From 9ebf5fe4a8dfb556f3f4cd39788eefbd662c64d3 Mon Sep 17 00:00:00 2001
From: gitadvisor <alerts@log4j.codes>
Date: Sun, 19 Jan 2025 01:36:10 +0000
Subject: [PATCH] generated content from 2025-01-19

---
 mapping.csv                                   |  1 +
 ...-b4454c7a-1938-439d-8e4d-fec2b0b6e63a.json | 22 +++++++++++++++++++
 2 files changed, 23 insertions(+)
 create mode 100644 objects/vulnerability/vulnerability--b4454c7a-1938-439d-8e4d-fec2b0b6e63a.json

diff --git a/mapping.csv b/mapping.csv
index 8bea887c6e..16be935cf8 100644
--- a/mapping.csv
+++ b/mapping.csv
@@ -264275,3 +264275,4 @@ vulnerability,CVE-2024-51448,vulnerability--15e43ab0-bba6-4963-93ad-b5afe9f5f12d
 vulnerability,CVE-2025-0560,vulnerability--034bff74-aebd-4b12-8ddc-cca5083ae3e4
 vulnerability,CVE-2024-47106,vulnerability--82d1b15a-3899-4df3-b2b0-6018cbdeb640
 vulnerability,CVE-2024-45662,vulnerability--bc68371f-5b20-477b-b842-77ea14a746f0
+vulnerability,CVE-2025-0561,vulnerability--b4454c7a-1938-439d-8e4d-fec2b0b6e63a
diff --git a/objects/vulnerability/vulnerability--b4454c7a-1938-439d-8e4d-fec2b0b6e63a.json b/objects/vulnerability/vulnerability--b4454c7a-1938-439d-8e4d-fec2b0b6e63a.json
new file mode 100644
index 0000000000..d3b1e25f95
--- /dev/null
+++ b/objects/vulnerability/vulnerability--b4454c7a-1938-439d-8e4d-fec2b0b6e63a.json
@@ -0,0 +1,22 @@
+{
+    "type": "bundle",
+    "id": "bundle--c3ff1351-d826-42c6-8298-ad3f4e4289fa",
+    "objects": [
+        {
+            "type": "vulnerability",
+            "spec_version": "2.1",
+            "id": "vulnerability--b4454c7a-1938-439d-8e4d-fec2b0b6e63a",
+            "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
+            "created": "2025-01-19T01:35:55.389264Z",
+            "modified": "2025-01-19T01:35:55.389264Z",
+            "name": "CVE-2025-0561",
+            "description": "A vulnerability has been found in itsourcecode Farm Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /add-pig.php. The manipulation of the argument pigno leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.",
+            "external_references": [
+                {
+                    "source_name": "cve",
+                    "external_id": "CVE-2025-0561"
+                }
+            ]
+        }
+    ]
+}
\ No newline at end of file