Skip to content

Commit

Permalink
generated content from 2025-01-29
Browse files Browse the repository at this point in the history
  • Loading branch information
gitadvisor committed Jan 29, 2025
1 parent 362236e commit f428fd6
Show file tree
Hide file tree
Showing 8 changed files with 161 additions and 0 deletions.
7 changes: 7 additions & 0 deletions mapping.csv
Original file line number Diff line number Diff line change
Expand Up @@ -265547,3 +265547,10 @@ vulnerability,CVE-2024-48310,vulnerability--e776a3b4-481e-43d7-943f-f99936aa612a
vulnerability,CVE-2025-0788,vulnerability--87021678-44aa-430f-9eca-70318fce6383
vulnerability,CVE-2025-0787,vulnerability--6042112b-8663-4f5b-91d4-e256e31ef50b
vulnerability,CVE-2025-0786,vulnerability--b554b260-3d8f-43bc-a3c3-f0a91aa8154f
vulnerability,CVE-2023-35017,vulnerability--fe821ab4-6495-4378-80f6-d4d416c1c12f
vulnerability,CVE-2025-0792,vulnerability--4a110dca-436a-478c-8ea2-3b94ec615184
vulnerability,CVE-2025-0790,vulnerability--1bf3d8a0-c023-4e86-b358-4b2aba631495
vulnerability,CVE-2025-0789,vulnerability--ec635f51-bcb1-4676-be08-22f0c2cf65b2
vulnerability,CVE-2025-0793,vulnerability--f8b18bab-f31f-476b-83be-0958ecac3d7e
vulnerability,CVE-2025-0791,vulnerability--940daca3-17cc-4fd8-a786-f1f7d9cf5142
vulnerability,CVE-2025-0794,vulnerability--67075803-59b7-408c-bfaa-b79092042c83
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--18b13f8b-d491-42b5-8715-58216b067e9b",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--1bf3d8a0-c023-4e86-b358-4b2aba631495",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T01:23:10.755695Z",
"modified": "2025-01-29T01:23:10.755695Z",
"name": "CVE-2025-0790",
"description": "A vulnerability classified as problematic was found in ESAFENET CDG V5. This vulnerability affects unknown code of the file /doneDetail.jsp. The manipulation of the argument curpage leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0790"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--3346ff04-7216-48b4-8d18-f2e525a57eee",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--4a110dca-436a-478c-8ea2-3b94ec615184",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T01:23:10.735578Z",
"modified": "2025-01-29T01:23:10.735578Z",
"name": "CVE-2025-0792",
"description": "A vulnerability, which was classified as critical, was found in ESAFENET CDG V5. Affected is an unknown function of the file /sdTodoDetail.jsp. The manipulation of the argument flowId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0792"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--4c182968-7347-4191-a22d-389330cbcf9e",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--67075803-59b7-408c-bfaa-b79092042c83",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T01:23:10.782871Z",
"modified": "2025-01-29T01:23:10.782871Z",
"name": "CVE-2025-0794",
"description": "A vulnerability was found in ESAFENET CDG V5 and classified as problematic. Affected by this issue is some unknown functionality of the file /todoDetail.jsp. The manipulation of the argument curpage leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0794"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--714f4b68-09ca-4b9b-9a14-137220b58b74",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--940daca3-17cc-4fd8-a786-f1f7d9cf5142",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T01:23:10.781245Z",
"modified": "2025-01-29T01:23:10.781245Z",
"name": "CVE-2025-0791",
"description": "A vulnerability, which was classified as critical, has been found in ESAFENET CDG V5. This issue affects some unknown processing of the file /sdDoneDetail.jsp. The manipulation of the argument flowId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0791"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--ea829b90-07f3-4d26-bdc5-5c76a632a8ef",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--ec635f51-bcb1-4676-be08-22f0c2cf65b2",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T01:23:10.766717Z",
"modified": "2025-01-29T01:23:10.766717Z",
"name": "CVE-2025-0789",
"description": "A vulnerability classified as critical has been found in ESAFENET CDG V5. This affects an unknown part of the file /doneDetail.jsp. The manipulation of the argument flowId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0789"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--8cb9d37f-41a0-4861-a08c-4e63eda79b24",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--f8b18bab-f31f-476b-83be-0958ecac3d7e",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T01:23:10.771064Z",
"modified": "2025-01-29T01:23:10.771064Z",
"name": "CVE-2025-0793",
"description": "A vulnerability has been found in ESAFENET CDG V5 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /todoDetail.jsp. The manipulation of the argument flowId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2025-0793"
}
]
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,22 @@
{
"type": "bundle",
"id": "bundle--cae22482-30ac-4ef3-adf0-bb13c1f6aaa5",
"objects": [
{
"type": "vulnerability",
"spec_version": "2.1",
"id": "vulnerability--fe821ab4-6495-4378-80f6-d4d416c1c12f",
"created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a",
"created": "2025-01-29T01:23:05.8654Z",
"modified": "2025-01-29T01:23:05.8654Z",
"name": "CVE-2023-35017",
"description": "IBM Security Verify Governance 10.0.2 Identity Manager can transmit user credentials in clear text that could be obtained by an attacker using man in the middle techniques.",
"external_references": [
{
"source_name": "cve",
"external_id": "CVE-2023-35017"
}
]
}
]
}

0 comments on commit f428fd6

Please sign in to comment.