diff --git a/mapping.csv b/mapping.csv index f3d9367388..fe678b71b9 100644 --- a/mapping.csv +++ b/mapping.csv @@ -263412,3 +263412,180 @@ vulnerability,CVE-2025-23366,vulnerability--4cf21d8a-665f-4012-8c0f-a5b55bb3ed0f vulnerability,CVE-2025-23025,vulnerability--dce93da0-55f8-4485-aa2f-30a9993aa820 vulnerability,CVE-2025-23051,vulnerability--40f4903f-db25-47c9-bc7b-895340420d59 vulnerability,CVE-2025-23052,vulnerability--51fad2c7-03e3-4242-9788-6a6baed49a40 +vulnerability,CVE-2024-56374,vulnerability--bbcbca15-d97e-4b69-984b-98b453ab7b90 +vulnerability,CVE-2024-48854,vulnerability--82b057d6-3ef3-4d68-84cf-0bdf972735ce +vulnerability,CVE-2024-48855,vulnerability--dd436e2c-34b0-4171-a356-f0bf325f718c +vulnerability,CVE-2024-49375,vulnerability--d0389fc8-0647-435e-9a3f-21cec42330c2 +vulnerability,CVE-2024-50338,vulnerability--f88bc8fe-7d4c-4592-bc79-0d3899a3fe81 +vulnerability,CVE-2024-50349,vulnerability--e1e1d399-69c9-49b2-b756-e0cc5eeb4880 +vulnerability,CVE-2024-52006,vulnerability--16596e74-6628-4255-bfcb-c7deec59bb0b +vulnerability,CVE-2025-21250,vulnerability--8cea3b93-4bfd-46e3-8bfd-44085722d75f +vulnerability,CVE-2025-21233,vulnerability--55022c28-e4b1-4b59-88c4-6475c7e4ceea +vulnerability,CVE-2025-21345,vulnerability--7b2b4490-41d1-42ce-bed0-13c26a506981 +vulnerability,CVE-2025-21249,vulnerability--0d2109b5-aed0-4424-aa35-bd8ae36a5b1e +vulnerability,CVE-2025-21172,vulnerability--81e97785-8e9d-4de0-93b6-3da092531579 +vulnerability,CVE-2025-21297,vulnerability--b8485299-554d-4246-9a3d-bc94a35434d6 +vulnerability,CVE-2025-21276,vulnerability--551cdf2b-fd32-42ea-8e93-ea16ebdbbb45 +vulnerability,CVE-2025-21245,vulnerability--5c33ccf4-4f71-44c6-8f14-d9912b79cf85 +vulnerability,CVE-2025-21341,vulnerability--4e7635f5-b70f-4c57-bd31-349508eff08a +vulnerability,CVE-2025-21258,vulnerability--7890f734-fd16-4151-9d5b-d89fc99f7787 +vulnerability,CVE-2025-21189,vulnerability--7acb485c-b4d9-44ef-9511-b4c30e7d6a88 +vulnerability,CVE-2025-21214,vulnerability--fcf1e66a-d4b5-48b6-8c61-0c900800ebfd +vulnerability,CVE-2025-21226,vulnerability--ae49358a-450f-47ba-9e7e-a45f3350c9ca +vulnerability,CVE-2025-21207,vulnerability--93c1924a-a8dc-45ca-bbd5-7002f05c3459 +vulnerability,CVE-2025-21274,vulnerability--0339ee2d-d66a-4a4b-9b4d-4f74b6f74402 +vulnerability,CVE-2025-21417,vulnerability--2ce97597-95db-428a-b6d2-aeb5fe5a9094 +vulnerability,CVE-2025-21313,vulnerability--0c792fa5-29a2-4665-aa44-9b3d8b52dc2e +vulnerability,CVE-2025-21231,vulnerability--200cd4ca-c37d-4b60-bcb0-e4d4268bfeaa +vulnerability,CVE-2025-21360,vulnerability--6e2d186a-7c9d-4100-88c6-694221b25e58 +vulnerability,CVE-2025-21193,vulnerability--15c5f594-025e-43de-93c2-d27ea23371c9 +vulnerability,CVE-2025-21308,vulnerability--7c5611de-367f-47a4-a3ac-1b5ff968b7b3 +vulnerability,CVE-2025-21370,vulnerability--a73f877f-ca47-4ba7-bb13-85a103e88404 +vulnerability,CVE-2025-21364,vulnerability--8e90d3f0-0ec9-498c-aa47-50ca282bdf69 +vulnerability,CVE-2025-21306,vulnerability--29739d3c-fdb9-4a58-8e77-5a53dae83261 +vulnerability,CVE-2025-21255,vulnerability--e3e0f208-4525-466b-aa55-d64b285da542 +vulnerability,CVE-2025-21227,vulnerability--25c22264-8274-437a-b857-fa6d2dea6a0e +vulnerability,CVE-2025-21237,vulnerability--ebed5fa5-4012-4a6e-94ed-212e9434acc1 +vulnerability,CVE-2025-21316,vulnerability--c5c9c6cd-44ef-4707-8eb5-7e7db89b26ca +vulnerability,CVE-2025-21356,vulnerability--7718f641-4e2b-4f41-a4d7-380db707d8ae +vulnerability,CVE-2025-21317,vulnerability--907c41c3-0408-4317-ae74-dd4646f61183 +vulnerability,CVE-2025-21395,vulnerability--86ac21b0-59c2-4e3a-8e01-c4a5b59f6d61 +vulnerability,CVE-2025-21280,vulnerability--d5323729-49ee-4992-bb51-0747873c268e +vulnerability,CVE-2025-21186,vulnerability--d4450668-9730-4d51-bd68-34a6e253b83b +vulnerability,CVE-2025-21336,vulnerability--70862900-35d5-4de6-a920-d8ad047dfaf4 +vulnerability,CVE-2025-21246,vulnerability--74f4aa15-79b9-4152-996d-937c5c67bbdf +vulnerability,CVE-2025-21299,vulnerability--91bd97c4-2c7a-40ba-9911-9e064e68d96a +vulnerability,CVE-2025-21173,vulnerability--0f30ec28-979f-4c55-9fed-5b133f6f408a +vulnerability,CVE-2025-21242,vulnerability--d6f90271-c4b4-4c27-b464-fdb9176308f5 +vulnerability,CVE-2025-21323,vulnerability--8616762a-19b6-4bf0-86c5-ad1ac42896c4 +vulnerability,CVE-2025-21187,vulnerability--d0ef1483-8453-455e-94f4-17b43f32d6f5 +vulnerability,CVE-2025-21251,vulnerability--8a52cba0-f0d8-420c-b662-6aa186e7461d +vulnerability,CVE-2025-21361,vulnerability--f1ecf999-c0c6-4c93-857c-17943a111913 +vulnerability,CVE-2025-21210,vulnerability--a3650801-8859-4c60-b244-73194b2a028c +vulnerability,CVE-2025-21285,vulnerability--38b2f6cd-26a9-47b0-a4a0-dd9b7ffa0982 +vulnerability,CVE-2025-21241,vulnerability--b85e0d8e-4c26-4fab-8564-d32b5a121743 +vulnerability,CVE-2025-21215,vulnerability--a579d2f3-df22-42b2-b39c-19e4bf3139ed +vulnerability,CVE-2025-21402,vulnerability--08968bd4-26ab-4819-98fd-4f0d45ffa69f +vulnerability,CVE-2025-21268,vulnerability--5cd6e945-89b6-4e26-b275-08f4062f1683 +vulnerability,CVE-2025-21131,vulnerability--eec9fd01-4214-4e88-a24b-bb4690b149d4 +vulnerability,CVE-2025-21293,vulnerability--53346903-11dd-4cda-a922-8868f66e043b +vulnerability,CVE-2025-21409,vulnerability--3c4fa6d1-b2aa-4670-bec4-9ceace95d395 +vulnerability,CVE-2025-21333,vulnerability--69e577ff-b237-4008-8122-02ae8f0dc328 +vulnerability,CVE-2025-21269,vulnerability--9bb86145-6bcc-409d-83f7-6db25da3f0f4 +vulnerability,CVE-2025-21307,vulnerability--3bbdbc86-43b6-4251-8145-54c2cc6f40bc +vulnerability,CVE-2025-21335,vulnerability--6c9af0a5-e6b2-4278-a288-dd58d9a48318 +vulnerability,CVE-2025-21220,vulnerability--9bbdaacf-296b-469e-8541-e0c8ba6b968d +vulnerability,CVE-2025-21130,vulnerability--cccaa280-387e-4dc5-91b8-ed86f5e7ca18 +vulnerability,CVE-2025-21354,vulnerability--664e2ca2-48ff-4fe6-9ace-f113a36a8927 +vulnerability,CVE-2025-21330,vulnerability--7d879c77-a32e-4600-86e9-4f163beef9eb +vulnerability,CVE-2025-21294,vulnerability--194a2fd8-53f6-41b5-a1cc-861bb49b5be5 +vulnerability,CVE-2025-21334,vulnerability--e18eb60c-f724-4de8-a047-ce26474b1360 +vulnerability,CVE-2025-21301,vulnerability--cdc2f797-e86b-4fcd-8b02-005016511fa5 +vulnerability,CVE-2025-21319,vulnerability--7d22eef1-5eb2-4974-895b-6c7c78fcab81 +vulnerability,CVE-2025-21228,vulnerability--ee688272-c91d-41ef-832b-4cab3bc06fc7 +vulnerability,CVE-2025-21284,vulnerability--e28611e8-0cb1-410c-b915-90b48245cb38 +vulnerability,CVE-2025-21275,vulnerability--d27c1f48-99cd-46c7-93c7-985d077464e7 +vulnerability,CVE-2025-21263,vulnerability--298050a9-2f69-465b-90bd-45312542054b +vulnerability,CVE-2025-21348,vulnerability--636e0b61-c192-4e84-a428-6c97616266a9 +vulnerability,CVE-2025-21127,vulnerability--ea308ca2-61e6-4755-979e-a808e0595311 +vulnerability,CVE-2025-21281,vulnerability--c27b1a2c-b712-4967-bbd2-d7a38aac5458 +vulnerability,CVE-2025-21302,vulnerability--c2edb084-c22e-4240-bc59-02f5f266e7af +vulnerability,CVE-2025-21324,vulnerability--b7ba8109-d8e6-44cf-94f9-8a75ba813164 +vulnerability,CVE-2025-21271,vulnerability--1b312af2-0daf-4453-a4cf-382f90ecf96d +vulnerability,CVE-2025-21288,vulnerability--12db9108-e28f-4e92-bef3-111c84fbaf49 +vulnerability,CVE-2025-21344,vulnerability--83c55b34-64a5-454b-9c5e-5e649bf83a87 +vulnerability,CVE-2025-21244,vulnerability--fd9cff12-9741-425a-9fcc-c8b0a97f0cc9 +vulnerability,CVE-2025-21278,vulnerability--ccb463d4-cc33-4722-93aa-fde2224fcc93 +vulnerability,CVE-2025-21413,vulnerability--1487baba-fb26-4750-8def-70b3f9407452 +vulnerability,CVE-2025-21234,vulnerability--4e21543b-497d-429c-978b-bd3a7d2b6ffb +vulnerability,CVE-2025-21248,vulnerability--a614e32e-4a7f-4f6e-9b1e-985f668242fb +vulnerability,CVE-2025-21252,vulnerability--900c20aa-01db-4a7c-9b6e-a5e0fedcd448 +vulnerability,CVE-2025-21217,vulnerability--3be5e133-a7ef-4152-92ec-c460f9b81b81 +vulnerability,CVE-2025-21243,vulnerability--472031a1-be7a-40c9-b74d-7e37a8e8c6af +vulnerability,CVE-2025-21213,vulnerability--b7a0c0b2-50e8-423b-ac66-d3f79fda8a27 +vulnerability,CVE-2025-21270,vulnerability--d68c0c44-ff1a-43e0-91d7-b42369f7d516 +vulnerability,CVE-2025-21296,vulnerability--7c56387d-76a1-4696-bd9c-8fb70dda528b +vulnerability,CVE-2025-21218,vulnerability--0d07e014-1f51-43a5-ab29-60f3dd50a25f +vulnerability,CVE-2025-21389,vulnerability--4342999d-fa6d-44fb-be9d-3dcc2bbd3066 +vulnerability,CVE-2025-21223,vulnerability--93b8e6b6-e641-4642-9b4e-4cb98d739860 +vulnerability,CVE-2025-21403,vulnerability--202b04cb-85b0-4874-b5a8-b63f9a012a25 +vulnerability,CVE-2025-21374,vulnerability--d14825a0-c9c7-44b9-b34f-f792ba550e88 +vulnerability,CVE-2025-21314,vulnerability--b6026b10-4111-48cd-9c91-2c3af6e67ec9 +vulnerability,CVE-2025-21372,vulnerability--77a18250-a159-4e40-804a-3ba5f8277a0b +vulnerability,CVE-2025-21378,vulnerability--10f993ec-f66c-4d09-807c-f6439e42363b +vulnerability,CVE-2025-21340,vulnerability--4cee96fd-2bfe-49f6-845e-787678743210 +vulnerability,CVE-2025-21260,vulnerability--571e75f5-79b4-448e-81e1-9d716da2347d +vulnerability,CVE-2025-21365,vulnerability--dcdd03f1-731a-42e9-8e83-749318a225e9 +vulnerability,CVE-2025-21303,vulnerability--e08ef48b-211b-4765-a2e9-f237fd04ba92 +vulnerability,CVE-2025-21327,vulnerability--56e79a75-0bbe-4f59-9070-f111cbb59895 +vulnerability,CVE-2025-21122,vulnerability--c82ab383-0524-4ff9-acf2-c9cbf90b370b +vulnerability,CVE-2025-21290,vulnerability--94849a0e-2e8a-4a92-a49f-2c9ce0f75fcd +vulnerability,CVE-2025-21272,vulnerability--5c87f6de-a7ee-48bc-9084-5466988b5077 +vulnerability,CVE-2025-21311,vulnerability--17e3dbce-4f1b-4317-ba74-dba0d27e7bc9 +vulnerability,CVE-2025-21286,vulnerability--1667cf5d-5655-474f-b673-826cd75f574c +vulnerability,CVE-2025-21304,vulnerability--f6ee0d9d-712f-4793-89aa-7f8805fe81b6 +vulnerability,CVE-2025-21411,vulnerability--47550c9d-62f6-4f13-a41d-36f060c6673a +vulnerability,CVE-2025-21328,vulnerability--4307e34e-b53a-4ed6-a200-b1e93802cb4a +vulnerability,CVE-2025-21312,vulnerability--d63ee527-fb32-46ba-9185-eec6edb8a2af +vulnerability,CVE-2025-21229,vulnerability--2b18587d-a061-477c-a690-a65a54b4315a +vulnerability,CVE-2025-21339,vulnerability--9b58de26-85e0-47ff-98cd-13fa6a21ac04 +vulnerability,CVE-2025-21366,vulnerability--30501cd1-9022-4508-a068-12d4788f48ba +vulnerability,CVE-2025-21305,vulnerability--34915f2f-d63c-40b3-a47f-c0b6417e7a82 +vulnerability,CVE-2025-21315,vulnerability--d482f82a-cc29-43b8-b67a-1c807ca59c14 +vulnerability,CVE-2025-21230,vulnerability--c5119ea2-0fa5-47d8-99f4-bf2ff4924cff +vulnerability,CVE-2025-21171,vulnerability--2cba0d0a-db95-4d44-8d0f-fd5147f6df20 +vulnerability,CVE-2025-21239,vulnerability--b9af11d9-6e4a-4801-8d0d-7d8f2fc86b8c +vulnerability,CVE-2025-21265,vulnerability--4e6a38b7-f51c-4038-8736-39684d149f49 +vulnerability,CVE-2025-21295,vulnerability--fa8d48b6-caa8-4674-bf54-4d9b75a8e50d +vulnerability,CVE-2025-21256,vulnerability--76719aaf-6bc0-484e-96a9-76aa0a6fa214 +vulnerability,CVE-2025-21309,vulnerability--c329b103-5f9d-4a58-8b1d-e433fe4c0699 +vulnerability,CVE-2025-21393,vulnerability--53da4ce3-4f42-434f-9d80-b6b4bf6490af +vulnerability,CVE-2025-21235,vulnerability--9f1b1e41-73e5-4b34-8fad-8e8a5ee3d0fb +vulnerability,CVE-2025-21291,vulnerability--d4dce396-3c11-4b27-938d-751a0b512da7 +vulnerability,CVE-2025-21225,vulnerability--aab5e60c-1b7e-4ebc-b0c9-00c1e2ecf3cf +vulnerability,CVE-2025-21261,vulnerability--35e6d751-f9ba-4922-bdb7-14fbd98ac425 +vulnerability,CVE-2025-21300,vulnerability--fcd8b8e9-bec7-4bcc-8715-1921deaacbf6 +vulnerability,CVE-2025-21338,vulnerability--7c60a56f-c756-4609-9711-b2262d0e7cca +vulnerability,CVE-2025-21289,vulnerability--2ff16a20-f8b6-4467-be39-fbbfec331ec9 +vulnerability,CVE-2025-21202,vulnerability--887c0543-63fc-4479-bdb3-67047fc915d4 +vulnerability,CVE-2025-21357,vulnerability--310d53f7-fed9-4ded-8c22-c60e4a7e7fd7 +vulnerability,CVE-2025-21298,vulnerability--32e337bf-6764-459d-97ef-c12972d34685 +vulnerability,CVE-2025-21363,vulnerability--8cac897d-23e6-40fa-bbb4-2bd676ddf899 +vulnerability,CVE-2025-21310,vulnerability--b7230cb9-629f-47eb-8061-f701d8a708c2 +vulnerability,CVE-2025-21128,vulnerability--9c671ba2-27eb-4f06-b357-7169f5e8bd20 +vulnerability,CVE-2025-21178,vulnerability--038db474-4787-40b7-9364-b607bb1da76f +vulnerability,CVE-2025-21346,vulnerability--1b6deda6-b211-4052-a934-1c455c0aecc1 +vulnerability,CVE-2025-21320,vulnerability--ea0919c8-1398-48aa-966f-b595ddfce9cd +vulnerability,CVE-2025-21343,vulnerability--b8b84577-f027-4851-9345-aac0ed9a09a0 +vulnerability,CVE-2025-21273,vulnerability--8b97bfe9-97b5-41b4-a311-35d3c7ff83d8 +vulnerability,CVE-2025-21331,vulnerability--60110b2e-1415-49ef-b0aa-9d4d5a5bcd04 +vulnerability,CVE-2025-21362,vulnerability--58368f2b-87da-44f2-80fa-c94d96eb8a0c +vulnerability,CVE-2025-21292,vulnerability--401b92eb-971a-4f60-99d1-57db112c6957 +vulnerability,CVE-2025-21329,vulnerability--26f9eed8-b934-4e9f-81d4-944d5565c0dd +vulnerability,CVE-2025-21240,vulnerability--95e5d3d1-05ed-47f4-adfc-78a56aed0f55 +vulnerability,CVE-2025-21238,vulnerability--1be8cdfe-e979-4e7f-a42c-6f296116d55b +vulnerability,CVE-2025-21232,vulnerability--05f68b11-f9a0-4a24-a740-ce41d2b40672 +vulnerability,CVE-2025-21318,vulnerability--51989fd0-3aba-4e83-8b28-dd03f37266ab +vulnerability,CVE-2025-21129,vulnerability--d72360a2-2cc5-4d29-bfe3-f4f25cae7198 +vulnerability,CVE-2025-21176,vulnerability--c40fb14d-7d66-46a2-a7d9-5613311a1591 +vulnerability,CVE-2025-21382,vulnerability--34949c1d-b902-4e85-8505-04f4f98a4581 +vulnerability,CVE-2025-21266,vulnerability--cae646ae-5c2d-46d5-a543-3a1112334feb +vulnerability,CVE-2025-21277,vulnerability--707e264f-012e-4168-ac71-bb8048cf9ccf +vulnerability,CVE-2025-21236,vulnerability--5214c2ad-b85c-4355-83fd-b2df6c585e87 +vulnerability,CVE-2025-21132,vulnerability--a1ae9f1b-7062-4c43-ad58-0a03b79e0a5e +vulnerability,CVE-2025-21321,vulnerability--a4827ee3-d124-41eb-b408-adde4015fbb4 +vulnerability,CVE-2025-21287,vulnerability--c95f1947-821b-4739-a28d-7739e39b701d +vulnerability,CVE-2025-21211,vulnerability--7318911f-a0ee-410f-a5e1-69158c4d4d51 +vulnerability,CVE-2025-21219,vulnerability--b68dbd4c-a688-4943-b9a8-ff0adaa5d16d +vulnerability,CVE-2025-21224,vulnerability--99f47381-8802-4d86-ab4c-4fc361047821 +vulnerability,CVE-2025-21326,vulnerability--9d717a94-64a2-4f00-b639-51dace895555 +vulnerability,CVE-2025-21332,vulnerability--9f2253db-edaf-40cb-97ed-6b5eac9dd87f +vulnerability,CVE-2025-21257,vulnerability--26bf2586-8f4a-49cc-8125-43cfc2edc443 +vulnerability,CVE-2025-21282,vulnerability--a6c03a0b-23dd-44b0-a91e-9f29177f8aa1 +vulnerability,CVE-2025-21405,vulnerability--08f951dd-63f3-40ff-9351-ae51748087ba +vulnerability,CVE-2025-0474,vulnerability--7ec83631-fd6e-45db-b74b-f3d1620d5a10 +vulnerability,CVE-2025-23042,vulnerability--33e68d41-449f-4ab8-8b46-d50b934624e0 +vulnerability,CVE-2025-23041,vulnerability--e8b3f1d3-1e8c-4a66-b347-a7d9935afc8c +vulnerability,CVE-2025-23073,vulnerability--163b6e85-d1fc-4e67-b494-a818dbe05908 +vulnerability,CVE-2025-23072,vulnerability--be81ea82-37ae-4e22-819b-8c3ffc44fbe7 +vulnerability,CVE-2025-23074,vulnerability--779edcae-1ddc-4aac-a1cf-2ebc1f2191de diff --git a/objects/vulnerability/vulnerability--0339ee2d-d66a-4a4b-9b4d-4f74b6f74402.json b/objects/vulnerability/vulnerability--0339ee2d-d66a-4a4b-9b4d-4f74b6f74402.json new file mode 100644 index 0000000000..a64f028723 --- /dev/null +++ b/objects/vulnerability/vulnerability--0339ee2d-d66a-4a4b-9b4d-4f74b6f74402.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--09a71d54-32d7-4c05-8013-1c53ff493777", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0339ee2d-d66a-4a4b-9b4d-4f74b6f74402", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.981904Z", + "modified": "2025-01-14T19:15:08.981904Z", + "name": "CVE-2025-21274", + "description": "Windows Event Tracing Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21274" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--038db474-4787-40b7-9364-b607bb1da76f.json b/objects/vulnerability/vulnerability--038db474-4787-40b7-9364-b607bb1da76f.json new file mode 100644 index 0000000000..9e9cdb3f96 --- /dev/null +++ b/objects/vulnerability/vulnerability--038db474-4787-40b7-9364-b607bb1da76f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c8d2a2fd-08d9-4030-9a2d-3d23d0298d8d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--038db474-4787-40b7-9364-b607bb1da76f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.13198Z", + "modified": "2025-01-14T19:15:09.13198Z", + "name": "CVE-2025-21178", + "description": "Visual Studio Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21178" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--05f68b11-f9a0-4a24-a740-ce41d2b40672.json b/objects/vulnerability/vulnerability--05f68b11-f9a0-4a24-a740-ce41d2b40672.json new file mode 100644 index 0000000000..22f9dce5e7 --- /dev/null +++ b/objects/vulnerability/vulnerability--05f68b11-f9a0-4a24-a740-ce41d2b40672.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8cc72154-1556-40c3-8f02-eeeb461e0750", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--05f68b11-f9a0-4a24-a740-ce41d2b40672", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.144428Z", + "modified": "2025-01-14T19:15:09.144428Z", + "name": "CVE-2025-21232", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21232" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--08968bd4-26ab-4819-98fd-4f0d45ffa69f.json b/objects/vulnerability/vulnerability--08968bd4-26ab-4819-98fd-4f0d45ffa69f.json new file mode 100644 index 0000000000..1c8692171b --- /dev/null +++ b/objects/vulnerability/vulnerability--08968bd4-26ab-4819-98fd-4f0d45ffa69f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--264a8374-8e52-4a65-8807-50c6925e6e70", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--08968bd4-26ab-4819-98fd-4f0d45ffa69f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.028037Z", + "modified": "2025-01-14T19:15:09.028037Z", + "name": "CVE-2025-21402", + "description": "Microsoft Office OneNote Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21402" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--08f951dd-63f3-40ff-9351-ae51748087ba.json b/objects/vulnerability/vulnerability--08f951dd-63f3-40ff-9351-ae51748087ba.json new file mode 100644 index 0000000000..1e2581c893 --- /dev/null +++ b/objects/vulnerability/vulnerability--08f951dd-63f3-40ff-9351-ae51748087ba.