", + "versions": [ + { + "lessThan": "2.26.2", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34340.json b/data/anchore/2024/CVE-2024-34340.json new file mode 100644 index 00000000..e200588d --- /dev/null +++ b/data/anchore/2024/CVE-2024-34340.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34340", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Cacti/cacti/security/advisories/GHSA-37x7-mfjv-mm7m" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:*" + ], + "product": "cacti", + "vendor": "Cacti", + "versions": [ + { + "lessThan": "1.2.27", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34346.json b/data/anchore/2024/CVE-2024-34346.json new file mode 100644 index 00000000..b6ce32a5 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34346.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34346", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/denoland/deno/security/advisories/GHSA-23rx-c3g5-hv9w" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:deno:deno:*:*:*:*:*:*:*:*", + "cpe:2.3:a:deno:deno_runtime:*:*:*:*:*:rust:*:*" + ], + "product": "deno", + "vendor": "denoland", + "versions": [ + { + "lessThan": "1.43.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34347.json b/data/anchore/2024/CVE-2024-34347.json new file mode 100644 index 00000000..fc680f04 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34347.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34347", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/hoppscotch/hoppscotch/commit/22c6eabd133195d22874250a5ae40cb26b851b01", + "https://github.com/hoppscotch/hoppscotch/security/advisories/GHSA-qmmm-73r2-f8xr" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:hoppscotch:hoppscotch:*:*:*:*:*:*:*:*" + ], + "product": "hoppscotch", + "vendor": "hoppscotch", + "versions": [ + { + "lessThan": "0.8.0", + "status": "affected", + "version": "0.5.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34349.json b/data/anchore/2024/CVE-2024-34349.json new file mode 100644 index 00000000..ef3e344f --- /dev/null +++ b/data/anchore/2024/CVE-2024-34349.json @@ -0,0 +1,40 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34349", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/Sylius/Sylius/commit/ba4b66da5af88cdb1bba6174de8bdf42f4853e12", + "https://github.com/Sylius/Sylius/security/advisories/GHSA-v2f9-rv6w-vw8r" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:sylius:sylius:*:*:*:*:*:*:*:*" + ], + "product": "Sylius", + "vendor": "Sylius", + "versions": [ + { + "lessThan": "1.12.16", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "1.13.1", + "status": "affected", + "version": "1.13.0-alpha.1", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34350.json b/data/anchore/2024/CVE-2024-34350.json new file mode 100644 index 00000000..183b84c3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34350.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34350", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/vercel/next.js/security/advisories/GHSA-77r5-gw3j-2mpf" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*" + ], + "product": "next.js", + "vendor": "vercel", + "versions": [ + { + "lessThan": "13.5.1", + "status": "affected", + "version": "13.4.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34351.json b/data/anchore/2024/CVE-2024-34351.json new file mode 100644 index 00000000..0b2b8a0b --- /dev/null +++ b/data/anchore/2024/CVE-2024-34351.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34351", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g", + "https://github.com/vercel/next.js/pull/62561", + "https://github.com/vercel/next.js/commit/8f7a6ca7d21a97bc9f7a1bbe10427b5ad74b9085" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:vercel:next.js:*:*:*:*:*:node.js:*:*" + ], + "product": "next.js", + "vendor": "vercel", + "versions": [ + { + "lessThan": "14.1.1", + "status": "affected", + "version": "13.4.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34352.json b/data/anchore/2024/CVE-2024-34352.json new file mode 100644 index 00000000..de24e603 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34352.json @@ -0,0 +1,33 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34352", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-f8ch-w75v-c847" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:fit2cloud:1panel:*:*:*:*:*:*:*:*" + ], + "product": "1Panel", + "vendor": "1Panel-dev", + "versions": [ + { + "lessThan": "1.10.3-lts", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34355.json b/data/anchore/2024/CVE-2024-34355.json new file mode 100644 index 00000000..9f048c63 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34355.