Skip to content

Commit

Permalink
generated content from 2025-01-15
Browse files Browse the repository at this point in the history
  • Loading branch information
gitadvisor committed Jan 15, 2025
1 parent a7bd1ef commit 7c73254
Show file tree
Hide file tree
Showing 10 changed files with 207 additions and 0 deletions.
9 changes: 9 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -263819,3 +263819,12 @@ vulnerability,CVE-2025-0481,vulnerability--4e6c56b5-a869-4da4-a805-834525124d97
vulnerability,CVE-2025-0483,vulnerability--bc373ad8-e5c4-464e-b754-3edeb54bbb78
vulnerability,CVE-2025-0482,vulnerability--29108eb5-71e4-4583-befc-c465dd61ff2e
vulnerability,CVE-2025-22146,vulnerability--c13ed312-2cb5-4133-a383-337c88cfadca
vulnerability,CVE-2024-48125,vulnerability--d8abfc01-a7a8-48f2-a927-725baaa73ed3
vulnerability,CVE-2024-48123,vulnerability--afead5ff-95f1-40a4-afac-1f7c0abffc78
vulnerability,CVE-2024-48126,vulnerability--98cbef0c-7de6-4f63-b019-b6e98d2830d4
vulnerability,CVE-2024-48122,vulnerability--9faec0e9-5a65-482f-a0f9-a5db55698d5e
vulnerability,CVE-2024-48121,vulnerability--de21f392-be28-437c-b163-7e967fe5a5cb
vulnerability,CVE-2025-0484,vulnerability--4d93e23d-b4bb-44ef-87ee-df709f92845d
vulnerability,CVE-2025-0485,vulnerability--51bfce5d-b2e1-4850-ab3e-f33d870687ae
vulnerability,CVE-2025-0486,vulnerability--4404d4bf-5e38-4a93-bc97-99523f8df21d
vulnerability,CVE-2025-0487,vulnerability--30342dd5-92fa-468f-bae8-0788e54847c6
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--52380d09-f4ef-4306-a1ad-6a8228dcc2c4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--30342dd5-92fa-468f-bae8-0788e54847c6",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-15T21:17:29.698022Z",
"modified": "2025-01-15T21:17:29.698022Z",
"name": "CVE-2025-0487",
"description": "A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /fladmin/cat_edit.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0487"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8a0304f2-5069-4b01-ae8d-0b88abb506e4",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4404d4bf-5e38-4a93-bc97-99523f8df21d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-15T21:17:29.696561Z",
"modified": "2025-01-15T21:17:29.696561Z",
"name": "CVE-2025-0486",
"description": "A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /fladmin/login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0486"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--993383d9-10ad-4b61-8e55-a65fcaf07ff5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4d93e23d-b4bb-44ef-87ee-df709f92845d",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-15T21:17:29.681685Z",
"modified": "2025-01-15T21:17:29.681685Z",
"name": "CVE-2025-0484",
"description": "A vulnerability was found in Fanli2012 native-php-cms 1.0 and classified as critical. This issue affects some unknown processing of the file /fladmin/sysconfig_doedit.php of the component Backend. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0484"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3f129d2a-26b2-4e7f-8732-d3e691b64fdc",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--51bfce5d-b2e1-4850-ab3e-f33d870687ae",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-15T21:17:29.69458Z",
"modified": "2025-01-15T21:17:29.69458Z",
"name": "CVE-2025-0485",
"description": "A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been classified as problematic. Affected is an unknown function of the file /fladmin/sysconfig_doedit.php. The manipulation of the argument info leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0485"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--f36f3e4f-32c8-4032-a83f-df4e75f15794",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--98cbef0c-7de6-4f63-b019-b6e98d2830d4",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-15T21:17:23.268255Z",
"modified": "2025-01-15T21:17:23.268255Z",
"name": "CVE-2024-48126",
"description": "HI-SCAN 6040i Hitrax HX-03-19-I was discovered to contain hardcoded credentials for access to vendor support and service access.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-48126"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--dc9d14e3-f062-4454-9a66-353ba4bd24b0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--9faec0e9-5a65-482f-a0f9-a5db55698d5e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-15T21:17:23.274643Z",
"modified": "2025-01-15T21:17:23.274643Z",
"name": "CVE-2024-48122",
"description": "Insecure default configurations in HI-SCAN 6040i Hitrax HX-03-19-I allow authenticated attackers with low-level privileges to escalate to root-level privileges.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-48122"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--7512b9e2-584c-4a34-ab17-262596a61246",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--afead5ff-95f1-40a4-afac-1f7c0abffc78",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-15T21:17:23.23999Z",
"modified": "2025-01-15T21:17:23.23999Z",
"name": "CVE-2024-48123",
"description": "An issue in the USB Autorun function of HI-SCAN 6040i Hitrax HX-03-19-I allows attackers to execute arbitrary code via uploading a crafted script from a USB device.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-48123"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--a9338756-142c-4702-b702-6952add436c0",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--d8abfc01-a7a8-48f2-a927-725baaa73ed3",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-15T21:17:23.031934Z",
"modified": "2025-01-15T21:17:23.031934Z",
"name": "CVE-2024-48125",
"description": "An issue in the AsDB service of HI-SCAN 6040i Hitrax HX-03-19-I allows attackers to enumerate user credentials via crafted GIOP protocol requests.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-48125"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--318f721a-3488-40f0-bc57-4bec347bb023",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--de21f392-be28-437c-b163-7e967fe5a5cb",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-15T21:17:23.278937Z",
"modified": "2025-01-15T21:17:23.278937Z",
"name": "CVE-2024-48121",
"description": "The HI-SCAN 6040i Hitrax HX-03-19-I was discovered to transmit user credentials in cleartext over the GIOP protocol. This allows attackers to possibly gain access to sensitive information via a man-in-the-middle attack.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2024-48121"
}
]
}
]
}

0 comments on commit 7c73254

Please sign in to comment.