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7e795b49-4a97-4759-a449-48b1aa57ce87", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--08f951dd-63f3-40ff-9351-ae51748087ba", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.168511Z", + "modified": "2025-01-14T19:15:09.168511Z", + "name": "CVE-2025-21405", + "description": "Visual Studio Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21405" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0c792fa5-29a2-4665-aa44-9b3d8b52dc2e.json b/objects/vulnerability/vulnerability--0c792fa5-29a2-4665-aa44-9b3d8b52dc2e.json new file mode 100644 index 0000000000..4014be0c1c --- /dev/null +++ b/objects/vulnerability/vulnerability--0c792fa5-29a2-4665-aa44-9b3d8b52dc2e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d4dc7e75-f15c-44c6-9c54-c6ecc78fa1c0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0c792fa5-29a2-4665-aa44-9b3d8b52dc2e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.98426Z", + "modified": "2025-01-14T19:15:08.98426Z", + "name": "CVE-2025-21313", + "description": "Windows Security Account Manager (SAM) Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21313" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0d07e014-1f51-43a5-ab29-60f3dd50a25f.json b/objects/vulnerability/vulnerability--0d07e014-1f51-43a5-ab29-60f3dd50a25f.json new file mode 100644 index 0000000000..f84453714c --- /dev/null +++ b/objects/vulnerability/vulnerability--0d07e014-1f51-43a5-ab29-60f3dd50a25f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7c63d568-7601-49ad-9c5c-9b2c6f293cda", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0d07e014-1f51-43a5-ab29-60f3dd50a25f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.076363Z", + "modified": "2025-01-14T19:15:09.076363Z", + "name": "CVE-2025-21218", + "description": "Windows Kerberos Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21218" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0d2109b5-aed0-4424-aa35-bd8ae36a5b1e.json b/objects/vulnerability/vulnerability--0d2109b5-aed0-4424-aa35-bd8ae36a5b1e.json new file mode 100644 index 0000000000..6c37b81559 --- /dev/null +++ b/objects/vulnerability/vulnerability--0d2109b5-aed0-4424-aa35-bd8ae36a5b1e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5a5aeff5-0e1e-494d-b076-657c455a89f7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0d2109b5-aed0-4424-aa35-bd8ae36a5b1e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.966742Z", + "modified": "2025-01-14T19:15:08.966742Z", + "name": "CVE-2025-21249", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21249" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0f30ec28-979f-4c55-9fed-5b133f6f408a.json b/objects/vulnerability/vulnerability--0f30ec28-979f-4c55-9fed-5b133f6f408a.json new file mode 100644 index 0000000000..b1e23574f4 --- /dev/null +++ b/objects/vulnerability/vulnerability--0f30ec28-979f-4c55-9fed-5b133f6f408a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9569f9ea-55ee-4756-909f-941819c7f92a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0f30ec28-979f-4c55-9fed-5b133f6f408a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.016174Z", + "modified": "2025-01-14T19:15:09.016174Z", + "name": "CVE-2025-21173", + "description": ".NET Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21173" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--10f993ec-f66c-4d09-807c-f6439e42363b.json b/objects/vulnerability/vulnerability--10f993ec-f66c-4d09-807c-f6439e42363b.json new file mode 100644 index 0000000000..a4f1cc8170 --- /dev/null +++ b/objects/vulnerability/vulnerability--10f993ec-f66c-4d09-807c-f6439e42363b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8fc54627-ffc7-4355-9231-688c5b5aae48", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--10f993ec-f66c-4d09-807c-f6439e42363b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.084487Z", + "modified": "2025-01-14T19:15:09.084487Z", + "name": "CVE-2025-21378", + "description": "Windows CSC Service Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21378" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--12db9108-e28f-4e92-bef3-111c84fbaf49.json b/objects/vulnerability/vulnerability--12db9108-e28f-4e92-bef3-111c84fbaf49.json new file mode 100644 index 0000000000..64ce1de008 --- /dev/null +++ b/objects/vulnerability/vulnerability--12db9108-e28f-4e92-bef3-111c84fbaf49.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3f5d923d-daf6-4862-9a57-9baea948c155", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--12db9108-e28f-4e92-bef3-111c84fbaf49", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.061146Z", + "modified": "2025-01-14T19:15:09.061146Z", + "name": "CVE-2025-21288", + "description": "Windows COM Server Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21288" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1487baba-fb26-4750-8def-70b3f9407452.json b/objects/vulnerability/vulnerability--1487baba-fb26-4750-8def-70b3f9407452.json new file mode 100644 index 0000000000..376bd08889 --- /dev/null +++ b/objects/vulnerability/vulnerability--1487baba-fb26-4750-8def-70b3f9407452.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--de94c8ba-55e4-4c7f-9721-8cf14b35a5f2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1487baba-fb26-4750-8def-70b3f9407452", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.065837Z", + "modified": "2025-01-14T19:15:09.065837Z", + "name": "CVE-2025-21413", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21413" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--15c5f594-025e-43de-93c2-d27ea23371c9.json b/objects/vulnerability/vulnerability--15c5f594-025e-43de-93c2-d27ea23371c9.json new file mode 100644 index 0000000000..51af4ea990 --- /dev/null +++ b/objects/vulnerability/vulnerability--15c5f594-025e-43de-93c2-d27ea23371c9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8ad6e869-3ccf-4ca6-875b-263d8ec2f267", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--15c5f594-025e-43de-93c2-d27ea23371c9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.98734Z", + "modified": "2025-01-14T19:15:08.98734Z", + "name": "CVE-2025-21193", + "description": "Active Directory Federation Server Spoofing Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21193" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--163b6e85-d1fc-4e67-b494-a818dbe05908.json b/objects/vulnerability/vulnerability--163b6e85-d1fc-4e67-b494-a818dbe05908.json new file mode 100644 index 0000000000..384332c6ef --- /dev/null +++ b/objects/vulnerability/vulnerability--163b6e85-d1fc-4e67-b494-a818dbe05908.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--edfa70a7-f1ef-4fd6-8f8a-70b41f4585ef", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--163b6e85-d1fc-4e67-b494-a818dbe05908", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.207321Z", + "modified": "2025-01-14T19:15:09.207321Z", + "name": "CVE-2025-23073", + "description": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation Mediawiki - GlobalBlocking Extension allows Retrieve Embedded Sensitive Data.This issue affects Mediawiki - GlobalBlocking Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-23073" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--16596e74-6628-4255-bfcb-c7deec59bb0b.json b/objects/vulnerability/vulnerability--16596e74-6628-4255-bfcb-c7deec59bb0b.json new file mode 100644 index 0000000000..bd1db89913 --- /dev/null +++ b/objects/vulnerability/vulnerability--16596e74-6628-4255-bfcb-c7deec59bb0b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--86a0c3a6-a881-4720-9a3d-2bccd7dbc8df", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--16596e74-6628-4255-bfcb-c7deec59bb0b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:03.896966Z", + "modified": "2025-01-14T19:15:03.896966Z", + "name": "CVE-2024-52006", + "description": "Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. Git defines a line-based protocol that is used to exchange information between Git and Git credential helpers. Some ecosystems (most notably, .NET and node.js) interpret single Carriage Return characters as newlines, which renders the protections against CVE-2020-5260 incomplete for credential helpers that treat Carriage Returns in this way. This issue has been addressed in commit `b01b9b8` which is included in release versions v2.48.1, v2.47.1, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to upgrade should avoid cloning from untrusted URLs, especially recursive clones.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-52006" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1667cf5d-5655-474f-b673-826cd75f574c.json b/objects/vulnerability/vulnerability--1667cf5d-5655-474f-b673-826cd75f574c.json new file mode 100644 index 0000000000..f26d79cd8e --- /dev/null +++ b/objects/vulnerability/vulnerability--1667cf5d-5655-474f-b673-826cd75f574c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f6cd2ca2-16c9-44b7-ba4b-83112dc0b4c7", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1667cf5d-5655-474f-b673-826cd75f574c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.095877Z", + "modified": "2025-01-14T19:15:09.095877Z", + "name": "CVE-2025-21286", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21286" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--17e3dbce-4f1b-4317-ba74-dba0d27e7bc9.json b/objects/vulnerability/vulnerability--17e3dbce-4f1b-4317-ba74-dba0d27e7bc9.json new file mode 100644 index 0000000000..d2db103fc4 --- /dev/null +++ b/objects/vulnerability/vulnerability--17e3dbce-4f1b-4317-ba74-dba0d27e7bc9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c1af0f7f-3b73-4195-a2cb-c36a1218dda3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--17e3dbce-4f1b-4317-ba74-dba0d27e7bc9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.094586Z", + "modified": "2025-01-14T19:15:09.094586Z", + "name": "CVE-2025-21311", + "description": "Windows NTLM V1 Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21311" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--194a2fd8-53f6-41b5-a1cc-861bb49b5be5.json b/objects/vulnerability/vulnerability--194a2fd8-53f6-41b5-a1cc-861bb49b5be5.json new file mode 100644 index 0000000000..5365273990 --- /dev/null +++ b/objects/vulnerability/vulnerability--194a2fd8-53f6-41b5-a1cc-861bb49b5be5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3156946f-b687-43ca-9fc1-f724f20d1d6f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--194a2fd8-53f6-41b5-a1cc-861bb49b5be5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.043694Z", + "modified": "2025-01-14T19:15:09.043694Z", + "name": "CVE-2025-21294", + "description": "Microsoft Digest Authentication Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21294" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1b312af2-0daf-4453-a4cf-382f90ecf96d.json b/objects/vulnerability/vulnerability--1b312af2-0daf-4453-a4cf-382f90ecf96d.json new file mode 100644 index 0000000000..4dd90ab0e9 --- /dev/null +++ b/objects/vulnerability/vulnerability--1b312af2-0daf-4453-a4cf-382f90ecf96d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--88355d3d-fefd-4c4a-a7bc-3954c99ab149", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1b312af2-0daf-4453-a4cf-382f90ecf96d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.059969Z", + "modified": "2025-01-14T19:15:09.059969Z", + "name": "CVE-2025-21271", + "description": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21271" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1b6deda6-b211-4052-a934-1c455c0aecc1.json b/objects/vulnerability/vulnerability--1b6deda6-b211-4052-a934-1c455c0aecc1.json new file mode 100644 index 0000000000..9c79944712 --- /dev/null +++ b/objects/vulnerability/vulnerability--1b6deda6-b211-4052-a934-1c455c0aecc1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8f534209-7b2c-4c18-9c30-5072d3bdd38b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1b6deda6-b211-4052-a934-1c455c0aecc1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.133019Z", + "modified": "2025-01-14T19:15:09.133019Z", + "name": "CVE-2025-21346", + "description": "Microsoft Office Security Feature Bypass Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21346" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1be8cdfe-e979-4e7f-a42c-6f296116d55b.json b/objects/vulnerability/vulnerability--1be8cdfe-e979-4e7f-a42c-6f296116d55b.json new file mode 100644 index 0000000000..b94f4993f2 --- /dev/null +++ b/objects/vulnerability/vulnerability--1be8cdfe-e979-4e7f-a42c-6f296116d55b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1ee2bbf4-2fb1-4db8-ad72-a957bb8a9ce1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1be8cdfe-e979-4e7f-a42c-6f296116d55b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.14323Z", + "modified": "2025-01-14T19:15:09.14323Z", + "name": "CVE-2025-21238", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21238" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--200cd4ca-c37d-4b60-bcb0-e4d4268bfeaa.json b/objects/vulnerability/vulnerability--200cd4ca-c37d-4b60-bcb0-e4d4268bfeaa.json new file mode 100644 index 0000000000..fff04390a4 --- /dev/null +++ b/objects/vulnerability/vulnerability--200cd4ca-c37d-4b60-bcb0-e4d4268bfeaa.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--503bd219-397c-47c2-95f9-4816a551e069", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--200cd4ca-c37d-4b60-bcb0-e4d4268bfeaa", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.98539Z", + "modified": "2025-01-14T19:15:08.98539Z", + "name": "CVE-2025-21231", + "description": "IP Helper Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21231" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--202b04cb-85b0-4874-b5a8-b63f9a012a25.json b/objects/vulnerability/vulnerability--202b04cb-85b0-4874-b5a8-b63f9a012a25.json new file mode 100644 index 0000000000..1ddaefbd0b --- /dev/null +++ b/objects/vulnerability/vulnerability--202b04cb-85b0-4874-b5a8-b63f9a012a25.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--df16b787-90b0-430e-b8a1-98b8875ec3ee", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--202b04cb-85b0-4874-b5a8-b63f9a012a25", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.079859Z", + "modified": "2025-01-14T19:15:09.079859Z", + "name": "CVE-2025-21403", + "description": "On-Premises Data Gateway Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21403" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--25c22264-8274-437a-b857-fa6d2dea6a0e.json b/objects/vulnerability/vulnerability--25c22264-8274-437a-b857-fa6d2dea6a0e.json new file mode 100644 index 0000000000..5ba5b21fad --- /dev/null +++ b/objects/vulnerability/vulnerability--25c22264-8274-437a-b857-fa6d2dea6a0e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ab9143a4-d2db-41db-8302-dc98bdab0d39", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--25c22264-8274-437a-b857-fa6d2dea6a0e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.994834Z", + "modified": "2025-01-14T19:15:08.994834Z", + "name": "CVE-2025-21227", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21227" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--26bf2586-8f4a-49cc-8125-43cfc2edc443.json b/objects/vulnerability/vulnerability--26bf2586-8f4a-49cc-8125-43cfc2edc443.json new file mode 100644 index 0000000000..95a064fc1e --- /dev/null +++ b/objects/vulnerability/vulnerability--26bf2586-8f4a-49cc-8125-43cfc2edc443.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--aa0ae35d-d16f-4a15-9f77-c427653b613d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--26bf2586-8f4a-49cc-8125-43cfc2edc443", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.162558Z", + "modified": "2025-01-14T19:15:09.162558Z", + "name": "CVE-2025-21257", + "description": "Windows WLAN AutoConfig Service Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21257" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--26f9eed8-b934-4e9f-81d4-944d5565c0dd.json b/objects/vulnerability/vulnerability--26f9eed8-b934-4e9f-81d4-944d5565c0dd.json new file mode 100644 index 0000000000..ebfd5f418c --- /dev/null +++ b/objects/vulnerability/vulnerability--26f9eed8-b934-4e9f-81d4-944d5565c0dd.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c5b2153f-b5a2-4743-bdf4-f3d6c3d2747d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--26f9eed8-b934-4e9f-81d4-944d5565c0dd", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.141004Z", + "modified": "2025-01-14T19:15:09.141004Z", + "name": "CVE-2025-21329", + "description": "MapUrlToZone Security Feature Bypass Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21329" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--29739d3c-fdb9-4a58-8e77-5a53dae83261.json b/objects/vulnerability/vulnerability--29739d3c-fdb9-4a58-8e77-5a53dae83261.json new file mode 100644 index 0000000000..556c8e33b2 --- /dev/null +++ b/objects/vulnerability/vulnerability--29739d3c-fdb9-4a58-8e77-5a53dae83261.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1b4828b5-9305-428f-9581-ad059c59cfce", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--29739d3c-fdb9-4a58-8e77-5a53dae83261", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.992371Z", + "modified": "2025-01-14T19:15:08.992371Z", + "name": "CVE-2025-21306", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21306" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--298050a9-2f69-465b-90bd-45312542054b.json b/objects/vulnerability/vulnerability--298050a9-2f69-465b-90bd-45312542054b.json new file mode 100644 index 0000000000..63766d82b5 --- /dev/null +++ b/objects/vulnerability/vulnerability--298050a9-2f69-465b-90bd-45312542054b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--dbafdcc5-5f6c-4094-9d81-867e8767fac2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--298050a9-2f69-465b-90bd-45312542054b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.05254Z", + "modified": "2025-01-14T19:15:09.05254Z", + "name": "CVE-2025-21263", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21263" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2b18587d-a061-477c-a690-a65a54b4315a.json b/objects/vulnerability/vulnerability--2b18587d-a061-477c-a690-a65a54b4315a.json new file mode 100644 index 0000000000..82ee1d9e35 --- /dev/null +++ b/objects/vulnerability/vulnerability--2b18587d-a061-477c-a690-a65a54b4315a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7882e85e-dcab-4c9b-9697-2caa69ee445c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2b18587d-a061-477c-a690-a65a54b4315a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.103268Z", + "modified": "2025-01-14T19:15:09.103268Z", + "name": "CVE-2025-21229", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21229" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2cba0d0a-db95-4d44-8d0f-fd5147f6df20.json b/objects/vulnerability/vulnerability--2cba0d0a-db95-4d44-8d0f-fd5147f6df20.json new file mode 100644 index 0000000000..6977b36bb4 --- /dev/null +++ b/objects/vulnerability/vulnerability--2cba0d0a-db95-4d44-8d0f-fd5147f6df20.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1de94343-2735-4199-9093-e26bf8a472ca", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2cba0d0a-db95-4d44-8d0f-fd5147f6df20", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.109239Z", + "modified": "2025-01-14T19:15:09.109239Z", + "name": "CVE-2025-21171", + "description": ".NET Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21171" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2ce97597-95db-428a-b6d2-aeb5fe5a9094.json b/objects/vulnerability/vulnerability--2ce97597-95db-428a-b6d2-aeb5fe5a9094.json new file mode 100644 index 0000000000..45332f2a8d --- /dev/null +++ b/objects/vulnerability/vulnerability--2ce97597-95db-428a-b6d2-aeb5fe5a9094.