From f56596cc18473dec3b72da58a324ba11e9fe9f60 Mon Sep 17 00:00:00 2001 From: gitadvisor Date: Sat, 18 Jan 2025 10:18:25 +0000 Subject: [PATCH] generated content from 2025-01-18 --- mapping.csv | 1 + ...-b50e2a89-eefd-47b0-9d12-455312f5fbb4.json | 22 +++++++++++++++++++ 2 files changed, 23 insertions(+) create mode 100644 objects/vulnerability/vulnerability--b50e2a89-eefd-47b0-9d12-455312f5fbb4.json diff --git a/mapping.csv b/mapping.csv index 5d3e212be8..362c4331ea 100644 --- a/mapping.csv +++ b/mapping.csv @@ -264264,3 +264264,4 @@ vulnerability,CVE-2025-0515,vulnerability--9bd037d7-bf7a-4886-9361-9fbc13e8b076 vulnerability,CVE-2025-0369,vulnerability--c7a0b61f-5620-4e88-b414-497705252528 vulnerability,CVE-2024-13184,vulnerability--67d898cb-136b-4b91-995f-f716c06942b1 vulnerability,CVE-2024-13375,vulnerability--906e8bab-7a31-4488-97fe-04742f4d6fb1 +vulnerability,CVE-2025-0557,vulnerability--b50e2a89-eefd-47b0-9d12-455312f5fbb4 diff --git a/objects/vulnerability/vulnerability--b50e2a89-eefd-47b0-9d12-455312f5fbb4.json b/objects/vulnerability/vulnerability--b50e2a89-eefd-47b0-9d12-455312f5fbb4.json new file mode 100644 index 0000000000..0688c66316 --- /dev/null +++ b/objects/vulnerability/vulnerability--b50e2a89-eefd-47b0-9d12-455312f5fbb4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--909c836d-bd73-40ae-ada4-ae0940a989ff", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b50e2a89-eefd-47b0-9d12-455312f5fbb4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-18T10:18:09.567714Z", + "modified": "2025-01-18T10:18:09.567714Z", + "name": "CVE-2025-0557", + "description": "A vulnerability classified as problematic has been found in Hyland Alfresco Community Edition and Alfresco Enterprise Edition up to 6.2.2. This affects an unknown part of the file /share/s/ of the component URL Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0 is able to address this issue. It is recommended to upgrade the affected component.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0557" + } + ] + } + ] +} \ No newline at end of file