-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Signed-off-by: Weston Steimel <[email protected]>
- Loading branch information
1 parent
e9aa7cc
commit bfd29dd
Showing
93 changed files
with
2,508 additions
and
79 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,54 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "hackerone", | ||
"cveId": "CVE-2023-28120", | ||
"description": "There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://discuss.rubyonrails.org/t/cve-2023-28120-possible-xss-security-vulnerability-in-safebuffer-bytesplice/82469", | ||
"https://github.com/rails/rails/commit/3cf23c3f891e2e81c977ea4ab83b62bc2a444b70", | ||
"https://lists.fedoraproject.org/archives/list/[email protected]/message/UPV6PVCX4VDJHLFFT42EXBBSGAWZICOW/", | ||
"https://lists.fedoraproject.org/archives/list/[email protected]/message/ZE5W4MH6IE4DV7GELDK6ISCSTFLHKSYO/", | ||
"https://security.netapp.com/advisory/ntap-20240202-0006/", | ||
"https://www.debian.org/security/2023/dsa-5389" | ||
], | ||
"upstream": { | ||
"datePublished": "2025-01-09T00:33:47.658Z", | ||
"dateReserved": "2023-03-10T19:36:27.051Z", | ||
"dateUpdated": "2025-01-09T00:33:47.658Z", | ||
"digest": "dc24678bcf20989366f5bf72e58b4bf8c1bf8b8a20cd90004c9e10a4fc2cf5bb" | ||
} | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://rubygems.org", | ||
"cpes": [ | ||
"cpe:2.3:a:activesupport_project:activesupport:*:*:*:*:*:ruby:*:*" | ||
], | ||
"packageName": "activesupport", | ||
"packageType": "gem", | ||
"product": "ActiveSupport", | ||
"vendor": "Rails", | ||
"versions": [ | ||
{ | ||
"lessThan": "7.0.4.3", | ||
"status": "affected", | ||
"version": "7", | ||
"versionType": "custom" | ||
}, | ||
{ | ||
"lessThan": "6.1.7.3", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "custom" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,49 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "hackerone", | ||
"cveId": "CVE-2023-38037", | ||
"description": "ActiveSupport::EncryptedFile writes contents that will be encrypted to a\r\ntemporary file. The temporary file's permissions are defaulted to the user's\r\ncurrent `umask` settings, meaning that it's possible for other users on the\r\nsame system to read the contents of the temporary file.\r\n\r\nAttackers that have access to the file system could possibly read the contents\r\nof this temporary file while a user is editing it.\r\n\r\nAll users running an affected release should either upgrade or use one of the\r\nworkarounds immediately.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://discuss.rubyonrails.org/t/cve-2023-38037-possible-file-disclosure-of-locally-encrypted-files/83544" | ||
], | ||
"upstream": { | ||
"datePublished": "2025-01-09T00:33:47.704Z", | ||
"dateReserved": "2023-07-12T01:00:11.881Z", | ||
"dateUpdated": "2025-01-09T00:33:47.704Z", | ||
"digest": "06b8748c4c8cae58222e542be97b8c84211fc209db5b6862b21c37fe9b2435dd" | ||
} | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://rubygems.org", | ||
"cpes": [ | ||
"cpe:2.3:a:activesupport_project:activesupport:*:*:*:*:*:ruby:*:*" | ||
], | ||
"packageName": "activesupport", | ||
"packageType": "gem", | ||
"product": "ActiveSupport", | ||
"vendor": "Rails", | ||
"versions": [ | ||
{ | ||
"lessThan": "7.0.7.1", | ||
"status": "affected", | ||
"version": "7", | ||
"versionType": "custom" | ||
}, | ||
{ | ||
"lessThan": "6.1.7.5", | ||
"status": "affected", | ||