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--116af814-8046-41ed-a57d-4f4da40aa640", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2ce97597-95db-428a-b6d2-aeb5fe5a9094", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.983151Z", + "modified": "2025-01-14T19:15:08.983151Z", + "name": "CVE-2025-21417", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21417" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2ff16a20-f8b6-4467-be39-fbbfec331ec9.json b/objects/vulnerability/vulnerability--2ff16a20-f8b6-4467-be39-fbbfec331ec9.json new file mode 100644 index 0000000000..90d8afb37d --- /dev/null +++ b/objects/vulnerability/vulnerability--2ff16a20-f8b6-4467-be39-fbbfec331ec9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--691d6aac-3845-4968-8291-60cc8199eb8f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2ff16a20-f8b6-4467-be39-fbbfec331ec9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.123822Z", + "modified": "2025-01-14T19:15:09.123822Z", + "name": "CVE-2025-21289", + "description": "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21289" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--30501cd1-9022-4508-a068-12d4788f48ba.json b/objects/vulnerability/vulnerability--30501cd1-9022-4508-a068-12d4788f48ba.json new file mode 100644 index 0000000000..82e37d7dd2 --- /dev/null +++ b/objects/vulnerability/vulnerability--30501cd1-9022-4508-a068-12d4788f48ba.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--03f40404-4d46-450a-b3e2-e71021eb92ed", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--30501cd1-9022-4508-a068-12d4788f48ba", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.105363Z", + "modified": "2025-01-14T19:15:09.105363Z", + "name": "CVE-2025-21366", + "description": "Microsoft Access Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21366" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--310d53f7-fed9-4ded-8c22-c60e4a7e7fd7.json b/objects/vulnerability/vulnerability--310d53f7-fed9-4ded-8c22-c60e4a7e7fd7.json new file mode 100644 index 0000000000..1d38bb0efc --- /dev/null +++ b/objects/vulnerability/vulnerability--310d53f7-fed9-4ded-8c22-c60e4a7e7fd7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0e79014b-c1e6-4760-9817-71dae1fd2bc0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--310d53f7-fed9-4ded-8c22-c60e4a7e7fd7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.125904Z", + "modified": "2025-01-14T19:15:09.125904Z", + "name": "CVE-2025-21357", + "description": "Microsoft Outlook Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21357" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--32e337bf-6764-459d-97ef-c12972d34685.json b/objects/vulnerability/vulnerability--32e337bf-6764-459d-97ef-c12972d34685.json new file mode 100644 index 0000000000..66f77872b0 --- /dev/null +++ b/objects/vulnerability/vulnerability--32e337bf-6764-459d-97ef-c12972d34685.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--34d3be2c-f647-43d4-86ae-fa42402a6c40", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--32e337bf-6764-459d-97ef-c12972d34685", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.127133Z", + "modified": "2025-01-14T19:15:09.127133Z", + "name": "CVE-2025-21298", + "description": "Windows OLE Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21298" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--33e68d41-449f-4ab8-8b46-d50b934624e0.json b/objects/vulnerability/vulnerability--33e68d41-449f-4ab8-8b46-d50b934624e0.json new file mode 100644 index 0000000000..455e579083 --- /dev/null +++ b/objects/vulnerability/vulnerability--33e68d41-449f-4ab8-8b46-d50b934624e0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a269e34e-0070-4fa8-abd4-d18631828490", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--33e68d41-449f-4ab8-8b46-d50b934624e0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.19779Z", + "modified": "2025-01-14T19:15:09.19779Z", + "name": "CVE-2025-23042", + "description": "Gradio is an open-source Python package that allows quick building of demos and web application for machine learning models, API, or any arbitrary Python function. Gradio's Access Control List (ACL) for file paths can be bypassed by altering the letter case of a blocked file or directory path. This vulnerability arises due to the lack of case normalization in the file path validation logic. On case-insensitive file systems, such as those used by Windows and macOS, this flaw enables attackers to circumvent security restrictions and access sensitive files that should be protected. This issue can lead to unauthorized data access, exposing sensitive information and undermining the integrity of Gradio's security model. Given Gradio's popularity for building web applications, particularly in machine learning and AI, this vulnerability may pose a substantial threat if exploited in production environments. This issue has been addressed in release version 5.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-23042" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--34915f2f-d63c-40b3-a47f-c0b6417e7a82.json b/objects/vulnerability/vulnerability--34915f2f-d63c-40b3-a47f-c0b6417e7a82.json new file mode 100644 index 0000000000..a79aec08f2 --- /dev/null +++ b/objects/vulnerability/vulnerability--34915f2f-d63c-40b3-a47f-c0b6417e7a82.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--67b69bde-1607-4642-9f29-0525baff0b55", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--34915f2f-d63c-40b3-a47f-c0b6417e7a82", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.106312Z", + "modified": "2025-01-14T19:15:09.106312Z", + "name": "CVE-2025-21305", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21305" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--34949c1d-b902-4e85-8505-04f4f98a4581.json b/objects/vulnerability/vulnerability--34949c1d-b902-4e85-8505-04f4f98a4581.json new file mode 100644 index 0000000000..fd4d2ec54c --- /dev/null +++ b/objects/vulnerability/vulnerability--34949c1d-b902-4e85-8505-04f4f98a4581.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--95b245ad-0982-4999-bc61-e777266c0a0d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--34949c1d-b902-4e85-8505-04f4f98a4581", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.14892Z", + "modified": "2025-01-14T19:15:09.14892Z", + "name": "CVE-2025-21382", + "description": "Windows Graphics Component Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21382" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--35e6d751-f9ba-4922-bdb7-14fbd98ac425.json b/objects/vulnerability/vulnerability--35e6d751-f9ba-4922-bdb7-14fbd98ac425.json new file mode 100644 index 0000000000..7e3d7422af --- /dev/null +++ b/objects/vulnerability/vulnerability--35e6d751-f9ba-4922-bdb7-14fbd98ac425.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--67a448b2-7972-4cb2-9e66-21ad3626e79d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--35e6d751-f9ba-4922-bdb7-14fbd98ac425", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.120919Z", + "modified": "2025-01-14T19:15:09.120919Z", + "name": "CVE-2025-21261", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21261" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--38b2f6cd-26a9-47b0-a4a0-dd9b7ffa0982.json b/objects/vulnerability/vulnerability--38b2f6cd-26a9-47b0-a4a0-dd9b7ffa0982.json new file mode 100644 index 0000000000..0c0733b75d --- /dev/null +++ b/objects/vulnerability/vulnerability--38b2f6cd-26a9-47b0-a4a0-dd9b7ffa0982.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3960538a-2a78-43c3-83fa-b7a591e85d55", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--38b2f6cd-26a9-47b0-a4a0-dd9b7ffa0982", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.024811Z", + "modified": "2025-01-14T19:15:09.024811Z", + "name": "CVE-2025-21285", + "description": "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21285" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3bbdbc86-43b6-4251-8145-54c2cc6f40bc.json b/objects/vulnerability/vulnerability--3bbdbc86-43b6-4251-8145-54c2cc6f40bc.json new file mode 100644 index 0000000000..34fc817366 --- /dev/null +++ b/objects/vulnerability/vulnerability--3bbdbc86-43b6-4251-8145-54c2cc6f40bc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b7a4af1d-d3c8-4b73-a995-652e4c5d1f9d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3bbdbc86-43b6-4251-8145-54c2cc6f40bc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.0362Z", + "modified": "2025-01-14T19:15:09.0362Z", + "name": "CVE-2025-21307", + "description": "Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21307" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3be5e133-a7ef-4152-92ec-c460f9b81b81.json b/objects/vulnerability/vulnerability--3be5e133-a7ef-4152-92ec-c460f9b81b81.json new file mode 100644 index 0000000000..a7a30ad961 --- /dev/null +++ b/objects/vulnerability/vulnerability--3be5e133-a7ef-4152-92ec-c460f9b81b81.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--66d9fdef-6caa-4f10-8764-ed199a48d97e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3be5e133-a7ef-4152-92ec-c460f9b81b81", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.070553Z", + "modified": "2025-01-14T19:15:09.070553Z", + "name": "CVE-2025-21217", + "description": "Windows NTLM Spoofing Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21217" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3c4fa6d1-b2aa-4670-bec4-9ceace95d395.json b/objects/vulnerability/vulnerability--3c4fa6d1-b2aa-4670-bec4-9ceace95d395.json new file mode 100644 index 0000000000..015f60ab9f --- /dev/null +++ b/objects/vulnerability/vulnerability--3c4fa6d1-b2aa-4670-bec4-9ceace95d395.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--887c70bb-208b-4307-a1fd-481cf194a7c2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3c4fa6d1-b2aa-4670-bec4-9ceace95d395", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.032928Z", + "modified": "2025-01-14T19:15:09.032928Z", + "name": "CVE-2025-21409", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21409" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--401b92eb-971a-4f60-99d1-57db112c6957.json b/objects/vulnerability/vulnerability--401b92eb-971a-4f60-99d1-57db112c6957.json new file mode 100644 index 0000000000..eadcd9e90e --- /dev/null +++ b/objects/vulnerability/vulnerability--401b92eb-971a-4f60-99d1-57db112c6957.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0d34b85b-df15-435a-a3e7-c36d0f5b3dfe", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--401b92eb-971a-4f60-99d1-57db112c6957", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.139847Z", + "modified": "2025-01-14T19:15:09.139847Z", + "name": "CVE-2025-21292", + "description": "Windows Search Service Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21292" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4307e34e-b53a-4ed6-a200-b1e93802cb4a.json b/objects/vulnerability/vulnerability--4307e34e-b53a-4ed6-a200-b1e93802cb4a.json new file mode 100644 index 0000000000..5864075233 --- /dev/null +++ b/objects/vulnerability/vulnerability--4307e34e-b53a-4ed6-a200-b1e93802cb4a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--42a20bb6-9383-4cc9-854b-918cf9b97abe", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4307e34e-b53a-4ed6-a200-b1e93802cb4a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.100801Z", + "modified": "2025-01-14T19:15:09.100801Z", + "name": "CVE-2025-21328", + "description": "MapUrlToZone Security Feature Bypass Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21328" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4342999d-fa6d-44fb-be9d-3dcc2bbd3066.json b/objects/vulnerability/vulnerability--4342999d-fa6d-44fb-be9d-3dcc2bbd3066.json new file mode 100644 index 0000000000..775a3c7640 --- /dev/null +++ b/objects/vulnerability/vulnerability--4342999d-fa6d-44fb-be9d-3dcc2bbd3066.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8fbef87b-013b-4b9a-afc7-abcb2640f3a0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4342999d-fa6d-44fb-be9d-3dcc2bbd3066", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.077526Z", + "modified": "2025-01-14T19:15:09.077526Z", + "name": "CVE-2025-21389", + "description": "Windows upnphost.dll Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21389" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--472031a1-be7a-40c9-b74d-7e37a8e8c6af.json b/objects/vulnerability/vulnerability--472031a1-be7a-40c9-b74d-7e37a8e8c6af.json new file mode 100644 index 0000000000..51e6a1cf43 --- /dev/null +++ b/objects/vulnerability/vulnerability--472031a1-be7a-40c9-b74d-7e37a8e8c6af.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fb850ba7-1e24-4bf5-bc5c-61a53d4a25c3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--472031a1-be7a-40c9-b74d-7e37a8e8c6af", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.071532Z", + "modified": "2025-01-14T19:15:09.071532Z", + "name": "CVE-2025-21243", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21243" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--47550c9d-62f6-4f13-a41d-36f060c6673a.json b/objects/vulnerability/vulnerability--47550c9d-62f6-4f13-a41d-36f060c6673a.json new file mode 100644 index 0000000000..b5267b171e --- /dev/null +++ b/objects/vulnerability/vulnerability--47550c9d-62f6-4f13-a41d-36f060c6673a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4d81c297-fefe-4bd3-907f-e532c375f542", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--47550c9d-62f6-4f13-a41d-36f060c6673a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.099613Z", + "modified": "2025-01-14T19:15:09.099613Z", + "name": "CVE-2025-21411", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21411" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4cee96fd-2bfe-49f6-845e-787678743210.json b/objects/vulnerability/vulnerability--4cee96fd-2bfe-49f6-845e-787678743210.json new file mode 100644 index 0000000000..89eecc0316 --- /dev/null +++ b/objects/vulnerability/vulnerability--4cee96fd-2bfe-49f6-845e-787678743210.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--09b3716d-752b-4273-bae1-6f73f3309138", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4cee96fd-2bfe-49f6-845e-787678743210", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.08555Z", + "modified": "2025-01-14T19:15:09.08555Z", + "name": "CVE-2025-21340", + "description": "Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21340" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4e21543b-497d-429c-978b-bd3a7d2b6ffb.json b/objects/vulnerability/vulnerability--4e21543b-497d-429c-978b-bd3a7d2b6ffb.json new file mode 100644 index 0000000000..6e6f867a28 --- /dev/null +++ b/objects/vulnerability/vulnerability--4e21543b-497d-429c-978b-bd3a7d2b6ffb.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--19209df0-43e4-449e-a440-a76e9047753a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4e21543b-497d-429c-978b-bd3a7d2b6ffb", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.066807Z", + "modified": "2025-01-14T19:15:09.066807Z", + "name": "CVE-2025-21234", + "description": "Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21234" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4e6a38b7-f51c-4038-8736-39684d149f49.json b/objects/vulnerability/vulnerability--4e6a38b7-f51c-4038-8736-39684d149f49.json new file mode 100644 index 0000000000..2871d31032 --- /dev/null +++ b/objects/vulnerability/vulnerability--4e6a38b7-f51c-4038-8736-39684d149f49.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--eae88e29-32b0-4188-8e91-68328e5989f1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4e6a38b7-f51c-4038-8736-39684d149f49", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.111618Z", + "modified": "2025-01-14T19:15:09.111618Z", + "name": "CVE-2025-21265", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21265" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4e7635f5-b70f-4c57-bd31-349508eff08a.json b/objects/vulnerability/vulnerability--4e7635f5-b70f-4c57-bd31-349508eff08a.json new file mode 100644 index 0000000000..7708348e3d --- /dev/null +++ b/objects/vulnerability/vulnerability--4e7635f5-b70f-4c57-bd31-349508eff08a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4420b167-7be2-40b6-8919-57a5aab0e7d5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4e7635f5-b70f-4c57-bd31-349508eff08a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.973419Z", + "modified": "2025-01-14T19:15:08.973419Z", + "name": "CVE-2025-21341", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21341" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--51989fd0-3aba-4e83-8b28-dd03f37266ab.json b/objects/vulnerability/vulnerability--51989fd0-3aba-4e83-8b28-dd03f37266ab.json new file mode 100644 index 0000000000..25ea13633e --- /dev/null +++ b/objects/vulnerability/vulnerability--51989fd0-3aba-4e83-8b28-dd03f37266ab.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9ab8ffaf-5727-4727-994a-e511bb966b09", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--51989fd0-3aba-4e83-8b28-dd03f37266ab", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.145415Z", + "modified": "2025-01-14T19:15:09.145415Z", + "name": "CVE-2025-21318", + "description": "Windows Kernel Memory Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21318" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5214c2ad-b85c-4355-83fd-b2df6c585e87.json b/objects/vulnerability/vulnerability--5214c2ad-b85c-4355-83fd-b2df6c585e87.json new file mode 100644 index 0000000000..a759eec38a --- /dev/null +++ b/objects/vulnerability/vulnerability--5214c2ad-b85c-4355-83fd-b2df6c585e87.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b2db893e-b21e-43ae-8b36-90d3ec933c10", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5214c2ad-b85c-4355-83fd-b2df6c585e87", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.152179Z", + "modified": "2025-01-14T19:15:09.152179Z", + "name": "CVE-2025-21236", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21236" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--53346903-11dd-4cda-a922-8868f66e043b.json b/objects/vulnerability/vulnerability--53346903-11dd-4cda-a922-8868f66e043b.json new file mode 100644 index 0000000000..92b3f2d719 --- /dev/null +++ b/objects/vulnerability/vulnerability--53346903-11dd-4cda-a922-8868f66e043b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f2cb7d04-031a-4aac-9222-e4bfee722926", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--53346903-11dd-4cda-a922-8868f66e043b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.031774Z", + "modified": "2025-01-14T19:15:09.031774Z", + "name": "CVE-2025-21293", + "description": "Active Directory Domain Services Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21293" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--53da4ce3-4f42-434f-9d80-b6b4bf6490af.json b/objects/vulnerability/vulnerability--53da4ce3-4f42-434f-9d80-b6b4bf6490af.json new file mode 100644 index 0000000000..9aa2cfaa48 --- /dev/null +++ b/objects/vulnerability/vulnerability--53da4ce3-4f42-434f-9d80-b6b4bf6490af.