Skip to content
Prev Previous commit
Use storybook argTypes for ThreatsDataViews storybook
  • Loading branch information
nateweller committed Mar 29, 2025
commit c4039994976b322d36fb8f283e4b2423a6c630fb
Original file line number Diff line number Diff line change
Expand Up @@ -127,3 +127,144 @@ export const historicData = [
source: '',
},
];

export const fixersData = [
{
id: 13216959,
signature: 'Vulnerable.WP.Core',
title: 'Vulnerable WordPress Version (6.4.3)',
description: 'This threat has an auto-fixer available. ',
firstDetected: '2024-07-15T21:56:50.000Z',
severity: 4,
fixer: null,
fixedOn: '2024-07-15T22:01:42.000Z',
status: 'current',
fixable: { fixer: 'update', target: '6.4.4', extensionStatus: 'inactive' },
version: '6.4.3',
source: '',
},
{
id: 12345678910,
signature: 'Vulnerable.WP.Extension',
title: 'Vulnerable Plugin: Example Plugin (version 1.2.3)',
description: 'This threat has an in-progress auto-fixer.',
firstDetected: '2024-10-02T17:34:59.000Z',
fixedIn: '1.2.4',
severity: 3,
fixable: { fixer: 'update', target: '1.12.4', extensionStatus: 'inactive' },
fixer: { status: 'in_progress', lastUpdated: new Date().toISOString() },
status: 'current',
source: 'https://wpscan.com/vulnerability/733d8a02-0d44-4b78-bbb2-37e447acd2f3',
extension: {
name: 'Example Plugin',
slug: 'example-plugin',
version: '1.2.3',
type: 'plugins',
},
},
{
id: 12345678911,
signature: 'Vulnerable.WP.Extension',
title: 'Vulnerable Theme: Example Theme (version 2.2.2)',
description: 'This threat has an in-progress auto-fixer that is taking too long.',
firstDetected: '2024-10-02T17:34:59.000Z',
fixedIn: '2.22.22',
severity: 3,
fixable: { fixer: 'update', target: '1.12.4', extensionStatus: 'inactive' },
fixer: { status: 'in_progress', lastUpdated: new Date( '1999-01-01' ).toISOString() },
status: 'current',
source: 'https://wpscan.com/vulnerability/733d8a02-0d44-4b78-bbb2-37e447acd2f3',
extension: {
name: 'Example Theme',
slug: 'example-theme',
version: '2.2.2',
type: 'themes',
},
},
{
id: 12345678912,
signature: 'Vulnerable.WP.Extension',
title: 'Vulnerable Theme: Example Theme II (version 3.3.3)',
description: 'This threat has a fixer with an error status.',
firstDetected: '2024-10-02T17:34:59.000Z',
fixedIn: '3.4.5',
severity: 3,
fixable: { fixer: 'update', target: '1.12.4', extensionStatus: 'inactive' },
fixer: { status: 'error', error: 'error' },
status: 'current',
source: 'https://wpscan.com/vulnerability/733d8a02-0d44-4b78-bbb2-37e447acd2f3',
extension: {
name: 'Example Theme II',
slug: 'example-theme-2',
version: '3.3.3',
type: 'themes',
},
},
{
id: 185868972,
signature: 'EICAR_AV_Test_Suspicious',
title: 'Malicious code found in file: jptt_eicar.php',
description: 'This threat has no auto-fixer available.',
firstDetected: '2024-10-07T20:40:15.000Z',
fixedIn: null,
severity: 1,
fixable: false,
status: 'current',
filename: '/var/www/html/wp-content/uploads/jptt_eicar.php',
context: {
'6': 'echo <<<HTML',
'7': 'X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-SUSPICIOUS-ANTIVIRUS-TEST-FILE!$H+H*',
'8': 'HTML;',
'9': 'echo <<<HTML',
'10': 'X5O!P%@AP[4\\PZX54(P^)7CC)7}$EICAR-SUSPICIOUS-ANTIVIRUS-TEST-FILE!$H+H*',
'11': 'HTML;',
marks: {},
},
},
];

export const freeData = [
{
id: '1d0470df-4671-47ac-8d87-a165e8f7d502',
title: 'WooCommerce <= 3.2.3 - Authenticated PHP Object Injection',
description:
'Versions 3.2.3 and earlier are affected by an issue where cached queries within shortcodes could lead to object injection. This is related to the recent WordPress 4.8.3 security release.This issue can only be exploited by users who can edit content and add shortcodes, but we still recommend all users running WooCommerce 3.x upgrade to 3.2 to mitigate this issue.',
fixedIn: '3.2.4',
source: 'https://wpscan.com/vulnerability/1d0470df-4671-47ac-8d87-a165e8f7d502',
extension: {
name: 'WooCommerce',
slug: 'woocommerce',
version: '3.2.3',
type: 'plugins',
},
},
{
id: '7275a176-d579-471a-8492-df8edbdf27de',
subtitle: 'WooCommerce 3.4.5',
title: 'WooCommerce <= 3.4.5 - Authenticated Stored XSS',
description:
'The WooCommerce WordPress plugin was affected by an Authenticated Stored XSS security vulnerability.',
fixedIn: '3.4.6',
source: 'https://wpscan.com/vulnerability/7275a176-d579-471a-8492-df8edbdf27de',
extension: {
name: 'WooCommerce',
slug: 'woocommerce',
version: '3.4.5',
type: 'plugins',
},
},
{
id: '733d8a02-0d44-4b78-bbb2-37e447acd2f3',
title: 'WP Super Cache < 1.7.2 - Authenticated Remote Code Execution (RCE)',
description:
'The plugin was affected by an authenticated (admin+) RCE in the settings page due to input validation failure and weak $cache_path check in the WP Super Cache Settings -> Cache Location option. Direct access to the wp-cache-config.php file is not prohibited, so this vulnerability can be exploited for a web shell injection.\r\n\r\nAnother possible attack vector: from XSS (via another plugin affected by XSS) to RCE.',
fixedIn: '1.7.2',
source: 'https://wpscan.com/vulnerability/733d8a02-0d44-4b78-bbb2-37e447acd2f3',
extension: {
name: 'WP Super Cache',
slug: 'wp-super-cache',
version: '1.6.3',
type: 'plugins',
},
},
];
Loading
Loading