"version": "5.2.0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,46 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "wordfence", | ||
"cveId": "CVE-2024-10585", | ||
"description": "The InfiniteWP Client plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.13.0 via the 'historyID' parameter of the ~/debug-chart/index.php file. This makes it possible for unauthenticated attackers to read .txt files outside of the intended directory.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://plugins.svn.wordpress.org/iwp-client/tags/1.13.0/debug-chart/index.php", | ||
"https://plugins.trac.wordpress.org/changeset/3202851/iwp-client/trunk/debug-chart/index.php", | ||
"https://www.wordfence.com/threat-intel/vulnerabilities/id/4d2518f6-3647-4bee-a98c-ce7f30375a62?source=cve" | ||
], | ||
"upstream": { | ||
"datePublished": "2025-01-08T05:19:22.264Z", | ||
"dateReserved": "2024-10-31T13:58:35.328Z", | ||
"dateUpdated": "2025-01-08T15:09:24.374Z", | ||
"digest": "fcb7cee4a8d2483e44baafa77a48784c231b413eb5380a5b08b7d1c90b83f083" | ||
} | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"cpes": [ | ||
"cpe:2.3:a:revmakx:infinitewp_client:*:*:*:*:*:wordpress:*:*" | ||
], | ||
"packageName": "iwp-client", | ||
"packageType": "wordpress-plugin", | ||
"product": "InfiniteWP Client", | ||
"repo": "https://plugins.svn.wordpress.org/iwp-client", | ||
"vendor": "revmakx", | ||
"versions": [ | ||
{ | ||
"lessThan": "1.13.1", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "wordfence", | ||
"cveId": "CVE-2024-11270", | ||
"description": "The WordPress Webinar Plugin – WebinarPress plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check on the 'sync-import-imgs' function and missing file type validation in all versions up to, and including, 1.33.24. This makes it possible for authenticated attackers, with subscriber-level access and above, to create arbitrary files that can lead to remote code execution.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://plugins.trac.wordpress.org/changeset/3216237/wp-webinarsystem/trunk/includes/class-webinarsysteem-ajax.php", | ||
"https://www.wordfence.com/threat-intel/vulnerabilities/id/f1c2cb3f-2f9e-40c5-9e5f-5b85a53e5868?source=cve" | ||
], | ||
"upstream": { | ||
"datePublished": "2025-01-08T04:17:59.763Z", | ||
"dateReserved": "2024-11-15T18:19:53.920Z", | ||
"dateUpdated": "2025-01-08T15:09:55.978Z", | ||
"digest": "a0e85334ea1b946814fadbbb2e5ca79a36ae224c59a9d0eaaca9f4c655c0588c" | ||
} | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"cpes": [ | ||
"cpe:2.3:a:webinarpress:webinarpress:*:*:*:*:*:wordpress:*:*" | ||
], | ||
"packageName": "wp-webinarsystem", | ||
"packageType": "wordpress-plugin", | ||
"product": "WordPress Webinar Plugin – WebinarPress", | ||
"repo": "https://plugins.svn.wordpress.org/wp-webinarsystem", | ||
"vendor": "wpwebinarsystem", | ||
"versions": [ | ||
{ | ||
"lessThan": "1.33.25", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "wordfence", | ||
"cveId": "CVE-2024-11271", | ||
"description": "The WordPress Webinar Plugin – WebinarPress plugin for WordPress is vulnerable to modification of data due to a missing capability check on several functions in all versions up to, and including, 1.33.24. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify webinars.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://plugins.trac.wordpress.org/changeset/3216237/wp-webinarsystem/trunk/includes/class-webinarsysteem-ajax.php", | ||
"https://www.wordfence.com/threat-intel/vulnerabilities/id/88508dbd-b7a0-441d-918b-f4cb7a7cd000?source=cve" | ||
