Skip to content

Commit

Permalink
updates 2025-01-09
Browse files Browse the repository at this point in the history
Signed-off-by: Weston Steimel <[email protected]>
  • Loading branch information
westonsteimel committed Jan 9, 2025
1 parent e9aa7cc commit bfd29dd
Show file tree
Hide file tree
Showing 93 changed files with 2,508 additions and 79 deletions.
54 changes: 54 additions & 0 deletions data/anchore/2023/CVE-2023-28120.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,54 @@
{
"additionalMetadata": {
"cna": "hackerone",
"cveId": "CVE-2023-28120",
"description": "There is a vulnerability in ActiveSupport if the new bytesplice method is called on a SafeBuffer with untrusted user input.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://discuss.rubyonrails.org/t/cve-2023-28120-possible-xss-security-vulnerability-in-safebuffer-bytesplice/82469",
"https://github.com/rails/rails/commit/3cf23c3f891e2e81c977ea4ab83b62bc2a444b70",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/UPV6PVCX4VDJHLFFT42EXBBSGAWZICOW/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/ZE5W4MH6IE4DV7GELDK6ISCSTFLHKSYO/",
"https://security.netapp.com/advisory/ntap-20240202-0006/",
"https://www.debian.org/security/2023/dsa-5389"
],
"upstream": {
"datePublished": "2025-01-09T00:33:47.658Z",
"dateReserved": "2023-03-10T19:36:27.051Z",
"dateUpdated": "2025-01-09T00:33:47.658Z",
"digest": "dc24678bcf20989366f5bf72e58b4bf8c1bf8b8a20cd90004c9e10a4fc2cf5bb"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://rubygems.org",
"cpes": [
"cpe:2.3:a:activesupport_project:activesupport:*:*:*:*:*:ruby:*:*"
],
"packageName": "activesupport",
"packageType": "gem",
"product": "ActiveSupport",
"vendor": "Rails",
"versions": [
{
"lessThan": "7.0.4.3",
"status": "affected",
"version": "7",
"versionType": "custom"
},
{
"lessThan": "6.1.7.3",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
49 changes: 49 additions & 0 deletions data/anchore/2023/CVE-2023-38037.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,49 @@
{
"additionalMetadata": {
"cna": "hackerone",
"cveId": "CVE-2023-38037",
"description": "ActiveSupport::EncryptedFile writes contents that will be encrypted to a\r\ntemporary file. The temporary file's permissions are defaulted to the user's\r\ncurrent `umask` settings, meaning that it's possible for other users on the\r\nsame system to read the contents of the temporary file.\r\n\r\nAttackers that have access to the file system could possibly read the contents\r\nof this temporary file while a user is editing it.\r\n\r\nAll users running an affected release should either upgrade or use one of the\r\nworkarounds immediately.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://discuss.rubyonrails.org/t/cve-2023-38037-possible-file-disclosure-of-locally-encrypted-files/83544"
],
"upstream": {
"datePublished": "2025-01-09T00:33:47.704Z",
"dateReserved": "2023-07-12T01:00:11.881Z",
"dateUpdated": "2025-01-09T00:33:47.704Z",
"digest": "06b8748c4c8cae58222e542be97b8c84211fc209db5b6862b21c37fe9b2435dd"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://rubygems.org",
"cpes": [
"cpe:2.3:a:activesupport_project:activesupport:*:*:*:*:*:ruby:*:*"
],
"packageName": "activesupport",
"packageType": "gem",
"product": "ActiveSupport",
"vendor": "Rails",
"versions": [
{
"lessThan": "7.0.7.1",
"status": "affected",
"version": "7",
"versionType": "custom"
},
{
"lessThan": "6.1.7.5",
"status": "affected",
"version": "5.2.0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
46 changes: 46 additions & 0 deletions data/anchore/2024/CVE-2024-10585.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-10585",
"description": "The InfiniteWP Client plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.13.0 via the 'historyID' parameter of the ~/debug-chart/index.php file. This makes it possible for unauthenticated attackers to read .txt files outside of the intended directory.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.svn.wordpress.org/iwp-client/tags/1.13.0/debug-chart/index.php",
"https://plugins.trac.wordpress.org/changeset/3202851/iwp-client/trunk/debug-chart/index.php",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/4d2518f6-3647-4bee-a98c-ce7f30375a62?source=cve"
],
"upstream": {
"datePublished": "2025-01-08T05:19:22.264Z",
"dateReserved": "2024-10-31T13:58:35.328Z",
"dateUpdated": "2025-01-08T15:09:24.374Z",
"digest": "fcb7cee4a8d2483e44baafa77a48784c231b413eb5380a5b08b7d1c90b83f083"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:revmakx:infinitewp_client:*:*:*:*:*:wordpress:*:*"
],
"packageName": "iwp-client",
"packageType": "wordpress-plugin",
"product": "InfiniteWP Client",
"repo": "https://plugins.svn.wordpress.org/iwp-client",
"vendor": "revmakx",
"versions": [
{
"lessThan": "1.13.1",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
7 changes: 6 additions & 1 deletion data/anchore/2024/CVE-2024-10892.json
Original file line number Diff line number Diff line change
Expand Up @@ -39,6 +39,11 @@
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/127691c4-dc63-44e0-b591-b342a3809888?source=cve"
}
]
}
}
45 changes: 45 additions & 0 deletions data/anchore/2024/CVE-2024-11270.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-11270",
