Skip to content

Commit 52a3429

Browse files
committed
enrichment 2026-02-19
Signed-off-by: Weston Steimel <author@code.w.steimel.me.uk>
1 parent 233cdf2 commit 52a3429

File tree

82 files changed

+4817
-6
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

82 files changed

+4817
-6
lines changed
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
[schema]
2+
version = "0.1.0"
3+
4+
[snapshot]
5+
captured = 2026-02-19T11:15:54.661427Z
6+
[[snapshot.cve5]]
7+
id = "CVE-2024-43784"
8+
published = 2024-11-26T20:17:56.482000Z
9+
reserved = 2024-08-16T14:20:37.323000Z
10+
updated = 2024-11-26T21:37:39.411000Z
11+
12+
[snapshot.cve5.digest]
13+
xxh128 = "a724cfb84f63528361489d00651332e3"
14+
15+
[snapshot.cve5.overview]
16+
urls = ["https://nvd.nist.gov/vuln/detail/CVE-2024-43784"]
17+
cna = "github_m"
18+
description = """lakeFS is an open-source tool that transforms object storage into a Git-like repository. Existing lakeFS users who have issued credentials to users who have been deleted are affected by this vulnerability. When creating a new user with the same username as a deleted user, that user will inherit all of the previous user's credentials. This issue has been addressed in release version 1.33.0 and all users are advised to upgrade. The only known workaround for those who cannot upgrade is to not reuse usernames."""
19+
references = [
20+
"https://github.com/treeverse/lakeFS/releases/tag/v1.33.0",
21+
"https://github.com/treeverse/lakeFS/security/advisories/GHSA-hh33-46q4-hwm2",
22+
]
23+
[[snapshot.nvd]]
24+
id = "CVE-2024-43784"
25+
published = 2024-11-26T21:15:07.160000
26+
updated = 2024-11-26T21:15:07.160000
27+
28+
29+
[curator]
30+
31+
[vuln]
32+
id = "ANCHORE-2024-36962"
33+
34+
[[vuln.providers.nvd]]
35+
id = "CVE-2024-43784"
36+
37+
[vuln.providers.nvd.enrichment]
38+
reason = "Added CPE configurations because not yet analyzed by NVD."
39+
40+
[[vuln.providers.nvd.products.override.go-module]]
41+
vendor = "treeverse"
42+
product = "lakeFS"
43+
package_name = "github.com/treeverse/lakefs"
44+
collection_url = "https://pkg.go.dev"
45+
[[vuln.providers.nvd.products.override.go-module.source]]
46+
url = "https://github.com/treeverse/lakefs"
47+
[[vuln.providers.nvd.products.override.go-module.cpe]]
48+
vendor = "lakefs"
49+
product = "lakefs"
50+
target_software = "go"
51+
[[vuln.providers.nvd.products.override.go-module.affected]]
52+
[vuln.providers.nvd.products.override.go-module.affected.version]
53+
scheme = "custom"
54+
greater_than_or_equal = "1.31.1"
55+
less_than = "1.33.0"
56+
[[vuln.providers.nvd.products.override.go-module.affected.remediation]]
57+
version = "1.33.0"
Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,56 @@
1+
[schema]
2+
version = "0.1.0"
3+
4+
[snapshot]
5+
captured = 2026-02-19T11:15:11.282172Z
6+
[[snapshot.cve5]]
7+
id = "CVE-2024-31118"
8+
published = 2026-02-17T15:04:26.093000Z
9+
reserved = 2024-03-28T06:58:24.005000Z
10+
updated = 2026-02-17T15:22:50.118000Z
11+
12+
[snapshot.cve5.digest]
13+
xxh128 = "ab8ddbe566ef252ee6611c651459640b"
14+
15+
[snapshot.cve5.overview]
16+
urls = ["https://nvd.nist.gov/vuln/detail/CVE-2024-31118"]
17+
cna = "patchstack"
18+
description = """Missing Authorization vulnerability in Smartypants SP Project & Document Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SP Project & Document Manager: from n/a through 4.70."""
19+
references = [
20+
"https://patchstack.com/database/wordpress/plugin/sp-client-document-manager/vulnerability/wordpress-sp-project-document-manager-plugin-4-70-broken-access-control-to-xss-vulnerability?_s_id=cve",
21+
]
22+
[[snapshot.nvd]]
23+
id = "CVE-2024-31118"
24+
published = 2026-02-17T15:16:05.817000
25+
updated = 2026-02-18T17:52:22.253000
26+
27+
28+
[curator]
29+
30+
[vuln]
31+
id = "ANCHORE-2024-53646"
32+
33+
[[vuln.providers.nvd]]
34+
id = "CVE-2024-31118"
35+
36+
[vuln.providers.nvd.enrichment]
37+
reason = "Added CPE configurations because not yet analyzed by NVD."
38+
39+
[[vuln.providers.nvd.products.override.wordpress-plugin]]
40+
vendor = "Smartypants"
41+
product = "SP Project & Document Manager"
42+
package_name = "sp-client-document-manager"
43+
collection_url = "https://wordpress.org/plugins"
44+
[[vuln.providers.nvd.products.override.wordpress-plugin.source]]
45+
url = "https://plugins.svn.wordpress.org/sp-client-document-manager"
46+
[[vuln.providers.nvd.products.override.wordpress-plugin.cpe]]
47+
vendor = "smartypantsplugins"
48+
product = "sp_project_\\&_document_manager"
49+
target_software = "wordpress"
50+
[[vuln.providers.nvd.products.override.wordpress-plugin.affected]]
51+
[vuln.providers.nvd.products.override.wordpress-plugin.affected.version]
52+
scheme = "custom"
53+
greater_than_or_equal = "0"
54+
less_than_or_equal = "4.70"
55+
[[vuln.providers.nvd.references.merge]]
56+
url = "https://www.wordfence.com/threat-intel/vulnerabilities/id/31cb7a9d-8965-49cd-b1fb-0d141038a0e1?source=cve"

