Skip to content

Commit

Permalink
generated content from 2025-01-13
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Jan 13, 2025
1 parent fd67a2c commit 378c814
Show file tree
Hide file tree
Showing 14 changed files with 299 additions and 0 deletions.
13 changes: 13 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -263004,3 +263004,16 @@ vulnerability,CVE-2025-0391,vulnerability--4f4bc9ff-941a-4cd4-a27e-bc83b90f1b08
vulnerability,CVE-2025-0106,vulnerability--96133b87-f952-43ed-b930-e3b24027c375
vulnerability,CVE-2025-23108,vulnerability--7658815e-907f-4cd1-975a-19ccc93875c5
vulnerability,CVE-2025-23109,vulnerability--490e80d4-8eaa-452e-95f2-d8b1eaff499c
vulnerability,CVE-2021-29669,vulnerability--19d44f77-e4d7-46ed-afd6-609d37755563
vulnerability,CVE-2024-49785,vulnerability--037ec441-de68-4684-b895-1ab584078753
vulnerability,CVE-2024-51456,vulnerability--dd1e7302-958c-414f-91b6-9d225631f210
vulnerability,CVE-2024-42180,vulnerability--ac4d8bd2-3b7a-4185-b111-4fb75898edcf
vulnerability,CVE-2024-42179,vulnerability--af6cb396-71e1-4d9d-9d45-d77424a8fa6d
vulnerability,CVE-2024-42181,vulnerability--7b603698-44f5-41c4-9e66-e82310dad11f
vulnerability,CVE-2025-0401,vulnerability--230b1946-32f3-47fa-ab57-09ee8c15adbf
vulnerability,CVE-2025-0398,vulnerability--42c5209a-fe51-49c4-bb75-4ea6883736e4
vulnerability,CVE-2025-0397,vulnerability--17befdf9-b061-4906-ba72-e180b42ed348
vulnerability,CVE-2025-0400,vulnerability--c1603cdc-e421-4d51-885e-a521c08d0933
vulnerability,CVE-2025-0399,vulnerability--b68a420a-5465-4859-967e-5d6e8fe5e881
vulnerability,CVE-2025-0396,vulnerability--3e1c566e-d281-41b4-9ce4-cbb3f129e976
vulnerability,CVE-2025-0402,vulnerability--f9813513-c404-44bc-8a7d-67858246ca9a
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8e976e03-9460-47a0-903e-9a2ce7ef9b09",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--037ec441-de68-4684-b895-1ab584078753",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:21:38.690579Z",
"modified": "2025-01-13T00:21:38.690579Z",
"name": "CVE-2024-49785",
"description": "IBM watsonx.ai 1.1 through 2.0.3 and IBM watsonx.ai on Cloud Pak for Data 4.8 through 5.0.3 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-49785"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--62c58d5f-1849-475c-a568-8f33137f2e88",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--17befdf9-b061-4906-ba72-e180b42ed348",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:21:44.996387Z",
"modified": "2025-01-13T00:21:44.996387Z",
"name": "CVE-2025-0397",
"description": "A vulnerability, which was classified as problematic, was found in reckcn SPPanAdmin 1.0. Affected is an unknown function of the file /;/admin/role/edit. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0397"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--67516c8d-5df9-4b1f-b4de-f0ad61aa00d8",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--19d44f77-e4d7-46ed-afd6-609d37755563",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:21:37.837831Z",
"modified": "2025-01-13T00:21:37.837831Z",
"name": "CVE-2021-29669",
"description": "IBM Jazz Foundation 6.0.6, 6.0.6.1, 7.0, 7.0.1, and 7.0.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2021-29669"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8d61131a-0e8c-4792-8139-0baf899c7c17",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--230b1946-32f3-47fa-ab57-09ee8c15adbf",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:21:44.9791Z",
"modified": "2025-01-13T00:21:44.9791Z",
"name": "CVE-2025-0401",
"description": "A vulnerability classified as critical has been found in 1902756969 reggie 1.0. Affected is the function download of the file src/main/java/com/itheima/reggie/controller/CommonController.java. The manipulation of the argument name leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0401"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--353ff175-035e-4a1e-ac54-7fcc08c2d334",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3e1c566e-d281-41b4-9ce4-cbb3f129e976",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:21:45.004451Z",
"modified": "2025-01-13T00:21:45.004451Z",
"name": "CVE-2025-0396",
"description": "A vulnerability, which was classified as critical, has been found in exelban stats up to 2.11.21. This issue affects the function shouldAcceptNewConnection of the component XPC Service. The manipulation leads to command injection. It is possible to launch the attack on the local host. Upgrading to version 2.11.22 is able to address this issue. It is recommended to upgrade the affected component.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0396"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--9ecfd2a2-6787-4e86-81b2-b4d4dae612d9",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--42c5209a-fe51-49c4-bb75-4ea6883736e4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:21:44.994589Z",
