Skip to content

Commit

Permalink
generated content from 2025-01-29
Browse files Browse the repository at this point in the history
  • Loading branch information
gitadvisor committed Jan 29, 2025
1 parent cc6a8ed commit eb27be5
Show file tree
Hide file tree
Showing 6 changed files with 115 additions and 0 deletions.
5 changes: 5 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -265571,3 +265571,8 @@ vulnerability,CVE-2024-57965,vulnerability--b654eaae-9230-44aa-a9aa-0a2480317925
vulnerability,CVE-2025-0762,vulnerability--e6e8ff12-526a-447e-8f0b-f34804608a3a
vulnerability,CVE-2025-0617,vulnerability--0bb5e226-3b11-4391-94c6-4829861c87f9
vulnerability,CVE-2021-3978,vulnerability--894e0b3f-d168-40b0-bf93-d7ab0e4e154a
vulnerability,CVE-2024-54461,vulnerability--3411d7c5-0074-4fb2-ab52-a578784c0a44
vulnerability,CVE-2024-54462,vulnerability--bd762339-39fa-4a69-8fdd-8e52a55f384a
vulnerability,CVE-2024-13561,vulnerability--d2f1b699-6007-4876-863b-79a22e681ab4
vulnerability,CVE-2024-41140,vulnerability--a91d3ac2-e8ad-4025-96ae-17fa943206be
vulnerability,CVE-2025-0353,vulnerability--81dd95db-f3c4-47ab-8f96-bc25184b5798
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--5de81196-7aef-4da8-8ee9-71f6b0b25de1",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--3411d7c5-0074-4fb2-ab52-a578784c0a44",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T12:36:48.232871Z",
"modified": "2025-01-29T12:36:48.232871Z",
"name": "CVE-2024-54461",
"description": "The file names constructed within file_selector are missing sanitization checks leaving them vulnerable to malicious document providers. This may result in cases where a user with a malicious document provider installed can select a document file from that provider while using your app and could potentially override internal files in your app cache. Issue patched in 0.5.1+12. It is recommended to update to the latest version of file_selector_android that contains the changes to address this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-54461"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--83fcb5e6-2f17-48b4-aeb1-76c3eef896cd",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--81dd95db-f3c4-47ab-8f96-bc25184b5798",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T12:36:58.489293Z",
"modified": "2025-01-29T12:36:58.489293Z",
"name": "CVE-2025-0353",
"description": "The Divi Torque Lite – Best Divi Addon, Extensions, Modules & Social Modules plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets in all versions up to, and including, 4.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0353"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a3a03f95-b9b3-4b2c-9860-03395fc2c62f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--a91d3ac2-e8ad-4025-96ae-17fa943206be",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T12:36:49.959751Z",
"modified": "2025-01-29T12:36:49.959751Z",
"name": "CVE-2024-41140",
"description": "Zohocorp ManageEngine Applications Manager versions 174000 and prior are vulnerable to the incorrect authorization in the update user function.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-41140"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1b19f63f-9f7d-4dc1-8313-224588ad221b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--bd762339-39fa-4a69-8fdd-8e52a55f384a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T12:36:48.24721Z",
"modified": "2025-01-29T12:36:48.24721Z",
"name": "CVE-2024-54462",
"description": "The file names constructed within image_picker are missing sanitization checks leaving them vulnerable to malicious document providers. This may result in cases where a user with a malicious document provider installed can select an image file from that provider while using your app and could potentially override internal files in your app cache. Issue patched in 0.8.12+18. It is recommended to update to the latest version of image_picker_android that contains the changes to address this vulnerability.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-54462"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3c55d3c1-6767-4d05-88bc-958bec6451be",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--d2f1b699-6007-4876-863b-79a22e681ab4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T12:36:48.75601Z",
"modified": "2025-01-29T12:36:48.75601Z",
"name": "CVE-2024-13561",
"description": "The Target Video Easy Publish plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's brid_override_yt shortcode in all versions up to, and including, 3.8.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-13561"
}
]
}
]
}

0 comments on commit eb27be5

Please sign in to comment.