Skip to content

Commit

Permalink
generated content from 2025-01-14
Browse files Browse the repository at this point in the history
  • Loading branch information
github-actions[bot] committed Jan 14, 2025
1 parent 9ef5b60 commit 9552173
Show file tree
Hide file tree
Showing 104 changed files with 2,369 additions and 0 deletions.
103 changes: 103 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -263017,3 +263017,106 @@ vulnerability,CVE-2025-0400,vulnerability--491d38fd-ecb0-4ae7-97ea-76819bd3d03b
vulnerability,CVE-2025-0399,vulnerability--2710c152-0664-490c-be68-45b683bb2f18
vulnerability,CVE-2025-0396,vulnerability--4f6d7822-3d63-4e49-a4f5-1edf7ad73362
vulnerability,CVE-2025-0402,vulnerability--3c34ec74-aaff-491a-ad6d-e8a40c6fa787
vulnerability,CVE-2023-42228,vulnerability--82bed0d9-c836-4695-82b2-83a3e4602d8f
vulnerability,CVE-2023-42232,vulnerability--fe4acb72-5162-4d02-8be2-4005fb42666a
vulnerability,CVE-2023-42241,vulnerability--dccbf631-b0c1-45cf-bc54-25b10ad7d631
vulnerability,CVE-2023-42245,vulnerability--09ae5f8e-58b1-4d9c-b9b1-f3cee376608f
vulnerability,CVE-2023-42239,vulnerability--707ef5b7-b32e-4b26-b459-84cf625def94
vulnerability,CVE-2023-42243,vulnerability--33eeed5b-169a-4792-8892-ddc359dae037
vulnerability,CVE-2023-42234,vulnerability--98123efa-5f43-46ac-a2c8-b1627ed38d68
vulnerability,CVE-2023-42248,vulnerability--7e2f3799-d307-441c-9336-05bf515142b2
vulnerability,CVE-2023-42229,vulnerability--b9beaac6-10be-42cc-b4c6-1d592430becb
vulnerability,CVE-2023-42242,vulnerability--d0eebf31-97de-413e-a121-3874464deb05
vulnerability,CVE-2023-42235,vulnerability--dd261a1f-72ee-444c-b770-4c68f4266331
vulnerability,CVE-2023-42227,vulnerability--0aa5aba5-99c4-4037-80ff-75ebce338b2e
vulnerability,CVE-2023-42249,vulnerability--f58411de-e63e-410c-bd2b-719330ebdf1e
vulnerability,CVE-2023-42240,vulnerability--eed50eae-204f-422b-ae16-655fb3aea526
vulnerability,CVE-2023-42246,vulnerability--f2ca302e-a79b-49b4-afb7-272b81c2be14
vulnerability,CVE-2023-42250,vulnerability--73b11449-ff54-4d9a-8da1-c5d6c21f98fb
vulnerability,CVE-2023-42233,vulnerability--db2355d7-694b-4984-b38b-306a3d27c8c9
vulnerability,CVE-2023-42231,vulnerability--6b63bef4-fb55-4ff0-9ffe-d737ff0f9ef5
vulnerability,CVE-2023-42236,vulnerability--c843ff2f-c2e6-4062-a019-ad8b7201e2ba
vulnerability,CVE-2023-42238,vulnerability--45941984-d1a1-4349-a42c-6819474e0923
vulnerability,CVE-2023-42247,vulnerability--2587e848-b41e-4ab4-94a8-929c2390110a
vulnerability,CVE-2023-42230,vulnerability--d4e55957-7332-4a82-9cee-dfee391943af
vulnerability,CVE-2023-42244,vulnerability--772bf50b-1b4e-4d30-95d7-3b1b055f92d1
vulnerability,CVE-2023-42225,vulnerability--2eb8dc3c-dd57-457e-bb99-38df7fcfe24d
vulnerability,CVE-2023-42237,vulnerability--d04ee7a6-92d7-4cb4-86dc-6213f2a559d2
vulnerability,CVE-2023-42226,vulnerability--160bd622-33d2-409d-bc69-5b2308d4ed34
vulnerability,CVE-2024-5743,vulnerability--ad4029d8-b79f-422c-b3b2-d018c0844cf4
vulnerability,CVE-2024-11128,vulnerability--b891ffaa-37ce-47a1-95ec-a987a180b972
vulnerability,CVE-2024-11636,vulnerability--0d7bf2ab-b539-483f-ab31-4444d31c239d
vulnerability,CVE-2024-56138,vulnerability--64b48ac1-ec61-41ae-98be-ed54d421f191
vulnerability,CVE-2024-56323,vulnerability--fc1b9d0b-3b3b-4d73-8346-8405a72cb583
vulnerability,CVE-2024-56065,vulnerability--6c9f959a-ee1b-49ea-aaac-27a899eb3206
vulnerability,CVE-2024-56301,vulnerability--e07a427a-a8c5-4908-ae5a-999dcea7650a
vulnerability,CVE-2024-48883,vulnerability--7ce4c7b9-09d3-4162-b587-4e0a680d4d6b
vulnerability,CVE-2024-6352,vulnerability--8b545418-d5d5-4564-a007-b4c35facfaff
vulnerability,CVE-2024-57811,vulnerability--8b122d63-c0fd-4f01-8297-70be4f56728f
vulnerability,CVE-2024-57488,vulnerability--10daf128-07d4-4a83-9017-741bfe9f8b4a
vulnerability,CVE-2024-57487,vulnerability--a1ea2a59-9ed2-4236-ba09-874ebb971cbb
