From 4b63cf6294e8d73eec38ae2988761a438d3589a2 Mon Sep 17 00:00:00 2001 From: gitadvisor Date: Sun, 19 Jan 2025 07:17:12 +0000 Subject: [PATCH] generated content from 2025-01-19 --- mapping.csv | 2 ++ ...-a46fd1c0-6504-466a-8a45-20c1e7addf8e.json | 22 +++++++++++++++++++ ...-f02feeb2-65be-4e41-81c3-b714352b214d.json | 22 +++++++++++++++++++ 3 files changed, 46 insertions(+) create mode 100644 objects/vulnerability/vulnerability--a46fd1c0-6504-466a-8a45-20c1e7addf8e.json create mode 100644 objects/vulnerability/vulnerability--f02feeb2-65be-4e41-81c3-b714352b214d.json diff --git a/mapping.csv b/mapping.csv index 9901cdcf1b..044700d95b 100644 --- a/mapping.csv +++ b/mapping.csv @@ -264283,3 +264283,5 @@ vulnerability,CVE-2024-45652,vulnerability--94a5fc22-1db9-4846-afb3-ab37b542d40c vulnerability,CVE-2024-45654,vulnerability--a9611ad8-724f-4a45-946f-448aa69237f6 vulnerability,CVE-2025-0564,vulnerability--808d8963-fb7c-412a-bc71-6201d43e5dd5 vulnerability,CVE-2024-8722,vulnerability--717fa8b1-7709-4177-bf36-c8d91b9382f3 +vulnerability,CVE-2025-0566,vulnerability--a46fd1c0-6504-466a-8a45-20c1e7addf8e +vulnerability,CVE-2025-0565,vulnerability--f02feeb2-65be-4e41-81c3-b714352b214d diff --git a/objects/vulnerability/vulnerability--a46fd1c0-6504-466a-8a45-20c1e7addf8e.json b/objects/vulnerability/vulnerability--a46fd1c0-6504-466a-8a45-20c1e7addf8e.json new file mode 100644 index 0000000000..025e8e8d2d --- /dev/null +++ b/objects/vulnerability/vulnerability--a46fd1c0-6504-466a-8a45-20c1e7addf8e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--24027fc2-bec5-40da-9543-343018748247", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a46fd1c0-6504-466a-8a45-20c1e7addf8e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-19T07:16:57.278737Z", + "modified": "2025-01-19T07:16:57.278737Z", + "name": "CVE-2025-0566", + "description": "A vulnerability classified as critical has been found in Tenda AC15 15.13.07.13. This affects the function formSetDevNetName of the file /goform/SetDevNetName. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0566" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f02feeb2-65be-4e41-81c3-b714352b214d.json b/objects/vulnerability/vulnerability--f02feeb2-65be-4e41-81c3-b714352b214d.json new file mode 100644 index 0000000000..d122a07482 --- /dev/null +++ b/objects/vulnerability/vulnerability--f02feeb2-65be-4e41-81c3-b714352b214d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8a40d3ea-cf60-4b8e-b8d0-e4a2e31dbd9e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f02feeb2-65be-4e41-81c3-b714352b214d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-19T07:16:57.305053Z", + "modified": "2025-01-19T07:16:57.305053Z", + "name": "CVE-2025-0565", + "description": "A vulnerability was found in ZZCMS 2023. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0565" + } + ] + } + ] +} \ No newline at end of file