From 9ebf5fe4a8dfb556f3f4cd39788eefbd662c64d3 Mon Sep 17 00:00:00 2001 From: gitadvisor <alerts@log4j.codes> Date: Sun, 19 Jan 2025 01:36:10 +0000 Subject: [PATCH] generated content from 2025-01-19 --- mapping.csv | 1 + ...-b4454c7a-1938-439d-8e4d-fec2b0b6e63a.json | 22 +++++++++++++++++++ 2 files changed, 23 insertions(+) create mode 100644 objects/vulnerability/vulnerability--b4454c7a-1938-439d-8e4d-fec2b0b6e63a.json diff --git a/mapping.csv b/mapping.csv index 8bea887c6e..16be935cf8 100644 --- a/mapping.csv +++ b/mapping.csv @@ -264275,3 +264275,4 @@ vulnerability,CVE-2024-51448,vulnerability--15e43ab0-bba6-4963-93ad-b5afe9f5f12d vulnerability,CVE-2025-0560,vulnerability--034bff74-aebd-4b12-8ddc-cca5083ae3e4 vulnerability,CVE-2024-47106,vulnerability--82d1b15a-3899-4df3-b2b0-6018cbdeb640 vulnerability,CVE-2024-45662,vulnerability--bc68371f-5b20-477b-b842-77ea14a746f0 +vulnerability,CVE-2025-0561,vulnerability--b4454c7a-1938-439d-8e4d-fec2b0b6e63a diff --git a/objects/vulnerability/vulnerability--b4454c7a-1938-439d-8e4d-fec2b0b6e63a.json b/objects/vulnerability/vulnerability--b4454c7a-1938-439d-8e4d-fec2b0b6e63a.json new file mode 100644 index 0000000000..d3b1e25f95 --- /dev/null +++ b/objects/vulnerability/vulnerability--b4454c7a-1938-439d-8e4d-fec2b0b6e63a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c3ff1351-d826-42c6-8298-ad3f4e4289fa", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b4454c7a-1938-439d-8e4d-fec2b0b6e63a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-19T01:35:55.389264Z", + "modified": "2025-01-19T01:35:55.389264Z", + "name": "CVE-2025-0561", + "description": "A vulnerability has been found in itsourcecode Farm Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /add-pig.php. The manipulation of the argument pigno leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0561" + } + ] + } + ] +} \ No newline at end of file