], | ||
"upstream": { | ||
"datePublished": "2025-01-08T04:17:58.930Z", | ||
"dateReserved": "2024-11-15T18:21:25.465Z", | ||
"dateUpdated": "2025-01-08T14:34:13.686Z", | ||
"digest": "a0e85334ea1b946814fadbbb2e5ca79a36ae224c59a9d0eaaca9f4c655c0588c" | ||
} | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"cpes": [ | ||
"cpe:2.3:a:webinarpress:webinarpress:*:*:*:*:*:wordpress:*:*" | ||
], | ||
"packageName": "wp-webinarsystem", | ||
"packageType": "wordpress-plugin", | ||
"product": "WordPress Webinar Plugin – WebinarPress", | ||
"repo": "https://plugins.svn.wordpress.org/wp-webinarsystem", | ||
"vendor": "wpwebinarsystem", | ||
"versions": [ | ||
{ | ||
"lessThan": "1.33.25", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,46 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "wordfence", | ||
"cveId": "CVE-2024-11613", | ||
"description": "The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://plugins.svn.wordpress.org/wp-file-upload/trunk/wfu_file_downloader.php", | ||
"https://plugins.trac.wordpress.org/changeset/3217005/", | ||
"https://www.wordfence.com/threat-intel/vulnerabilities/id/31052fe6-a0ae-4502-b2d2-dbc3b3bf672f?source=cve" | ||
], | ||
"upstream": { | ||
"datePublished": "2025-01-08T06:41:36.482Z", | ||
"dateReserved": "2024-11-21T20:56:11.357Z", | ||
"dateUpdated": "2025-01-08T15:08:48.560Z", | ||
"digest": "0417d7263cd29e38f1a3ee24c7ef7b4cde340831fa40375b50ac684f3a4d1950" | ||
} | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"cpes": [ | ||
"cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*" | ||
], | ||
"packageName": "wp-file-upload", | ||
"packageType": "wordpress-plugin", | ||
"product": "WordPress File Upload", | ||
"repo": "https://plugins.svn.wordpress.org/wp-file-upload", | ||
"vendor": "nickboss", | ||
"versions": [ | ||
{ | ||
"lessThan": "4.25.0", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
{ | ||
"additionalMetadata": { | ||
"cna": "wordfence", | ||
"cveId": "CVE-2024-11635", | ||
"description": "The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.24.12 via the 'wfu_ABSPATH' cookie parameter. This makes it possible for unauthenticated attackers to execute code on the server.", | ||
"reason": "Added CPE configurations because not yet analyzed by NVD.", | ||
"references": [ | ||
"https://plugins.svn.wordpress.org/wp-file-upload/trunk/wfu_file_downloader.php", | ||
"https://www.wordfence.com/threat-intel/vulnerabilities/id/b5165f60-6515-4a2c-a124-cc88155eaf01?source=cve" | ||
], | ||
"upstream": { | ||
"datePublished": "2025-01-08T07:18:38.747Z", | ||
"dateReserved": "2024-11-22T18:05:20.006Z", | ||
"dateUpdated": "2025-01-08T14:17:39.138Z", | ||
"digest": "5c1353b0bcc750f901f338fc3ca35481d92d5ce10e2d438dd9846426f67b0a1e" | ||
} | ||
}, | ||
"adp": { | ||
"affected": [ | ||
{ | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"cpes": [ | ||
"cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*" | ||
], | ||
"packageName": "wp-file-upload", | ||
"packageType": "wordpress-plugin", | ||
"product": "WordPress File Upload", | ||
"repo": "https://plugins.svn.wordpress.org/wp-file-upload", | ||
"vendor": "nickboss", | ||
"versions": [ | ||
{ | ||
"lessThan": "4.24.14", | ||
"status": "affected", | ||
"version": "0", | ||
"versionType": "semver" | ||
} | ||
] | ||
} | ||
], | ||
"providerMetadata": { | ||
"orgId": "00000000-0000-4000-8000-000000000000", | ||
"shortName": "anchoreadp" | ||
} | ||
} | ||
} |
Oops, something went wrong.