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34355", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/TYPO3/typo3/commit/56afa304ba8b5ad302e15df5def71bcc8d820375", + "https://typo3.org/security/advisory/typo3-core-sa-2024-007", + "https://github.com/TYPO3/typo3/security/advisories/GHSA-xjwx-78x7-q6jc" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" + ], + "product": "typo3", + "vendor": "TYPO3", + "versions": [ + { + "lessThan": "13.1.1", + "status": "affected", + "version": "13.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34356.json b/data/anchore/2024/CVE-2024-34356.json new file mode 100644 index 00000000..c32d38e8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34356.json @@ -0,0 +1,61 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34356", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/TYPO3/typo3/commit/d0393a879a32fb4e3569acad6bdb5cda776be1e5", + "https://github.com/TYPO3/typo3/commit/2832e2f51f929aeddb5de7d667538a33ceda8156", + "https://github.com/TYPO3/typo3/security/advisories/GHSA-v6mw-h7w6-59w3", + "https://typo3.org/security/advisory/typo3-core-sa-2024-008", + "https://github.com/TYPO3/typo3/commit/e95a1224719efafb9cab2d85964f240fd0356e64" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" + ], + "product": "typo3", + "vendor": "TYPO3", + "versions": [ + { + "lessThan": "9.5.48", + "status": "affected", + "version": "9.0.0", + "versionType": "custom" + }, + { + "lessThan": "10.4.45", + "status": "affected", + "version": "10.0.0", + "versionType": "custom" + }, + { + "lessThan": "11.5.37", + "status": "affected", + "version": "11.0.0", + "versionType": "custom" + }, + { + "lessThan": "12.4.15", + "status": "affected", + "version": "12.0.0", + "versionType": "custom" + }, + { + "lessThan": "13.1.1", + "status": "affected", + "version": "13.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34357.json b/data/anchore/2024/CVE-2024-34357.json new file mode 100644 index 00000000..b108e134 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34357.json @@ -0,0 +1,61 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34357", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/TYPO3/typo3/commit/d774642381354d3bf5095a5a26e18acd2767f0b1", + "https://github.com/TYPO3/typo3/security/advisories/GHSA-hw6c-6gwq-3m3m", + "https://github.com/TYPO3/typo3/commit/376474904f6b9a54dc1b785a2e45277cbd13b0d7", + "https://github.com/TYPO3/typo3/commit/b31d05d1da3eeaeead2d19eb43b1c3f9c88e15ee", + "https://typo3.org/security/advisory/typo3-core-sa-2024-009" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" + ], + "product": "typo3", + "vendor": "TYPO3", + "versions": [ + { + "lessThan": "9.5.48", + "status": "affected", + "version": "9.0.0", + "versionType": "custom" + }, + { + "lessThan": "10.4.45", + "status": "affected", + "version": "10.0.0", + "versionType": "custom" + }, + { + "lessThan": "11.5.37", + "status": "affected", + "version": "11.0.0", + "versionType": "custom" + }, + { + "lessThan": "12.4.15", + "status": "affected", + "version": "12.0.0", + "versionType": "custom" + }, + { + "lessThan": "13.1.1", + "status": "affected", + "version": "13.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34358.json b/data/anchore/2024/CVE-2024-34358.json new file mode 100644 index 00000000..a5f1e2d2 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34358.json @@ -0,0 +1,61 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34358", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/TYPO3/typo3/commit/1e70ebf736935413b0531004839362b4fb0755a5", + "https://typo3.org/security/advisory/typo3-core-sa-2024-010", + "https://github.com/TYPO3/typo3/commit/05c95fed869a1a6dcca06c7077b83b6ea866ff14", + "https://github.com/TYPO3/typo3/security/advisories/GHSA-36g8-62qv-5957", + "https://github.com/TYPO3/typo3/commit/df7909b6a1cf0f12a42994d0cc3376b607746142" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" + ], + "product": "typo3", + "vendor": "TYPO3", + "versions": [ + { + "lessThan": "9.5.48", + "status": "affected", + "version": "9.0.0", + "versionType": "custom" + }, + { + "lessThan": "10.4.45", + "status": "affected", + "version": "10.0.0", + "versionType": "custom" + }, + { + "lessThan": "11.5.37", + "status": "affected", + "version": "11.0.0", + "versionType": "custom" + }, + { + "lessThan": "12.4.15", + "status": "affected", + "version": "12.0.0", + "versionType": "custom" + }, + { + "lessThan": "13.1.1", + "status": "affected", + "version": "13.