From 98ba6c13a4190e4c5c7023fee08841b2b96b62b7 Mon Sep 17 00:00:00 2001 From: gitadvisor Date: Wed, 15 Jan 2025 16:24:12 +0000 Subject: [PATCH] generated content from 2025-01-15 --- mapping.csv | 55 +++++++++++++++++++ ...-013f7af9-5d2c-4404-8dde-e74dd97acb6b.json | 22 ++++++++ ...-0789a218-0f62-4558-ab04-e0044c05d3d6.json | 22 ++++++++ ...-0bf0df1d-444d-408f-9803-14dee8de90dd.json | 22 ++++++++ ...-16807199-bebc-4946-b96f-2565a3ddaa11.json | 22 ++++++++ ...-1fd4b236-603c-48db-8935-34c70368e75e.json | 22 ++++++++ ...-2df82062-3475-4611-b887-913d27ba3fb9.json | 22 ++++++++ ...-366c46e8-430b-4bc6-820f-90e393ac692b.json | 22 ++++++++ ...-3b248aa2-af5b-4d37-8384-e7a7153bfd57.json | 22 ++++++++ ...-3dabbe3d-6594-405b-96e4-25de79edc8ba.json | 22 ++++++++ ...-3dd84408-4282-4e52-af21-eadb222cb3e3.json | 22 ++++++++ ...-40019e87-b79f-422a-80bb-4de6d1fbc6e5.json | 22 ++++++++ ...-43f58cb7-726c-4df1-9d29-9c9895bc70c0.json | 22 ++++++++ ...-44d5b5de-68e6-4c27-8a0d-e51116336422.json | 22 ++++++++ ...-49634e37-bacd-42fa-8e35-5382b64cbc94.json | 22 ++++++++ ...-4ded8a7d-b5c2-432b-b724-2372aa63515c.json | 22 ++++++++ ...-4eae1bbe-3c9a-415c-a144-b5038569df2b.json | 22 ++++++++ ...-4f6ce357-813a-4a2b-b3b5-4447c0fc82a0.json | 22 ++++++++ ...-5316db06-960e-4684-bd57-2b3112b460cc.json | 22 ++++++++ ...-5a6756c6-bf12-469d-8632-4f9938d69fa0.json | 22 ++++++++ ...-69942da1-28f2-4d40-8396-de6d32587428.json | 22 ++++++++ ...-6d945722-b03a-4a3d-aed9-c1b38e2f21ba.json | 22 ++++++++ ...-706eb848-5bca-4493-85fb-f1dad419db61.json | 22 ++++++++ ...-70eb41dd-c719-4831-8cf3-a4e37edb6af1.json | 22 ++++++++ ...-7fe599d3-8b96-486c-9a54-dc279add04df.json | 22 ++++++++ ...-807515d2-a52a-4692-805e-ee863706c9e1.json | 22 ++++++++ ...-82951b40-ee7f-4e50-bc1d-a5190e9fe9db.json | 22 ++++++++ ...-86311023-ca57-4332-9924-f79db5068e28.json | 22 ++++++++ ...-947006c8-68ba-4a15-80c2-8a55862eee35.json | 22 ++++++++ ...-9d81c95f-9aef-4d1b-a581-d4aff5169379.json | 22 ++++++++ ...-9e91c4fe-d614-4b3b-9335-d0e259f9ee4c.json | 22 ++++++++ ...-a9d4a8d8-1485-4f26-a6c1-7c7aec0a0b1b.json | 22 ++++++++ ...-aa562e7c-a7e8-42f0-b168-2a69dd97c403.json | 22 ++++++++ ...-b4472724-77a9-4895-ba49-f048fee3eba1.json | 22 ++++++++ ...-b60d5fe7-416d-4bff-b271-8efa50588976.json | 22 ++++++++ ...-ba591e4c-8f4e-4691-8257-5996588ccd24.json | 22 ++++++++ ...-bb422a65-7a23-4ce4-8ba0-1a79f37ecf1f.json | 22 ++++++++ ...-c020de2b-98d8-434b-9f8f-b690e433e6f2.json | 22 ++++++++ ...-c324903c-20b5-40d0-9ef9-affccaebafd1.json | 22 ++++++++ ...-c7c825eb-5983-4296-8c17-a6b67b8b06c1.json | 22 ++++++++ ...-d5275f4c-6ba2-487c-b2e8-5be6675ac877.json | 22 ++++++++ ...-d6ef8b16-e11e-4927-9f0c-888138bcf8d1.json | 22 ++++++++ ...-da09db82-49ce-4911-b780-39d06ab4ce36.json | 22 ++++++++ ...-dff179df-7c91-4f34-a10e-c3971095000b.json | 22 ++++++++ ...-e4685b20-c860-479f-9a02-a47f5756ae65.json | 22 ++++++++ ...-e495aefe-c29f-4a2b-a874-9b9c836c4f25.json | 22 ++++++++ ...-ea07faa4-8287-490d-a8be-29552c3747f0.json | 22 ++++++++ ...-eb1f2fae-35fe-45fc-8bcb-089823294185.json | 22 ++++++++ ...-ec71bcd1-6781-4a17-8699-4dc9954fd090.json | 22 ++++++++ ...-ef016803-420b-4895-8c72-db4bea51e8bc.json | 22 ++++++++ ...-f3fb2c29-bc46-4de3-857f-eebb60dac6cb.json | 22 ++++++++ ...-f44b48be-de8c-4ca0-88b7-23b8307b76ce.json | 22 ++++++++ ...-f53bbf2f-f901-46eb-b85b-258d5dc95f06.json | 22 ++++++++ ...-f5e7c00a-00b8-4fba-968a-979ada142aec.json | 22 ++++++++ ...-f6b18162-98be-4d5f-ba5c-259db437a9e0.json | 22 ++++++++ ...-f8d1409f-f335-40d2-ad7f-03512a5dc99e.json | 22 ++++++++ 56 files changed, 1265 insertions(+) create mode 100644 objects/vulnerability/vulnerability--013f7af9-5d2c-4404-8dde-e74dd97acb6b.json create mode 100644 objects/vulnerability/vulnerability--0789a218-0f62-4558-ab04-e0044c05d3d6.json create mode 100644 objects/vulnerability/vulnerability--0bf0df1d-444d-408f-9803-14dee8de90dd.json create mode 100644 objects/vulnerability/vulnerability--16807199-bebc-4946-b96f-2565a3ddaa11.json create mode 100644 objects/vulnerability/vulnerability--1fd4b236-603c-48db-8935-34c70368e75e.json create mode 100644 objects/vulnerability/vulnerability--2df82062-3475-4611-b887-913d27ba3fb9.json create mode 100644 objects/vulnerability/vulnerability--366c46e8-430b-4bc6-820f-90e393ac692b.json create mode 100644 objects/vulnerability/vulnerability--3b248aa2-af5b-4d37-8384-e7a7153bfd57.json create mode 100644 objects/vulnerability/vulnerability--3dabbe3d-6594-405b-96e4-25de79edc8ba.json create mode 100644 objects/vulnerability/vulnerability--3dd84408-4282-4e52-af21-eadb222cb3e3.json create mode 100644 objects/vulnerability/vulnerability--40019e87-b79f-422a-80bb-4de6d1fbc6e5.json create mode 100644 objects/vulnerability/vulnerability--43f58cb7-726c-4df1-9d29-9c9895bc70c0.json create mode 100644 objects/vulnerability/vulnerability--44d5b5de-68e6-4c27-8a0d-e51116336422.json create mode 100644 objects/vulnerability/vulnerability--49634e37-bacd-42fa-8e35-5382b64cbc94.json create mode 100644 objects/vulnerability/vulnerability--4ded8a7d-b5c2-432b-b724-2372aa63515c.json create mode 100644 objects/vulnerability/vulnerability--4eae1bbe-3c9a-415c-a144-b5038569df2b.json create mode 100644 objects/vulnerability/vulnerability--4f6ce357-813a-4a2b-b3b5-4447c0fc82a0.json create mode 100644 objects/vulnerability/vulnerability--5316db06-960e-4684-bd57-2b3112b460cc.json create mode 100644 objects/vulnerability/vulnerability--5a6756c6-bf12-469d-8632-4f9938d69fa0.json create mode 100644 objects/vulnerability/vulnerability--69942da1-28f2-4d40-8396-de6d32587428.json create mode 100644 objects/vulnerability/vulnerability--6d945722-b03a-4a3d-aed9-c1b38e2f21ba.json create mode 100644 objects/vulnerability/vulnerability--706eb848-5bca-4493-85fb-f1dad419db61.json create mode 100644 objects/vulnerability/vulnerability--70eb41dd-c719-4831-8cf3-a4e37edb6af1.json create mode 100644 objects/vulnerability/vulnerability--7fe599d3-8b96-486c-9a54-dc279add04df.json create mode 100644 objects/vulnerability/vulnerability--807515d2-a52a-4692-805e-ee863706c9e1.json create mode 100644 objects/vulnerability/vulnerability--82951b40-ee7f-4e50-bc1d-a5190e9fe9db.json create mode 100644 objects/vulnerability/vulnerability--86311023-ca57-4332-9924-f79db5068e28.json create mode 100644 objects/vulnerability/vulnerability--947006c8-68ba-4a15-80c2-8a55862eee35.json create mode 100644 objects/vulnerability/vulnerability--9d81c95f-9aef-4d1b-a581-d4aff5169379.json create mode 100644 objects/vulnerability/vulnerability--9e91c4fe-d614-4b3b-9335-d0e259f9ee4c.json create mode 100644 objects/vulnerability/vulnerability--a9d4a8d8-1485-4f26-a6c1-7c7aec0a0b1b.json create mode 100644 objects/vulnerability/vulnerability--aa562e7c-a7e8-42f0-b168-2a69dd97c403.json create mode 100644 objects/vulnerability/vulnerability--b4472724-77a9-4895-ba49-f048fee3eba1.json create mode 100644 objects/vulnerability/vulnerability--b60d5fe7-416d-4bff-b271-8efa50588976.json create mode 100644 objects/vulnerability/vulnerability--ba591e4c-8f4e-4691-8257-5996588ccd24.json create mode 100644 objects/vulnerability/vulnerability--bb422a65-7a23-4ce4-8ba0-1a79f37ecf1f.json create mode 100644 objects/vulnerability/vulnerability--c020de2b-98d8-434b-9f8f-b690e433e6f2.json create mode 100644 objects/vulnerability/vulnerability--c324903c-20b5-40d0-9ef9-affccaebafd1.json create mode 100644 objects/vulnerability/vulnerability--c7c825eb-5983-4296-8c17-a6b67b8b06c1.json create mode 100644 objects/vulnerability/vulnerability--d5275f4c-6ba2-487c-b2e8-5be6675ac877.json create mode 100644 objects/vulnerability/vulnerability--d6ef8b16-e11e-4927-9f0c-888138bcf8d1.json create mode 100644 objects/vulnerability/vulnerability--da09db82-49ce-4911-b780-39d06ab4ce36.json create mode 100644 objects/vulnerability/vulnerability--dff179df-7c91-4f34-a10e-c3971095000b.json create mode 100644 