data/2025/236/ANCHORE-2025-236050.toml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,6 @@ id = "ANCHORE-2025-236050"
4141
[[vuln.providers.nvd.products.override.cve5]]
4242
vendor = "NVIDIA"
4343
product = "NeMo Framework"
44-
platforms = ["All platforms"]
4544
[[vuln.providers.nvd.products.override.cve5.cpe]]
4645
vendor = "nvidia"
4746
product = "nemo_framework"

data/2025/236/ANCHORE-2025-236051.toml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,6 @@ id = "ANCHORE-2025-236051"
4141
[[vuln.providers.nvd.products.override.cve5]]
4242
vendor = "NVIDIA"
4343
product = "NeMo Framework"
44-
platforms = ["All platforms"]
4544
[[vuln.providers.nvd.products.override.cve5.cpe]]
4645
vendor = "nvidia"
4746
product = "nemo_framework"
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
[schema]
2+
version = "0.1.0"
3+
4+
[snapshot]
5+
captured = 2026-02-19T11:13:49.974356Z
6+
[[snapshot.cve5]]
7+
id = "CVE-2025-54059"
8+
published = 2025-07-18T15:40:43.277000Z
9+
reserved = 2025-07-16T13:22:18.203000Z
10+
updated = 2025-07-18T16:04:30.154000Z
11+
12+
[snapshot.cve5.digest]
13+
xxh128 = "258d216537d227f58707d1b90ed33504"
14+
15+
[snapshot.cve5.overview]
16+
urls = ["https://nvd.nist.gov/vuln/detail/CVE-2025-54059"]
17+
cna = "github_m"
18+
description = """melange allows users to build apk packages using declarative pipelines. Starting in version 0.23.0 and prior to version 0.29.5, SBOM files generated by melange in apks had file system permissions mode 666. This potentially allows an unprivileged user to tamper with apk SBOMs on a running image, potentially confusing security scanners. An attacker could also perform a DoS under special circumstances. Version 0.29.5 fixes the issue."""
19+
references = [
20+
"https://github.com/chainguard-dev/melange/commit/1b272db2a0bb3441553284cc56d87236b4b64c04",
21+
"https://github.com/chainguard-dev/melange/commit/e29494b4a40a91619ec1c87a09003c6d5164cea1",
22+
"https://github.com/chainguard-dev/melange/pull/1836",
23+
"https://github.com/chainguard-dev/melange/pull/2086",
24+
"https://github.com/chainguard-dev/melange/releases/tag/v0.23.0",
25+
"https://github.com/chainguard-dev/melange/releases/tag/v0.29.5",
26+
"https://github.com/chainguard-dev/melange/security/advisories/GHSA-5662-cv6m-63wh",
27+
]
28+
[[snapshot.nvd]]
29+
id = "CVE-2025-54059"
30+
published = 2025-07-18T16:15:30.180000
31+
updated = 2025-07-22T13:06:27.983000
32+
33+
34+
[curator]
35+
36+
[vuln]
37+
id = "ANCHORE-2025-27043"
38+
39+
[[vuln.providers.nvd]]
40+
id = "CVE-2025-54059"
41+
42+
[vuln.providers.nvd.enrichment]
43+
reason = "Added CPE configurations because not yet analyzed by NVD."
44+
45+
[[vuln.providers.nvd.products.override.go-module]]
46+
vendor = "chainguard-dev"
47+
product = "melange"
48+
package_name = "chainguard.dev/melange"
49+
collection_url = "https://pkg.go.dev"
50+
[[vuln.providers.nvd.products.override.go-module.source]]
51+
url = "https://github.com/chainguard-dev/melange"
52+
[[vuln.providers.nvd.products.override.go-module.cpe]]
53+
vendor = "chainguard"
54+
product = "melange"
55+
target_software = "go"
56+
[[vuln.providers.nvd.products.override.go-module.affected]]
57+
[vuln.providers.nvd.products.override.go-module.affected.version]
58+
scheme = "custom"
59+
greater_than_or_equal = "0.23.0"
60+
less_than = "0.29.5"
61+
[[vuln.providers.nvd.products.override.go-module.affected.remediation]]
62+
version = "0.29.5"

