Skip to content

Commit

Permalink
updates 2024-12-11
Browse files Browse the repository at this point in the history
Signed-off-by: Weston Steimel <[email protected]>
  • Loading branch information
westonsteimel committed Dec 11, 2024
1 parent c9dddd4 commit 8485910
Show file tree
Hide file tree
Showing 16 changed files with 597 additions and 10 deletions.
45 changes: 45 additions & 0 deletions data/anchore/2023/CVE-2023-6947.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2023-6947",
"description": "The Best WordPress Gallery Plugin – FooGallery plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.4.26. This makes it possible for authenticated attackers, with contributor level or higher to read the contents of arbitrary folders on the server, which can contain sensitive information such as folder structure.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://github.com/fooplugins/foogallery/pull/263/commits/9989f6f4f4d478ec04cb634d09b18c87a5b31c4d",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/68420c5a-4add-4597-bd2a-20dc831e81bd?source=cve"
],
"upstream": {
"datePublished": "2024-12-10T05:24:41.940Z",
"dateReserved": "2023-12-19T15:10:40.265Z",
"dateUpdated": "2024-12-10T20:54:03.539Z",
"digest": "1a3a80d85fdf295f8f8c5a0ee42c67bf2442eaa278c871ce3849a9174d2348eb"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:fooplugins:foogallery:*:*:*:*:*:wordpress:*:*"
],
"packageName": "foogallery-premium",
"packageType": "wordpress-plugin",
"product": "FooGallery Premium",
"repo": "https://plugins.svn.wordpress.org/foogallery",
"vendor": "https://fooplugins.com",
"versions": [
{
"lessThan": "2.4.27",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
44 changes: 44 additions & 0 deletions data/anchore/2024/CVE-2024-10708.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
{
"additionalMetadata": {
"cna": "wpscan",
"cveId": "CVE-2024-10708",
"description": "The System Dashboard WordPress plugin before 2.8.15 does not validate user input used in a path, which could allow high privilege users such as admin to perform path traversal attacks an read arbitrary files on the server",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://wpscan.com/vulnerability/61d750a5-8c2c-4c94-a1a9-6a254c2a0d03/"
],
"upstream": {
"datePublished": "2024-12-10T06:00:01.931Z",
"dateReserved": "2024-11-01T19:02:01.104Z",
"dateUpdated": "2024-12-10T15:27:29.260Z",
"digest": "4a572e1287ac1622ca3e1e4a56b182b3a073e455eccf3c57a990fd0e14bc50ec"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:bowo:system_dashboard:*:*:*:*:*:wordpress:*:*"
],
"packageName": "system-dashboard",
"packageType": "wordpress-plugin",
"product": "System Dashboard",
"repo": "https://plugins.svn.wordpress.org/system-dashboard",
"vendor": "bowo",
"versions": [
{
"lessThan": "2.8.15",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
47 changes: 47 additions & 0 deletions data/anchore/2024/CVE-2024-10959.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-10959",
"description": "The The Active Products Tables for WooCommerce. Use constructor to create tables plugin for WordPress is vulnerable to arbitrary shortcode execution via woot_get_smth AJAX action in all versions up to, and including, 1.0.6.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.trac.wordpress.org/browser/profit-products-tables-for-woocommerce/trunk/index.php#L1666",
"https://plugins.trac.wordpress.org/changeset/3199368/",
"https://wordpress.org/plugins/profit-products-tables-for-woocommerce/#developers",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/ecf803cf-1b9c-4d2e-863f-d1f51b08f833?source=cve"
],
"upstream": {
"datePublished": "2024-12-10T11:09:12.310Z",
"dateReserved": "2024-11-07T00:02:14.604Z",
"dateUpdated": "2024-12-10T15:00:50.546Z",
"digest": "2cad64b4445f72eb4f78ce0e30566db603cd408b860db7b8742f14814efa11ae"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:pluginus:woot:*:*:*:*:*:wordpress:*:*"
],
"packageName": "profit-products-tables-for-woocommerce",
"packageType": "wordpress-plugin",
"product": "Active Products Tables for WooCommerce. Use constructor to create tables",
"repo": "https://plugins.svn.wordpress.org/profit-products-tables-for-woocommerce",
"vendor": "realmag777",
"versions": [
{
"lessThan": "1.0.6.6",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
44 changes: 44 additions & 0 deletions data/anchore/2024/CVE-2024-11107.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
{
"additionalMetadata": {
"cna": "wpscan",
"cveId": "CVE-2024-11107",
"description": "The System Dashboard WordPress plugin before 2.8.15 does not sanitise and escape some parameters when outputting them in the page, which could allow unauthenticated users to perform Cross-Site Scripting attacks.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://wpscan.com/vulnerability/a89f1117-8df3-417b-b54f-6587545833ee/"
],
"upstream": {
"datePublished": "2024-12-10T06:00:02.187Z",
"dateReserved": "2024-11-11T21:26:58.732Z",
"dateUpdated": "2024-12-10T15:15:07.287Z",
"digest": "4a572e1287ac1622ca3e1e4a56b182b3a073e455eccf3c57a990fd0e14bc50ec"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:bowo:system_dashboard:*:*:*:*:*:wordpress:*:*"
],