objects/vulnerability/vulnerability--e4685b20-c860-479f-9a02-a47f5756ae65.json create mode 100644 objects/vulnerability/vulnerability--e495aefe-c29f-4a2b-a874-9b9c836c4f25.json create mode 100644 objects/vulnerability/vulnerability--ea07faa4-8287-490d-a8be-29552c3747f0.json create mode 100644 objects/vulnerability/vulnerability--eb1f2fae-35fe-45fc-8bcb-089823294185.json create mode 100644 objects/vulnerability/vulnerability--ec71bcd1-6781-4a17-8699-4dc9954fd090.json create mode 100644 objects/vulnerability/vulnerability--ef016803-420b-4895-8c72-db4bea51e8bc.json create mode 100644 objects/vulnerability/vulnerability--f3fb2c29-bc46-4de3-857f-eebb60dac6cb.json create mode 100644 objects/vulnerability/vulnerability--f44b48be-de8c-4ca0-88b7-23b8307b76ce.json create mode 100644 objects/vulnerability/vulnerability--f53bbf2f-f901-46eb-b85b-258d5dc95f06.json create mode 100644 objects/vulnerability/vulnerability--f5e7c00a-00b8-4fba-968a-979ada142aec.json create mode 100644 objects/vulnerability/vulnerability--f6b18162-98be-4d5f-ba5c-259db437a9e0.json create mode 100644 objects/vulnerability/vulnerability--f8d1409f-f335-40d2-ad7f-03512a5dc99e.json diff --git a/mapping.csv b/mapping.csv index 11c147fe33..a0065ec0b4 100644 --- a/mapping.csv +++ b/mapping.csv @@ -263722,3 +263722,58 @@ vulnerability,CVE-2024-47002,vulnerability--d83a7a1b-6467-493e-b104-a2dc2667354c vulnerability,CVE-2024-47140,vulnerability--0e0e478c-3503-4ac5-a7f5-d789b4a55e3a vulnerability,CVE-2024-45061,vulnerability--c7283160-64bb-490c-a2aa-24ee33c47136 vulnerability,CVE-2024-12084,vulnerability--a1d30699-062c-4403-99a8-e4974622db5f +vulnerability,CVE-2024-56295,vulnerability--a9d4a8d8-1485-4f26-a6c1-7c7aec0a0b1b +vulnerability,CVE-2024-8603,vulnerability--f3fb2c29-bc46-4de3-857f-eebb60dac6cb +vulnerability,CVE-2025-21088,vulnerability--4eae1bbe-3c9a-415c-a144-b5038569df2b +vulnerability,CVE-2025-22736,vulnerability--ef016803-420b-4895-8c72-db4bea51e8bc +vulnerability,CVE-2025-22752,vulnerability--aa562e7c-a7e8-42f0-b168-2a69dd97c403 +vulnerability,CVE-2025-22738,vulnerability--0789a218-0f62-4558-ab04-e0044c05d3d6 +vulnerability,CVE-2025-22760,vulnerability--16807199-bebc-4946-b96f-2565a3ddaa11 +vulnerability,CVE-2025-22587,vulnerability--ec71bcd1-6781-4a17-8699-4dc9954fd090 +vulnerability,CVE-2025-22788,vulnerability--3b248aa2-af5b-4d37-8384-e7a7153bfd57 +vulnerability,CVE-2025-22758,vulnerability--ba591e4c-8f4e-4691-8257-5996588ccd24 +vulnerability,CVE-2025-22744,vulnerability--f8d1409f-f335-40d2-ad7f-03512a5dc99e +vulnerability,CVE-2025-22317,vulnerability--d5275f4c-6ba2-487c-b2e8-5be6675ac877 +vulnerability,CVE-2025-22785,vulnerability--4ded8a7d-b5c2-432b-b724-2372aa63515c +vulnerability,CVE-2025-22782,vulnerability--4f6ce357-813a-4a2b-b3b5-4447c0fc82a0 +vulnerability,CVE-2025-22737,vulnerability--807515d2-a52a-4692-805e-ee863706c9e1 +vulnerability,CVE-2025-22747,vulnerability--f53bbf2f-f901-46eb-b85b-258d5dc95f06 +vulnerability,CVE-2025-22749,vulnerability--f6b18162-98be-4d5f-ba5c-259db437a9e0 +vulnerability,CVE-2025-22764,vulnerability--86311023-ca57-4332-9924-f79db5068e28 +vulnerability,CVE-2025-22761,vulnerability--49634e37-bacd-42fa-8e35-5382b64cbc94 +vulnerability,CVE-2025-22798,vulnerability--b4472724-77a9-4895-ba49-f048fee3eba1 +vulnerability,CVE-2025-22779,vulnerability--f5e7c00a-00b8-4fba-968a-979ada142aec +vulnerability,CVE-2025-22780,vulnerability--1fd4b236-603c-48db-8935-34c70368e75e +vulnerability,CVE-2025-22769,vulnerability--e4685b20-c860-479f-9a02-a47f5756ae65 +vulnerability,CVE-2025-22766,vulnerability--5a6756c6-bf12-469d-8632-4f9938d69fa0 +vulnerability,CVE-2025-22329,vulnerability--9e91c4fe-d614-4b3b-9335-d0e259f9ee4c +vulnerability,CVE-2025-22797,vulnerability--eb1f2fae-35fe-45fc-8bcb-089823294185 +vulnerability,CVE-2025-22793,vulnerability--da09db82-49ce-4911-b780-39d06ab4ce36 +vulnerability,CVE-2025-22799,vulnerability--9d81c95f-9aef-4d1b-a581-d4aff5169379 +vulnerability,CVE-2025-22745,vulnerability--44d5b5de-68e6-4c27-8a0d-e51116336422 +vulnerability,CVE-2025-22787,vulnerability--70eb41dd-c719-4831-8cf3-a4e37edb6af1 +vulnerability,CVE-2025-22762,vulnerability--bb422a65-7a23-4ce4-8ba0-1a79f37ecf1f +vulnerability,CVE-2025-22765,vulnerability--5316db06-960e-4684-bd57-2b3112b460cc +vulnerability,CVE-2025-22751,vulnerability--40019e87-b79f-422a-80bb-4de6d1fbc6e5 +vulnerability,CVE-2025-22759,vulnerability--c7c825eb-5983-4296-8c17-a6b67b8b06c1 +vulnerability,CVE-2025-22784,vulnerability--dff179df-7c91-4f34-a10e-c3971095000b +vulnerability,CVE-2025-22346,vulnerability--6d945722-b03a-4a3d-aed9-c1b38e2f21ba +vulnerability,CVE-2025-22781,vulnerability--e495aefe-c29f-4a2b-a874-9b9c836c4f25 +vulnerability,CVE-2025-22773,vulnerability--706eb848-5bca-4493-85fb-f1dad419db61 +vulnerability,CVE-2025-22742,vulnerability--c324903c-20b5-40d0-9ef9-affccaebafd1 +vulnerability,CVE-2025-22778,vulnerability--b60d5fe7-416d-4bff-b271-8efa50588976 +vulnerability,CVE-2025-22753,vulnerability--013f7af9-5d2c-4404-8dde-e74dd97acb6b +vulnerability,CVE-2025-22754,vulnerability--7fe599d3-8b96-486c-9a54-dc279add04df +vulnerability,CVE-2025-22776,vulnerability--ea07faa4-8287-490d-a8be-29552c3747f0 +vulnerability,CVE-2025-22724,vulnerability--947006c8-68ba-4a15-80c2-8a55862eee35 +vulnerability,CVE-2025-22734,vulnerability--82951b40-ee7f-4e50-bc1d-a5190e9fe9db +vulnerability,CVE-2025-22795,vulnerability--0bf0df1d-444d-408f-9803-14dee8de90dd +vulnerability,CVE-2025-22786,vulnerability--3dd84408-4282-4e52-af21-eadb222cb3e3 +vulnerability,CVE-2025-22750,vulnerability--d6ef8b16-e11e-4927-9f0c-888138bcf8d1 +vulnerability,CVE-2025-22729,vulnerability--69942da1-28f2-4d40-8396-de6d32587428 +vulnerability,CVE-2025-22968,vulnerability--c020de2b-98d8-434b-9f8f-b690e433e6f2 +vulnerability,CVE-2025-22746,vulnerability--43f58cb7-726c-4df1-9d29-9c9895bc70c0 +vulnerability,CVE-2025-22731,vulnerability--f44b48be-de8c-4ca0-88b7-23b8307b76ce +vulnerability,CVE-2025-22743,vulnerability--3dabbe3d-6594-405b-96e4-25de79edc8ba +vulnerability,CVE-2025-22748,vulnerability--2df82062-3475-4611-b887-913d27ba3fb9 +vulnerability,CVE-2025-22755,vulnerability--366c46e8-430b-4bc6-820f-90e393ac692b diff --git a/objects/vulnerability/vulnerability--013f7af9-5d2c-4404-8dde-e74dd97acb6b.json b/objects/vulnerability/vulnerability--013f7af9-5d2c-4404-8dde-e74dd97acb6b.json new file mode 100644 index 0000000000..24bf4e31a6 --- /dev/null +++ b/objects/vulnerability/vulnerability--013f7af9-5d2c-4404-8dde-e74dd97acb6b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8bbb165e-a16a-4521-9517-3b767e4f4fd3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--013f7af9-5d2c-4404-8dde-e74dd97acb6b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.328555Z", + "modified": "2025-01-15T16:23:56.328555Z", + "name": "CVE-2025-22753", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dueclic turboSMTP allows Reflected XSS.This issue affects turboSMTP: from n/a through 4.6.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22753" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0789a218-0f62-4558-ab04-e0044c05d3d6.json b/objects/vulnerability/vulnerability--0789a218-0f62-4558-ab04-e0044c05d3d6.json new file mode 100644 index 0000000000..12ba28c7a6 --- /dev/null +++ b/objects/vulnerability/vulnerability--0789a218-0f62-4558-ab04-e0044c05d3d6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--36276865-9884-4c09-81a3-5bc0a1d79308", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0789a218-0f62-4558-ab04-e0044c05d3d6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.264474Z", + "modified": "2025-01-15T16:23:56.264474Z", + "name": "CVE-2025-22738", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TechnoWich WP ULike allows Stored XSS.This issue affects WP ULike: from n/a through 4.7.6.