vulnerability,CVE-2024-52938,vulnerability--b76f9a91-cba1-4a2c-87a1-0034ca1b8ac1
vulnerability,CVE-2024-52937,vulnerability--0a0b2688-9c13-4f0e-9c3a-20f8e0a4e5ac
vulnerability,CVE-2024-52935,vulnerability--9cfd676f-e1e5-4cd7-8bbe-96d137e08b3e
vulnerability,CVE-2024-52333,vulnerability--9867205b-ec25-4818-bae9-9411cc3e6c60
vulnerability,CVE-2024-52936,vulnerability--6bfcfeb1-ded5-478b-bf5a-51b5649548ef
vulnerability,CVE-2024-47894,vulnerability--22bf920b-5ae3-4b97-88cb-56580f657154
vulnerability,CVE-2024-47895,vulnerability--f066510d-2b51-43ab-8a4f-de84538ca74a
vulnerability,CVE-2024-47897,vulnerability--d7c831e6-5120-4f1b-a02d-f90d262a82ea
vulnerability,CVE-2024-47796,vulnerability--7fa608cd-03e8-46be-8c30-bce260c03474
vulnerability,CVE-2024-12211,vulnerability--c9585865-3b69-4494-ba95-a7016695ac69
vulnerability,CVE-2024-12274,vulnerability--40260377-5e17-424a-9301-7720d0f8e63d
vulnerability,CVE-2024-12567,vulnerability--2e1e0c89-d67e-4b4b-8861-e6d24c299aa7
vulnerability,CVE-2024-12568,vulnerability--2b32b90d-11f2-49eb-a7ef-769586154a62
vulnerability,CVE-2024-12566,vulnerability--be04e4b1-5412-44b5-8d51-61488e3cdac7
vulnerability,CVE-2024-54999,vulnerability--1a1d2820-cba1-463e-b1fe-4809762322c8
vulnerability,CVE-2024-51491,vulnerability--265feddb-5abf-4037-b3a1-41dab316578c
vulnerability,CVE-2024-46920,vulnerability--d2c362e4-a76c-4555-8612-eb00486521ce
vulnerability,CVE-2024-46921,vulnerability--1d82d894-0595-432e-9a64-38fac541760d
vulnerability,CVE-2024-46481,vulnerability--c142b445-f5b9-4032-aaa7-d1a23ca913b5
vulnerability,CVE-2024-46480,vulnerability--533b681a-4b53-4537-bd88-c01b874e4452
vulnerability,CVE-2024-46479,vulnerability--961bdf0a-bb17-4a43-b796-0e96c385331f
vulnerability,CVE-2024-46310,vulnerability--901aec45-b183-4afc-96b2-5ee7de251955
vulnerability,CVE-2024-46919,vulnerability--d55d1d73-1615-465f-a031-499187fb8db4
vulnerability,CVE-2024-44771,vulnerability--20596133-5425-4879-b6a2-73165310ecbf
vulnerability,CVE-2025-0410,vulnerability--cc92724b-7972-4471-be4e-d33327b7d12b
vulnerability,CVE-2025-0409,vulnerability--e34fb81e-aee8-4e8b-bc6c-b161add57840
vulnerability,CVE-2025-0403,vulnerability--f9eca9c3-7be7-49fb-b747-655dca6155eb
vulnerability,CVE-2025-0404,vulnerability--0babffe7-9492-4525-99a7-470979fed92a
vulnerability,CVE-2025-0406,vulnerability--f1f84358-6de2-4cef-8f3f-9045bc3b7abb
vulnerability,CVE-2025-0408,vulnerability--7bde38d7-c861-4e59-ba60-542b95c0f943
vulnerability,CVE-2025-0412,vulnerability--d7edfe05-bc50-40b6-85a5-8f674dd9cba8
vulnerability,CVE-2025-0407,vulnerability--5aa13d83-04f7-40b2-b62a-ee11e9d87bd2
vulnerability,CVE-2025-0405,vulnerability--b313887e-d96e-438e-8dc1-973a6418ce1a
vulnerability,CVE-2025-23026,vulnerability--afed288c-682e-4013-950f-9b4fe1a23296
vulnerability,CVE-2025-23027,vulnerability--7adb4a2f-97c5-4fc9-bdfd-f0868ec16b79
vulnerability,CVE-2025-22614,vulnerability--618430a2-9e24-41d3-aaad-c1ed251fdf24
vulnerability,CVE-2025-22613,vulnerability--9acdcba4-734b-43e1-93ee-3489c40c4956
vulnerability,CVE-2025-22963,vulnerability--c96134bc-e556-44a1-8d76-919e898e685e
vulnerability,CVE-2025-22615,vulnerability--33dc0b8c-4bec-44f2-8eef-0d51530574c1
vulnerability,CVE-2025-22588,vulnerability--10ce97cd-5d52-4306-9afc-192fb8fe1a26
vulnerability,CVE-2025-22498,vulnerability--7e89b433-70ad-4b31-87a7-e6e62646030a
vulnerability,CVE-2025-22138,vulnerability--53648343-e90d-40a3-9029-24d0188e7c1e
vulnerability,CVE-2025-22344,vulnerability--839e6ae7-f1f5-4493-a95b-54481b5877af
vulnerability,CVE-2025-22567,vulnerability--f6b1275d-a31d-4a13-afa0-3fd18a675459
vulnerability,CVE-2025-22514,vulnerability--8d6011b9-5ed1-437c-aff2-5370d056e1f5
vulnerability,CVE-2025-22576,vulnerability--a69b667a-2c65-4f28-81b8-3a2c746ebbc6
vulnerability,CVE-2025-22569,vulnerability--48f3886a-1e49-46cf-8f69-ddcc1f44274f
