Skip to content

Commit

Permalink
Show file tree
Hide file tree
Showing 17 changed files with 521 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
{
"schema_version": "1.4.0",
"id": "GHSA-45gg-w2cf-qwhh",
"modified": "2025-01-27T06:30:26Z",
"published": "2025-01-27T06:30:26Z",
"aliases": [
"CVE-2024-12436"
],
"details": "The WP Customer Area WordPress plugin through 8.2.4 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks",
"severity": [],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12436"
},
{
"type": "WEB",
"url": "https://wpscan.com/vulnerability/3345a403-f62c-40c1-b7ae-bc947591e02a"
}
],
"database_specific": {
"cwe_ids": [],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-27T06:15:22Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
{
"schema_version": "1.4.0",
"id": "GHSA-6876-c4r3-53ww",
"modified": "2025-01-27T06:30:26Z",
"published": "2025-01-27T06:30:26Z",
"aliases": [
"CVE-2024-13056"
],
"details": "The Dyn Business Panel WordPress plugin through 1.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.",
"severity": [],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-13056"
},
{
"type": "WEB",
"url": "https://wpscan.com/vulnerability/a6acb608-a23e-461d-af48-a6669a45594a"
}
],
"database_specific": {
"cwe_ids": [],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-27T06:15:23Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
{
"schema_version": "1.4.0",
"id": "GHSA-69jp-7vgw-2cgr",
"modified": "2025-01-27T06:30:26Z",
"published": "2025-01-27T06:30:26Z",
"aliases": [
"CVE-2024-12774"
],
"details": "The Altra Side Menu WordPress plugin through 2.0 does not have CSRF checks in some places, which could allow attackers to make logged in admins delete arbitrary menu via a CSRF attack",
"severity": [],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12774"
},
{
"type": "WEB",
"url": "https://wpscan.com/vulnerability/8decbef5-f106-488b-925c-42b3b280460a"
}
],
"database_specific": {
"cwe_ids": [],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-27T06:15:22Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
{
"schema_version": "1.4.0",
"id": "GHSA-7jq5-8rmw-j9wh",
"modified": "2025-01-27T06:30:26Z",
"published": "2025-01-27T06:30:26Z",
"aliases": [
"CVE-2024-13095"
],
"details": "The WP Triggers Lite WordPress plugin through 2.5.3 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks",
"severity": [],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-13095"
},
{
"type": "WEB",
"url": "https://wpscan.com/vulnerability/74e95fb5-025b-4d4d-a279-844b6ee3e57d"
}
],
"database_specific": {
"cwe_ids": [],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-27T06:15:23Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
{
"schema_version": "1.4.0",
"id": "GHSA-9grv-p46v-p3fp",
"modified": "2025-01-27T06:30:26Z",
"published": "2025-01-27T06:30:26Z",
"aliases": [
"CVE-2024-13052"
],
"details": "The Dental Optimizer Patient Generator App WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.",
"severity": [],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-13052"
},
{
"type": "WEB",
"url": "https://wpscan.com/vulnerability/671d5eef-c496-4047-9d01-8ab8a94cdc72"
}
],
"database_specific": {
"cwe_ids": [],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-27T06:15:22Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
{
"schema_version": "1.4.0",
"id": "GHSA-9hcf-78cf-xwqv",
"modified": "2025-01-27T06:30:26Z",
"published": "2025-01-27T06:30:26Z",
"aliases": [
"CVE-2024-13117"
],
"details": "The Social Share Buttons for WordPress plugin through 2.7 allows an unauthenticated user to upload arbitrary images and change the path where they are uploaded",
"severity": [],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-13117"
},
{
"type": "WEB",
"url": "https://wpscan.com/vulnerability/3234cdac-f328-4f1e-a1de-31fbd86aefb9"
}
],
"database_specific": {
"cwe_ids": [],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-27T06:15:23Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
{
"schema_version": "1.4.0",
"id": "GHSA-c33j-w5w4-w9q4",
"modified": "2025-01-27T06:30:26Z",
"published": "2025-01-27T06:30:26Z",
"aliases": [
"CVE-2024-13055"
],
"details": "The Dyn Business Panel WordPress plugin through 1.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.",