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0e07c278-c6df-4103-8c06-38a75ce96e8e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--53da4ce3-4f42-434f-9d80-b6b4bf6490af", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.116213Z", + "modified": "2025-01-14T19:15:09.116213Z", + "name": "CVE-2025-21393", + "description": "Microsoft SharePoint Server Spoofing Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21393" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--55022c28-e4b1-4b59-88c4-6475c7e4ceea.json b/objects/vulnerability/vulnerability--55022c28-e4b1-4b59-88c4-6475c7e4ceea.json new file mode 100644 index 0000000000..9a1baf5ff7 --- /dev/null +++ b/objects/vulnerability/vulnerability--55022c28-e4b1-4b59-88c4-6475c7e4ceea.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--70220c56-af86-46ec-962c-f896210c3b92", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--55022c28-e4b1-4b59-88c4-6475c7e4ceea", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.96387Z", + "modified": "2025-01-14T19:15:08.96387Z", + "name": "CVE-2025-21233", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21233" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--551cdf2b-fd32-42ea-8e93-ea16ebdbbb45.json b/objects/vulnerability/vulnerability--551cdf2b-fd32-42ea-8e93-ea16ebdbbb45.json new file mode 100644 index 0000000000..4314a61dd8 --- /dev/null +++ b/objects/vulnerability/vulnerability--551cdf2b-fd32-42ea-8e93-ea16ebdbbb45.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5f35f958-d2c2-4709-83e5-b7f4e2271318", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--551cdf2b-fd32-42ea-8e93-ea16ebdbbb45", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.97051Z", + "modified": "2025-01-14T19:15:08.97051Z", + "name": "CVE-2025-21276", + "description": "Windows MapUrlToZone Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21276" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--56e79a75-0bbe-4f59-9070-f111cbb59895.json b/objects/vulnerability/vulnerability--56e79a75-0bbe-4f59-9070-f111cbb59895.json new file mode 100644 index 0000000000..f98af8a92e --- /dev/null +++ b/objects/vulnerability/vulnerability--56e79a75-0bbe-4f59-9070-f111cbb59895.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--97240a86-8f97-41f7-9cdd-9c00cdcc9920", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--56e79a75-0bbe-4f59-9070-f111cbb59895", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.089865Z", + "modified": "2025-01-14T19:15:09.089865Z", + "name": "CVE-2025-21327", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21327" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--571e75f5-79b4-448e-81e1-9d716da2347d.json b/objects/vulnerability/vulnerability--571e75f5-79b4-448e-81e1-9d716da2347d.json new file mode 100644 index 0000000000..b4c3f778d0 --- /dev/null +++ b/objects/vulnerability/vulnerability--571e75f5-79b4-448e-81e1-9d716da2347d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c1d001ac-9d02-458e-b64a-13f1b7b0dafd", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--571e75f5-79b4-448e-81e1-9d716da2347d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.086843Z", + "modified": "2025-01-14T19:15:09.086843Z", + "name": "CVE-2025-21260", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21260" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--58368f2b-87da-44f2-80fa-c94d96eb8a0c.json b/objects/vulnerability/vulnerability--58368f2b-87da-44f2-80fa-c94d96eb8a0c.json new file mode 100644 index 0000000000..38886e1a2d --- /dev/null +++ b/objects/vulnerability/vulnerability--58368f2b-87da-44f2-80fa-c94d96eb8a0c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--739d478c-0951-4d10-b597-3fc73aeff3bf", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--58368f2b-87da-44f2-80fa-c94d96eb8a0c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.138733Z", + "modified": "2025-01-14T19:15:09.138733Z", + "name": "CVE-2025-21362", + "description": "Microsoft Excel Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21362" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5c33ccf4-4f71-44c6-8f14-d9912b79cf85.json b/objects/vulnerability/vulnerability--5c33ccf4-4f71-44c6-8f14-d9912b79cf85.json new file mode 100644 index 0000000000..ff0844f78f --- /dev/null +++ b/objects/vulnerability/vulnerability--5c33ccf4-4f71-44c6-8f14-d9912b79cf85.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--19c4ef90-932b-4cb8-ae3f-de78b245fc65", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5c33ccf4-4f71-44c6-8f14-d9912b79cf85", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.971748Z", + "modified": "2025-01-14T19:15:08.971748Z", + "name": "CVE-2025-21245", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21245" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5c87f6de-a7ee-48bc-9084-5466988b5077.json b/objects/vulnerability/vulnerability--5c87f6de-a7ee-48bc-9084-5466988b5077.json new file mode 100644 index 0000000000..fb805a774d --- /dev/null +++ b/objects/vulnerability/vulnerability--5c87f6de-a7ee-48bc-9084-5466988b5077.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--025ed5fa-81cf-45c7-b82a-068e1a200ab0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5c87f6de-a7ee-48bc-9084-5466988b5077", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.093577Z", + "modified": "2025-01-14T19:15:09.093577Z", + "name": "CVE-2025-21272", + "description": "Windows COM Server Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21272" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5cd6e945-89b6-4e26-b275-08f4062f1683.json b/objects/vulnerability/vulnerability--5cd6e945-89b6-4e26-b275-08f4062f1683.json new file mode 100644 index 0000000000..e78ff45f0d --- /dev/null +++ b/objects/vulnerability/vulnerability--5cd6e945-89b6-4e26-b275-08f4062f1683.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--eb20fe9e-7c56-404d-9cda-c5d304587cf9", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5cd6e945-89b6-4e26-b275-08f4062f1683", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.029203Z", + "modified": "2025-01-14T19:15:09.029203Z", + "name": "CVE-2025-21268", + "description": "MapUrlToZone Security Feature Bypass Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21268" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--60110b2e-1415-49ef-b0aa-9d4d5a5bcd04.json b/objects/vulnerability/vulnerability--60110b2e-1415-49ef-b0aa-9d4d5a5bcd04.json new file mode 100644 index 0000000000..24a3a54fd2 --- /dev/null +++ b/objects/vulnerability/vulnerability--60110b2e-1415-49ef-b0aa-9d4d5a5bcd04.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--74d6838c-80dd-4003-b0b8-3ace09f7cc4d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--60110b2e-1415-49ef-b0aa-9d4d5a5bcd04", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.137537Z", + "modified": "2025-01-14T19:15:09.137537Z", + "name": "CVE-2025-21331", + "description": "Windows Installer Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21331" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--636e0b61-c192-4e84-a428-6c97616266a9.json b/objects/vulnerability/vulnerability--636e0b61-c192-4e84-a428-6c97616266a9.json new file mode 100644 index 0000000000..adb42c3378 --- /dev/null +++ b/objects/vulnerability/vulnerability--636e0b61-c192-4e84-a428-6c97616266a9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d59bd97a-4f85-4bb7-96b6-7f4bf2d11e3e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--636e0b61-c192-4e84-a428-6c97616266a9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.054443Z", + "modified": "2025-01-14T19:15:09.054443Z", + "name": "CVE-2025-21348", + "description": "Microsoft SharePoint Server Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21348" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--664e2ca2-48ff-4fe6-9ace-f113a36a8927.json b/objects/vulnerability/vulnerability--664e2ca2-48ff-4fe6-9ace-f113a36a8927.json new file mode 100644 index 0000000000..d5f8a439ca --- /dev/null +++ b/objects/vulnerability/vulnerability--664e2ca2-48ff-4fe6-9ace-f113a36a8927.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--94a29132-fed4-4478-9190-eb0e8a6ae249", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--664e2ca2-48ff-4fe6-9ace-f113a36a8927", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.041243Z", + "modified": "2025-01-14T19:15:09.041243Z", + "name": "CVE-2025-21354", + "description": "Microsoft Excel Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21354" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--69e577ff-b237-4008-8122-02ae8f0dc328.json b/objects/vulnerability/vulnerability--69e577ff-b237-4008-8122-02ae8f0dc328.json new file mode 100644 index 0000000000..f3628257bd --- /dev/null +++ b/objects/vulnerability/vulnerability--69e577ff-b237-4008-8122-02ae8f0dc328.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--54ef99e2-c50a-4ff0-9d12-b78660733b76", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--69e577ff-b237-4008-8122-02ae8f0dc328", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.033911Z", + "modified": "2025-01-14T19:15:09.033911Z", + "name": "CVE-2025-21333", + "description": "Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21333" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6c9af0a5-e6b2-4278-a288-dd58d9a48318.json b/objects/vulnerability/vulnerability--6c9af0a5-e6b2-4278-a288-dd58d9a48318.json new file mode 100644 index 0000000000..c45c1a0f43 --- /dev/null +++ b/objects/vulnerability/vulnerability--6c9af0a5-e6b2-4278-a288-dd58d9a48318.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fa5beffb-6f61-4728-a66b-cce9edd54fbd", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6c9af0a5-e6b2-4278-a288-dd58d9a48318", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.037556Z", + "modified": "2025-01-14T19:15:09.037556Z", + "name": "CVE-2025-21335", + "description": "Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21335" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6e2d186a-7c9d-4100-88c6-694221b25e58.json b/objects/vulnerability/vulnerability--6e2d186a-7c9d-4100-88c6-694221b25e58.json new file mode 100644 index 0000000000..7677fa5b28 --- /dev/null +++ b/objects/vulnerability/vulnerability--6e2d186a-7c9d-4100-88c6-694221b25e58.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e638fe20-b67a-4b52-b3bb-89dc9e989946", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6e2d186a-7c9d-4100-88c6-694221b25e58", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.986375Z", + "modified": "2025-01-14T19:15:08.986375Z", + "name": "CVE-2025-21360", + "description": "Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21360" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--707e264f-012e-4168-ac71-bb8048cf9ccf.json b/objects/vulnerability/vulnerability--707e264f-012e-4168-ac71-bb8048cf9ccf.json new file mode 100644 index 0000000000..a22776969d --- /dev/null +++ b/objects/vulnerability/vulnerability--707e264f-012e-4168-ac71-bb8048cf9ccf.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--89ce0b24-4845-493b-925e-810c99299646", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--707e264f-012e-4168-ac71-bb8048cf9ccf", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.150806Z", + "modified": "2025-01-14T19:15:09.150806Z", + "name": "CVE-2025-21277", + "description": "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21277" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--70862900-35d5-4de6-a920-d8ad047dfaf4.json b/objects/vulnerability/vulnerability--70862900-35d5-4de6-a920-d8ad047dfaf4.json new file mode 100644 index 0000000000..8fc55c0007 --- /dev/null +++ b/objects/vulnerability/vulnerability--70862900-35d5-4de6-a920-d8ad047dfaf4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e0022e1d-75ef-443a-8fe3-ed346bd84423", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--70862900-35d5-4de6-a920-d8ad047dfaf4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.012386Z", + "modified": "2025-01-14T19:15:09.012386Z", + "name": "CVE-2025-21336", + "description": "Windows Cryptographic Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21336" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7318911f-a0ee-410f-a5e1-69158c4d4d51.json b/objects/vulnerability/vulnerability--7318911f-a0ee-410f-a5e1-69158c4d4d51.json new file mode 100644 index 0000000000..ba7bb82c78 --- /dev/null +++ b/objects/vulnerability/vulnerability--7318911f-a0ee-410f-a5e1-69158c4d4d51.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--18267985-fdd2-4368-9745-7e6f3bd3206a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7318911f-a0ee-410f-a5e1-69158c4d4d51", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.157294Z", + "modified": "2025-01-14T19:15:09.157294Z", + "name": "CVE-2025-21211", + "description": "Secure Boot Security Feature Bypass Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21211" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--74f4aa15-79b9-4152-996d-937c5c67bbdf.json b/objects/vulnerability/vulnerability--74f4aa15-79b9-4152-996d-937c5c67bbdf.json new file mode 100644 index 0000000000..a16f33859d --- /dev/null +++ b/objects/vulnerability/vulnerability--74f4aa15-79b9-4152-996d-937c5c67bbdf.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f94c214e-aecc-48fd-8f5f-a62f20e03346", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--74f4aa15-79b9-4152-996d-937c5c67bbdf", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.013484Z", + "modified": "2025-01-14T19:15:09.013484Z", + "name": "CVE-2025-21246", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21246" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--76719aaf-6bc0-484e-96a9-76aa0a6fa214.json b/objects/vulnerability/vulnerability--76719aaf-6bc0-484e-96a9-76aa0a6fa214.json new file mode 100644 index 0000000000..f11087232a --- /dev/null +++ b/objects/vulnerability/vulnerability--76719aaf-6bc0-484e-96a9-76aa0a6fa214.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--45f99df1-c84b-437d-8e5e-bccc3e153afb", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--76719aaf-6bc0-484e-96a9-76aa0a6fa214", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.114022Z", + "modified": "2025-01-14T19:15:09.114022Z", + "name": "CVE-2025-21256", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21256" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7718f641-4e2b-4f41-a4d7-380db707d8ae.json b/objects/vulnerability/vulnerability--7718f641-4e2b-4f41-a4d7-380db707d8ae.json new file mode 100644 index 0000000000..20d28bed1d --- /dev/null +++ b/objects/vulnerability/vulnerability--7718f641-4e2b-4f41-a4d7-380db707d8ae.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bd7bf083-847c-45a3-aa9d-224145d72943", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7718f641-4e2b-4f41-a4d7-380db707d8ae", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.998299Z", + "modified": "2025-01-14T19:15:08.998299Z", + "name": "CVE-2025-21356", + "description": "Microsoft Office Visio Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21356" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--779edcae-1ddc-4aac-a1cf-2ebc1f2191de.json b/objects/vulnerability/vulnerability--779edcae-1ddc-4aac-a1cf-2ebc1f2191de.json new file mode 100644 index 0000000000..2d2e9e6aab --- /dev/null +++ b/objects/vulnerability/vulnerability--779edcae-1ddc-4aac-a1cf-2ebc1f2191de.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3f2148cd-1918-455e-a0b2-c0698e17b133", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--779edcae-1ddc-4aac-a1cf-2ebc1f2191de", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.211452Z", + "modified": "2025-01-14T19:15:09.211452Z", + "name": "CVE-2025-23074", + "description": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wikimedia Foundation Mediawiki - SocialProfile Extension allows Functionality Misuse.This issue affects Mediawiki - SocialProfile Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-23074" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--77a18250-a159-4e40-804a-3ba5f8277a0b.json b/objects/vulnerability/vulnerability--77a18250-a159-4e40-804a-3ba5f8277a0b.json new file mode 100644 index 0000000000..7d9811b6d5 --- /dev/null +++ b/objects/vulnerability/vulnerability--77a18250-a159-4e40-804a-3ba5f8277a0b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fc2d2c9d-11a5-4476-b3a9-6d08ace557ad", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--77a18250-a159-4e40-804a-3ba5f8277a0b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.083182Z", + "modified": "2025-01-14T19:15:09.083182Z", + "name": "CVE-2025-21372", + "description": "Microsoft Brokering File System Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21372" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7890f734-fd16-4151-9d5b-d89fc99f7787.json b/objects/vulnerability/vulnerability--7890f734-fd16-4151-9d5b-d89fc99f7787.json new file mode 100644 index 0000000000..7e92896351 --- /dev/null +++ b/objects/vulnerability/vulnerability--7890f734-fd16-4151-9d5b-d89fc99f7787.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--996aaf22-773a-4546-a302-328195b9c4f8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7890f734-fd16-4151-9d5b-d89fc99f7787", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.974704Z", + "modified": "2025-01-14T19:15:08.974704Z", + "name": "CVE-2025-21258", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21258" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7acb485c-b4d9-44ef-9511-b4c30e7d6a88.json b/objects/vulnerability/vulnerability--7acb485c-b4d9-44ef-9511-b4c30e7d6a88.json new file mode 100644 index 0000000000..bd08071f8f --- /dev/null +++ b/objects/vulnerability/vulnerability--7acb485c-b4d9-44ef-9511-b4c30e7d6a88.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--16fa4062-0db7-419d-928d-635e3a7babd6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7acb485c-b4d9-44ef-9511-b4c30e7d6a88", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.976507Z", + "modified": "2025-01-14T19:15:08.976507Z", + "name": "CVE-2025-21189", + "description": "MapUrlToZone Security Feature Bypass Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21189" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7b2b4490-41d1-42ce-bed0-13c26a506981.json b/objects/vulnerability/vulnerability--7b2b4490-41d1-42ce-bed0-13c26a506981.json new file mode 100644 index 0000000000..f9eeb28903 --- /dev/null +++ b/objects/vulnerability/vulnerability--7b2b4490-41d1-42ce-bed0-13c26a506981.