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22738" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0bf0df1d-444d-408f-9803-14dee8de90dd.json b/objects/vulnerability/vulnerability--0bf0df1d-444d-408f-9803-14dee8de90dd.json new file mode 100644 index 0000000000..4a695b43d2 --- /dev/null +++ b/objects/vulnerability/vulnerability--0bf0df1d-444d-408f-9803-14dee8de90dd.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--34e88808-00b4-41a0-831e-bef0f1d008ec", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0bf0df1d-444d-408f-9803-14dee8de90dd", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.33844Z", + "modified": "2025-01-15T16:23:56.33844Z", + "name": "CVE-2025-22795", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Thorsten Krug Multilang Contact Form allows Reflected XSS.This issue affects Multilang Contact Form: from n/a through 1.5.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22795" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--16807199-bebc-4946-b96f-2565a3ddaa11.json b/objects/vulnerability/vulnerability--16807199-bebc-4946-b96f-2565a3ddaa11.json new file mode 100644 index 0000000000..5779849add --- /dev/null +++ b/objects/vulnerability/vulnerability--16807199-bebc-4946-b96f-2565a3ddaa11.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1dbf608d-1889-4174-93dc-b30a866618af", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--16807199-bebc-4946-b96f-2565a3ddaa11", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.26583Z", + "modified": "2025-01-15T16:23:56.26583Z", + "name": "CVE-2025-22760", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodeBard CodeBard Help Desk allows Reflected XSS.This issue affects CodeBard Help Desk: from n/a through 1.1.2.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22760" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1fd4b236-603c-48db-8935-34c70368e75e.json b/objects/vulnerability/vulnerability--1fd4b236-603c-48db-8935-34c70368e75e.json new file mode 100644 index 0000000000..b43a49478b --- /dev/null +++ b/objects/vulnerability/vulnerability--1fd4b236-603c-48db-8935-34c70368e75e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--97039f26-6b07-464a-b5b6-4019d365c150", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1fd4b236-603c-48db-8935-34c70368e75e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.296957Z", + "modified": "2025-01-15T16:23:56.296957Z", + "name": "CVE-2025-22780", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alexey Yuzhakov wp-pano allows Stored XSS.This issue affects wp-pano: from n/a through 1.17.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22780" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2df82062-3475-4611-b887-913d27ba3fb9.json b/objects/vulnerability/vulnerability--2df82062-3475-4611-b887-913d27ba3fb9.json new file mode 100644 index 0000000000..87f7ebb405 --- /dev/null +++ b/objects/vulnerability/vulnerability--2df82062-3475-4611-b887-913d27ba3fb9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--411ad0f6-431a-48f1-9d4a-942d7d010ce9", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2df82062-3475-4611-b887-913d27ba3fb9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.349095Z", + "modified": "2025-01-15T16:23:56.349095Z", + "name": "CVE-2025-22748", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SetMore Appointments SetMore Theme – Custom Post Types allows Stored XSS.This issue affects SetMore Theme – Custom Post Types: from n/a through 1.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22748" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--366c46e8-430b-4bc6-820f-90e393ac692b.json b/objects/vulnerability/vulnerability--366c46e8-430b-4bc6-820f-90e393ac692b.json new file mode 100644 index 0000000000..a59296c64e --- /dev/null +++ b/objects/vulnerability/vulnerability--366c46e8-430b-4bc6-820f-90e393ac692b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--80c50326-5f1c-4900-a822-8e69656dd9e4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--366c46e8-430b-4bc6-820f-90e393ac692b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.350255Z", + "modified": "2025-01-15T16:23:56.350255Z", + "name": "CVE-2025-22755", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in James Bavington WP Headmaster allows Reflected XSS.This issue affects WP Headmaster: from n/a through 0.3.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22755" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3b248aa2-af5b-4d37-8384-e7a7153bfd57.json b/objects/vulnerability/vulnerability--3b248aa2-af5b-4d37-8384-e7a7153bfd57.json new file mode 100644 index 0000000000..4552e6736e --- /dev/null +++ b/objects/vulnerability/vulnerability--3b248aa2-af5b-4d37-8384-e7a7153bfd57.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6218e91e-07d3-4270-963b-0d1f3ed6d1dd", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3b248aa2-af5b-4d37-8384-e7a7153bfd57", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.273222Z", + "modified": "2025-01-15T16:23:56.273222Z", + "name": "CVE-2025-22788", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Codexpert, Inc CoDesigner WooCommerce Builder for Elementor allows Stored XSS.This issue affects CoDesigner WooCommerce Builder for Elementor: from n/a through 4.7.17.2.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22788" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3dabbe3d-6594-405b-96e4-25de79edc8ba.json b/objects/vulnerability/vulnerability--3dabbe3d-6594-405b-96e4-25de79edc8ba.json new file mode 100644 index 0000000000..0e870a515c --- /dev/null +++ b/objects/vulnerability/vulnerability--3dabbe3d-6594-405b-96e4-25de79edc8ba.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f237bfaf-7062-405a-b247-6f33cd7c8945", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3dabbe3d-6594-405b-96e4-25de79edc8ba", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.347839Z", + "modified": "2025-01-15T16:23:56.347839Z", + "name": "CVE-2025-22743", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mohsin Rasool Twitter Bootstrap Collapse aka Accordian Shortcode allows DOM-Based XSS.This issue affects Twitter Bootstrap Collapse aka Accordian Shortcode: from n/a through 1.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22743" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3dd84408-4282-4e52-af21-eadb222cb3e3.json b/objects/vulnerability/vulnerability--3dd84408-4282-4e52-af21-eadb222cb3e3.json new file mode 100644 index 0000000000..6f3edb8228 --- /dev/null +++ b/objects/vulnerability/vulnerability--3dd84408-4282-4e52-af21-eadb222cb3e3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--798094b8-7bb4-451b-9a6f-ef477cf4d3d4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3dd84408-4282-4e52-af21-eadb222cb3e3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.339968Z", + "modified": "2025-01-15T16:23:56.339968Z", + "name": "CVE-2025-22786", + "description": "Path Traversal vulnerability in ElementInvader ElementInvader Addons for Elementor allows PHP Local File Inclusion.This issue affects ElementInvader Addons for Elementor: from n/a through 1.2.6.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22786" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--40019e87-b79f-422a-80bb-4de6d1fbc6e5.json b/objects/vulnerability/vulnerability--40019e87-b79f-422a-80bb-4de6d1fbc6e5.json new file mode 100644 index 0000000000..17523e6726 --- /dev/null +++ b/objects/vulnerability/vulnerability--40019e87-b79f-422a-80bb-4de6d1fbc6e5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--997973e2-200e-435b-abe8-e240f228e7ec", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--40019e87-b79f-422a-80bb-4de6d1fbc6e5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.318905Z", + "modified": "2025-01-15T16:23:56.318905Z", + "name": "CVE-2025-22751", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mighty Digital Partners allows Reflected XSS.This issue affects Partners: from n/a through 0.2.