"description": "The WordPress Webinar Plugin – WebinarPress plugin for WordPress is vulnerable to arbitrary file creation due to a missing capability check on the 'sync-import-imgs' function and missing file type validation in all versions up to, and including, 1.33.24. This makes it possible for authenticated attackers, with subscriber-level access and above, to create arbitrary files that can lead to remote code execution.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.trac.wordpress.org/changeset/3216237/wp-webinarsystem/trunk/includes/class-webinarsysteem-ajax.php",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/f1c2cb3f-2f9e-40c5-9e5f-5b85a53e5868?source=cve"
],
"upstream": {
"datePublished": "2025-01-08T04:17:59.763Z",
"dateReserved": "2024-11-15T18:19:53.920Z",
"dateUpdated": "2025-01-08T15:09:55.978Z",
"digest": "a0e85334ea1b946814fadbbb2e5ca79a36ae224c59a9d0eaaca9f4c655c0588c"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:webinarpress:webinarpress:*:*:*:*:*:wordpress:*:*"
],
"packageName": "wp-webinarsystem",
"packageType": "wordpress-plugin",
"product": "WordPress Webinar Plugin – WebinarPress",
"repo": "https://plugins.svn.wordpress.org/wp-webinarsystem",
"vendor": "wpwebinarsystem",
"versions": [
{
"lessThan": "1.33.25",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
45 changes: 45 additions & 0 deletions data/anchore/2024/CVE-2024-11271.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-11271",
"description": "The WordPress Webinar Plugin – WebinarPress plugin for WordPress is vulnerable to modification of data due to a missing capability check on several functions in all versions up to, and including, 1.33.24. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify webinars.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.trac.wordpress.org/changeset/3216237/wp-webinarsystem/trunk/includes/class-webinarsysteem-ajax.php",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/88508dbd-b7a0-441d-918b-f4cb7a7cd000?source=cve"
],
"upstream": {
"datePublished": "2025-01-08T04:17:58.930Z",
"dateReserved": "2024-11-15T18:21:25.465Z",
"dateUpdated": "2025-01-08T14:34:13.686Z",
"digest": "a0e85334ea1b946814fadbbb2e5ca79a36ae224c59a9d0eaaca9f4c655c0588c"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:webinarpress:webinarpress:*:*:*:*:*:wordpress:*:*"
],
"packageName": "wp-webinarsystem",
"packageType": "wordpress-plugin",
"product": "WordPress Webinar Plugin – WebinarPress",
"repo": "https://plugins.svn.wordpress.org/wp-webinarsystem",
"vendor": "wpwebinarsystem",
"versions": [
{
"lessThan": "1.33.25",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
46 changes: 46 additions & 0 deletions data/anchore/2024/CVE-2024-11613.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-11613",
"description": "The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.svn.wordpress.org/wp-file-upload/trunk/wfu_file_downloader.php",
"https://plugins.trac.wordpress.org/changeset/3217005/",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/31052fe6-a0ae-4502-b2d2-dbc3b3bf672f?source=cve"
],
"upstream": {
"datePublished": "2025-01-08T06:41:36.482Z",
"dateReserved": "2024-11-21T20:56:11.357Z",
"dateUpdated": "2025-01-08T15:08:48.560Z",
"digest": "0417d7263cd29e38f1a3ee24c7ef7b4cde340831fa40375b50ac684f3a4d1950"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*"
],
"packageName": "wp-file-upload",
"packageType": "wordpress-plugin",
"product": "WordPress File Upload",
"repo": "https://plugins.svn.wordpress.org/wp-file-upload",
"vendor": "nickboss",
"versions": [
{
"lessThan": "4.25.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
45 changes: 45 additions & 0 deletions data/anchore/2024/CVE-2024-11635.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
{
"additionalMetadata": {
"cna": "wordfence",
"cveId": "CVE-2024-11635",
"description": "The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.24.12 via the 'wfu_ABSPATH' cookie parameter. This makes it possible for unauthenticated attackers to execute code on the server.",
"reason": "Added CPE configurations because not yet analyzed by NVD.",
"references": [
"https://plugins.svn.wordpress.org/wp-file-upload/trunk/wfu_file_downloader.php",
"https://www.wordfence.com/threat-intel/vulnerabilities/id/b5165f60-6515-4a2c-a124-cc88155eaf01?source=cve"
],
"upstream": {
"datePublished": "2025-01-08T07:18:38.747Z",
"dateReserved": "2024-11-22T18:05:20.006Z",
"dateUpdated": "2025-01-08T14:17:39.138Z",
"digest": "5c1353b0bcc750f901f338fc3ca35481d92d5ce10e2d438dd9846426f67b0a1e"
}
},
"adp": {
"affected": [
{
"collectionURL": "https://wordpress.org/plugins",
"cpes": [
"cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*"
],
"packageName": "wp-file-upload",
"packageType": "wordpress-plugin",
"product": "WordPress File Upload",
"repo": "https://plugins.svn.wordpress.org/wp-file-upload",
"vendor": "nickboss",
"versions": [
{
"lessThan": "4.24.14",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"providerMetadata": {
"orgId": "00000000-0000-4000-8000-000000000000",
"shortName": "anchoreadp"
}
}
}
Loading

0 comments on commit bfd29dd

Please sign in to comment.