data/2025/6/ANCHORE-2025-6689.toml

Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
[schema]
2+
version = "0.1.0"
3+
4+
[snapshot]
5+
captured = 2026-02-19T11:14:18.173222Z
6+
[[snapshot.cve5]]
7+
id = "CVE-2025-27100"
8+
published = 2025-02-21T00:03:01.411000Z
9+
reserved = 2025-02-18T16:44:48.765000Z
10+
updated = 2025-02-21T17:22:59.322000Z
11+
12+
[snapshot.cve5.digest]
13+
xxh128 = "7d2d32c5f02cd3a02d5687ab6d5f80e0"
14+
15+
[snapshot.cve5.overview]
16+
urls = ["https://nvd.nist.gov/vuln/detail/CVE-2025-27100"]
17+
cna = "github_m"
18+
description = """lakeFS is an open-source tool that transforms your object storage into a Git-like repository. In affected versions an authenticated user can crash lakeFS by exhausting server memory. This is an authenticated denial-of-service issue. This problem has been patched in version 1.50.0. Users on versions 1.49.1 and below are affected. Users are advised to upgrade. Users unable to upgrade should either set the environment variable `LAKEFS_BLOCKSTORE_S3_DISABLE_PRE_SIGNED_MULTIPART` to `true` or configure the `disable_pre_signed_multipart` key to true in their config yaml."""
19+
references = [
20+
"https://github.com/treeverse/lakeFS/commit/3a625752acdf3f8e137bec20451e71d0f9fa82f2",
21+
"https://github.com/treeverse/lakeFS/security/advisories/GHSA-j7jw-28jm-whr6",
22+
]
23+
[[snapshot.nvd]]
24+
id = "CVE-2025-27100"
25+
published = 2025-02-21T00:15:09.250000
26+
updated = 2025-02-21T00:15:09.250000
27+
28+
29+
[curator]
30+
31+
[vuln]
32+
id = "ANCHORE-2025-6689"
33+
34+
[[vuln.providers.nvd]]
35+
id = "CVE-2025-27100"
36+
37+
[vuln.providers.nvd.enrichment]
38+
reason = "Added CPE configurations because not yet analyzed by NVD."
39+
40+
[[vuln.providers.nvd.products.override.go-module]]
41+
vendor = "treeverse"
42+
product = "lakeFS"
43+
package_name = "github.com/treeverse/lakefs"
44+
collection_url = "https://pkg.go.dev"
45+
[[vuln.providers.nvd.products.override.go-module.source]]
46+
url = "https://github.com/treeverse/lakefs"
47+
[[vuln.providers.nvd.products.override.go-module.cpe]]
48+
vendor = "lakefs"
49+
product = "lakefs"
50+
target_software = "go"
51+
[[vuln.providers.nvd.products.override.go-module.affected]]
52+
[vuln.providers.nvd.products.override.go-module.affected.version]
53+
scheme = "custom"
54+
greater_than_or_equal = "0"
55+
less_than = "1.50.0"
56+
[[vuln.providers.nvd.products.override.go-module.affected.remediation]]
57+
version = "1.50.0"
Lines changed: 57 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,57 @@
1+
[schema]
2+
version = "0.1.0"
3+
4+
[snapshot]
5+
captured = 2026-02-19T11:13:41.509260Z
6+
[[snapshot.cve5]]
7+
id = "CVE-2025-64179"
8+
published = 2025-11-06T21:57:18.234000Z
9+
reserved = 2025-10-28T21:07:16.440000Z
10+