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22751" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--43f58cb7-726c-4df1-9d29-9c9895bc70c0.json b/objects/vulnerability/vulnerability--43f58cb7-726c-4df1-9d29-9c9895bc70c0.json new file mode 100644 index 0000000000..6eeb4afa9e --- /dev/null +++ b/objects/vulnerability/vulnerability--43f58cb7-726c-4df1-9d29-9c9895bc70c0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--cc62a5fa-223f-4223-ad35-bb90217856d2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--43f58cb7-726c-4df1-9d29-9c9895bc70c0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.345099Z", + "modified": "2025-01-15T16:23:56.345099Z", + "name": "CVE-2025-22746", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HireHive HireHive Job Plugin allows Stored XSS.This issue affects HireHive Job Plugin: from n/a through 2.9.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22746" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--44d5b5de-68e6-4c27-8a0d-e51116336422.json b/objects/vulnerability/vulnerability--44d5b5de-68e6-4c27-8a0d-e51116336422.json new file mode 100644 index 0000000000..d48f2120a0 --- /dev/null +++ b/objects/vulnerability/vulnerability--44d5b5de-68e6-4c27-8a0d-e51116336422.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--55987bd4-315c-41b6-b901-bef3e16857de", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--44d5b5de-68e6-4c27-8a0d-e51116336422", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.310979Z", + "modified": "2025-01-15T16:23:56.310979Z", + "name": "CVE-2025-22745", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Björn Weinbrenner Navigation Du Lapin Blanc allows DOM-Based XSS.This issue affects Navigation Du Lapin Blanc: from n/a through 1.1.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22745" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--49634e37-bacd-42fa-8e35-5382b64cbc94.json b/objects/vulnerability/vulnerability--49634e37-bacd-42fa-8e35-5382b64cbc94.json new file mode 100644 index 0000000000..d6d364f394 --- /dev/null +++ b/objects/vulnerability/vulnerability--49634e37-bacd-42fa-8e35-5382b64cbc94.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--53a3a009-c9e5-49ae-b448-5a1639ee0335", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--49634e37-bacd-42fa-8e35-5382b64cbc94", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.291642Z", + "modified": "2025-01-15T16:23:56.291642Z", + "name": "CVE-2025-22761", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Olaf Lederer Ajax Contact Form allows Stored XSS.This issue affects Ajax Contact Form: from n/a through 1.2.5.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22761" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4ded8a7d-b5c2-432b-b724-2372aa63515c.json b/objects/vulnerability/vulnerability--4ded8a7d-b5c2-432b-b724-2372aa63515c.json new file mode 100644 index 0000000000..0a0cea4c7d --- /dev/null +++ b/objects/vulnerability/vulnerability--4ded8a7d-b5c2-432b-b724-2372aa63515c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a1ca6829-5ec8-4f2d-ade7-9449b234714c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4ded8a7d-b5c2-432b-b724-2372aa63515c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.27997Z", + "modified": "2025-01-15T16:23:56.27997Z", + "name": "CVE-2025-22785", + "description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ComMotion Course Booking System allows SQL Injection.This issue affects Course Booking System: from n/a through 6.0.5.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22785" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4eae1bbe-3c9a-415c-a144-b5038569df2b.json b/objects/vulnerability/vulnerability--4eae1bbe-3c9a-415c-a144-b5038569df2b.json new file mode 100644 index 0000000000..184349d5b9 --- /dev/null +++ b/objects/vulnerability/vulnerability--4eae1bbe-3c9a-415c-a144-b5038569df2b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7fb751ba-5d6e-40d7-97fb-c5cd0efdd4f5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4eae1bbe-3c9a-415c-a144-b5038569df2b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.194995Z", + "modified": "2025-01-15T16:23:56.194995Z", + "name": "CVE-2025-21088", + "description": "Mattermost versions 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly validate the style of proto supplied to an action's style in post.props.attachments, which allows an attacker to crash the frontend via crafted malicious input.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21088" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4f6ce357-813a-4a2b-b3b5-4447c0fc82a0.json b/objects/vulnerability/vulnerability--4f6ce357-813a-4a2b-b3b5-4447c0fc82a0.json new file mode 100644 index 0000000000..8f3d58214f --- /dev/null +++ b/objects/vulnerability/vulnerability--4f6ce357-813a-4a2b-b3b5-4447c0fc82a0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4fe1b8ac-1162-49ec-ad32-9b63f008c4c4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4f6ce357-813a-4a2b-b3b5-4447c0fc82a0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.281251Z", + "modified": "2025-01-15T16:23:56.281251Z", + "name": "CVE-2025-22782", + "description": "Unrestricted Upload of File with Dangerous Type vulnerability in Web Ready Now WR Price List Manager For Woocommerce allows Upload a Web Shell to a Web Server.This issue affects WR Price List Manager For Woocommerce: from n/a through 1.0.8.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22782" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5316db06-960e-4684-bd57-2b3112b460cc.json b/objects/vulnerability/vulnerability--5316db06-960e-4684-bd57-2b3112b460cc.json new file mode 100644 index 0000000000..d66a14e932 --- /dev/null +++ b/objects/vulnerability/vulnerability--5316db06-960e-4684-bd57-2b3112b460cc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--003a7b99-44f3-4554-b4db-66238240b75d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5316db06-960e-4684-bd57-2b3112b460cc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.31597Z", + "modified": "2025-01-15T16:23:56.31597Z", + "name": "CVE-2025-22765", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Uri Weil WP Order By allows Reflected XSS.This issue affects WP Order By: from n/a through 1.4.2.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22765" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5a6756c6-bf12-469d-8632-4f9938d69fa0.json b/objects/vulnerability/vulnerability--5a6756c6-bf12-469d-8632-4f9938d69fa0.json new file mode 100644 index 0000000000..5d535a55ec --- /dev/null +++ b/objects/vulnerability/vulnerability--5a6756c6-bf12-469d-8632-4f9938d69fa0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--16324128-ef26-4d67-bdc2-bee64d5dd110", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5a6756c6-bf12-469d-8632-4f9938d69fa0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.301231Z", + "modified": "2025-01-15T16:23:56.301231Z", + "name": "CVE-2025-22766", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Masoud Amini Zarinpal Paid Download allows Reflected XSS.This issue affects Zarinpal Paid Download: from n/a through 2.3.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22766" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--69942da1-28f2-4d40-8396-de6d32587428.json b/objects/vulnerability/vulnerability--69942da1-28f2-4d40-8396-de6d32587428.json new file mode 100644 index 0000000000..5599e83a4d --- /dev/null +++ b/objects/vulnerability/vulnerability--69942da1-28f2-4d40-8396-de6d32587428.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--044626df-1a1f-4dad-8fff-b0013fe0e756", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--69942da1-28f2-4d40-8396-de6d32587428", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.342297Z", + "modified": "2025-01-15T16:23:56.342297Z", + "name": "CVE-2025-22729", + "description": "Missing Authorization vulnerability in Infomaniak Staff VOD Infomaniak allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects VOD Infomaniak: from n/a through 1.5.9.