"severity": [],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-13055"
},
{
"type": "WEB",
"url": "https://wpscan.com/vulnerability/91178272-ed7e-412c-a187-e360a1313004"
}
],
"database_specific": {
"cwe_ids": [],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-27T06:15:23Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
{
"schema_version": "1.4.0",
"id": "GHSA-c75v-42g3-xvcr",
"modified": "2025-01-27T06:30:26Z",
"published": "2025-01-27T06:30:26Z",
"aliases": [
"CVE-2024-13094"
],
"details": "The WP Triggers Lite WordPress plugin through 2.5.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.",
"severity": [],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-13094"
},
{
"type": "WEB",
"url": "https://wpscan.com/vulnerability/7a75809e-824e-458e-bd01-50dadcea7713"
}
],
"database_specific": {
"cwe_ids": [],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-27T06:15:23Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
{
"schema_version": "1.4.0",
"id": "GHSA-chc6-3mhw-pc4r",
"modified": "2025-01-27T06:30:26Z",
"published": "2025-01-27T06:30:26Z",
"aliases": [
"CVE-2024-43446"
],
"details": "An improper privilege management vulnerability in OTRS Generic Interface module allows change of the Ticket status even if the user only has ro permissions. \n\nThis issue affects: \n\n * OTRS 7.0.X\n\n * OTRS 8.0.X\n * OTRS 2023.X\n * OTRS 2024.X\n\n * ((OTRS)) Community Edition: 6.0.x\n\nProducts based on the ((OTRS)) Community Edition also very likely to be affected",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N"
}
],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-43446"
},
{
"type": "WEB",
"url": "https://otrs.com/release-notes/otrs-security-advisory-2025-02"
}
],
"database_specific": {
"cwe_ids": [
"CWE-269"
],
"severity": "LOW",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-27T06:15:24Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
{
"schema_version": "1.4.0",
"id": "GHSA-f39m-g6qq-h3xv",
"modified": "2025-01-27T06:30:24Z",
"published": "2025-01-27T06:30:24Z",
"aliases": [
"CVE-2024-12280"
],
"details": "The WP Customer Area WordPress plugin through 8.2.4 does not have CSRF check in place when deleting its logs, which could allow attackers to make a logged in to delete them via a CSRF attack",
"severity": [],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12280"
},
{
"type": "WEB",
"url": "https://wpscan.com/vulnerability/2b32c0b8-28bb-4220-800b-4c369bca91c5"
}
],
"database_specific": {
"cwe_ids": [],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-27T06:15:21Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
{
"schema_version": "1.4.0",
"id": "GHSA-f5ph-j9m6-qjqc",
"modified": "2025-01-27T06:30:26Z",
"published": "2025-01-27T06:30:26Z",
"aliases": [
"CVE-2024-13057"
],
"details": "The Dyn Business Panel WordPress plugin through 1.0.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.",
"severity": [],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-13057"
},
{
"type": "WEB",
"url": "https://wpscan.com/vulnerability/6f869a3d-1ac1-4d31-8fe5-9b9795b15b5b"
}
],
"database_specific": {
"cwe_ids": [],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-27T06:15:23Z"
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
{
"schema_version": "1.4.0",
"id": "GHSA-fg8c-fxj5-qp3x",
"modified": "2025-01-27T06:30:26Z",
"published": "2025-01-27T06:30:26Z",
"aliases": [
"CVE-2024-43445"
],
"details": "A vulnerability exists in OTRS and ((OTRS Community Edition)) that fail to set the HTTP response header X-Content-Type-Options to nosniff. An attacker could exploit this vulnerability by uploading or inserting content that would be treated as a different MIME type than intended. \n\nThis issue affects: \n\n * OTRS 7.0.X\n\n * OTRS 8.0.X\n * OTRS 2023.X\n * OTRS 2024.X\n\n * ((OTRS)) Community Edition: 6.0.x\n\nProducts based on the ((OTRS)) Community Edition also very likely to be affected",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
}
],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-43445"
},
{
"type": "WEB",
"url": "https://otrs.com/release-notes/otrs-security-advisory-2025-01"
}
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"severity": "MODERATE",
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-27T06:15:23Z"
}
}
Loading

0 comments on commit ef48511

Please sign in to comment.