From 7c7325490cb3cc307884f9d73c70227482ded810 Mon Sep 17 00:00:00 2001 From: gitadvisor Date: Wed, 15 Jan 2025 21:17:45 +0000 Subject: [PATCH] generated content from 2025-01-15 --- mapping.csv | 9 ++++++++ ...-30342dd5-92fa-468f-bae8-0788e54847c6.json | 22 +++++++++++++++++++ ...-4404d4bf-5e38-4a93-bc97-99523f8df21d.json | 22 +++++++++++++++++++ ...-4d93e23d-b4bb-44ef-87ee-df709f92845d.json | 22 +++++++++++++++++++ ...-51bfce5d-b2e1-4850-ab3e-f33d870687ae.json | 22 +++++++++++++++++++ ...-98cbef0c-7de6-4f63-b019-b6e98d2830d4.json | 22 +++++++++++++++++++ ...-9faec0e9-5a65-482f-a0f9-a5db55698d5e.json | 22 +++++++++++++++++++ ...-afead5ff-95f1-40a4-afac-1f7c0abffc78.json | 22 +++++++++++++++++++ ...-d8abfc01-a7a8-48f2-a927-725baaa73ed3.json | 22 +++++++++++++++++++ ...-de21f392-be28-437c-b163-7e967fe5a5cb.json | 22 +++++++++++++++++++ 10 files changed, 207 insertions(+) create mode 100644 objects/vulnerability/vulnerability--30342dd5-92fa-468f-bae8-0788e54847c6.json create mode 100644 objects/vulnerability/vulnerability--4404d4bf-5e38-4a93-bc97-99523f8df21d.json create mode 100644 objects/vulnerability/vulnerability--4d93e23d-b4bb-44ef-87ee-df709f92845d.json create mode 100644 objects/vulnerability/vulnerability--51bfce5d-b2e1-4850-ab3e-f33d870687ae.json create mode 100644 objects/vulnerability/vulnerability--98cbef0c-7de6-4f63-b019-b6e98d2830d4.json create mode 100644 objects/vulnerability/vulnerability--9faec0e9-5a65-482f-a0f9-a5db55698d5e.json create mode 100644 objects/vulnerability/vulnerability--afead5ff-95f1-40a4-afac-1f7c0abffc78.json create mode 100644 objects/vulnerability/vulnerability--d8abfc01-a7a8-48f2-a927-725baaa73ed3.json create mode 100644 objects/vulnerability/vulnerability--de21f392-be28-437c-b163-7e967fe5a5cb.json diff --git a/mapping.csv b/mapping.csv index cc19fe8e66..a374e46204 100644 --- a/mapping.csv +++ b/mapping.csv @@ -263819,3 +263819,12 @@ vulnerability,CVE-2025-0481,vulnerability--4e6c56b5-a869-4da4-a805-834525124d97 vulnerability,CVE-2025-0483,vulnerability--bc373ad8-e5c4-464e-b754-3edeb54bbb78 vulnerability,CVE-2025-0482,vulnerability--29108eb5-71e4-4583-befc-c465dd61ff2e vulnerability,CVE-2025-22146,vulnerability--c13ed312-2cb5-4133-a383-337c88cfadca +vulnerability,CVE-2024-48125,vulnerability--d8abfc01-a7a8-48f2-a927-725baaa73ed3 +vulnerability,CVE-2024-48123,vulnerability--afead5ff-95f1-40a4-afac-1f7c0abffc78 +vulnerability,CVE-2024-48126,vulnerability--98cbef0c-7de6-4f63-b019-b6e98d2830d4 +vulnerability,CVE-2024-48122,vulnerability--9faec0e9-5a65-482f-a0f9-a5db55698d5e +vulnerability,CVE-2024-48121,vulnerability--de21f392-be28-437c-b163-7e967fe5a5cb +vulnerability,CVE-2025-0484,vulnerability--4d93e23d-b4bb-44ef-87ee-df709f92845d +vulnerability,CVE-2025-0485,vulnerability--51bfce5d-b2e1-4850-ab3e-f33d870687ae +vulnerability,CVE-2025-0486,vulnerability--4404d4bf-5e38-4a93-bc97-99523f8df21d +vulnerability,CVE-2025-0487,vulnerability--30342dd5-92fa-468f-bae8-0788e54847c6 diff --git a/objects/vulnerability/vulnerability--30342dd5-92fa-468f-bae8-0788e54847c6.json b/objects/vulnerability/vulnerability--30342dd5-92fa-468f-bae8-0788e54847c6.json new file mode 100644 index 0000000000..a010a2e212 --- /dev/null +++ b/objects/vulnerability/vulnerability--30342dd5-92fa-468f-bae8-0788e54847c6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--52380d09-f4ef-4306-a1ad-6a8228dcc2c4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--30342dd5-92fa-468f-bae8-0788e54847c6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T21:17:29.698022Z", + "modified": "2025-01-15T21:17:29.698022Z", + "name": "CVE-2025-0487", + "description": "A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /fladmin/cat_edit.