vulnerability,CVE-2025-22506,vulnerability--084953dc-9050-4a84-bbdb-090b08d3c93e
vulnerability,CVE-2025-22800,vulnerability--16ae6019-870b-4b83-b55c-991462c670c3
vulnerability,CVE-2025-22586,vulnerability--a31b8242-3825-49f2-ab22-76c0960ecd06
vulnerability,CVE-2025-22134,vulnerability--d90241c2-09ef-47e2-a627-c7108ae1717d
vulnerability,CVE-2025-22568,vulnerability--2680017b-8070-4ecd-9058-19844857d20f
vulnerability,CVE-2025-22617,vulnerability--f6271df2-94c5-44de-a21f-967933d8c85e
vulnerability,CVE-2025-22616,vulnerability--34da41f1-3259-4c8b-a5d8-0172cf04b055
vulnerability,CVE-2025-22618,vulnerability--ef4e848d-37c8-4c63-9064-c339aa7a5948
vulnerability,CVE-2025-22144,vulnerability--c4bd0585-9cea-47b3-b3fe-d8b121623d6b
vulnerability,CVE-2025-22499,vulnerability--4c2561bc-2111-4525-987e-1e18b233d076
vulnerability,CVE-2025-22583,vulnerability--5bc87786-c1df-4458-909e-c1c4ec64fa07
vulnerability,CVE-2025-22314,vulnerability--02bcf6bd-1f17-4530-bee4-19dc481f4a6d
vulnerability,CVE-2025-22570,vulnerability--d318ffff-70d5-4b55-9d93-eda720c9d7c7
vulnerability,CVE-2025-22828,vulnerability--3761b6e0-3d8e-4528-84ec-0a0deee980ae
vulnerability,CVE-2025-22142,vulnerability--550a5a96-201b-4228-bef3-903a55c92c09
vulnerability,CVE-2025-22337,vulnerability--328afa20-98a9-4d10-b635-757388544aab
vulnerability,CVE-2025-22619,vulnerability--d0554fd8-f79f-4371-b382-6077b54b5f4f
vulnerability,CVE-2025-22777,vulnerability--a26bd9c5-a4b3-4d4a-a851-26c2959d0b3d
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--464f0450-9aec-4d02-89ed-26876afa49d2",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--02bcf6bd-1f17-4530-bee4-19dc481f4a6d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T00:35:43.645702Z",
"modified": "2025-01-14T00:35:43.645702Z",
"name": "CVE-2025-22314",
"description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Scripts Food Store – Online Food Delivery & Pickup allows Reflected XSS.This issue affects Food Store – Online Food Delivery & Pickup: from n/a through 1.5.1.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-22314"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--1528417a-7daf-41ea-8318-46bf596b6b92",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--084953dc-9050-4a84-bbdb-090b08d3c93e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T00:35:43.60886Z",
"modified": "2025-01-14T00:35:43.60886Z",
"name": "CVE-2025-22506",
"description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SmartAgenda Smart Agenda allows Stored XSS.This issue affects Smart Agenda: from n/a through 4.7.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-22506"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--e82a0bb2-3991-4f1f-a334-5eab3059546f",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--09ae5f8e-58b1-4d9c-b9b1-f3cee376608f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T00:35:34.21038Z",
"modified": "2025-01-14T00:35:34.21038Z",
"name": "CVE-2023-42245",
"description": "Selesta Visual Access Manager < 4.42.2 is vulnerable to Cross Site Scripting (XSS) via monitor/s_scheduledfile.php.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-42245"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--98df6c84-e632-4e07-b25d-3e4e8c402240",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0a0b2688-9c13-4f0e-9c3a-20f8e0a4e5ac",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T00:35:38.344524Z",
"modified": "2025-01-14T00:35:38.344524Z",
"name": "CVE-2024-52937",
"description": "Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data outside the Guest's virtualised GPU memory.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-52937"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--04e0aaf6-1051-42f8-847f-33a8a62407e3",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0aa5aba5-99c4-4037-80ff-75ebce338b2e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T00:35:34.233008Z",
