Skip to content

Commit

Permalink
generated content from 2025-01-13
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Jan 13, 2025
1 parent a93ea1c commit ca33ea6
Show file tree
Hide file tree
Showing 14 changed files with 299 additions and 0 deletions.
13 changes: 13 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -263004,3 +263004,16 @@ vulnerability,CVE-2025-0392,vulnerability--26e75131-48c8-4ed9-b393-aa41ef175c2f
vulnerability,CVE-2025-0107,vulnerability--a42855ef-6f7e-48ec-917f-bcdb2bfefce5
vulnerability,CVE-2025-0391,vulnerability--d39a752c-fea1-4850-a767-6f686c2fc6a5
vulnerability,CVE-2025-0103,vulnerability--df60cb9b-0914-492f-9bff-080eafae42f6
vulnerability,CVE-2024-51456,vulnerability--38ddfa76-52c1-4f3f-b216-cf09f4c10476
vulnerability,CVE-2024-49785,vulnerability--81f8cacf-4a8b-4b78-ba20-77d1e4a86424
vulnerability,CVE-2024-42181,vulnerability--847a9bb3-3133-4029-af46-13ac39a7e657
vulnerability,CVE-2024-42180,vulnerability--c949c79b-c8b2-467b-94fc-05cbc343500c
vulnerability,CVE-2024-42179,vulnerability--3b633550-608a-4710-8faa-d1bad773a8a6
vulnerability,CVE-2021-29669,vulnerability--682650f0-db11-4744-8151-2ef648ce0b0d
vulnerability,CVE-2025-0397,vulnerability--b3ea7f43-45b4-44ad-8261-e4b215add0ed
vulnerability,CVE-2025-0396,vulnerability--f5d8160a-35bf-4364-8352-6e5447530b66
vulnerability,CVE-2025-0402,vulnerability--0f33500e-fd9e-4486-bc89-06007cb14770
vulnerability,CVE-2025-0400,vulnerability--b689d3e0-4b86-4477-b3a7-ee0f26753482
vulnerability,CVE-2025-0401,vulnerability--d4dc9fe7-b040-489f-afba-0fdf854fe6dd
vulnerability,CVE-2025-0398,vulnerability--2963fcfb-3f07-4110-81e6-b173534f0668
vulnerability,CVE-2025-0399,vulnerability--6bcff6bc-e126-4fab-bbcd-b7d8da10699e
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b8c3ce61-894b-4092-aba9-04cb225636df",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0f33500e-fd9e-4486-bc89-06007cb14770",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:22:57.441054Z",
"modified": "2025-01-13T00:22:57.441054Z",
"name": "CVE-2025-0402",
"description": "A vulnerability classified as critical was found in 1902756969 reggie 1.0. Affected by this vulnerability is the function upload of the file src/main/java/com/itheima/reggie/controller/CommonController.java. The manipulation of the argument file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0402"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--309f813e-f771-4101-944b-c6fb7d430c39",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--2963fcfb-3f07-4110-81e6-b173534f0668",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:22:57.456078Z",
"modified": "2025-01-13T00:22:57.456078Z",
"name": "CVE-2025-0398",
"description": "A vulnerability has been found in longpi1 warehouse 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /resources/..;/inport/updateInport of the component Backend. The manipulation of the argument remark leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0398"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--39f4ecaa-4750-4906-981a-babd913575e1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--38ddfa76-52c1-4f3f-b216-cf09f4c10476",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:22:45.255093Z",
"modified": "2025-01-13T00:22:45.255093Z",
"name": "CVE-2024-51456",
"description": "IBM Robotic Process Automation 21.0.0 through 21.0.7.19 and 23.0.0 through 23.0.19 could allow a remote attacker to obtain sensitive data that may be exposed through certain crypto-analytic attacks.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-51456"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--48d9247c-9da9-4262-978e-40c8589c8218",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3b633550-608a-4710-8faa-d1bad773a8a6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:22:47.446089Z",
"modified": "2025-01-13T00:22:47.446089Z",
"name": "CVE-2024-42179",
"description": "HCL MyXalytics is affected by sensitive information disclosure vulnerability. The HTTP response header exposes the Microsoft-HTTP API∕2.0 as the server's name & version.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42179"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7b7702f1-cd9d-4ea9-94ce-af992e73a8d6",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--682650f0-db11-4744-8151-2ef648ce0b0d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:22:50.924813Z",
"modified": "2025-01-13T00:22:50.924813Z",
"name": "CVE-2021-29669",
"description": "IBM Jazz Foundation 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2021-29669"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--543fd5de-5173-45de-b8d9-0ae91c16676f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--6bcff6bc-e126-4fab-bbcd-b7d8da10699e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:22:57.457414Z",