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0487" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4404d4bf-5e38-4a93-bc97-99523f8df21d.json b/objects/vulnerability/vulnerability--4404d4bf-5e38-4a93-bc97-99523f8df21d.json new file mode 100644 index 0000000000..a65a2de8cd --- /dev/null +++ b/objects/vulnerability/vulnerability--4404d4bf-5e38-4a93-bc97-99523f8df21d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--8a0304f2-5069-4b01-ae8d-0b88abb506e4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4404d4bf-5e38-4a93-bc97-99523f8df21d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T21:17:29.696561Z", + "modified": "2025-01-15T21:17:29.696561Z", + "name": "CVE-2025-0486", + "description": "A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /fladmin/login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0486" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4d93e23d-b4bb-44ef-87ee-df709f92845d.json b/objects/vulnerability/vulnerability--4d93e23d-b4bb-44ef-87ee-df709f92845d.json new file mode 100644 index 0000000000..46542051b5 --- /dev/null +++ b/objects/vulnerability/vulnerability--4d93e23d-b4bb-44ef-87ee-df709f92845d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--993383d9-10ad-4b61-8e55-a65fcaf07ff5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4d93e23d-b4bb-44ef-87ee-df709f92845d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T21:17:29.681685Z", + "modified": "2025-01-15T21:17:29.681685Z", + "name": "CVE-2025-0484", + "description": "A vulnerability was found in Fanli2012 native-php-cms 1.0 and classified as critical. This issue affects some unknown processing of the file /fladmin/sysconfig_doedit.php of the component Backend. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0484" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--51bfce5d-b2e1-4850-ab3e-f33d870687ae.json b/objects/vulnerability/vulnerability--51bfce5d-b2e1-4850-ab3e-f33d870687ae.json new file mode 100644 index 0000000000..412aa61d95 --- /dev/null +++ b/objects/vulnerability/vulnerability--51bfce5d-b2e1-4850-ab3e-f33d870687ae.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3f129d2a-26b2-4e7f-8732-d3e691b64fdc", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--51bfce5d-b2e1-4850-ab3e-f33d870687ae", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T21:17:29.69458Z", + "modified": "2025-01-15T21:17:29.69458Z", + "name": "CVE-2025-0485", + "description": "A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been classified as problematic. Affected is an unknown function of the file /fladmin/sysconfig_doedit.php. The manipulation of the argument info leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0485" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--98cbef0c-7de6-4f63-b019-b6e98d2830d4.json b/objects/vulnerability/vulnerability--98cbef0c-7de6-4f63-b019-b6e98d2830d4.json new file mode 100644 index 0000000000..858deef221 --- /dev/null +++ b/objects/vulnerability/vulnerability--98cbef0c-7de6-4f63-b019-b6e98d2830d4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f36f3e4f-32c8-4032-a83f-df4e75f15794", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--98cbef0c-7de6-4f63-b019-b6e98d2830d4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T21:17:23.268255Z", + "modified": "2025-01-15T21:17:23.268255Z", + "name": "CVE-2024-48126", + "description": "HI-SCAN 6040i Hitrax HX-03-19-I was discovered to contain hardcoded credentials for access to vendor support and service access.