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22729" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6d945722-b03a-4a3d-aed9-c1b38e2f21ba.json b/objects/vulnerability/vulnerability--6d945722-b03a-4a3d-aed9-c1b38e2f21ba.json new file mode 100644 index 0000000000..291971ce7d --- /dev/null +++ b/objects/vulnerability/vulnerability--6d945722-b03a-4a3d-aed9-c1b38e2f21ba.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--409e8046-8aaa-47b4-af44-fa07ecb17e27", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6d945722-b03a-4a3d-aed9-c1b38e2f21ba", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.322678Z", + "modified": "2025-01-15T16:23:56.322678Z", + "name": "CVE-2025-22346", + "description": "Server-Side Request Forgery (SSRF) vulnerability in Faizaan Gagan Course Migration for LearnDash allows Server Side Request Forgery.This issue affects Course Migration for LearnDash: from 1.0.2 through n/a.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22346" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--706eb848-5bca-4493-85fb-f1dad419db61.json b/objects/vulnerability/vulnerability--706eb848-5bca-4493-85fb-f1dad419db61.json new file mode 100644 index 0000000000..b7a43aba08 --- /dev/null +++ b/objects/vulnerability/vulnerability--706eb848-5bca-4493-85fb-f1dad419db61.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--677b1c8b-b1f1-4f18-a3ab-c56b36311dca", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--706eb848-5bca-4493-85fb-f1dad419db61", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.325119Z", + "modified": "2025-01-15T16:23:56.325119Z", + "name": "CVE-2025-22773", + "description": "Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in WPChill Htaccess File Editor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Htaccess File Editor: from n/a through 1.0.19.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22773" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--70eb41dd-c719-4831-8cf3-a4e37edb6af1.json b/objects/vulnerability/vulnerability--70eb41dd-c719-4831-8cf3-a4e37edb6af1.json new file mode 100644 index 0000000000..ba15a4767e --- /dev/null +++ b/objects/vulnerability/vulnerability--70eb41dd-c719-4831-8cf3-a4e37edb6af1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bd06c60a-86af-4655-ab53-52cdc01f08fa", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--70eb41dd-c719-4831-8cf3-a4e37edb6af1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.31255Z", + "modified": "2025-01-15T16:23:56.31255Z", + "name": "CVE-2025-22787", + "description": "Missing Authorization vulnerability in bPlugins LLC Button Block allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Button Block: from n/a through 1.1.5.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22787" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7fe599d3-8b96-486c-9a54-dc279add04df.json b/objects/vulnerability/vulnerability--7fe599d3-8b96-486c-9a54-dc279add04df.json new file mode 100644 index 0000000000..2b8e907851 --- /dev/null +++ b/objects/vulnerability/vulnerability--7fe599d3-8b96-486c-9a54-dc279add04df.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bd5a090d-f8f4-44cc-af45-3ddc01a1621b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7fe599d3-8b96-486c-9a54-dc279add04df", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.330173Z", + "modified": "2025-01-15T16:23:56.330173Z", + "name": "CVE-2025-22754", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Berkman Center for Internet & Society Amber allows Reflected XSS.This issue affects Amber: from n/a through 1.4.4.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22754" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--807515d2-a52a-4692-805e-ee863706c9e1.json b/objects/vulnerability/vulnerability--807515d2-a52a-4692-805e-ee863706c9e1.json new file mode 100644 index 0000000000..2bfffca10b --- /dev/null +++ b/objects/vulnerability/vulnerability--807515d2-a52a-4692-805e-ee863706c9e1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8f9a20b7-9361-43fb-ba73-cf5a3da6774f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--807515d2-a52a-4692-805e-ee863706c9e1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.282565Z", + "modified": "2025-01-15T16:23:56.282565Z", + "name": "CVE-2025-22737", + "description": "Missing Authorization vulnerability in MagePeople Team WpTravelly allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects WpTravelly: from n/a through 1.8.5.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22737" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--82951b40-ee7f-4e50-bc1d-a5190e9fe9db.json b/objects/vulnerability/vulnerability--82951b40-ee7f-4e50-bc1d-a5190e9fe9db.json new file mode 100644 index 0000000000..53e9a997eb --- /dev/null +++ b/objects/vulnerability/vulnerability--82951b40-ee7f-4e50-bc1d-a5190e9fe9db.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4f62a110-58c5-4ff9-a159-c68eb3a5c1c0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--82951b40-ee7f-4e50-bc1d-a5190e9fe9db", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.337394Z", + "modified": "2025-01-15T16:23:56.337394Z", + "name": "CVE-2025-22734", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Data443 Posts Footer Manager allows Stored XSS.This issue affects Posts Footer Manager: from n/a through 2.1.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22734" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--86311023-ca57-4332-9924-f79db5068e28.json b/objects/vulnerability/vulnerability--86311023-ca57-4332-9924-f79db5068e28.json new file mode 100644 index 0000000000..f4539e77db --- /dev/null +++ b/objects/vulnerability/vulnerability--86311023-ca57-4332-9924-f79db5068e28.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--76075859-36d2-4250-ad42-cabf5124e338", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--86311023-ca57-4332-9924-f79db5068e28", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.288509Z", + "modified": "2025-01-15T16:23:56.288509Z", + "name": "CVE-2025-22764", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpwebs Team - VA Jariwala WP Post Corrector allows Reflected XSS.This issue affects WP Post Corrector: from n/a through 1.0.2.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22764" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--947006c8-68ba-4a15-80c2-8a55862eee35.json b/objects/vulnerability/vulnerability--947006c8-68ba-4a15-80c2-8a55862eee35.json new file mode 100644 index 0000000000..369c92b1ba --- /dev/null +++ b/objects/vulnerability/vulnerability--947006c8-68ba-4a15-80c2-8a55862eee35.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0cc25198-3351-470c-8949-d084c3a33830", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--947006c8-68ba-4a15-80c2-8a55862eee35", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.335947Z", + "modified": "2025-01-15T16:23:56.335947Z", + "name": "CVE-2025-22724", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MojofyWP Product Carousel For WooCommerce – WoorouSell allows Stored XSS.This issue affects Product Carousel For WooCommerce – WoorouSell: from n/a through 1.1.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22724" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9d81c95f-9aef-4d1b-a581-d4aff5169379.json b/objects/vulnerability/vulnerability--9d81c95f-9aef-4d1b-a581-d4aff5169379.json new file mode 100644 index 0000000000..23af4971cc --- /dev/null +++ b/objects/vulnerability/vulnerability--9d81c95f-9aef-4d1b-a581-d4aff5169379.