"packageName": "system-dashboard",
"packageType": "wordpress-plugin",
"product": "System Dashboard",
"repo": "https://plugins.svn.wordpress.org/system-dashboard",
"vendor": "bowo",
"versions": [
{
"lessThan": "2.8.15",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
45 changes: 45 additions & 0 deletions data/anchore/2024/CVE-2024-11868.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-11868",
"description": "The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.7.3 via class-lp-rest-material-controller.php. This makes it possible for unauthenticated attackers to extract potentially sensitive paid course material.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.trac.wordpress.org/changeset/3200780/learnpress",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/7bd43980-9193-4a63-adba-720dd1b11699?source=cve"
],
"upstream": {
"datePublished": "2024-12-10T12:24:59.516Z",
"dateReserved": "2024-11-27T15:10:11.982Z",
"dateUpdated": "2024-12-10T14:56:15.813Z",
"digest": "841ff76a272d640ca3807f65e31257873b3a372e8d7ccf92d87abf1e1a121eb2"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*"
],
"packageName": "learnpress",
"packageType": "wordpress-plugin",
"product": "LearnPress – WordPress LMS Plugin",
"repo": "https://plugins.svn.wordpress.org/learnpress",
"vendor": "thimpress",
"versions": [
{
"lessThan": "4.2.7.4",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
2 changes: 1 addition & 1 deletion data/anchore/2024/CVE-2024-12026.json
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@
"vendor": "kofimokome",
"versions": [
{
"lessThanOrEqual": "1.6.3",
"lessThan": "1.6.3.1",
"status": "affected",
"version": "0",
"versionType": "semver"
Expand Down
2 changes: 1 addition & 1 deletion data/anchore/2024/CVE-2024-12027.json
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@
"vendor": "kofimokome",
"versions": [
{
"lessThanOrEqual": "1.6.3",
"lessThan": "1.6.3.1",
"status": "affected",
"version": "0",
"versionType": "semver"
Expand Down
44 changes: 41 additions & 3 deletions data/anchore/2024/CVE-2024-41128.json
Original file line number Diff line number Diff line change
Expand Up @@ -19,10 +19,10 @@
{
"collectionURL": "https://rubygems.org",
"cpes": [
"cpe:2.3:a:activerecord_project:activerecord:*:*:*:*:*:ruby:*:*",
"cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:ruby:*:*"
"cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:ruby:*:*",
"cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:ruby:*:*"
],
"packageName": "actionpack",
"packageName": "rails",
"packageType": "gem",
"product": "rails",
"repo": "https://github.com/rails/rails",
Expand Down Expand Up @@ -53,6 +53,44 @@
"versionType": "custom"
}
]
},
{
"collectionURL": "https://rubygems.org",
"cpes": [
"cpe:2.3:a:actionpack_project:actionpack:*:*:*:*:*:ruby:*:*",
"cpe:2.3:a:rubyonrails:actionpack:*:*:*:*:*:ruby:*:*"
],
"packageName": "actionpack",
"packageType": "gem",
"product": "actionpack",
"repo": "https://github.com/rails/rails",
"vendor": "rails",
"versions": [
{
"lessThan": "6.1.7.9",
"status": "affected",
"version": "3.1.0",
"versionType": "custom"
},
{
"lessThan": "7.0.8.5",
"status": "affected",
"version": "7.0.0",
"versionType": "custom"
},
{
"lessThan": "7.1.4.1",
"status": "affected",
"version": "7.1.0",
"versionType": "custom"
},
{
"lessThan": "7.2.1.1",
"status": "affected",
"version": "7.2.0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
Expand Down
44 changes: 41 additions & 3 deletions data/anchore/2024/CVE-2024-47887.json
Original file line number Diff line number Diff line change
Expand Up @@ -17,10 +17,10 @@
{
"collectionURL": "https://rubygems.org",
"cpes": [
"cpe:2.3:a:activerecord_project:activerecord:*:*:*:*:*:ruby:*:*",
"cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:ruby:*:*"
"cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:ruby:*:*",
"cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:ruby:*:*"
],
"packageName": "actionpack",
"packageName": "rails",
"packageType": "gem",
"product": "rails",
"repo": "https://github.com/rails/rails",
Expand Down Expand Up @@ -51,6 +51,44 @@
"versionType": "custom"
}
]
},
{
"collectionURL": "https://rubygems.org",
"cpes": [
"cpe:2.3:a:actionpack_project:actionpack:*:*:*:*:*:ruby:*:*",
"cpe:2.3:a:rubyonrails:actionpack:*:*:*:*:*:ruby:*:*"
],
"packageName": "actionpack",
"packageType": "gem",
"product": "actionpack",
"repo": "https://github.com/rails/rails",
"vendor": "rails",
"versions": [
{
"lessThan": "6.1.7.9",
"status": "affected",
"version": "4.0.0",
"versionType": "custom"
},
{
"lessThan": "7.0.8.5",
"status": "affected",
"version": "7.0.0",
"versionType": "custom"
},
{
"lessThan": "7.1.4.1",
"status": "affected",
"version": "7.1.0",
"versionType": "custom"
},
{
"lessThan": "7.2.1.1",
"status": "affected",
"version": "7.2.0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
Expand Down
2 changes: 1 addition & 1 deletion data/anchore/2024/CVE-2024-52419.json
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@
"vendor": "Clipboard Team",
"versions": [
{
"lessThanOrEqual": "4.0.3",
"lessThan": "4.0.4",
"status": "affected",
"version": "0",
"versionType": "custom"
Expand Down
Loading

0 comments on commit 8485910

Please sign in to comment.