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fad4fc77-8e61-4b72-91b7-106491c05017", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7b2b4490-41d1-42ce-bed0-13c26a506981", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.965341Z", + "modified": "2025-01-14T19:15:08.965341Z", + "name": "CVE-2025-21345", + "description": "Microsoft Office Visio Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21345" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7c5611de-367f-47a4-a3ac-1b5ff968b7b3.json b/objects/vulnerability/vulnerability--7c5611de-367f-47a4-a3ac-1b5ff968b7b3.json new file mode 100644 index 0000000000..e2c5bfcc31 --- /dev/null +++ b/objects/vulnerability/vulnerability--7c5611de-367f-47a4-a3ac-1b5ff968b7b3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8462daae-5a0f-44d8-88a6-3c70e9353148", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7c5611de-367f-47a4-a3ac-1b5ff968b7b3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.988321Z", + "modified": "2025-01-14T19:15:08.988321Z", + "name": "CVE-2025-21308", + "description": "Windows Themes Spoofing Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21308" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7c56387d-76a1-4696-bd9c-8fb70dda528b.json b/objects/vulnerability/vulnerability--7c56387d-76a1-4696-bd9c-8fb70dda528b.json new file mode 100644 index 0000000000..44a38e4b5e --- /dev/null +++ b/objects/vulnerability/vulnerability--7c56387d-76a1-4696-bd9c-8fb70dda528b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1d878df5-e356-497c-8e8b-d5f49ed65a68", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7c56387d-76a1-4696-bd9c-8fb70dda528b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.074868Z", + "modified": "2025-01-14T19:15:09.074868Z", + "name": "CVE-2025-21296", + "description": "BranchCache Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21296" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7c60a56f-c756-4609-9711-b2262d0e7cca.json b/objects/vulnerability/vulnerability--7c60a56f-c756-4609-9711-b2262d0e7cca.json new file mode 100644 index 0000000000..8dedc1308f --- /dev/null +++ b/objects/vulnerability/vulnerability--7c60a56f-c756-4609-9711-b2262d0e7cca.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a048cb73-fe69-456f-8462-5e38dad8d4d6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7c60a56f-c756-4609-9711-b2262d0e7cca", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.122875Z", + "modified": "2025-01-14T19:15:09.122875Z", + "name": "CVE-2025-21338", + "description": "GDI+ Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21338" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7d22eef1-5eb2-4974-895b-6c7c78fcab81.json b/objects/vulnerability/vulnerability--7d22eef1-5eb2-4974-895b-6c7c78fcab81.json new file mode 100644 index 0000000000..08ba4b16f5 --- /dev/null +++ b/objects/vulnerability/vulnerability--7d22eef1-5eb2-4974-895b-6c7c78fcab81.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5e6167df-391f-496f-8187-352356570ce8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7d22eef1-5eb2-4974-895b-6c7c78fcab81", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.04765Z", + "modified": "2025-01-14T19:15:09.04765Z", + "name": "CVE-2025-21319", + "description": "Windows Kernel Memory Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21319" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7d879c77-a32e-4600-86e9-4f163beef9eb.json b/objects/vulnerability/vulnerability--7d879c77-a32e-4600-86e9-4f163beef9eb.json new file mode 100644 index 0000000000..ff686b9bf3 --- /dev/null +++ b/objects/vulnerability/vulnerability--7d879c77-a32e-4600-86e9-4f163beef9eb.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--90ec8b8d-9c11-41df-a6db-0559e8e1e3e6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7d879c77-a32e-4600-86e9-4f163beef9eb", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.042537Z", + "modified": "2025-01-14T19:15:09.042537Z", + "name": "CVE-2025-21330", + "description": "Windows Remote Desktop Services Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21330" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7ec83631-fd6e-45db-b74b-f3d1620d5a10.json b/objects/vulnerability/vulnerability--7ec83631-fd6e-45db-b74b-f3d1620d5a10.json new file mode 100644 index 0000000000..cf2ea6dc52 --- /dev/null +++ b/objects/vulnerability/vulnerability--7ec83631-fd6e-45db-b74b-f3d1620d5a10.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--08263e20-6259-405b-a814-83e7e6fe4d22", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7ec83631-fd6e-45db-b74b-f3d1620d5a10", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.177211Z", + "modified": "2025-01-14T19:15:09.177211Z", + "name": "CVE-2025-0474", + "description": "Invoice Ninja is vulnerable to authenticated Server-Side Request Forgery (SSRF) allowing for arbitrary file read and network resource requests as the application user.\nThis issue affects Invoice Ninja: from 5.8.56 through 5.11.23.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0474" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--81e97785-8e9d-4de0-93b6-3da092531579.json b/objects/vulnerability/vulnerability--81e97785-8e9d-4de0-93b6-3da092531579.json new file mode 100644 index 0000000000..9ea4c09913 --- /dev/null +++ b/objects/vulnerability/vulnerability--81e97785-8e9d-4de0-93b6-3da092531579.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bc669fcc-4337-4df6-9f16-1b7218a76c5a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--81e97785-8e9d-4de0-93b6-3da092531579", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.967774Z", + "modified": "2025-01-14T19:15:08.967774Z", + "name": "CVE-2025-21172", + "description": ".NET and Visual Studio Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21172" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--82b057d6-3ef3-4d68-84cf-0bdf972735ce.json b/objects/vulnerability/vulnerability--82b057d6-3ef3-4d68-84cf-0bdf972735ce.json new file mode 100644 index 0000000000..be8a515437 --- /dev/null +++ b/objects/vulnerability/vulnerability--82b057d6-3ef3-4d68-84cf-0bdf972735ce.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c0d38d48-6ceb-4067-b883-d22f6b886a63", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--82b057d6-3ef3-4d68-84cf-0bdf972735ce", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:02.566471Z", + "modified": "2025-01-14T19:15:02.566471Z", + "name": "CVE-2024-48854", + "description": "Off-by-one error in the TIFF image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause an information disclosure in the context of the process using the image codec.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48854" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--83c55b34-64a5-454b-9c5e-5e649bf83a87.json b/objects/vulnerability/vulnerability--83c55b34-64a5-454b-9c5e-5e649bf83a87.json new file mode 100644 index 0000000000..9f06a1da40 --- /dev/null +++ b/objects/vulnerability/vulnerability--83c55b34-64a5-454b-9c5e-5e649bf83a87.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5e6c4b10-beba-4789-b942-a03ca6fe0e16", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--83c55b34-64a5-454b-9c5e-5e649bf83a87", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.062167Z", + "modified": "2025-01-14T19:15:09.062167Z", + "name": "CVE-2025-21344", + "description": "Microsoft SharePoint Server Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21344" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8616762a-19b6-4bf0-86c5-ad1ac42896c4.json b/objects/vulnerability/vulnerability--8616762a-19b6-4bf0-86c5-ad1ac42896c4.json new file mode 100644 index 0000000000..251820e52a --- /dev/null +++ b/objects/vulnerability/vulnerability--8616762a-19b6-4bf0-86c5-ad1ac42896c4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c9f0336e-4417-4d27-adc2-249e98e49dbe", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8616762a-19b6-4bf0-86c5-ad1ac42896c4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.019268Z", + "modified": "2025-01-14T19:15:09.019268Z", + "name": "CVE-2025-21323", + "description": "Windows Kernel Memory Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21323" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--86ac21b0-59c2-4e3a-8e01-c4a5b59f6d61.json b/objects/vulnerability/vulnerability--86ac21b0-59c2-4e3a-8e01-c4a5b59f6d61.json new file mode 100644 index 0000000000..8d31ef715d --- /dev/null +++ b/objects/vulnerability/vulnerability--86ac21b0-59c2-4e3a-8e01-c4a5b59f6d61.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f557effe-7b7f-498b-8b7d-0184cf36d773", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--86ac21b0-59c2-4e3a-8e01-c4a5b59f6d61", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.000378Z", + "modified": "2025-01-14T19:15:09.000378Z", + "name": "CVE-2025-21395", + "description": "Microsoft Access Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21395" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--887c0543-63fc-4479-bdb3-67047fc915d4.json b/objects/vulnerability/vulnerability--887c0543-63fc-4479-bdb3-67047fc915d4.json new file mode 100644 index 0000000000..64d38d0612 --- /dev/null +++ b/objects/vulnerability/vulnerability--887c0543-63fc-4479-bdb3-67047fc915d4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d264ace1-3f54-431f-a4b9-0f04fd8926b2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--887c0543-63fc-4479-bdb3-67047fc915d4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.124854Z", + "modified": "2025-01-14T19:15:09.124854Z", + "name": "CVE-2025-21202", + "description": "Windows Recovery Environment Agent Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21202" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8a52cba0-f0d8-420c-b662-6aa186e7461d.json b/objects/vulnerability/vulnerability--8a52cba0-f0d8-420c-b662-6aa186e7461d.json new file mode 100644 index 0000000000..2f29135c51 --- /dev/null +++ b/objects/vulnerability/vulnerability--8a52cba0-f0d8-420c-b662-6aa186e7461d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b0a4d3c5-d946-439c-b391-7ac1d1e32745", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8a52cba0-f0d8-420c-b662-6aa186e7461d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.021512Z", + "modified": "2025-01-14T19:15:09.021512Z", + "name": "CVE-2025-21251", + "description": "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21251" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8b97bfe9-97b5-41b4-a311-35d3c7ff83d8.json b/objects/vulnerability/vulnerability--8b97bfe9-97b5-41b4-a311-35d3c7ff83d8.json new file mode 100644 index 0000000000..a2487e4da1 --- /dev/null +++ b/objects/vulnerability/vulnerability--8b97bfe9-97b5-41b4-a311-35d3c7ff83d8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--04e0b513-6146-4019-856b-aafce0f21d6d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8b97bfe9-97b5-41b4-a311-35d3c7ff83d8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.136443Z", + "modified": "2025-01-14T19:15:09.136443Z", + "name": "CVE-2025-21273", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21273" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8cac897d-23e6-40fa-bbb4-2bd676ddf899.json b/objects/vulnerability/vulnerability--8cac897d-23e6-40fa-bbb4-2bd676ddf899.json new file mode 100644 index 0000000000..4854c06ecb --- /dev/null +++ b/objects/vulnerability/vulnerability--8cac897d-23e6-40fa-bbb4-2bd676ddf899.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--956d6404-c8c4-4040-9ecf-c4967a381d74", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8cac897d-23e6-40fa-bbb4-2bd676ddf899", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.128481Z", + "modified": "2025-01-14T19:15:09.128481Z", + "name": "CVE-2025-21363", + "description": "Microsoft Word Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21363" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8cea3b93-4bfd-46e3-8bfd-44085722d75f.json b/objects/vulnerability/vulnerability--8cea3b93-4bfd-46e3-8bfd-44085722d75f.json new file mode 100644 index 0000000000..3828be1326 --- /dev/null +++ b/objects/vulnerability/vulnerability--8cea3b93-4bfd-46e3-8bfd-44085722d75f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4a1adb56-81e8-4672-b8b5-e311af72c953", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8cea3b93-4bfd-46e3-8bfd-44085722d75f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.954237Z", + "modified": "2025-01-14T19:15:08.954237Z", + "name": "CVE-2025-21250", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21250" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8e90d3f0-0ec9-498c-aa47-50ca282bdf69.json b/objects/vulnerability/vulnerability--8e90d3f0-0ec9-498c-aa47-50ca282bdf69.json new file mode 100644 index 0000000000..0c1cf19923 --- /dev/null +++ b/objects/vulnerability/vulnerability--8e90d3f0-0ec9-498c-aa47-50ca282bdf69.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--17080931-0d78-48d6-9ff3-416de6d850a2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8e90d3f0-0ec9-498c-aa47-50ca282bdf69", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.990962Z", + "modified": "2025-01-14T19:15:08.990962Z", + "name": "CVE-2025-21364", + "description": "Microsoft Excel Security Feature Bypass Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21364" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--900c20aa-01db-4a7c-9b6e-a5e0fedcd448.json b/objects/vulnerability/vulnerability--900c20aa-01db-4a7c-9b6e-a5e0fedcd448.json new file mode 100644 index 0000000000..ba3078746f --- /dev/null +++ b/objects/vulnerability/vulnerability--900c20aa-01db-4a7c-9b6e-a5e0fedcd448.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c192f31f-c7c6-4880-969a-331232d15156", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--900c20aa-01db-4a7c-9b6e-a5e0fedcd448", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.06955Z", + "modified": "2025-01-14T19:15:09.06955Z", + "name": "CVE-2025-21252", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21252" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--907c41c3-0408-4317-ae74-dd4646f61183.json b/objects/vulnerability/vulnerability--907c41c3-0408-4317-ae74-dd4646f61183.json new file mode 100644 index 0000000000..ce7ae94458 --- /dev/null +++ b/objects/vulnerability/vulnerability--907c41c3-0408-4317-ae74-dd4646f61183.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b7571623-321f-4cc9-845c-c9899e5f8d75", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--907c41c3-0408-4317-ae74-dd4646f61183", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.999359Z", + "modified": "2025-01-14T19:15:08.999359Z", + "name": "CVE-2025-21317", + "description": "Windows Kernel Memory Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21317" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--91bd97c4-2c7a-40ba-9911-9e064e68d96a.json b/objects/vulnerability/vulnerability--91bd97c4-2c7a-40ba-9911-9e064e68d96a.json new file mode 100644 index 0000000000..4a4a89257e --- /dev/null +++ b/objects/vulnerability/vulnerability--91bd97c4-2c7a-40ba-9911-9e064e68d96a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--cc6548f6-6a73-4ad0-9305-6c3d3924fb2b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--91bd97c4-2c7a-40ba-9911-9e064e68d96a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.014658Z", + "modified": "2025-01-14T19:15:09.014658Z", + "name": "CVE-2025-21299", + "description": "Windows Kerberos Security Feature Bypass Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21299" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--93b8e6b6-e641-4642-9b4e-4cb98d739860.json b/objects/vulnerability/vulnerability--93b8e6b6-e641-4642-9b4e-4cb98d739860.json new file mode 100644 index 0000000000..7f1c92d59b --- /dev/null +++ b/objects/vulnerability/vulnerability--93b8e6b6-e641-4642-9b4e-4cb98d739860.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c804f37c-57fa-476d-b43b-49ca2aff4999", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--93b8e6b6-e641-4642-9b4e-4cb98d739860", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.078758Z", + "modified": "2025-01-14T19:15:09.078758Z", + "name": "CVE-2025-21223", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21223" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--93c1924a-a8dc-45ca-bbd5-7002f05c3459.json b/objects/vulnerability/vulnerability--93c1924a-a8dc-45ca-bbd5-7002f05c3459.json new file mode 100644 index 0000000000..b14e96631a --- /dev/null +++ b/objects/vulnerability/vulnerability--93c1924a-a8dc-45ca-bbd5-7002f05c3459.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ceffb37b-aa59-4e16-933e-8b25c9e335ab", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--93c1924a-a8dc-45ca-bbd5-7002f05c3459", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.979892Z", + "modified": "2025-01-14T19:15:08.979892Z", + "name": "CVE-2025-21207", + "description": "Windows Connected Devices Platform Service (Cdpsvc) Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21207" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--94849a0e-2e8a-4a92-a49f-2c9ce0f75fcd.json b/objects/vulnerability/vulnerability--94849a0e-2e8a-4a92-a49f-2c9ce0f75fcd.json new file mode 100644 index 0000000000..d94424b2ce --- /dev/null +++ b/objects/vulnerability/vulnerability--94849a0e-2e8a-4a92-a49f-2c9ce0f75fcd.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ce6b8ca8-d86f-4a5f-b4e2-d0c36e33d021", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--94849a0e-2e8a-4a92-a49f-2c9ce0f75fcd", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.09226Z", + "modified": "2025-01-14T19:15:09.09226Z", + "name": "CVE-2025-21290", + "description": "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21290" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--95e5d3d1-05ed-47f4-adfc-78a56aed0f55.json b/objects/vulnerability/vulnerability--95e5d3d1-05ed-47f4-adfc-78a56aed0f55.json new file mode 100644 index 0000000000..0b237e143a --- /dev/null +++ b/objects/vulnerability/vulnerability--95e5d3d1-05ed-47f4-adfc-78a56aed0f55.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2a1a20c9-b63b-44d6-abd4-945bcb4f5184", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--95e5d3d1-05ed-47f4-adfc-78a56aed0f55", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.142095Z", + "modified": "2025-01-14T19:15:09.142095Z", + "name": "CVE-2025-21240", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21240" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--99f47381-8802-4d86-ab4c-4fc361047821.json b/objects/vulnerability/vulnerability--99f47381-8802-4d86-ab4c-4fc361047821.json new file mode 100644 index 0000000000..d4de3f75f7 --- /dev/null +++ b/objects/vulnerability/vulnerability--99f47381-8802-4d86-ab4c-4fc361047821.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ea1115e2-3828-4cdc-b92b-3bb7f1cdf8ce", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--99f47381-8802-4d86-ab4c-4fc361047821", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.15925Z", + "modified": "2025-01-14T19:15:09.15925Z", + "name": "CVE-2025-21224", + "description": "Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21224" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9b58de26-85e0-47ff-98cd-13fa6a21ac04.json b/objects/vulnerability/vulnerability--9b58de26-85e0-47ff-98cd-13fa6a21ac04.json new file mode 100644 index 0000000000..15694d3ba7 --- /dev/null +++ b/objects/vulnerability/vulnerability--9b58de26-85e0-47ff-98cd-13fa6a21ac04.