diff --git a/mapping.csv b/mapping.csv index 5d3e212be8..362c4331ea 100644 --- a/mapping.csv +++ b/mapping.csv @@ -264264,3 +264264,4 @@ vulnerability,CVE-2025-0515,vulnerability--9bd037d7-bf7a-4886-9361-9fbc13e8b076 vulnerability,CVE-2025-0369,vulnerability--c7a0b61f-5620-4e88-b414-497705252528 vulnerability,CVE-2024-13184,vulnerability--67d898cb-136b-4b91-995f-f716c06942b1 vulnerability,CVE-2024-13375,vulnerability--906e8bab-7a31-4488-97fe-04742f4d6fb1 +vulnerability,CVE-2025-0557,vulnerability--b50e2a89-eefd-47b0-9d12-455312f5fbb4 diff --git a/objects/vulnerability/vulnerability--b50e2a89-eefd-47b0-9d12-455312f5fbb4.json b/objects/vulnerability/vulnerability--b50e2a89-eefd-47b0-9d12-455312f5fbb4.json new file mode 100644 index 0000000000..0688c66316 --- /dev/null +++ b/objects/vulnerability/vulnerability--b50e2a89-eefd-47b0-9d12-455312f5fbb4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--909c836d-bd73-40ae-ada4-ae0940a989ff", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b50e2a89-eefd-47b0-9d12-455312f5fbb4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-18T10:18:09.567714Z", + "modified": "2025-01-18T10:18:09.567714Z", + "name": "CVE-2025-0557", + "description": "A vulnerability classified as problematic has been found in Hyland Alfresco Community Edition and Alfresco Enterprise Edition up to 6.2.2. This affects an unknown part of the file /share/s/ of the component URL Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0 is able to address this issue. It is recommended to upgrade the affected component.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0557" + } + ] + } + ] +} \ No newline at end of file