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34701.json b/data/anchore/2024/CVE-2024-34701.json new file mode 100644 index 00000000..9994884a --- /dev/null +++ b/data/anchore/2024/CVE-2024-34701.json @@ -0,0 +1,39 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34701", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://issue-tracker.miraheze.org/T12102", + "https://github.com/miraheze/CreateWiki/security/advisories/GHSA-89fx-77w7-rc64", + "https://github.com/miraheze/mw-config/commit/1798e53901a202b62edab32f8bcd5c6b9e574191", + "https://github.com/miraheze/mw-config/commit/e5664995fbb8644f9a80b450b4326194f20f9ddc", + "https://issue-tracker.miraheze.org/T12011", + "https://github.com/miraheze/CreateWiki/commit/02e0f298f8d35155c39aa74193cb7b867432c5b8" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:miraheze:createwiki:*:*:*:*:*:*:*:*" + ], + "product": "CreateWiki", + "vendor": "miraheze", + "repo": "https://github.com/miraheze/CreateWiki", + "versions": [ + { + "lessThan": "02e0f298f8d35155c39aa74193cb7b867432c5b8", + "status": "affected", + "version": "0", + "versionType": "git" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34707.json b/data/anchore/2024/CVE-2024-34707.json new file mode 100644 index 00000000..cc83395e --- /dev/null +++ b/data/anchore/2024/CVE-2024-34707.json @@ -0,0 +1,43 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34707", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/nautobot/nautobot/commit/f640aedc69c848d3d1be57f0300fc40033ff6423", + "https://github.com/nautobot/nautobot/pull/5697", + "https://github.com/nautobot/nautobot/commit/4f0a66bd6307bfe0e0acb899233e0d4ad516f51c", + "https://github.com/nautobot/nautobot/security/advisories/GHSA-r2hr-4v48-fjv3", + "https://github.com/nautobot/nautobot/pull/5698" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:networktocode:nautobot:*:*:*:*:*:*:*:*" + ], + "product": "nautobot", + "vendor": "nautobot", + "versions": [ + { + "lessThan": "1.6.22", + "status": "affected", + "version": "0", + "versionType": "custom" + }, + { + "lessThan": "2.2.4", + "status": "affected", + "version": "2.0.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34708.json b/data/anchore/2024/CVE-2024-34708.json new file mode 100644 index 00000000..afa598f7 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34708.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34708", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/directus/directus/security/advisories/GHSA-p8v3-m643-4xqx", + "https://github.com/directus/directus/commit/e70a90c267bea695afce6545174c2b77517d617b" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", + "cpe:2.3:a:rangerstudio:directus:*:*:*:*:*:node.js:*:*" + ], + "product": "directus", + "vendor": "directus", + "versions": [ + { + "lessThan": "10.11.0", + "status": "affected", + "version": "0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34709.json b/data/anchore/2024/CVE-2024-34709.json new file mode 100644 index 00000000..b68c444a --- /dev/null +++ b/data/anchore/2024/CVE-2024-34709.json @@ -0,0 +1,35 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34709", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/directus/directus/security/advisories/GHSA-g65h-35f3-x2w3", + "https://github.com/directus/directus/commit/a6172f8a6a0f31a6bf4305a090de172ebfb63bcf" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", + "cpe:2.3:a:rangerstudio:directus:*:*:*:*:*:node.js:*:*" + ], + "product": "directus", + "vendor": "directus", + "versions": [ + { + "lessThan": "10.11.0", + "status": "affected", + "version": "10.10.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34716.json b/data/anchore/2024/CVE-2024-34716.json new file mode 100644 index 00000000..4fbf9ac8 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34716.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34716", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/PrestaShop/PrestaShop/releases/tag/8.1.6", + "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-45vm-3j38-7p78" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*" + ], + "product": "PrestaShop", + "vendor": "PrestaShop", + "versions": [ + { + "lessThan": "8.1.6", + "status": "affected", + "version": "8.1.0", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file diff --git a/data/anchore/2024/CVE-2024-34717.json b/data/anchore/2024/CVE-2024-34717.json new file mode 100644 index 00000000..c7bd0cf3 --- /dev/null +++ b/data/anchore/2024/CVE-2024-34717.json @@ -0,0 +1,34 @@ +{ + "additionalMetadata": { + "cna": "github_m", + "cveId": "CVE-2024-34717", + "reason": "Added CPE configurations because not yet analyzed by NVD.", + "references": [ + "https://github.com/PrestaShop/PrestaShop/releases/tag/8.1.6", + "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-7pjr-2rgh-fc5g" + ] + }, + "adp": { + "affected": [ + { + "cpes": [ + "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*" + ], + "product": "PrestaShop", + "vendor": "PrestaShop", + "versions": [ + { + "lessThan": "8.1.6", + "status": "affected", + "version": "8.1.5", + "versionType": "custom" + } + ] + } + ], + "providerMetadata": { + "orgId": "00000000-0000-4000-8000-000000000000", + "shortName": "anchoreadp" + } + } +} \ No newline at end of file