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e7877fb9-4649-4532-a7f3-faf35a41ceeb", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9b58de26-85e0-47ff-98cd-13fa6a21ac04", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.104302Z", + "modified": "2025-01-14T19:15:09.104302Z", + "name": "CVE-2025-21339", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21339" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9bb86145-6bcc-409d-83f7-6db25da3f0f4.json b/objects/vulnerability/vulnerability--9bb86145-6bcc-409d-83f7-6db25da3f0f4.json new file mode 100644 index 0000000000..73ed060154 --- /dev/null +++ b/objects/vulnerability/vulnerability--9bb86145-6bcc-409d-83f7-6db25da3f0f4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6fc4efde-132a-4344-9e2e-cd2673a82e16", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9bb86145-6bcc-409d-83f7-6db25da3f0f4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.035031Z", + "modified": "2025-01-14T19:15:09.035031Z", + "name": "CVE-2025-21269", + "description": "Windows HTML Platforms Security Feature Bypass Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21269" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9bbdaacf-296b-469e-8541-e0c8ba6b968d.json b/objects/vulnerability/vulnerability--9bbdaacf-296b-469e-8541-e0c8ba6b968d.json new file mode 100644 index 0000000000..0e1be06bb1 --- /dev/null +++ b/objects/vulnerability/vulnerability--9bbdaacf-296b-469e-8541-e0c8ba6b968d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--552f79e6-d18a-423a-a94f-a616f719bf3a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9bbdaacf-296b-469e-8541-e0c8ba6b968d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.038882Z", + "modified": "2025-01-14T19:15:09.038882Z", + "name": "CVE-2025-21220", + "description": "Microsoft Message Queuing Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21220" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9c671ba2-27eb-4f06-b357-7169f5e8bd20.json b/objects/vulnerability/vulnerability--9c671ba2-27eb-4f06-b357-7169f5e8bd20.json new file mode 100644 index 0000000000..ac3d34541e --- /dev/null +++ b/objects/vulnerability/vulnerability--9c671ba2-27eb-4f06-b357-7169f5e8bd20.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--20c99a1a-b9a6-4cfa-acf3-264e119b2529", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9c671ba2-27eb-4f06-b357-7169f5e8bd20", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.130594Z", + "modified": "2025-01-14T19:15:09.130594Z", + "name": "CVE-2025-21128", + "description": "Substance3D - Stager versions 3.0.4 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21128" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9d717a94-64a2-4f00-b639-51dace895555.json b/objects/vulnerability/vulnerability--9d717a94-64a2-4f00-b639-51dace895555.json new file mode 100644 index 0000000000..680a919b22 --- /dev/null +++ b/objects/vulnerability/vulnerability--9d717a94-64a2-4f00-b639-51dace895555.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c38188b5-6b55-482f-a5bf-456734fc749f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9d717a94-64a2-4f00-b639-51dace895555", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.160158Z", + "modified": "2025-01-14T19:15:09.160158Z", + "name": "CVE-2025-21326", + "description": "Internet Explorer Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21326" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9f1b1e41-73e5-4b34-8fad-8e8a5ee3d0fb.json b/objects/vulnerability/vulnerability--9f1b1e41-73e5-4b34-8fad-8e8a5ee3d0fb.json new file mode 100644 index 0000000000..1d03ba8e14 --- /dev/null +++ b/objects/vulnerability/vulnerability--9f1b1e41-73e5-4b34-8fad-8e8a5ee3d0fb.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--12aa188d-c613-4d2f-a9ce-3e85abd2e756", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9f1b1e41-73e5-4b34-8fad-8e8a5ee3d0fb", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.117356Z", + "modified": "2025-01-14T19:15:09.117356Z", + "name": "CVE-2025-21235", + "description": "Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21235" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9f2253db-edaf-40cb-97ed-6b5eac9dd87f.json b/objects/vulnerability/vulnerability--9f2253db-edaf-40cb-97ed-6b5eac9dd87f.json new file mode 100644 index 0000000000..217cc163f9 --- /dev/null +++ b/objects/vulnerability/vulnerability--9f2253db-edaf-40cb-97ed-6b5eac9dd87f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--28256ba6-0f07-490e-9001-3aa2448f0d3f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9f2253db-edaf-40cb-97ed-6b5eac9dd87f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.161447Z", + "modified": "2025-01-14T19:15:09.161447Z", + "name": "CVE-2025-21332", + "description": "MapUrlToZone Security Feature Bypass Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21332" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a1ae9f1b-7062-4c43-ad58-0a03b79e0a5e.json b/objects/vulnerability/vulnerability--a1ae9f1b-7062-4c43-ad58-0a03b79e0a5e.json new file mode 100644 index 0000000000..def2968689 --- /dev/null +++ b/objects/vulnerability/vulnerability--a1ae9f1b-7062-4c43-ad58-0a03b79e0a5e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2276700a-9077-42b1-8ee8-0a13c80466e8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a1ae9f1b-7062-4c43-ad58-0a03b79e0a5e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.153688Z", + "modified": "2025-01-14T19:15:09.153688Z", + "name": "CVE-2025-21132", + "description": "Substance3D - Stager versions 3.0.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21132" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a3650801-8859-4c60-b244-73194b2a028c.json b/objects/vulnerability/vulnerability--a3650801-8859-4c60-b244-73194b2a028c.json new file mode 100644 index 0000000000..b20798a111 --- /dev/null +++ b/objects/vulnerability/vulnerability--a3650801-8859-4c60-b244-73194b2a028c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--95b0f70a-e9b9-437d-90ac-0067301438ba", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a3650801-8859-4c60-b244-73194b2a028c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.023751Z", + "modified": "2025-01-14T19:15:09.023751Z", + "name": "CVE-2025-21210", + "description": "Windows BitLocker Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21210" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a4827ee3-d124-41eb-b408-adde4015fbb4.json b/objects/vulnerability/vulnerability--a4827ee3-d124-41eb-b408-adde4015fbb4.json new file mode 100644 index 0000000000..e0e859a353 --- /dev/null +++ b/objects/vulnerability/vulnerability--a4827ee3-d124-41eb-b408-adde4015fbb4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3a42258e-14fe-459c-9743-ed4acb6096ef", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a4827ee3-d124-41eb-b408-adde4015fbb4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.154991Z", + "modified": "2025-01-14T19:15:09.154991Z", + "name": "CVE-2025-21321", + "description": "Windows Kernel Memory Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21321" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a579d2f3-df22-42b2-b39c-19e4bf3139ed.json b/objects/vulnerability/vulnerability--a579d2f3-df22-42b2-b39c-19e4bf3139ed.json new file mode 100644 index 0000000000..dd9ab121af --- /dev/null +++ b/objects/vulnerability/vulnerability--a579d2f3-df22-42b2-b39c-19e4bf3139ed.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1df67ccc-bfd5-4266-91f6-82758df0dd8c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a579d2f3-df22-42b2-b39c-19e4bf3139ed", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.027072Z", + "modified": "2025-01-14T19:15:09.027072Z", + "name": "CVE-2025-21215", + "description": "Secure Boot Security Feature Bypass Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21215" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a614e32e-4a7f-4f6e-9b1e-985f668242fb.json b/objects/vulnerability/vulnerability--a614e32e-4a7f-4f6e-9b1e-985f668242fb.json new file mode 100644 index 0000000000..c05913bf12 --- /dev/null +++ b/objects/vulnerability/vulnerability--a614e32e-4a7f-4f6e-9b1e-985f668242fb.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f706ba0d-34f9-49dc-8da6-b4f1c1660cdd", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a614e32e-4a7f-4f6e-9b1e-985f668242fb", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.068457Z", + "modified": "2025-01-14T19:15:09.068457Z", + "name": "CVE-2025-21248", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21248" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a6c03a0b-23dd-44b0-a91e-9f29177f8aa1.json b/objects/vulnerability/vulnerability--a6c03a0b-23dd-44b0-a91e-9f29177f8aa1.json new file mode 100644 index 0000000000..e46f53732a --- /dev/null +++ b/objects/vulnerability/vulnerability--a6c03a0b-23dd-44b0-a91e-9f29177f8aa1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--601f9d3b-9702-431c-a3e9-0025c5337481", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a6c03a0b-23dd-44b0-a91e-9f29177f8aa1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.164698Z", + "modified": "2025-01-14T19:15:09.164698Z", + "name": "CVE-2025-21282", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21282" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a73f877f-ca47-4ba7-bb13-85a103e88404.json b/objects/vulnerability/vulnerability--a73f877f-ca47-4ba7-bb13-85a103e88404.json new file mode 100644 index 0000000000..ebdb19ff4c --- /dev/null +++ b/objects/vulnerability/vulnerability--a73f877f-ca47-4ba7-bb13-85a103e88404.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--19bae3c6-8991-4586-8772-afd5d1d06c3b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a73f877f-ca47-4ba7-bb13-85a103e88404", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.989772Z", + "modified": "2025-01-14T19:15:08.989772Z", + "name": "CVE-2025-21370", + "description": "Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21370" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--aab5e60c-1b7e-4ebc-b0c9-00c1e2ecf3cf.json b/objects/vulnerability/vulnerability--aab5e60c-1b7e-4ebc-b0c9-00c1e2ecf3cf.json new file mode 100644 index 0000000000..fcdbaa7679 --- /dev/null +++ b/objects/vulnerability/vulnerability--aab5e60c-1b7e-4ebc-b0c9-00c1e2ecf3cf.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--694f80ad-f33a-429f-bb7e-d5180059021b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--aab5e60c-1b7e-4ebc-b0c9-00c1e2ecf3cf", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.119556Z", + "modified": "2025-01-14T19:15:09.119556Z", + "name": "CVE-2025-21225", + "description": "Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21225" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ae49358a-450f-47ba-9e7e-a45f3350c9ca.json b/objects/vulnerability/vulnerability--ae49358a-450f-47ba-9e7e-a45f3350c9ca.json new file mode 100644 index 0000000000..c1bcc42794 --- /dev/null +++ b/objects/vulnerability/vulnerability--ae49358a-450f-47ba-9e7e-a45f3350c9ca.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--daa63b65-ecb1-4510-b51f-31be5f4a9b26", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ae49358a-450f-47ba-9e7e-a45f3350c9ca", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.978691Z", + "modified": "2025-01-14T19:15:08.978691Z", + "name": "CVE-2025-21226", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21226" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b6026b10-4111-48cd-9c91-2c3af6e67ec9.json b/objects/vulnerability/vulnerability--b6026b10-4111-48cd-9c91-2c3af6e67ec9.json new file mode 100644 index 0000000000..7763faa92f --- /dev/null +++ b/objects/vulnerability/vulnerability--b6026b10-4111-48cd-9c91-2c3af6e67ec9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3b37a2f1-8770-4698-bc27-caa4a7b62b72", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b6026b10-4111-48cd-9c91-2c3af6e67ec9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.082123Z", + "modified": "2025-01-14T19:15:09.082123Z", + "name": "CVE-2025-21314", + "description": "Windows SmartScreen Spoofing Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21314" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b68dbd4c-a688-4943-b9a8-ff0adaa5d16d.json b/objects/vulnerability/vulnerability--b68dbd4c-a688-4943-b9a8-ff0adaa5d16d.json new file mode 100644 index 0000000000..3c7461aeaa --- /dev/null +++ b/objects/vulnerability/vulnerability--b68dbd4c-a688-4943-b9a8-ff0adaa5d16d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1281fd42-d3a5-442b-9bc7-8ccc340f4077", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b68dbd4c-a688-4943-b9a8-ff0adaa5d16d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.158326Z", + "modified": "2025-01-14T19:15:09.158326Z", + "name": "CVE-2025-21219", + "description": "MapUrlToZone Security Feature Bypass Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21219" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b7230cb9-629f-47eb-8061-f701d8a708c2.json b/objects/vulnerability/vulnerability--b7230cb9-629f-47eb-8061-f701d8a708c2.json new file mode 100644 index 0000000000..cf0b157eeb --- /dev/null +++ b/objects/vulnerability/vulnerability--b7230cb9-629f-47eb-8061-f701d8a708c2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1a2a7be6-40b5-42a0-b7fa-d78e302c532e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b7230cb9-629f-47eb-8061-f701d8a708c2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.129532Z", + "modified": "2025-01-14T19:15:09.129532Z", + "name": "CVE-2025-21310", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21310" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b7a0c0b2-50e8-423b-ac66-d3f79fda8a27.json b/objects/vulnerability/vulnerability--b7a0c0b2-50e8-423b-ac66-d3f79fda8a27.json new file mode 100644 index 0000000000..dec9984baa --- /dev/null +++ b/objects/vulnerability/vulnerability--b7a0c0b2-50e8-423b-ac66-d3f79fda8a27.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a820af59-3c9b-412e-85e1-028332f2816e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b7a0c0b2-50e8-423b-ac66-d3f79fda8a27", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.072606Z", + "modified": "2025-01-14T19:15:09.072606Z", + "name": "CVE-2025-21213", + "description": "Secure Boot Security Feature Bypass Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21213" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b7ba8109-d8e6-44cf-94f9-8a75ba813164.json b/objects/vulnerability/vulnerability--b7ba8109-d8e6-44cf-94f9-8a75ba813164.json new file mode 100644 index 0000000000..6cef944177 --- /dev/null +++ b/objects/vulnerability/vulnerability--b7ba8109-d8e6-44cf-94f9-8a75ba813164.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5bf7c4b4-47d4-4516-89a1-a484665e0f33", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b7ba8109-d8e6-44cf-94f9-8a75ba813164", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.058962Z", + "modified": "2025-01-14T19:15:09.058962Z", + "name": "CVE-2025-21324", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21324" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b8485299-554d-4246-9a3d-bc94a35434d6.json b/objects/vulnerability/vulnerability--b8485299-554d-4246-9a3d-bc94a35434d6.json new file mode 100644 index 0000000000..8eb98260d0 --- /dev/null +++ b/objects/vulnerability/vulnerability--b8485299-554d-4246-9a3d-bc94a35434d6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1f5b2395-b876-4686-9044-99a545c7a83a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b8485299-554d-4246-9a3d-bc94a35434d6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.968912Z", + "modified": "2025-01-14T19:15:08.968912Z", + "name": "CVE-2025-21297", + "description": "Windows Remote Desktop Services Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21297" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b85e0d8e-4c26-4fab-8564-d32b5a121743.json b/objects/vulnerability/vulnerability--b85e0d8e-4c26-4fab-8564-d32b5a121743.json new file mode 100644 index 0000000000..ea241fa62e --- /dev/null +++ b/objects/vulnerability/vulnerability--b85e0d8e-4c26-4fab-8564-d32b5a121743.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--417bccc0-3d7c-4cbc-94f7-b96d0a0e1534", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b85e0d8e-4c26-4fab-8564-d32b5a121743", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.025998Z", + "modified": "2025-01-14T19:15:09.025998Z", + "name": "CVE-2025-21241", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21241" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b8b84577-f027-4851-9345-aac0ed9a09a0.json b/objects/vulnerability/vulnerability--b8b84577-f027-4851-9345-aac0ed9a09a0.json new file mode 100644 index 0000000000..7b26013a87 --- /dev/null +++ b/objects/vulnerability/vulnerability--b8b84577-f027-4851-9345-aac0ed9a09a0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--485af330-b69d-46d1-b082-59b93d5623c1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b8b84577-f027-4851-9345-aac0ed9a09a0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.135318Z", + "modified": "2025-01-14T19:15:09.135318Z", + "name": "CVE-2025-21343", + "description": "Windows Web Threat Defense User Service Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21343" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b9af11d9-6e4a-4801-8d0d-7d8f2fc86b8c.json b/objects/vulnerability/vulnerability--b9af11d9-6e4a-4801-8d0d-7d8f2fc86b8c.json new file mode 100644 index 0000000000..73a2bc43a4 --- /dev/null +++ b/objects/vulnerability/vulnerability--b9af11d9-6e4a-4801-8d0d-7d8f2fc86b8c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8b0538f4-d324-4536-ae72-e94df22afd57", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b9af11d9-6e4a-4801-8d0d-7d8f2fc86b8c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.110212Z", + "modified": "2025-01-14T19:15:09.110212Z", + "name": "CVE-2025-21239", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21239" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bbcbca15-d97e-4b69-984b-98b453ab7b90.json b/objects/vulnerability/vulnerability--bbcbca15-d97e-4b69-984b-98b453ab7b90.json new file mode 100644 index 0000000000..9e2407b085 --- /dev/null +++ b/objects/vulnerability/vulnerability--bbcbca15-d97e-4b69-984b-98b453ab7b90.