updated = 2025-11-07T13:24:42.263000Z
11+
12+
[snapshot.cve5.digest]
13+
xxh128 = "d46f3058952d7619d86798e9bedb1e2e"
14+
15+
[snapshot.cve5.overview]
16+
urls = ["https://nvd.nist.gov/vuln/detail/CVE-2025-64179"]
17+
cna = "github_m"
18+
description = """lakeFS is an open-source tool that transforms object storage into a Git-like repositories. In versions 1.69.0 and below, missing authentication in the /api/v1/usage-report/summary endpoint allows anyone to retrieve aggregate API usage counts. While no sensitive data is disclosed, the endpoint may reveal information about service activity or uptime. This issue is fixed in version 1.71.0 . To workaround the vulnerability, use a load-balancer or application level firewall in order to block the request route /api/v1/usage-report/summary."""
19+
references = [
20+
"https://github.com/treeverse/lakeFS/commit/1c8adab852dac2387fcb00a256402b308a610c60",
21+
"https://github.com/treeverse/lakeFS/security/advisories/GHSA-h238-5mwf-8xw8",
22+
]
23+
[[snapshot.nvd]]
24+
id = "CVE-2025-64179"
25+
published = 2025-11-06T22:15:44.463000
26+
updated = 2025-11-12T16:20:22.257000
27+
28+
29+
[curator]
30+
31+
[vuln]
32+
id = "ANCHORE-2025-91220"
33+
34+
[[vuln.providers.nvd]]
35+
id = "CVE-2025-64179"
36+
37+
[vuln.providers.nvd.enrichment]
38+
reason = "Added CPE configurations because not yet analyzed by NVD."
39+
40+
[[vuln.providers.nvd.products.override.go-module]]
41+
vendor = "treeverse"
42+
product = "lakeFS"
43+
package_name = "github.com/treeverse/lakefs"
44+
collection_url = "https://pkg.go.dev"
45+
[[vuln.providers.nvd.products.override.go-module.source]]
46+
url = "https://github.com/treeverse/lakefs"
47+
[[vuln.providers.nvd.products.override.go-module.cpe]]
48+
vendor = "lakefs"
49+
product = "lakefs"
50+
target_software = "go"
51+
[[vuln.providers.nvd.products.override.go-module.affected]]
52+
[vuln.providers.nvd.products.override.go-module.affected.version]
53+
scheme = "custom"
54+
greater_than_or_equal = "0"
55+
less_than = "1.71.0"
56+
[[vuln.providers.nvd.products.override.go-module.affected.remediation]]
57+
version = "1.71.0"
Lines changed: 75 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,75 @@
1+
[schema]
2+
version = "0.1.0"
3+
4+
[snapshot]
5+
captured = 2026-02-19T11:13:41.626836Z
6+
[[snapshot.cve5]]
7+
id = "CVE-2025-64513"
8+
published = 2025-11-10T22:05:14.744000Z
9+
reserved = 2025-11-05T21:15:39.400000Z
10+
updated = 2025-11-12T20:13:31.847000Z
11+
12+
[snapshot.cve5.digest]
13+
xxh128 = "dae34b1f06c95241e241c491ebaeb708"
14+
15+
[snapshot.cve5.overview]
16+
urls = ["https://nvd.nist.gov/vuln/detail/CVE-2025-64513"]
17+
cna = "github_m"
18+