"modified": "2025-01-13T00:21:44.994589Z",
"name": "CVE-2025-0398",
"description": "A vulnerability has been found in longpi1 warehouse 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /resources/..;/inport/updateInport of the component Backend. The manipulation of the argument remark leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0398"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1e35c916-1b2a-442a-b6dc-8fdd74cc2cd3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--7b603698-44f5-41c4-9e66-e82310dad11f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:21:40.452027Z",
"modified": "2025-01-13T00:21:40.452027Z",
"name": "CVE-2024-42181",
"description": "HCL MyXalytics is affected by a cleartext transmission of sensitive information vulnerability. The application transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42181"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--873b29bb-eeb8-4c20-bc25-b1108869cfa0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--ac4d8bd2-3b7a-4185-b111-4fb75898edcf",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:21:40.438596Z",
"modified": "2025-01-13T00:21:40.438596Z",
"name": "CVE-2024-42180",
"description": "HCL MyXalytics is affected by a malicious file upload vulnerability. The application accepts invalid file uploads, including incorrect content types, double extensions, null bytes, and special characters, allowing attackers to upload and execute malicious files.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42180"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--b6c3f967-8d39-4616-bc53-320845d89ac3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--af6cb396-71e1-4d9d-9d45-d77424a8fa6d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:21:40.445685Z",
"modified": "2025-01-13T00:21:40.445685Z",
"name": "CVE-2024-42179",
"description": "HCL MyXalytics is affected by sensitive information disclosure vulnerability. The HTTP response header exposes the Microsoft-HTTP API∕2.0 as the server's name & version.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-42179"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a217e13e-c7af-405b-b039-72abe28195e5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--b68a420a-5465-4859-967e-5d6e8fe5e881",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:21:45.002335Z",
"modified": "2025-01-13T00:21:45.002335Z",
"name": "CVE-2025-0399",
"description": "A vulnerability was found in StarSea99 starsea-mall 1.0. It has been declared as critical. This vulnerability affects the function UploadController of the file src/main/java/com/siro/mall/controller/common/uploadController.java. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0399"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--299bac74-8523-4437-98db-62ecd4f1797d",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--c1603cdc-e421-4d51-885e-a521c08d0933",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:21:45.001132Z",
"modified": "2025-01-13T00:21:45.001132Z",
"name": "CVE-2025-0400",
"description": "A vulnerability was found in StarSea99 starsea-mall 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/categories/update. The manipulation of the argument categoryName leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0400"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--d45d41c9-94e3-4283-96d0-554048d859b4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--dd1e7302-958c-414f-91b6-9d225631f210",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:21:40.419303Z",
"modified": "2025-01-13T00:21:40.419303Z",
"name": "CVE-2024-51456",
"description": "IBM Robotic Process Automation 21.0.0 through 21.0.7.19 and 23.0.0 through 23.0.19 could allow a remote attacker to obtain sensitive data that may be exposed through certain crypto-analytic attacks.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-51456"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e791cece-0955-4dd1-b2ea-da5551ca7a0f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--f9813513-c404-44bc-8a7d-67858246ca9a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-13T00:21:45.005574Z",
"modified": "2025-01-13T00:21:45.005574Z",
"name": "CVE-2025-0402",
"description": "A vulnerability classified as critical was found in 1902756969 reggie 1.0. Affected by this vulnerability is the function upload of the file src/main/java/com/itheima/reggie/controller/CommonController.java. The manipulation of the argument file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0402"
}
]
}
]
}

0 comments on commit 378c814

Please sign in to comment.