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d89ad153-0ad9-4e53-ad91-3fe1f558a431", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bbcbca15-d97e-4b69-984b-98b453ab7b90", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:02.2634Z", + "modified": "2025-01-14T19:15:02.2634Z", + "name": "CVE-2024-56374", + "description": "An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-56374" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--be81ea82-37ae-4e22-819b-8c3ffc44fbe7.json b/objects/vulnerability/vulnerability--be81ea82-37ae-4e22-819b-8c3ffc44fbe7.json new file mode 100644 index 0000000000..985d3a1a2a --- /dev/null +++ b/objects/vulnerability/vulnerability--be81ea82-37ae-4e22-819b-8c3ffc44fbe7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5001e38b-f481-41d2-b21b-f1cc2ca8082b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--be81ea82-37ae-4e22-819b-8c3ffc44fbe7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.208319Z", + "modified": "2025-01-14T19:15:09.208319Z", + "name": "CVE-2025-23072", + "description": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - RefreshSpecial Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - RefreshSpecial Extension: from 1.39.X before 1.39.11, from 1.41.X before 1.41.3, from 1.42.X before 1.42.2.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-23072" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c27b1a2c-b712-4967-bbd2-d7a38aac5458.json b/objects/vulnerability/vulnerability--c27b1a2c-b712-4967-bbd2-d7a38aac5458.json new file mode 100644 index 0000000000..818ca899ec --- /dev/null +++ b/objects/vulnerability/vulnerability--c27b1a2c-b712-4967-bbd2-d7a38aac5458.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--60c1bb05-5cfa-416a-b087-8e8559aa6bd5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c27b1a2c-b712-4967-bbd2-d7a38aac5458", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.056591Z", + "modified": "2025-01-14T19:15:09.056591Z", + "name": "CVE-2025-21281", + "description": "Microsoft COM for Windows Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21281" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c2edb084-c22e-4240-bc59-02f5f266e7af.json b/objects/vulnerability/vulnerability--c2edb084-c22e-4240-bc59-02f5f266e7af.json new file mode 100644 index 0000000000..c0011f23c5 --- /dev/null +++ b/objects/vulnerability/vulnerability--c2edb084-c22e-4240-bc59-02f5f266e7af.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a62627df-47e2-4e10-be5e-fcec01ff6e06", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c2edb084-c22e-4240-bc59-02f5f266e7af", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.057742Z", + "modified": "2025-01-14T19:15:09.057742Z", + "name": "CVE-2025-21302", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21302" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c329b103-5f9d-4a58-8b1d-e433fe4c0699.json b/objects/vulnerability/vulnerability--c329b103-5f9d-4a58-8b1d-e433fe4c0699.json new file mode 100644 index 0000000000..92af190f16 --- /dev/null +++ b/objects/vulnerability/vulnerability--c329b103-5f9d-4a58-8b1d-e433fe4c0699.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ba67de4b-0d42-4607-b877-98746503f34d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c329b103-5f9d-4a58-8b1d-e433fe4c0699", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.115262Z", + "modified": "2025-01-14T19:15:09.115262Z", + "name": "CVE-2025-21309", + "description": "Windows Remote Desktop Services Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21309" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c40fb14d-7d66-46a2-a7d9-5613311a1591.json b/objects/vulnerability/vulnerability--c40fb14d-7d66-46a2-a7d9-5613311a1591.json new file mode 100644 index 0000000000..dac42db251 --- /dev/null +++ b/objects/vulnerability/vulnerability--c40fb14d-7d66-46a2-a7d9-5613311a1591.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--534b9f31-3d40-4670-99c5-3cd76eb9b78e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c40fb14d-7d66-46a2-a7d9-5613311a1591", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.147855Z", + "modified": "2025-01-14T19:15:09.147855Z", + "name": "CVE-2025-21176", + "description": ".NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21176" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c5119ea2-0fa5-47d8-99f4-bf2ff4924cff.json b/objects/vulnerability/vulnerability--c5119ea2-0fa5-47d8-99f4-bf2ff4924cff.json new file mode 100644 index 0000000000..a1001f71c9 --- /dev/null +++ b/objects/vulnerability/vulnerability--c5119ea2-0fa5-47d8-99f4-bf2ff4924cff.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--edba2797-15ad-4a07-8d0f-122634c46882", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c5119ea2-0fa5-47d8-99f4-bf2ff4924cff", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.108298Z", + "modified": "2025-01-14T19:15:09.108298Z", + "name": "CVE-2025-21230", + "description": "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21230" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c5c9c6cd-44ef-4707-8eb5-7e7db89b26ca.json b/objects/vulnerability/vulnerability--c5c9c6cd-44ef-4707-8eb5-7e7db89b26ca.json new file mode 100644 index 0000000000..b765cf66e1 --- /dev/null +++ b/objects/vulnerability/vulnerability--c5c9c6cd-44ef-4707-8eb5-7e7db89b26ca.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f27a7ef2-f514-44e0-9f77-e21cd058c196", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c5c9c6cd-44ef-4707-8eb5-7e7db89b26ca", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.997284Z", + "modified": "2025-01-14T19:15:08.997284Z", + "name": "CVE-2025-21316", + "description": "Windows Kernel Memory Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21316" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c82ab383-0524-4ff9-acf2-c9cbf90b370b.json b/objects/vulnerability/vulnerability--c82ab383-0524-4ff9-acf2-c9cbf90b370b.json new file mode 100644 index 0000000000..4a9b5c1456 --- /dev/null +++ b/objects/vulnerability/vulnerability--c82ab383-0524-4ff9-acf2-c9cbf90b370b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3335b5bf-3882-4f1a-a98e-5821945e0092", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c82ab383-0524-4ff9-acf2-c9cbf90b370b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.090815Z", + "modified": "2025-01-14T19:15:09.090815Z", + "name": "CVE-2025-21122", + "description": "Photoshop Desktop versions 25.12, 26.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21122" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c95f1947-821b-4739-a28d-7739e39b701d.json b/objects/vulnerability/vulnerability--c95f1947-821b-4739-a28d-7739e39b701d.json new file mode 100644 index 0000000000..fe34e8fed8 --- /dev/null +++ b/objects/vulnerability/vulnerability--c95f1947-821b-4739-a28d-7739e39b701d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0d3554aa-0bcf-4ac4-86bc-62cbe6ae7ab9", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c95f1947-821b-4739-a28d-7739e39b701d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.15608Z", + "modified": "2025-01-14T19:15:09.15608Z", + "name": "CVE-2025-21287", + "description": "Windows Installer Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21287" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--cae646ae-5c2d-46d5-a543-3a1112334feb.json b/objects/vulnerability/vulnerability--cae646ae-5c2d-46d5-a543-3a1112334feb.json new file mode 100644 index 0000000000..48c05c7a36 --- /dev/null +++ b/objects/vulnerability/vulnerability--cae646ae-5c2d-46d5-a543-3a1112334feb.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--79eb1198-5a86-4063-b940-526eaa21ff47", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--cae646ae-5c2d-46d5-a543-3a1112334feb", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.149863Z", + "modified": "2025-01-14T19:15:09.149863Z", + "name": "CVE-2025-21266", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21266" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ccb463d4-cc33-4722-93aa-fde2224fcc93.json b/objects/vulnerability/vulnerability--ccb463d4-cc33-4722-93aa-fde2224fcc93.json new file mode 100644 index 0000000000..5027ab6a08 --- /dev/null +++ b/objects/vulnerability/vulnerability--ccb463d4-cc33-4722-93aa-fde2224fcc93.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e5388757-48e0-4702-9d77-834c28c1f93f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ccb463d4-cc33-4722-93aa-fde2224fcc93", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.064312Z", + "modified": "2025-01-14T19:15:09.064312Z", + "name": "CVE-2025-21278", + "description": "Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21278" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--cccaa280-387e-4dc5-91b8-ed86f5e7ca18.json b/objects/vulnerability/vulnerability--cccaa280-387e-4dc5-91b8-ed86f5e7ca18.json new file mode 100644 index 0000000000..3d36ceeb37 --- /dev/null +++ b/objects/vulnerability/vulnerability--cccaa280-387e-4dc5-91b8-ed86f5e7ca18.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4296f81f-c9c1-4da3-b194-bbc538e1b18d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--cccaa280-387e-4dc5-91b8-ed86f5e7ca18", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.039915Z", + "modified": "2025-01-14T19:15:09.039915Z", + "name": "CVE-2025-21130", + "description": "Substance3D - Stager versions 3.0.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21130" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--cdc2f797-e86b-4fcd-8b02-005016511fa5.json b/objects/vulnerability/vulnerability--cdc2f797-e86b-4fcd-8b02-005016511fa5.json new file mode 100644 index 0000000000..33c29fb2c9 --- /dev/null +++ b/objects/vulnerability/vulnerability--cdc2f797-e86b-4fcd-8b02-005016511fa5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2c898c91-4fed-4f70-9639-33e6cd2d8967", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--cdc2f797-e86b-4fcd-8b02-005016511fa5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.046471Z", + "modified": "2025-01-14T19:15:09.046471Z", + "name": "CVE-2025-21301", + "description": "Windows Geolocation Service Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21301" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d0389fc8-0647-435e-9a3f-21cec42330c2.json b/objects/vulnerability/vulnerability--d0389fc8-0647-435e-9a3f-21cec42330c2.json new file mode 100644 index 0000000000..3bc2b4e986 --- /dev/null +++ b/objects/vulnerability/vulnerability--d0389fc8-0647-435e-9a3f-21cec42330c2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6a290fc7-b853-4494-b0c7-106969b2901c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d0389fc8-0647-435e-9a3f-21cec42330c2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:02.747088Z", + "modified": "2025-01-14T19:15:02.747088Z", + "name": "CVE-2024-49375", + "description": "Open source machine learning framework. A vulnerability has been identified in Rasa that enables an attacker who has the ability to load a maliciously crafted model remotely into a Rasa instance to achieve Remote Code Execution. The prerequisites for this are: 1. The HTTP API must be enabled on the Rasa instance eg with `--enable-api`. This is not the default configuration. 2. For unauthenticated RCE to be exploitable, the user must not have configured any authentication or other security controls recommended in our documentation. 3. For authenticated RCE, the attacker must posses a valid authentication token or JWT to interact with the Rasa API. This issue has been addressed in rasa version 3.6.21 and all users are advised to upgrade. Users unable to upgrade should ensure that they require authentication and that only trusted users are given access.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-49375" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d0ef1483-8453-455e-94f4-17b43f32d6f5.json b/objects/vulnerability/vulnerability--d0ef1483-8453-455e-94f4-17b43f32d6f5.json new file mode 100644 index 0000000000..d8c88843b6 --- /dev/null +++ b/objects/vulnerability/vulnerability--d0ef1483-8453-455e-94f4-17b43f32d6f5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a35cb695-fd3b-4e80-b253-407ac56387c1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d0ef1483-8453-455e-94f4-17b43f32d6f5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.020466Z", + "modified": "2025-01-14T19:15:09.020466Z", + "name": "CVE-2025-21187", + "description": "Microsoft Power Automate Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21187" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d14825a0-c9c7-44b9-b34f-f792ba550e88.json b/objects/vulnerability/vulnerability--d14825a0-c9c7-44b9-b34f-f792ba550e88.json new file mode 100644 index 0000000000..7d2c9878b1 --- /dev/null +++ b/objects/vulnerability/vulnerability--d14825a0-c9c7-44b9-b34f-f792ba550e88.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--751f8a66-3f3f-4893-a47d-0e53ad70aac1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d14825a0-c9c7-44b9-b34f-f792ba550e88", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.080965Z", + "modified": "2025-01-14T19:15:09.080965Z", + "name": "CVE-2025-21374", + "description": "Windows CSC Service Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21374" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d27c1f48-99cd-46c7-93c7-985d077464e7.json b/objects/vulnerability/vulnerability--d27c1f48-99cd-46c7-93c7-985d077464e7.json new file mode 100644 index 0000000000..13e10efcfe --- /dev/null +++ b/objects/vulnerability/vulnerability--d27c1f48-99cd-46c7-93c7-985d077464e7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--eaa0dd41-8d3a-4ba2-8d32-6a3ad8d6dedf", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d27c1f48-99cd-46c7-93c7-985d077464e7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.051176Z", + "modified": "2025-01-14T19:15:09.051176Z", + "name": "CVE-2025-21275", + "description": "Windows App Package Installer Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21275" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d4450668-9730-4d51-bd68-34a6e253b83b.json b/objects/vulnerability/vulnerability--d4450668-9730-4d51-bd68-34a6e253b83b.json new file mode 100644 index 0000000000..ad6a906a98 --- /dev/null +++ b/objects/vulnerability/vulnerability--d4450668-9730-4d51-bd68-34a6e253b83b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c13e8d73-1068-4c4b-98f1-4be2b10d3ea3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d4450668-9730-4d51-bd68-34a6e253b83b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.01136Z", + "modified": "2025-01-14T19:15:09.01136Z", + "name": "CVE-2025-21186", + "description": "Microsoft Access Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21186" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d482f82a-cc29-43b8-b67a-1c807ca59c14.json b/objects/vulnerability/vulnerability--d482f82a-cc29-43b8-b67a-1c807ca59c14.json new file mode 100644 index 0000000000..9a788ebe72 --- /dev/null +++ b/objects/vulnerability/vulnerability--d482f82a-cc29-43b8-b67a-1c807ca59c14.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6827a2c3-06cf-4509-99a8-d6addd876552", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d482f82a-cc29-43b8-b67a-1c807ca59c14", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.107235Z", + "modified": "2025-01-14T19:15:09.107235Z", + "name": "CVE-2025-21315", + "description": "Microsoft Brokering File System Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21315" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d4dce396-3c11-4b27-938d-751a0b512da7.json b/objects/vulnerability/vulnerability--d4dce396-3c11-4b27-938d-751a0b512da7.json new file mode 100644 index 0000000000..d97eb5e7f0 --- /dev/null +++ b/objects/vulnerability/vulnerability--d4dce396-3c11-4b27-938d-751a0b512da7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--32c07cd5-d11b-4227-a0fc-058f9160d89f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d4dce396-3c11-4b27-938d-751a0b512da7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.118282Z", + "modified": "2025-01-14T19:15:09.118282Z", + "name": "CVE-2025-21291", + "description": "Windows Direct Show Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21291" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d5323729-49ee-4992-bb51-0747873c268e.json b/objects/vulnerability/vulnerability--d5323729-49ee-4992-bb51-0747873c268e.json new file mode 100644 index 0000000000..d39608e517 --- /dev/null +++ b/objects/vulnerability/vulnerability--d5323729-49ee-4992-bb51-0747873c268e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4da60888-5cee-4fef-820a-66fcba4ab119", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d5323729-49ee-4992-bb51-0747873c268e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.010045Z", + "modified": "2025-01-14T19:15:09.010045Z", + "name": "CVE-2025-21280", + "description": "Windows Virtual Trusted Platform Module Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21280" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d63ee527-fb32-46ba-9185-eec6edb8a2af.json b/objects/vulnerability/vulnerability--d63ee527-fb32-46ba-9185-eec6edb8a2af.json new file mode 100644 index 0000000000..3be6f3ecd7 --- /dev/null +++ b/objects/vulnerability/vulnerability--d63ee527-fb32-46ba-9185-eec6edb8a2af.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a4d781dc-312b-4835-9c89-2db093211b52", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d63ee527-fb32-46ba-9185-eec6edb8a2af", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.102111Z", + "modified": "2025-01-14T19:15:09.102111Z", + "name": "CVE-2025-21312", + "description": "Windows Smart Card Reader Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21312" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d68c0c44-ff1a-43e0-91d7-b42369f7d516.json b/objects/vulnerability/vulnerability--d68c0c44-ff1a-43e0-91d7-b42369f7d516.json new file mode 100644 index 0000000000..bd4423e1b4 --- /dev/null +++ b/objects/vulnerability/vulnerability--d68c0c44-ff1a-43e0-91d7-b42369f7d516.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8c7cdeb8-5df2-4c2e-869b-8d85c15dbd7c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d68c0c44-ff1a-43e0-91d7-b42369f7d516", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.073658Z", + "modified": "2025-01-14T19:15:09.073658Z", + "name": "CVE-2025-21270", + "description": "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21270" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d6f90271-c4b4-4c27-b464-fdb9176308f5.json b/objects/vulnerability/vulnerability--d6f90271-c4b4-4c27-b464-fdb9176308f5.json new file mode 100644 index 0000000000..5e6c0b8c73 --- /dev/null +++ b/objects/vulnerability/vulnerability--d6f90271-c4b4-4c27-b464-fdb9176308f5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c30bf6d5-b058-4ef7-b5bd-ad536170e93f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d6f90271-c4b4-4c27-b464-fdb9176308f5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.017174Z", + "modified": "2025-01-14T19:15:09.017174Z", + "name": "CVE-2025-21242", + "description": "Windows Kerberos Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21242" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d72360a2-2cc5-4d29-bfe3-f4f25cae7198.json b/objects/vulnerability/vulnerability--d72360a2-2cc5-4d29-bfe3-f4f25cae7198.json new file mode 100644 index 0000000000..1f615db6cd --- /dev/null +++ b/objects/vulnerability/vulnerability--d72360a2-2cc5-4d29-bfe3-f4f25cae7198.