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9e4ac386-2f86-4f42-9f58-c04aed55a711", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9d81c95f-9aef-4d1b-a581-d4aff5169379", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.309215Z", + "modified": "2025-01-15T16:23:56.309215Z", + "name": "CVE-2025-22799", + "description": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Vertim Coders Neon Product Designer allows SQL Injection.This issue affects Neon Product Designer: from n/a through 2.1.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22799" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9e91c4fe-d614-4b3b-9335-d0e259f9ee4c.json b/objects/vulnerability/vulnerability--9e91c4fe-d614-4b3b-9335-d0e259f9ee4c.json new file mode 100644 index 0000000000..80bac7b6e2 --- /dev/null +++ b/objects/vulnerability/vulnerability--9e91c4fe-d614-4b3b-9335-d0e259f9ee4c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a680437d-d4bb-476f-972e-b4a758bae603", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9e91c4fe-d614-4b3b-9335-d0e259f9ee4c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.303674Z", + "modified": "2025-01-15T16:23:56.303674Z", + "name": "CVE-2025-22329", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AGILELOGIX Free Google Maps allows Stored XSS.This issue affects Free Google Maps: from n/a through 1.0.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22329" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a9d4a8d8-1485-4f26-a6c1-7c7aec0a0b1b.json b/objects/vulnerability/vulnerability--a9d4a8d8-1485-4f26-a6c1-7c7aec0a0b1b.json new file mode 100644 index 0000000000..ed7d8309d7 --- /dev/null +++ b/objects/vulnerability/vulnerability--a9d4a8d8-1485-4f26-a6c1-7c7aec0a0b1b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--abdfe784-3a73-4da5-b1ff-9ec31b0cfde6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a9d4a8d8-1485-4f26-a6c1-7c7aec0a0b1b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:49.336179Z", + "modified": "2025-01-15T16:23:49.336179Z", + "name": "CVE-2024-56295", + "description": "Missing Authorization vulnerability in Poll Maker Team Poll Maker allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Poll Maker: from n/a through 5.5.6.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-56295" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--aa562e7c-a7e8-42f0-b168-2a69dd97c403.json b/objects/vulnerability/vulnerability--aa562e7c-a7e8-42f0-b168-2a69dd97c403.json new file mode 100644 index 0000000000..13d723c364 --- /dev/null +++ b/objects/vulnerability/vulnerability--aa562e7c-a7e8-42f0-b168-2a69dd97c403.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3cdb3874-0694-4195-91b2-e8fe1f470ce6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--aa562e7c-a7e8-42f0-b168-2a69dd97c403", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.260928Z", + "modified": "2025-01-15T16:23:56.260928Z", + "name": "CVE-2025-22752", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GSheetConnector GSheetConnector for Forminator Forms allows Reflected XSS.This issue affects GSheetConnector for Forminator Forms: from n/a through 1.0.11.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22752" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b4472724-77a9-4895-ba49-f048fee3eba1.json b/objects/vulnerability/vulnerability--b4472724-77a9-4895-ba49-f048fee3eba1.json new file mode 100644 index 0000000000..9f6358a142 --- /dev/null +++ b/objects/vulnerability/vulnerability--b4472724-77a9-4895-ba49-f048fee3eba1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--64d99014-0155-4949-a721-e11cafe67a8d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b4472724-77a9-4895-ba49-f048fee3eba1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.292845Z", + "modified": "2025-01-15T16:23:56.292845Z", + "name": "CVE-2025-22798", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CHR Designer Responsive jQuery Slider allows Stored XSS.This issue affects Responsive jQuery Slider: from n/a through 1.1.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22798" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b60d5fe7-416d-4bff-b271-8efa50588976.json b/objects/vulnerability/vulnerability--b60d5fe7-416d-4bff-b271-8efa50588976.json new file mode 100644 index 0000000000..180812ef79 --- /dev/null +++ b/objects/vulnerability/vulnerability--b60d5fe7-416d-4bff-b271-8efa50588976.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ceb1ac34-9a1d-4c27-8e75-6a2515292601", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b60d5fe7-416d-4bff-b271-8efa50588976", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.327282Z", + "modified": "2025-01-15T16:23:56.327282Z", + "name": "CVE-2025-22778", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lijit Networks Inc. and Crowd Favorite Lijit Search allows Reflected XSS.This issue affects Lijit Search: from n/a through 1.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22778" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ba591e4c-8f4e-4691-8257-5996588ccd24.json b/objects/vulnerability/vulnerability--ba591e4c-8f4e-4691-8257-5996588ccd24.json new file mode 100644 index 0000000000..0fa4abfb5f --- /dev/null +++ b/objects/vulnerability/vulnerability--ba591e4c-8f4e-4691-8257-5996588ccd24.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c8053210-a4b5-4669-99ef-eba7192b5864", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ba591e4c-8f4e-4691-8257-5996588ccd24", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.274748Z", + "modified": "2025-01-15T16:23:56.274748Z", + "name": "CVE-2025-22758", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in aiwp Elementor AI Addons allows DOM-Based XSS.This issue affects Elementor AI Addons: from n/a through 2.2.1.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22758" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bb422a65-7a23-4ce4-8ba0-1a79f37ecf1f.json b/objects/vulnerability/vulnerability--bb422a65-7a23-4ce4-8ba0-1a79f37ecf1f.json new file mode 100644 index 0000000000..a8f7fd1a2c --- /dev/null +++ b/objects/vulnerability/vulnerability--bb422a65-7a23-4ce4-8ba0-1a79f37ecf1f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2ef475fa-26c8-459b-b13f-fdb79225e3e9", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bb422a65-7a23-4ce4-8ba0-1a79f37ecf1f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.314359Z", + "modified": "2025-01-15T16:23:56.314359Z", + "name": "CVE-2025-22762", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Octrace Studio WordPress HelpDesk & Support Ticket System Plugin – Octrace Support allows Stored XSS.This issue affects WordPress HelpDesk & Support Ticket System Plugin – Octrace Support: from n/a through 1.2.7.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22762" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c020de2b-98d8-434b-9f8f-b690e433e6f2.json b/objects/vulnerability/vulnerability--c020de2b-98d8-434b-9f8f-b690e433e6f2.json new file mode 100644 index 0000000000..98dac2cb1f --- /dev/null +++ b/objects/vulnerability/vulnerability--c020de2b-98d8-434b-9f8f-b690e433e6f2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--525f69cb-52e5-4e76-af6a-703fc27dcf83", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c020de2b-98d8-434b-9f8f-b690e433e6f2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.344171Z", + "modified": "2025-01-15T16:23:56.344171Z", + "name": "CVE-2025-22968", + "description": "An issue in D-Link DWR-M972V 1.05SSG allows a remote attacker to execute arbitrary code via SSH using root account without restrictions", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22968" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c324903c-20b5-40d0-9ef9-affccaebafd1.json b/objects/vulnerability/vulnerability--c324903c-20b5-40d0-9ef9-affccaebafd1.json new file mode 100644 index 0000000000..f3e9825e19 --- /dev/null +++ b/objects/vulnerability/vulnerability--c324903c-20b5-40d0-9ef9-affccaebafd1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--64517177-041a-4c5f-a265-baf20638e296", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c324903c-20b5-40d0-9ef9-affccaebafd1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.326147Z", + "modified": "2025-01-15T16:23:56.326147Z", + "name": "CVE-2025-22742", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in falldeaf WP ViewSTL allows DOM-Based XSS.This issue affects WP ViewSTL: from n/a through 1.