"modified": "2025-01-13T00:22:57.457414Z",
"name": "CVE-2025-0399",
"description": "A vulnerability was found in StarSea99 starsea-mall 1.0. It has been declared as critical. This vulnerability affects the function UploadController of the file src/main/java/com/siro/mall/controller/common/uploadController.java. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0399"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5edaeafc-ef3c-421d-83f5-f287c6bd3919",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--81f8cacf-4a8b-4b78-ba20-77d1e4a86424",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:22:46.997122Z",
"modified": "2025-01-13T00:22:46.997122Z",
"name": "CVE-2024-49785",
"description": "IBM watsonx.ai 1.1 through 2.0.3 and IBM watsonx.ai on Cloud Pak for Data 4.8 through 5.0.3 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49785"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d3499517-57f8-4105-9db3-1c88baea63cd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--847a9bb3-3133-4029-af46-13ac39a7e657",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:22:47.40242Z",
"modified": "2025-01-13T00:22:47.40242Z",
"name": "CVE-2024-42181",
"description": "HCL MyXalytics is affected by a cleartext transmission of sensitive information vulnerability. The application transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42181"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--dcfa3710-b2ff-4346-ba9e-bdb092152fcf",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--b3ea7f43-45b4-44ad-8261-e4b215add0ed",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:22:57.427836Z",
"modified": "2025-01-13T00:22:57.427836Z",
"name": "CVE-2025-0397",
"description": "A vulnerability, which was classified as problematic, was found in reckcn SPPanAdmin 1.0. Affected is an unknown function of the file /;/admin/role/edit. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0397"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--de77ff1d-e51f-4beb-8f08-ab087206190d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--b689d3e0-4b86-4477-b3a7-ee0f26753482",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:22:57.443801Z",
"modified": "2025-01-13T00:22:57.443801Z",
"name": "CVE-2025-0400",
"description": "A vulnerability was found in StarSea99 starsea-mall 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/categories/update. The manipulation of the argument categoryName leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0400"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--898ed30c-5c30-4a27-9eec-8c061e2e861f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--c949c79b-c8b2-467b-94fc-05cbc343500c",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:22:47.439835Z",
"modified": "2025-01-13T00:22:47.439835Z",
"name": "CVE-2024-42180",
"description": "HCL MyXalytics is affected by a malicious file upload vulnerability. The application accepts invalid file uploads, including incorrect content types, double extensions, null bytes, and special characters, allowing attackers to upload and execute malicious files.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42180"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4eda91d1-48d9-4e44-86bb-0a438176a7ac",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--d4dc9fe7-b040-489f-afba-0fdf854fe6dd",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:22:57.452316Z",
"modified": "2025-01-13T00:22:57.452316Z",
"name": "CVE-2025-0401",
"description": "A vulnerability classified as critical has been found in 1902756969 reggie 1.0. Affected is the function download of the file src/main/java/com/itheima/reggie/controller/CommonController.java. The manipulation of the argument name leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0401"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8ebe56fa-0b99-465a-b952-c5c190361680",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--f5d8160a-35bf-4364-8352-6e5447530b66",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:22:57.431276Z",
"modified": "2025-01-13T00:22:57.431276Z",
"name": "CVE-2025-0396",
"description": "A vulnerability, which was classified as critical, has been found in exelban stats up to 2.11.21. This issue affects the function shouldAcceptNewConnection of the component XPC Service. The manipulation leads to command injection. It is possible to launch the attack on the local host. Upgrading to version 2.11.22 is able to address this issue. It is recommended to upgrade the affected component.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0396"
}
]
}
]
}

0 comments on commit ca33ea6

Please sign in to comment.