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d46c7f52-c1b0-4f8e-a47b-f520729236f0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d72360a2-2cc5-4d29-bfe3-f4f25cae7198", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.146422Z", + "modified": "2025-01-14T19:15:09.146422Z", + "name": "CVE-2025-21129", + "description": "Substance3D - Stager versions 3.0.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21129" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--dcdd03f1-731a-42e9-8e83-749318a225e9.json b/objects/vulnerability/vulnerability--dcdd03f1-731a-42e9-8e83-749318a225e9.json new file mode 100644 index 0000000000..04757e1b88 --- /dev/null +++ b/objects/vulnerability/vulnerability--dcdd03f1-731a-42e9-8e83-749318a225e9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--517ea522-7551-40c7-b211-96ee2c8bb696", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--dcdd03f1-731a-42e9-8e83-749318a225e9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.087787Z", + "modified": "2025-01-14T19:15:09.087787Z", + "name": "CVE-2025-21365", + "description": "Microsoft Office Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21365" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--dd436e2c-34b0-4171-a356-f0bf325f718c.json b/objects/vulnerability/vulnerability--dd436e2c-34b0-4171-a356-f0bf325f718c.json new file mode 100644 index 0000000000..cc93f39bc2 --- /dev/null +++ b/objects/vulnerability/vulnerability--dd436e2c-34b0-4171-a356-f0bf325f718c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b4c03d71-6aa3-4174-8210-433f89b83ecb", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--dd436e2c-34b0-4171-a356-f0bf325f718c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:02.569024Z", + "modified": "2025-01-14T19:15:02.569024Z", + "name": "CVE-2024-48855", + "description": "Out-of-bounds read in the TIFF image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause an information disclosure in the context of the process using the image codec.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48855" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e08ef48b-211b-4765-a2e9-f237fd04ba92.json b/objects/vulnerability/vulnerability--e08ef48b-211b-4765-a2e9-f237fd04ba92.json new file mode 100644 index 0000000000..a94ca993d6 --- /dev/null +++ b/objects/vulnerability/vulnerability--e08ef48b-211b-4765-a2e9-f237fd04ba92.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--18cbd7b6-1c29-4f87-a87b-600be71e93a9", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e08ef48b-211b-4765-a2e9-f237fd04ba92", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.088865Z", + "modified": "2025-01-14T19:15:09.088865Z", + "name": "CVE-2025-21303", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21303" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e18eb60c-f724-4de8-a047-ce26474b1360.json b/objects/vulnerability/vulnerability--e18eb60c-f724-4de8-a047-ce26474b1360.json new file mode 100644 index 0000000000..cc22897f3e --- /dev/null +++ b/objects/vulnerability/vulnerability--e18eb60c-f724-4de8-a047-ce26474b1360.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c1f70ce9-a5ea-4091-991f-9037fcc068ab", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e18eb60c-f724-4de8-a047-ce26474b1360", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.045431Z", + "modified": "2025-01-14T19:15:09.045431Z", + "name": "CVE-2025-21334", + "description": "Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21334" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e1e1d399-69c9-49b2-b756-e0cc5eeb4880.json b/objects/vulnerability/vulnerability--e1e1d399-69c9-49b2-b756-e0cc5eeb4880.json new file mode 100644 index 0000000000..62afa62135 --- /dev/null +++ b/objects/vulnerability/vulnerability--e1e1d399-69c9-49b2-b756-e0cc5eeb4880.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f287f2ce-0ff5-4e8d-85bd-4a3c971b16d0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e1e1d399-69c9-49b2-b756-e0cc5eeb4880", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:03.641925Z", + "modified": "2025-01-14T19:15:03.641925Z", + "name": "CVE-2024-50349", + "description": "Git is a fast, scalable, distributed revision control system with an unusually rich command set that provides both high-level operations and full access to internals. When Git asks for credentials via a terminal prompt (i.e. without using any credential helper), it prints out the host name for which the user is expected to provide a username and/or a password. At this stage, any URL-encoded parts have been decoded already, and are printed verbatim. This allows attackers to craft URLs that contain ANSI escape sequences that the terminal interpret to confuse users e.g. into providing passwords for trusted Git hosting sites when in fact they are then sent to untrusted sites that are under the attacker's control. This issue has been patch via commits `7725b81` and `c903985` which are included in release versions v2.48.1, v2.47.1, v2.46.3, v2.45.3, v2.44.3, v2.43.6, v2.42.4, v2.41.3, and v2.40.4. Users are advised to upgrade. Users unable to upgrade should avoid cloning from untrusted URLs, especially recursive clones.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50349" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e28611e8-0cb1-410c-b915-90b48245cb38.json b/objects/vulnerability/vulnerability--e28611e8-0cb1-410c-b915-90b48245cb38.json new file mode 100644 index 0000000000..3f48d341b5 --- /dev/null +++ b/objects/vulnerability/vulnerability--e28611e8-0cb1-410c-b915-90b48245cb38.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--788825b7-2751-4dd8-a0d5-2b62d20ddf4d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e28611e8-0cb1-410c-b915-90b48245cb38", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.050068Z", + "modified": "2025-01-14T19:15:09.050068Z", + "name": "CVE-2025-21284", + "description": "Windows Virtual Trusted Platform Module Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21284" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e3e0f208-4525-466b-aa55-d64b285da542.json b/objects/vulnerability/vulnerability--e3e0f208-4525-466b-aa55-d64b285da542.json new file mode 100644 index 0000000000..87a0595b6e --- /dev/null +++ b/objects/vulnerability/vulnerability--e3e0f208-4525-466b-aa55-d64b285da542.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2402a9a0-240e-4a33-969b-bb277b5b99d2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e3e0f208-4525-466b-aa55-d64b285da542", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.993475Z", + "modified": "2025-01-14T19:15:08.993475Z", + "name": "CVE-2025-21255", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21255" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e8b3f1d3-1e8c-4a66-b347-a7d9935afc8c.json b/objects/vulnerability/vulnerability--e8b3f1d3-1e8c-4a66-b347-a7d9935afc8c.json new file mode 100644 index 0000000000..b17447365a --- /dev/null +++ b/objects/vulnerability/vulnerability--e8b3f1d3-1e8c-4a66-b347-a7d9935afc8c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--442a384d-5e07-4f50-b66f-772805edee21", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e8b3f1d3-1e8c-4a66-b347-a7d9935afc8c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.200538Z", + "modified": "2025-01-14T19:15:09.200538Z", + "name": "CVE-2025-23041", + "description": "Umbraco.Forms is a web form framework written for the nuget ecosystem. Character limits configured by editors for short and long answer fields are validated only client-side, not server-side. This issue has been patched in versions 8.13.16, 10.5.7, 13.2.2, and 14.1.2. Users are advised to upgrade. There are no known workarounds for this issue.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-23041" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ea0919c8-1398-48aa-966f-b595ddfce9cd.json b/objects/vulnerability/vulnerability--ea0919c8-1398-48aa-966f-b595ddfce9cd.json new file mode 100644 index 0000000000..ee9ad2d2c2 --- /dev/null +++ b/objects/vulnerability/vulnerability--ea0919c8-1398-48aa-966f-b595ddfce9cd.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--54a24e23-59a4-4761-bb3c-f70ebd968704", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ea0919c8-1398-48aa-966f-b595ddfce9cd", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.134062Z", + "modified": "2025-01-14T19:15:09.134062Z", + "name": "CVE-2025-21320", + "description": "Windows Kernel Memory Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21320" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ea308ca2-61e6-4755-979e-a808e0595311.json b/objects/vulnerability/vulnerability--ea308ca2-61e6-4755-979e-a808e0595311.json new file mode 100644 index 0000000000..9556dd0cc9 --- /dev/null +++ b/objects/vulnerability/vulnerability--ea308ca2-61e6-4755-979e-a808e0595311.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ba8e985f-09b6-4329-b2df-5c136f67f3e4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ea308ca2-61e6-4755-979e-a808e0595311", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.055502Z", + "modified": "2025-01-14T19:15:09.055502Z", + "name": "CVE-2025-21127", + "description": "Photoshop Desktop versions 25.12, 26.1 and earlier are affected by an Uncontrolled Search Path Element vulnerability that could lead to arbitrary code execution. An attacker could manipulate the search path environment variable to point to a malicious library, resulting in the execution of arbitrary code when the application loads. Exploitation of this issue requires user interaction in that a victim must run the vulnerable application.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21127" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ebed5fa5-4012-4a6e-94ed-212e9434acc1.json b/objects/vulnerability/vulnerability--ebed5fa5-4012-4a6e-94ed-212e9434acc1.json new file mode 100644 index 0000000000..8981e44811 --- /dev/null +++ b/objects/vulnerability/vulnerability--ebed5fa5-4012-4a6e-94ed-212e9434acc1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5d851c28-2593-486f-a44d-4195ad034b55", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ebed5fa5-4012-4a6e-94ed-212e9434acc1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.99623Z", + "modified": "2025-01-14T19:15:08.99623Z", + "name": "CVE-2025-21237", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21237" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ee688272-c91d-41ef-832b-4cab3bc06fc7.json b/objects/vulnerability/vulnerability--ee688272-c91d-41ef-832b-4cab3bc06fc7.json new file mode 100644 index 0000000000..d0f0768bcb --- /dev/null +++ b/objects/vulnerability/vulnerability--ee688272-c91d-41ef-832b-4cab3bc06fc7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4484518c-c97c-4138-a965-8269e6739637", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ee688272-c91d-41ef-832b-4cab3bc06fc7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.048934Z", + "modified": "2025-01-14T19:15:09.048934Z", + "name": "CVE-2025-21228", + "description": "Windows Digital Media Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21228" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--eec9fd01-4214-4e88-a24b-bb4690b149d4.json b/objects/vulnerability/vulnerability--eec9fd01-4214-4e88-a24b-bb4690b149d4.json new file mode 100644 index 0000000000..d8c74a4183 --- /dev/null +++ b/objects/vulnerability/vulnerability--eec9fd01-4214-4e88-a24b-bb4690b149d4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--206e31a1-ab12-4447-8911-234be27b06a6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--eec9fd01-4214-4e88-a24b-bb4690b149d4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.030789Z", + "modified": "2025-01-14T19:15:09.030789Z", + "name": "CVE-2025-21131", + "description": "Substance3D - Stager versions 3.0.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21131" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f1ecf999-c0c6-4c93-857c-17943a111913.json b/objects/vulnerability/vulnerability--f1ecf999-c0c6-4c93-857c-17943a111913.json new file mode 100644 index 0000000000..308424c408 --- /dev/null +++ b/objects/vulnerability/vulnerability--f1ecf999-c0c6-4c93-857c-17943a111913.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a88a1daa-6091-4b09-91a1-252b89833a10", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f1ecf999-c0c6-4c93-857c-17943a111913", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.022522Z", + "modified": "2025-01-14T19:15:09.022522Z", + "name": "CVE-2025-21361", + "description": "Microsoft Outlook Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21361" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f6ee0d9d-712f-4793-89aa-7f8805fe81b6.json b/objects/vulnerability/vulnerability--f6ee0d9d-712f-4793-89aa-7f8805fe81b6.json new file mode 100644 index 0000000000..f960b3f233 --- /dev/null +++ b/objects/vulnerability/vulnerability--f6ee0d9d-712f-4793-89aa-7f8805fe81b6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--25225e42-7793-4604-9fb2-82e066650dbd", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f6ee0d9d-712f-4793-89aa-7f8805fe81b6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.097786Z", + "modified": "2025-01-14T19:15:09.097786Z", + "name": "CVE-2025-21304", + "description": "Microsoft DWM Core Library Elevation of Privilege Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21304" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f88bc8fe-7d4c-4592-bc79-0d3899a3fe81.json b/objects/vulnerability/vulnerability--f88bc8fe-7d4c-4592-bc79-0d3899a3fe81.json new file mode 100644 index 0000000000..9d2f50b5d4 --- /dev/null +++ b/objects/vulnerability/vulnerability--f88bc8fe-7d4c-4592-bc79-0d3899a3fe81.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--29e662ab-b898-4395-a2e1-947088503248", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f88bc8fe-7d4c-4592-bc79-0d3899a3fe81", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:03.63186Z", + "modified": "2025-01-14T19:15:03.63186Z", + "name": "CVE-2024-50338", + "description": "Git Credential Manager (GCM) is a secure Git credential helper built on .NET that runs on Windows, macOS, and Linux. The Git credential protocol is text-based over standard input/output, and consists of a series of lines of key-value pairs in the format `key=value`. Git's documentation restricts the use of the NUL (`\\0`) character and newlines to form part of the keys or values. When Git reads from standard input, it considers both LF and CRLF as newline characters for the credential protocol by virtue of calling `strbuf_getline` that calls to `strbuf_getdelim_strip_crlf`. Git also validates that a newline is not present in the value by checking for the presence of the line-feed character (LF, `\\n`), and errors if this is the case. This captures both LF and CRLF-type newlines. Git Credential Manager uses the .NET standard library `StreamReader` class to read the standard input stream line-by-line and parse the `key=value` credential protocol format. The implementation of the `ReadLineAsync` method considers LF, CRLF, and CR as valid line endings. This is means that .NET considers a single CR as a valid newline character, whereas Git does not. This mismatch of newline treatment between Git and GCM means that an attacker can craft a malicious remote URL. When a user clones or otherwise interacts with a malicious repository that requires authentication, the attacker can capture credentials for another Git remote. The attack is also heightened when cloning from repositories with submodules when using the `--recursive` clone option as the user is not able to inspect the submodule remote URLs beforehand. This issue has been patched in version 2.6.1 and all users are advised to upgrade. Users unable to upgrade should only interact with trusted remote repositories, and not clone with `--recursive` to allow inspection of any submodule URLs before cloning those submodules.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-50338" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fa8d48b6-caa8-4674-bf54-4d9b75a8e50d.json b/objects/vulnerability/vulnerability--fa8d48b6-caa8-4674-bf54-4d9b75a8e50d.json new file mode 100644 index 0000000000..43035b8dd0 --- /dev/null +++ b/objects/vulnerability/vulnerability--fa8d48b6-caa8-4674-bf54-4d9b75a8e50d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--788e9b3f-d2a1-43de-8f63-543e47e3e53a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fa8d48b6-caa8-4674-bf54-4d9b75a8e50d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.113019Z", + "modified": "2025-01-14T19:15:09.113019Z", + "name": "CVE-2025-21295", + "description": "SPNEGO Extended Negotiation (NEGOEX) Security Mechanism Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21295" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fcd8b8e9-bec7-4bcc-8715-1921deaacbf6.json b/objects/vulnerability/vulnerability--fcd8b8e9-bec7-4bcc-8715-1921deaacbf6.json new file mode 100644 index 0000000000..d98721a406 --- /dev/null +++ b/objects/vulnerability/vulnerability--fcd8b8e9-bec7-4bcc-8715-1921deaacbf6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--30e50b51-9839-45df-9a39-9b42c6bbdce8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fcd8b8e9-bec7-4bcc-8715-1921deaacbf6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.121923Z", + "modified": "2025-01-14T19:15:09.121923Z", + "name": "CVE-2025-21300", + "description": "Windows upnphost.dll Denial of Service Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21300" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fcf1e66a-d4b5-48b6-8c61-0c900800ebfd.json b/objects/vulnerability/vulnerability--fcf1e66a-d4b5-48b6-8c61-0c900800ebfd.json new file mode 100644 index 0000000000..90189bd3f7 --- /dev/null +++ b/objects/vulnerability/vulnerability--fcf1e66a-d4b5-48b6-8c61-0c900800ebfd.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5e4968ad-1749-4a54-972b-bd0f91f853cd", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fcf1e66a-d4b5-48b6-8c61-0c900800ebfd", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:08.977562Z", + "modified": "2025-01-14T19:15:08.977562Z", + "name": "CVE-2025-21214", + "description": "Windows BitLocker Information Disclosure Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21214" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fd9cff12-9741-425a-9fcc-c8b0a97f0cc9.json b/objects/vulnerability/vulnerability--fd9cff12-9741-425a-9fcc-c8b0a97f0cc9.json new file mode 100644 index 0000000000..9b13947674 --- /dev/null +++ b/objects/vulnerability/vulnerability--fd9cff12-9741-425a-9fcc-c8b0a97f0cc9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2603b51c-f2dc-4bc4-a81b-7e5c56f0ca18", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fd9cff12-9741-425a-9fcc-c8b0a97f0cc9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-14T19:15:09.063285Z", + "modified": "2025-01-14T19:15:09.063285Z", + "name": "CVE-2025-21244", + "description": "Windows Telephony Service Remote Code Execution Vulnerability", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21244" + } + ] + } + ] +} \ No newline at end of file