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48126" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9faec0e9-5a65-482f-a0f9-a5db55698d5e.json b/objects/vulnerability/vulnerability--9faec0e9-5a65-482f-a0f9-a5db55698d5e.json new file mode 100644 index 0000000000..a4efabc681 --- /dev/null +++ b/objects/vulnerability/vulnerability--9faec0e9-5a65-482f-a0f9-a5db55698d5e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--dc9d14e3-f062-4454-9a66-353ba4bd24b0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9faec0e9-5a65-482f-a0f9-a5db55698d5e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T21:17:23.274643Z", + "modified": "2025-01-15T21:17:23.274643Z", + "name": "CVE-2024-48122", + "description": "Insecure default configurations in HI-SCAN 6040i Hitrax HX-03-19-I allow authenticated attackers with low-level privileges to escalate to root-level privileges.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48122" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--afead5ff-95f1-40a4-afac-1f7c0abffc78.json b/objects/vulnerability/vulnerability--afead5ff-95f1-40a4-afac-1f7c0abffc78.json new file mode 100644 index 0000000000..d0707b262f --- /dev/null +++ b/objects/vulnerability/vulnerability--afead5ff-95f1-40a4-afac-1f7c0abffc78.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7512b9e2-584c-4a34-ab17-262596a61246", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--afead5ff-95f1-40a4-afac-1f7c0abffc78", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T21:17:23.23999Z", + "modified": "2025-01-15T21:17:23.23999Z", + "name": "CVE-2024-48123", + "description": "An issue in the USB Autorun function of HI-SCAN 6040i Hitrax HX-03-19-I allows attackers to execute arbitrary code via uploading a crafted script from a USB device.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48123" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d8abfc01-a7a8-48f2-a927-725baaa73ed3.json b/objects/vulnerability/vulnerability--d8abfc01-a7a8-48f2-a927-725baaa73ed3.json new file mode 100644 index 0000000000..b716af11b8 --- /dev/null +++ b/objects/vulnerability/vulnerability--d8abfc01-a7a8-48f2-a927-725baaa73ed3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a9338756-142c-4702-b702-6952add436c0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d8abfc01-a7a8-48f2-a927-725baaa73ed3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T21:17:23.031934Z", + "modified": "2025-01-15T21:17:23.031934Z", + "name": "CVE-2024-48125", + "description": "An issue in the AsDB service of HI-SCAN 6040i Hitrax HX-03-19-I allows attackers to enumerate user credentials via crafted GIOP protocol requests.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48125" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--de21f392-be28-437c-b163-7e967fe5a5cb.json b/objects/vulnerability/vulnerability--de21f392-be28-437c-b163-7e967fe5a5cb.json new file mode 100644 index 0000000000..e17639d642 --- /dev/null +++ b/objects/vulnerability/vulnerability--de21f392-be28-437c-b163-7e967fe5a5cb.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--318f721a-3488-40f0-bc57-4bec347bb023", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--de21f392-be28-437c-b163-7e967fe5a5cb", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-15T21:17:23.278937Z", + "modified": "2025-01-15T21:17:23.278937Z", + "name": "CVE-2024-48121", + "description": "The HI-SCAN 6040i Hitrax HX-03-19-I was discovered to transmit user credentials in cleartext over the GIOP protocol. This allows attackers to possibly gain access to sensitive information via a man-in-the-middle attack.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-48121" + } + ] + } + ] +} \ No newline at end of file