"modified": "2025-01-14T00:35:34.233008Z",
"name": "CVE-2023-42227",
"description": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Directory Traversal via the WSCView/Save function.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-42227"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3f01d05d-c667-473d-80e4-cce32e6e9104",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0babffe7-9492-4525-99a7-470979fed92a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T00:35:43.552936Z",
"modified": "2025-01-14T00:35:43.552936Z",
"name": "CVE-2025-0404",
"description": "A vulnerability has been found in liujianview gymxmjpa 1.0 and classified as critical. This vulnerability affects the function CoachController of the file src/main/java/com/liujian/gymxmjpa/controller/CoachController.java. The manipulation of the argument coachName leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0404"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--60405f4b-3d7f-4759-bfa9-aa8ac94fa699",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--0d7bf2ab-b539-483f-ab31-4444d31c239d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T00:35:36.702958Z",
"modified": "2025-01-14T00:35:36.702958Z",
"name": "CVE-2024-11636",
"description": "The Email Subscribers by Icegram Express WordPress plugin before 5.7.45 does not sanitise and escape some of its Text Block options, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-11636"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3805fa16-cc32-4665-8fe6-449ebf9d93b7",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--10ce97cd-5d52-4306-9afc-192fb8fe1a26",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T00:35:43.593182Z",
"modified": "2025-01-14T00:35:43.593182Z",
"name": "CVE-2025-22588",
"description": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scanventory.net Scanventory allows Reflected XSS.This issue affects Scanventory: from n/a through 1.1.3.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-22588"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--106889b2-f4d3-4438-b042-f51ce67483e5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--10daf128-07d4-4a83-9017-741bfe9f8b4a",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T00:35:37.888141Z",
"modified": "2025-01-14T00:35:37.888141Z",
"name": "CVE-2024-57488",
"description": "Code-Projects Online Car Rental System 1.0 is vulnerable to Cross Site Scripting (XSS) via the vehicalorcview parameter in /admin/edit-vehicle.php.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-57488"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--475a7a23-098d-4988-9890-eaefda8c2f76",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--160bd622-33d2-409d-bc69-5b2308d4ed34",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T00:35:34.269812Z",
"modified": "2025-01-14T00:35:34.269812Z",
"name": "CVE-2023-42226",
"description": "Pat Infinite Solutions HelpdeskAdvanced <= 11.0.33 is vulnerable to Directory Traversal via Email/SaveAttachment function.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-42226"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--26779fa3-4ff4-4e0d-9367-93261915c1df",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--16ae6019-870b-4b83-b55c-991462c670c3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-14T00:35:43.612454Z",
"modified": "2025-01-14T00:35:43.612454Z",
"name": "CVE-2025-22800",
"description": "Missing Authorization vulnerability in Post SMTP Post SMTP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Post SMTP: from n/a through 2.9.11.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-22800"
}
]
}
]
}
Loading

0 comments on commit 9552173

Please sign in to comment.