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22742" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c7c825eb-5983-4296-8c17-a6b67b8b06c1.json b/objects/vulnerability/vulnerability--c7c825eb-5983-4296-8c17-a6b67b8b06c1.json new file mode 100644 index 0000000000..000c4fef3b --- /dev/null +++ b/objects/vulnerability/vulnerability--c7c825eb-5983-4296-8c17-a6b67b8b06c1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--62d9921e-04c3-4b1e-8826-a5e609188f8a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c7c825eb-5983-4296-8c17-a6b67b8b06c1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.320213Z", + "modified": "2025-01-15T16:23:56.320213Z", + "name": "CVE-2025-22759", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BoldGrid Post and Page Builder by BoldGrid – Visual Drag and Drop Editor allows Stored XSS.This issue affects Post and Page Builder by BoldGrid – Visual Drag and Drop Editor: from n/a through 1.27.4.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22759" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d5275f4c-6ba2-487c-b2e8-5be6675ac877.json b/objects/vulnerability/vulnerability--d5275f4c-6ba2-487c-b2e8-5be6675ac877.json new file mode 100644 index 0000000000..e0e6196d6a --- /dev/null +++ b/objects/vulnerability/vulnerability--d5275f4c-6ba2-487c-b2e8-5be6675ac877.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b1aad444-71c2-4d53-b232-f9052e1825b5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d5275f4c-6ba2-487c-b2e8-5be6675ac877", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.278794Z", + "modified": "2025-01-15T16:23:56.278794Z", + "name": "CVE-2025-22317", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in galleryape Photo Gallery – Image Gallery by Ape allows Reflected XSS.This issue affects Photo Gallery – Image Gallery by Ape: from n/a through 2.2.8.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22317" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d6ef8b16-e11e-4927-9f0c-888138bcf8d1.json b/objects/vulnerability/vulnerability--d6ef8b16-e11e-4927-9f0c-888138bcf8d1.json new file mode 100644 index 0000000000..fa37877f42 --- /dev/null +++ b/objects/vulnerability/vulnerability--d6ef8b16-e11e-4927-9f0c-888138bcf8d1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--40ca76b0-6062-4d63-9aa2-1fb4cd8f509b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d6ef8b16-e11e-4927-9f0c-888138bcf8d1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.34122Z", + "modified": "2025-01-15T16:23:56.34122Z", + "name": "CVE-2025-22750", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tarak Patel Post Carousel & Slider allows Reflected XSS.This issue affects Post Carousel & Slider: from n/a through 1.0.4.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22750" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--da09db82-49ce-4911-b780-39d06ab4ce36.json b/objects/vulnerability/vulnerability--da09db82-49ce-4911-b780-39d06ab4ce36.json new file mode 100644 index 0000000000..4da6c3469d --- /dev/null +++ b/objects/vulnerability/vulnerability--da09db82-49ce-4911-b780-39d06ab4ce36.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--17ed9bd5-3ee1-4c55-a0b4-233b7adc42da", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--da09db82-49ce-4911-b780-39d06ab4ce36", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.307844Z", + "modified": "2025-01-15T16:23:56.307844Z", + "name": "CVE-2025-22793", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Bold Bold pagos en linea allows DOM-Based XSS.This issue affects Bold pagos en linea: from n/a through 3.1.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22793" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--dff179df-7c91-4f34-a10e-c3971095000b.json b/objects/vulnerability/vulnerability--dff179df-7c91-4f34-a10e-c3971095000b.json new file mode 100644 index 0000000000..4ad3f3835e --- /dev/null +++ b/objects/vulnerability/vulnerability--dff179df-7c91-4f34-a10e-c3971095000b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d0605b5f-3dc0-4ad3-97a4-5e0d49e8b464", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--dff179df-7c91-4f34-a10e-c3971095000b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.32136Z", + "modified": "2025-01-15T16:23:56.32136Z", + "name": "CVE-2025-22784", + "description": "Cross-Site Request Forgery (CSRF) vulnerability in Johan Ström Background Control allows Path Traversal.This issue affects Background Control: from n/a through 1.0.5.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22784" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e4685b20-c860-479f-9a02-a47f5756ae65.json b/objects/vulnerability/vulnerability--e4685b20-c860-479f-9a02-a47f5756ae65.json new file mode 100644 index 0000000000..e6f59c3a00 --- /dev/null +++ b/objects/vulnerability/vulnerability--e4685b20-c860-479f-9a02-a47f5756ae65.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e8d54491-5e89-4571-b397-b499311942f3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e4685b20-c860-479f-9a02-a47f5756ae65", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.298633Z", + "modified": "2025-01-15T16:23:56.298633Z", + "name": "CVE-2025-22769", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Creative Brahma Multifox allows Stored XSS.This issue affects Multifox: from n/a through 1.3.7.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22769" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e495aefe-c29f-4a2b-a874-9b9c836c4f25.json b/objects/vulnerability/vulnerability--e495aefe-c29f-4a2b-a874-9b9c836c4f25.json new file mode 100644 index 0000000000..d86317594e --- /dev/null +++ b/objects/vulnerability/vulnerability--e495aefe-c29f-4a2b-a874-9b9c836c4f25.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2b511e95-de3b-4945-a4ca-7c09aa643ff7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e495aefe-c29f-4a2b-a874-9b9c836c4f25", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.324065Z", + "modified": "2025-01-15T16:23:56.324065Z", + "name": "CVE-2025-22781", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nativery Developer Nativery allows DOM-Based XSS.This issue affects Nativery: from n/a through 0.1.6.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22781" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ea07faa4-8287-490d-a8be-29552c3747f0.json b/objects/vulnerability/vulnerability--ea07faa4-8287-490d-a8be-29552c3747f0.json new file mode 100644 index 0000000000..259b0b1869 --- /dev/null +++ b/objects/vulnerability/vulnerability--ea07faa4-8287-490d-a8be-29552c3747f0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4ea80f9a-c398-4849-a6cb-54036dedebd4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ea07faa4-8287-490d-a8be-29552c3747f0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.33138Z", + "modified": "2025-01-15T16:23:56.33138Z", + "name": "CVE-2025-22776", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jay Carter WP Bulletin Board allows Reflected XSS.This issue affects WP Bulletin Board: from n/a through 1.1.4.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22776" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--eb1f2fae-35fe-45fc-8bcb-089823294185.json b/objects/vulnerability/vulnerability--eb1f2fae-35fe-45fc-8bcb-089823294185.json new file mode 100644 index 0000000000..447b90ff65 --- /dev/null +++ b/objects/vulnerability/vulnerability--eb1f2fae-35fe-45fc-8bcb-089823294185.