description = """Milvus is an open-source vector database built for generative AI applications. An unauthenticated attacker can exploit a vulnerability in versions prior to 2.4.24, 2.5.21, and 2.6.5 to bypass all authentication mechanisms in the Milvus Proxy component, gaining full administrative access to the Milvus cluster. This grants the attacker the ability to read, modify, or delete data, and to perform privileged administrative operations such as database or collection management. This issue has been fixed in Milvus 2.4.24, 2.5.21, and 2.6.5. If immediate upgrade is not possible, a temporary mitigation can be applied by removing the sourceID header from all incoming requests at the gateway, API gateway, or load balancer level before they reach the Milvus Proxy. This prevents attackers from exploiting the authentication bypass behavior."""
19+
references = [
20+
"https://github.com/milvus-io/milvus/pull/45379",
21+
"https://github.com/milvus-io/milvus/pull/45383",
22+
"https://github.com/milvus-io/milvus/pull/45391",
23+
"https://github.com/milvus-io/milvus/security/advisories/GHSA-mhjq-8c7m-3f7p",
24+
]
25+
[[snapshot.nvd]]
26+
id = "CVE-2025-64513"
27+
published = 2025-11-10T22:15:40.270000
28+
updated = 2025-11-12T16:19:59.103000
29+
30+
31+
[curator]
32+
33+
[vuln]
34+
id = "ANCHORE-2025-97636"
35+
36+
[[vuln.providers.nvd]]
37+
id = "CVE-2025-64513"
38+
39+
[vuln.providers.nvd.enrichment]
40+
reason = "Added CPE configurations because not yet analyzed by NVD."
41+
42+
[[vuln.providers.nvd.products.override.go-module]]
43+
vendor = "milvus-io"
44+
product = "milvus"
45+
package_name = "github.com/milvus-io/milvus"
46+
collection_url = "https://pkg.go.dev"
47+
[[vuln.providers.nvd.products.override.go-module.source]]
48+
url = "https://github.com/milvus-io/milvus"
49+
[[vuln.providers.nvd.products.override.go-module.cpe]]
50+
vendor = "milvus"
51+
product = "milvus"
52+
target_software = "go"
53+
[[vuln.providers.nvd.products.override.go-module.affected]]
54+
[vuln.providers.nvd.products.override.go-module.affected.version]
55+
scheme = "custom"
56+
greater_than_or_equal = "0"
57+
less_than = "2.4.24"
58+
[[vuln.providers.nvd.products.override.go-module.affected.remediation]]
59+
version = "2.4.24"
60+
61+
[[vuln.providers.nvd.products.override.go-module.affected]]
62+
[vuln.providers.nvd.products.override.go-module.affected.version]
63+
scheme = "custom"
64+
greater_than_or_equal = "2.5.0"
65+
less_than = "2.5.21"
66+
[[vuln.providers.nvd.products.override.go-module.affected.remediation]]
67+
version = "2.5.21"
68+
69+
[[vuln.providers.nvd.products.override.go-module.affected]]
70+
[vuln.providers.nvd.products.override.go-module.affected.version]
71+
scheme = "custom"
72+
greater_than_or_equal = "2.6.0"
73+
less_than = "2.6.5"
74+
[[vuln.providers.nvd.products.override.go-module.affected.remediation]]
75+
version = "2.6.5"

0 commit comments

Comments
 (0)