-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Signed-off-by: Weston Steimel <[email protected]>
- Loading branch information
1 parent
c9dddd4
commit 8485910
Showing
16 changed files
with
597 additions
and
10 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "wordfence", | ||
"cveId": "CVE-2023-6947", | ||
"description": "The Best WordPress Gallery Plugin – FooGallery plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.4.26. This makes it possible for authenticated attackers, with contributor level or higher to read the contents of arbitrary folders on the server, which can contain sensitive information such as folder structure.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://github.com/fooplugins/foogallery/pull/263/commits/9989f6f4f4d478ec04cb634d09b18c87a5b31c4d", | ||
"https://www.wordfence.com/threat-intel/vulnerabilities/id/68420c5a-4add-4597-bd2a-20dc831e81bd?source=cve" | ||
], | ||
"upstream": { | ||
"datePublished": "2024-12-10T05:24:41.940Z", | ||
"dateReserved": "2023-12-19T15:10:40.265Z", | ||
"dateUpdated": "2024-12-10T20:54:03.539Z", | ||
"digest": "1a3a80d85fdf295f8f8c5a0ee42c67bf2442eaa278c871ce3849a9174d2348eb" | ||
} | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"cpes": [ | ||
"cpe:2.3:a:fooplugins:foogallery:*:*:*:*:*:wordpress:*:*" | ||
], | ||
"packageName": "foogallery-premium", | ||
"packageType": "wordpress-plugin", | ||
"product": "FooGallery Premium", | ||
"repo": "https://plugins.svn.wordpress.org/foogallery", | ||
"vendor": "https://fooplugins.com", | ||
"versions": [ | ||
{ | ||
"lessThan": "2.4.27", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,44 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "wpscan", | ||
"cveId": "CVE-2024-10708", | ||
"description": "The System Dashboard WordPress plugin before 2.8.15 does not validate user input used in a path, which could allow high privilege users such as admin to perform path traversal attacks an read arbitrary files on the server", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://wpscan.com/vulnerability/61d750a5-8c2c-4c94-a1a9-6a254c2a0d03/" | ||
], | ||
"upstream": { | ||
"datePublished": "2024-12-10T06:00:01.931Z", | ||
"dateReserved": "2024-11-01T19:02:01.104Z", | ||
"dateUpdated": "2024-12-10T15:27:29.260Z", | ||
"digest": "4a572e1287ac1622ca3e1e4a56b182b3a073e455eccf3c57a990fd0e14bc50ec" | ||
} | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"cpes": [ | ||
"cpe:2.3:a:bowo:system_dashboard:*:*:*:*:*:wordpress:*:*" | ||
], | ||
"packageName": "system-dashboard", | ||
"packageType": "wordpress-plugin", | ||
"product": "System Dashboard", | ||
"repo": "https://plugins.svn.wordpress.org/system-dashboard", | ||
"vendor": "bowo", | ||
"versions": [ | ||
{ | ||
"lessThan": "2.8.15", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "wordfence", | ||
"cveId": "CVE-2024-10959", | ||
"description": "The The Active Products Tables for WooCommerce. Use constructor to create tables plugin for WordPress is vulnerable to arbitrary shortcode execution via woot_get_smth AJAX action in all versions up to, and including, 1.0.6.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://plugins.trac.wordpress.org/browser/profit-products-tables-for-woocommerce/trunk/index.php#L1666", | ||
"https://plugins.trac.wordpress.org/changeset/3199368/", | ||
"https://wordpress.org/plugins/profit-products-tables-for-woocommerce/#developers", | ||
"https://www.wordfence.com/threat-intel/vulnerabilities/id/ecf803cf-1b9c-4d2e-863f-d1f51b08f833?source=cve" | ||
], | ||
"upstream": { | ||
"datePublished": "2024-12-10T11:09:12.310Z", | ||
"dateReserved": "2024-11-07T00:02:14.604Z", | ||
"dateUpdated": "2024-12-10T15:00:50.546Z", | ||
"digest": "2cad64b4445f72eb4f78ce0e30566db603cd408b860db7b8742f14814efa11ae" | ||
} | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"cpes": [ | ||
"cpe:2.3:a:pluginus:woot:*:*:*:*:*:wordpress:*:*" | ||
], | ||
"packageName": "profit-products-tables-for-woocommerce", | ||
"packageType": "wordpress-plugin", | ||
"product": "Active Products Tables for WooCommerce. Use constructor to create tables", | ||
"repo": "https://plugins.svn.wordpress.org/profit-products-tables-for-woocommerce", | ||
"vendor": "realmag777", | ||
"versions": [ | ||
{ | ||
"lessThan": "1.0.6.6", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,44 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "wpscan", | ||
"cveId": "CVE-2024-11107", | ||
"description": "The System Dashboard WordPress plugin before 2.8.15 does not sanitise and escape some parameters when outputting them in the page, which could allow unauthenticated users to perform Cross-Site Scripting attacks.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://wpscan.com/vulnerability/a89f1117-8df3-417b-b54f-6587545833ee/" | ||
], | ||
"upstream": { | ||
"datePublished": "2024-12-10T06:00:02.187Z", | ||
"dateReserved": "2024-11-11T21:26:58.732Z", | ||
"dateUpdated": "2024-12-10T15:15:07.287Z", | ||
"digest": "4a572e1287ac1622ca3e1e4a56b182b3a073e455eccf3c57a990fd0e14bc50ec" | ||
} | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"cpes": [ | ||
"cpe:2.3:a:bowo:system_dashboard:*:*:*:*:*:wordpress:*:*" | ||
], | ||
"packageName": "system-dashboard", | ||
"packageType": "wordpress-plugin", | ||
"product": "System Dashboard", | ||
"repo": "https://plugins.svn.wordpress.org/system-dashboard", | ||
"vendor": "bowo", | ||
"versions": [ | ||
{ | ||
"lessThan": "2.8.15", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "wordfence", | ||
"cveId": "CVE-2024-11868", | ||
"description": "The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.7.3 via class-lp-rest-material-controller.php. This makes it possible for unauthenticated attackers to extract potentially sensitive paid course material.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://plugins.trac.wordpress.org/changeset/3200780/learnpress", | ||
"https://www.wordfence.com/threat-intel/vulnerabilities/id/7bd43980-9193-4a63-adba-720dd1b11699?source=cve" | ||
], | ||
"upstream": { | ||
"datePublished": "2024-12-10T12:24:59.516Z", | ||
"dateReserved": "2024-11-27T15:10:11.982Z", | ||
"dateUpdated": "2024-12-10T14:56:15.813Z", | ||
"digest": "841ff76a272d640ca3807f65e31257873b3a372e8d7ccf92d87abf1e1a121eb2" | ||
} | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"cpes": [ | ||
"cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*" | ||
], | ||
"packageName": "learnpress", | ||
"packageType": "wordpress-plugin", | ||
"product": "LearnPress – WordPress LMS Plugin", | ||
"repo": "https://plugins.svn.wordpress.org/learnpress", | ||
"vendor": "thimpress", | ||
"versions": [ | ||
{ | ||
"lessThan": "4.2.7.4", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.