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5c3b7307-641e-43ed-a9e1-183945595ad3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--eb1f2fae-35fe-45fc-8bcb-089823294185", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.30557Z", + "modified": "2025-01-15T16:23:56.30557Z", + "name": "CVE-2025-22797", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Oğulcan Özügenç Gallery and Lightbox allows Stored XSS.This issue affects Gallery and Lightbox: from n/a through 1.0.14.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22797" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ec71bcd1-6781-4a17-8699-4dc9954fd090.json b/objects/vulnerability/vulnerability--ec71bcd1-6781-4a17-8699-4dc9954fd090.json new file mode 100644 index 0000000000..2e178fd116 --- /dev/null +++ b/objects/vulnerability/vulnerability--ec71bcd1-6781-4a17-8699-4dc9954fd090.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--39b9c03f-0792-4ebb-8822-53f9f870465a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ec71bcd1-6781-4a17-8699-4dc9954fd090", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.269699Z", + "modified": "2025-01-15T16:23:56.269699Z", + "name": "CVE-2025-22587", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NCiphers SEO Bulk Editor allows Stored XSS.This issue affects SEO Bulk Editor: from n/a through 1.1.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22587" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ef016803-420b-4895-8c72-db4bea51e8bc.json b/objects/vulnerability/vulnerability--ef016803-420b-4895-8c72-db4bea51e8bc.json new file mode 100644 index 0000000000..0f9ce7bd69 --- /dev/null +++ b/objects/vulnerability/vulnerability--ef016803-420b-4895-8c72-db4bea51e8bc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--92fc25d9-f3fd-4c11-ac33-3c1c26519a1e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ef016803-420b-4895-8c72-db4bea51e8bc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.258306Z", + "modified": "2025-01-15T16:23:56.258306Z", + "name": "CVE-2025-22736", + "description": "Incorrect Privilege Assignment vulnerability in WPExperts User Management allows Privilege Escalation.This issue affects User Management: from n/a through 1.2.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22736" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f3fb2c29-bc46-4de3-857f-eebb60dac6cb.json b/objects/vulnerability/vulnerability--f3fb2c29-bc46-4de3-857f-eebb60dac6cb.json new file mode 100644 index 0000000000..d4f3f1328d --- /dev/null +++ b/objects/vulnerability/vulnerability--f3fb2c29-bc46-4de3-857f-eebb60dac6cb.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--aa32c251-5828-4052-baf9-f81629689be8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f3fb2c29-bc46-4de3-857f-eebb60dac6cb", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:50.616895Z", + "modified": "2025-01-15T16:23:50.616895Z", + "name": "CVE-2024-8603", + "description": "A “Use of a Broken or Risky Cryptographic Algorithm” vulnerability in the SSL/TLS component used in B&R Automation Runtime versions before 6.1 and B&R mapp View versions before 6.1 may be abused by unauthenticated network-based attackers to masquerade as services on impacted devices.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-8603" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f44b48be-de8c-4ca0-88b7-23b8307b76ce.json b/objects/vulnerability/vulnerability--f44b48be-de8c-4ca0-88b7-23b8307b76ce.json new file mode 100644 index 0000000000..94485e3151 --- /dev/null +++ b/objects/vulnerability/vulnerability--f44b48be-de8c-4ca0-88b7-23b8307b76ce.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ffdc2258-9248-4b16-8d42-7eb159a0c8df", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f44b48be-de8c-4ca0-88b7-23b8307b76ce", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.346589Z", + "modified": "2025-01-15T16:23:56.346589Z", + "name": "CVE-2025-22731", + "description": "Cross-Site Request Forgery (CSRF) vulnerability in silverplugins217 Build Private Store For Woocommerce allows Cross Site Request Forgery.This issue affects Build Private Store For Woocommerce: from n/a through 1.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22731" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f53bbf2f-f901-46eb-b85b-258d5dc95f06.json b/objects/vulnerability/vulnerability--f53bbf2f-f901-46eb-b85b-258d5dc95f06.json new file mode 100644 index 0000000000..417df9e4f8 --- /dev/null +++ b/objects/vulnerability/vulnerability--f53bbf2f-f901-46eb-b85b-258d5dc95f06.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--719fa8e5-563b-4ce1-bb4e-7f4d1b513f06", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f53bbf2f-f901-46eb-b85b-258d5dc95f06", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.284601Z", + "modified": "2025-01-15T16:23:56.284601Z", + "name": "CVE-2025-22747", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tor Morten Jensen Foundation Columns allows Stored XSS.This issue affects Foundation Columns: from n/a through 0.8.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22747" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f5e7c00a-00b8-4fba-968a-979ada142aec.json b/objects/vulnerability/vulnerability--f5e7c00a-00b8-4fba-968a-979ada142aec.json new file mode 100644 index 0000000000..67def10b9a --- /dev/null +++ b/objects/vulnerability/vulnerability--f5e7c00a-00b8-4fba-968a-979ada142aec.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--eaa19724-e7b6-4896-8ed7-209353bc357f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f5e7c00a-00b8-4fba-968a-979ada142aec", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.295595Z", + "modified": "2025-01-15T16:23:56.295595Z", + "name": "CVE-2025-22779", + "description": "Missing Authorization vulnerability in Ugur CELIK WP News Sliders allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP News Sliders: from n/a through 1.0.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22779" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f6b18162-98be-4d5f-ba5c-259db437a9e0.json b/objects/vulnerability/vulnerability--f6b18162-98be-4d5f-ba5c-259db437a9e0.json new file mode 100644 index 0000000000..6faa1b0e03 --- /dev/null +++ b/objects/vulnerability/vulnerability--f6b18162-98be-4d5f-ba5c-259db437a9e0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c357fcd3-0cc9-4449-a747-26473924c9c7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f6b18162-98be-4d5f-ba5c-259db437a9e0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.286986Z", + "modified": "2025-01-15T16:23:56.286986Z", + "name": "CVE-2025-22749", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AwoThemes Social Media Engine allows Stored XSS.This issue affects Social Media Engine: from n/a through 1.0.2.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22749" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f8d1409f-f335-40d2-ad7f-03512a5dc99e.json b/objects/vulnerability/vulnerability--f8d1409f-f335-40d2-ad7f-03512a5dc99e.json new file mode 100644 index 0000000000..2393574bb7 --- /dev/null +++ b/objects/vulnerability/vulnerability--f8d1409f-f335-40d2-ad7f-03512a5dc99e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b71f675e-1efc-4406-9de3-d7c04f851047", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f8d1409f-f335-40d2-ad7f-03512a5dc99e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T16:23:56.276105Z", + "modified": "2025-01-15T16:23:56.276105Z", + "name": "CVE-2025-22744", + "description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rob von Bothmer / SeoDev S-DEV SEO allows Stored XSS.This issue affects S-DEV SEO: from n/a through 1.88.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22744" + } + ] + } + ] +} \ No newline at end of file