diff --git a/mapping.csv b/mapping.csv index 7a38759470..d0759c4df2 100644 --- a/mapping.csv +++ b/mapping.csv @@ -263091,3 +263091,4 @@ vulnerability,CVE-2025-22337,vulnerability--5fbafecc-396d-4f22-ab6a-099dbcdf97e7 vulnerability,CVE-2025-22777,vulnerability--3583868a-dbc3-447d-8523-65d8ead5912e vulnerability,CVE-2024-52333,vulnerability--9757d7a3-db28-4a9e-a711-c7d4e93ae1ca vulnerability,CVE-2024-47796,vulnerability--4745dc1a-a7b9-461b-b918-afd05fcaddd5 +vulnerability,CVE-2025-22963,vulnerability--12ffc9eb-604a-41a7-bc2d-a48e74537d32 diff --git a/objects/vulnerability/vulnerability--12ffc9eb-604a-41a7-bc2d-a48e74537d32.json b/objects/vulnerability/vulnerability--12ffc9eb-604a-41a7-bc2d-a48e74537d32.json new file mode 100644 index 0000000000..04ff38bdd3 --- /dev/null +++ b/objects/vulnerability/vulnerability--12ffc9eb-604a-41a7-bc2d-a48e74537d32.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0e00f89a-49f6-4a0f-b4ab-8775ac227bf6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--12ffc9eb-604a-41a7-bc2d-a48e74537d32", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-01-13T16:26:20.493509Z", + "modified": "2025-01-13T16:26:20.493509Z", + "name": "CVE-2025-22963", + "description": "Teedy through 1.11 allows CSRF for account takeover via POST /api/user/admin.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22963" + } + ] + } + ] +} \ No newline at end of file