diff --git a/mapping.csv b/mapping.csv index 87d16f023ef..c596f001972 100644 --- a/mapping.csv +++ b/mapping.csv @@ -267779,3 +267779,128 @@ vulnerability,CVE-2025-0796,vulnerability--5566356b-888a-408e-a412-6baad41d1e19 vulnerability,CVE-2025-0424,vulnerability--432c6971-8f9d-4b85-bced-6f2e66fdc4c6 vulnerability,CVE-2025-0622,vulnerability--b178f571-9a15-4b3e-ad77-fc8e3072ed1b vulnerability,CVE-2025-0422,vulnerability--ed67e855-6204-4e3f-a261-ee17ebf8a157 +vulnerability,CVE-2024-5706,vulnerability--14b2ed93-7584-42e7-9273-61837ba34d46 +vulnerability,CVE-2024-5705,vulnerability--76d72b79-81cd-4330-bb42-26589e7c5ce3 +vulnerability,CVE-2024-37362,vulnerability--6b9f1be6-3658-4a38-b808-1d45dc3115bb +vulnerability,CVE-2024-37359,vulnerability--a55840f8-06af-470e-a972-2212e4baa585 +vulnerability,CVE-2024-37361,vulnerability--fe8d7571-dc12-4fd3-ac21-e9ed42008783 +vulnerability,CVE-2024-37360,vulnerability--ec1e2803-f767-40dd-8801-83eb967a5938 +vulnerability,CVE-2024-37363,vulnerability--9af43b39-1f96-4d99-b53d-d142461b4fb8 +vulnerability,CVE-2024-28776,vulnerability--0d323cea-8b83-4ffe-8689-3b5d03d0a559 +vulnerability,CVE-2024-28780,vulnerability--d3012c38-0886-4e68-a237-b81ba11c180e +vulnerability,CVE-2024-28777,vulnerability--b2140c9a-888e-483f-bdce-9caac511d36f +vulnerability,CVE-2024-57262,vulnerability--9ebb69be-8ba3-47f6-a420-6c05ebb8dd1e +vulnerability,CVE-2024-57261,vulnerability--f4e5c5f6-5e70-4e03-aa52-a7218d95b643 +vulnerability,CVE-2024-12339,vulnerability--45ab0e31-7180-4289-b87d-967d79742f8d +vulnerability,CVE-2024-12284,vulnerability--3540893c-5af1-414e-9009-4f09acb916ed +vulnerability,CVE-2024-12173,vulnerability--57285280-0948-4625-bc03-f720af2672c4 +vulnerability,CVE-2024-12522,vulnerability--ac062e33-b8d8-439b-a2da-286b22b305e3 +vulnerability,CVE-2024-12069,vulnerability--aa98b31b-3cda-4a6b-86e4-a9ef5ae3de2b +vulnerability,CVE-2024-53974,vulnerability--26040cbb-2038-45a7-b7a6-ed5ab0244c2a +vulnerability,CVE-2024-45081,vulnerability--3c51cdbe-8468-4f98-ba02-687d84e18559 +vulnerability,CVE-2024-45777,vulnerability--5d2619a5-074f-4ad0-a243-e8e288c32460 +vulnerability,CVE-2024-45084,vulnerability--8b8dc3e4-dbfd-4284-be9a-06adb96b6589 +vulnerability,CVE-2024-6697,vulnerability--ba68104a-c9cd-433b-8a9e-f31506d28790 +vulnerability,CVE-2024-6696,vulnerability--bf35ca4a-00e1-4859-945a-3addd74dd98a +vulnerability,CVE-2024-52902,vulnerability--5a45c1f1-58d9-42a3-ac25-2bc9c8c7f480 +vulnerability,CVE-2024-52541,vulnerability--0b841742-aa9a-43bb-8c42-36e19bd36b1f +vulnerability,CVE-2024-13489,vulnerability--b5f84f00-1074-4a49-ac1f-1c13382cb90e +vulnerability,CVE-2024-13364,vulnerability--a49f167a-b3ef-489f-b989-8f453d7ddeaf +vulnerability,CVE-2024-13483,vulnerability--8bc3f43a-0eec-4932-b7a3-e04672fdf88a +vulnerability,CVE-2024-13591,vulnerability--b1f2ee8b-73de-48ec-9937-0c231fb8e0b7 +vulnerability,CVE-2024-13231,vulnerability--c103a1eb-c506-4898-b5fd-6f9d64f0aac1 +vulnerability,CVE-2024-13674,vulnerability--7dd36f5f-4882-4932-a267-edce6aed98f2 +vulnerability,CVE-2024-13711,vulnerability--4a496bcb-2749-4e85-aac0-4a4b26cce5dd +vulnerability,CVE-2024-13719,vulnerability--58449b87-35af-4bda-8047-7c33f90db94d +vulnerability,CVE-2024-13663,vulnerability--f3260fbf-0a44-4caf-ba97-385410f2199e +vulnerability,CVE-2024-13679,vulnerability--0e6a8879-cac8-479d-a2b4-20ca254b5c2c +vulnerability,CVE-2024-13736,vulnerability--cf23d958-9a89-4d68-a508-02c3df07bc93 +vulnerability,CVE-2024-13712,vulnerability--264b370c-94ef-45be-8db2-1ec079cca2e7 +vulnerability,CVE-2024-13491,vulnerability--0f498444-c7c8-47d9-806e-be4bdd4b756a +vulnerability,CVE-2024-13481,vulnerability--6264c5f3-b9fc-455c-90bd-f026fa6d1545 +vulnerability,CVE-2024-13485,vulnerability--f1ceff02-ea17-4340-abdb-7393390f510e +vulnerability,CVE-2024-13592,vulnerability--c9582ccc-b203-416d-9f6c-da2e1488a4f7 +vulnerability,CVE-2024-13660,vulnerability--87fc2115-656a-41de-8e29-da55205b860c +vulnerability,CVE-2024-13657,vulnerability--f432b9a2-3f34-4d07-b44e-e17e82e858a7 +vulnerability,CVE-2024-13534,vulnerability--922d7fce-6242-4030-bc73-4294fb33fdcc +vulnerability,CVE-2024-13676,vulnerability--15897bd1-a64a-4fa8-ab93-44f86821e976 +vulnerability,CVE-2024-13462,vulnerability--5e838a89-9e84-487b-9565-cdf615cfc028 +vulnerability,CVE-2024-13589,vulnerability--7eb04ec5-b423-4192-a504-467e9c7049b4 +vulnerability,CVE-2024-13478,vulnerability--10088c1a-31da-4e56-a088-be100581a77f +vulnerability,CVE-2024-13799,vulnerability--3904c458-a0d5-4a41-8f90-8a6ef70db2f6 +vulnerability,CVE-2024-13533,vulnerability--9f09ab27-4eda-472a-b22e-d0f9cdca4cb1 +vulnerability,CVE-2024-13854,vulnerability--8e59e19a-5316-40fd-9bbf-1424e7eef46e +vulnerability,CVE-2024-13479,vulnerability--d4fb6f2f-3a45-4c47-bcf2-781b6a1f210b +vulnerability,CVE-2024-13390,vulnerability--b2754b83-e8f8-4534-acb2-fee6617cdf25 +vulnerability,CVE-2024-13443,vulnerability--2c7b964c-d5ce-468a-900b-750051253bfc +vulnerability,CVE-2024-13336,vulnerability--0bb89032-bf22-4151-9811-6f34388f5d45 +vulnerability,CVE-2024-13339,vulnerability--10601afd-f050-4db6-8d0c-7b8cb5c50a3e +vulnerability,CVE-2024-13468,vulnerability--e464050e-26c2-47a3-9c95-c347f35f6915 +vulnerability,CVE-2024-13363,vulnerability--e2f48f18-1325-480a-85b8-c04edd6da88c +vulnerability,CVE-2024-13405,vulnerability--1e153386-3647-4332-8162-935b4fe423b1 +vulnerability,CVE-2024-11778,vulnerability--922f7fb3-0c17-4a01-b468-3a604779bd44 +vulnerability,CVE-2024-11582,vulnerability--31a9e648-f08a-455a-9786-ff5ce86b8d81 +vulnerability,CVE-2024-11753,vulnerability--3d508ce2-de1b-42c4-b984-5aaaa4c56132 +vulnerability,CVE-2024-11335,vulnerability--5a2750d9-1be8-478a-9d73-d8de801e0812 +vulnerability,CVE-2025-1448,vulnerability--bf9c3bd6-0783-4484-86b8-11eb99435389 +vulnerability,CVE-2025-1465,vulnerability--c7f0dad5-2272-4be2-9ece-f3f3b662bec6 +vulnerability,CVE-2025-1075,vulnerability--771a5fd7-8a06-4b51-b9fe-ca49df421b14 +vulnerability,CVE-2025-1426,vulnerability--4a60fd98-0da2-4273-acdc-7fbcee1ce370 +vulnerability,CVE-2025-1118,vulnerability--c9633fc1-d75e-4ffd-91ce-99945c49f479 +vulnerability,CVE-2025-1132,vulnerability--d2720a8e-2d40-4aa5-a545-b438a3cbcfd0 +vulnerability,CVE-2025-1447,vulnerability--8523e6b2-db80-4d9c-95fc-3fc6c33cfb72 +vulnerability,CVE-2025-1006,vulnerability--de31fc2c-72fb-46e0-a350-823d76b176ff +vulnerability,CVE-2025-1441,vulnerability--8a778e5a-662a-40f2-a7a4-17df87f912eb +vulnerability,CVE-2025-1065,vulnerability--045d2996-22f9-4601-9b53-6ee701f96542 +vulnerability,CVE-2025-1464,vulnerability--80a10140-e848-46f8-b868-c0b0908f7eea +vulnerability,CVE-2025-1135,vulnerability--92cfda54-24be-4cb0-bec4-5adda96cea08 +vulnerability,CVE-2025-1007,vulnerability--4373597c-0841-4165-9b44-173991430e52 +vulnerability,CVE-2025-1024,vulnerability--641f21a0-ca29-4b37-83c6-2ae80f24e6ae +vulnerability,CVE-2025-1134,vulnerability--229872d6-641f-4d9c-a845-8c9b9c86050a +vulnerability,CVE-2025-1133,vulnerability--efd1569d-e0d7-42b2-8f14-9b3fb7f1bac5 +vulnerability,CVE-2025-21355,vulnerability--5b9ac498-4e40-4276-9925-fe3f77672fad +vulnerability,CVE-2025-22622,vulnerability--5c46a36f-5145-4c3f-845e-3550ddeee2a8 +vulnerability,CVE-2025-22888,vulnerability--989a56b1-cd65-4efe-a5a5-3795c6b0a25e +vulnerability,CVE-2025-20153,vulnerability--ccc19c53-c3a3-42a8-ba98-dd198764cf07 +vulnerability,CVE-2025-20211,vulnerability--ec56e504-2d28-4bc9-a00f-f0bffafb2052 +vulnerability,CVE-2025-20158,vulnerability--526c8939-6787-4780-9ccc-db2d26d0f452 +vulnerability,CVE-2025-27092,vulnerability--a6093929-3d8f-486f-b864-1d8a17b0c50f +vulnerability,CVE-2025-27089,vulnerability--20b855e3-4354-43df-9579-167c42d46872 +vulnerability,CVE-2025-27090,vulnerability--ca1c32f3-902e-45ae-a0dd-fbc8f689fe00 +vulnerability,CVE-2025-24806,vulnerability--00978baa-e4b0-4ce9-8edf-cdcd276e44cc +vulnerability,CVE-2025-24989,vulnerability--2590fcb4-4406-424c-89d5-049b2130b7c1 +vulnerability,CVE-2025-24841,vulnerability--9325e2e8-0543-4651-a4b2-ccb347b59f43 +vulnerability,CVE-2025-24965,vulnerability--f3d5abd9-d503-4f5b-9a14-66ada3768ec5 +vulnerability,CVE-2025-25942,vulnerability--6353184c-5a4d-4b6d-a2ef-3c281e761b41 +vulnerability,CVE-2025-25943,vulnerability--aa07e9af-6d36-4260-96fe-b5b8f43488b2 +vulnerability,CVE-2025-25947,vulnerability--66ae8e4a-00e8-453e-9728-b59906128ccd +vulnerability,CVE-2025-25054,vulnerability--291c2f5b-4e1f-45dd-ba54-5b1a25f8d755 +vulnerability,CVE-2025-25944,vulnerability--f05617a4-d28c-4a8d-aaa1-c897277c705e +vulnerability,CVE-2025-25946,vulnerability--23ad66aa-be2c-4acd-9bd2-b55e87c1837d +vulnerability,CVE-2025-25196,vulnerability--e01a808c-3326-4ecd-a484-7a8b0fee224e +vulnerability,CVE-2025-25945,vulnerability--df73531e-5068-40bf-8d54-5ddedc04a3e1 +vulnerability,CVE-2025-0968,vulnerability--f497c4d7-3c42-4b6a-a739-7eb4febb9006 +vulnerability,CVE-2025-0893,vulnerability--5acb0eb0-8758-477b-9a54-53bca20032d0 +vulnerability,CVE-2025-0865,vulnerability--503c83af-4d24-4ac4-bf37-6b3dacbbb2f4 +vulnerability,CVE-2025-0999,vulnerability--d7457272-3c94-4711-bf33-d7e35a42081d +vulnerability,CVE-2025-0624,vulnerability--855d5735-43b1-4b65-9e14-3d043d0cee69 +vulnerability,CVE-2025-0633,vulnerability--87bd9756-8729-4aa8-af26-ae9fe64b8a5e +vulnerability,CVE-2025-0112,vulnerability--6b7b11c9-9f0b-471e-a35e-4ac947a81563 +vulnerability,CVE-2025-0916,vulnerability--cf9bec98-81e0-4146-b414-db9ee9f60166 +vulnerability,CVE-2025-0677,vulnerability--d1a50a60-4a35-4766-8054-5ecd698e76fb +vulnerability,CVE-2023-46272,vulnerability--3927fc98-a2f1-4322-b012-d7fcf702397c +vulnerability,CVE-2023-46271,vulnerability--dad24515-187a-4d76-8e59-bbfde0a49c24 +vulnerability,CVE-2023-51296,vulnerability--bdca7d18-cd7d-483b-8233-86c1bc8a7307 +vulnerability,CVE-2023-51302,vulnerability--d05eeadc-4c1e-4400-bc38-4a857a1f7716 +vulnerability,CVE-2023-51297,vulnerability--08602999-0c01-4482-9d3e-4a9de101eff2 +vulnerability,CVE-2023-51298,vulnerability--5f40614a-2f1a-425f-8b00-febc72943d4d +vulnerability,CVE-2023-51300,vulnerability--90fa2549-5f43-424b-84d8-4b1953dcd737 +vulnerability,CVE-2023-51301,vulnerability--1b4fe9bf-bc82-45fb-ac6f-82d8aa25021b +vulnerability,CVE-2023-51299,vulnerability--f98c9e9c-6f51-4cb2-86fc-b684fb8aa6df +vulnerability,CVE-2023-51303,vulnerability--2029fff2-b84e-4338-9044-461f461e1b14 +vulnerability,CVE-2023-51293,vulnerability--d12a4b2a-6794-4a83-8d97-f4ab5ff1ebce +vulnerability,CVE-2023-51305,vulnerability--e686bd6e-eb69-4f4c-a6a8-4b6bf7fa6896 +vulnerability,CVE-2023-47160,vulnerability--935461fb-9fec-4482-8384-d25bc3156d99 +vulnerability,CVE-2020-10095,vulnerability--1b8e10f0-b73c-4929-a2c1-911c3652e6a9 +vulnerability,CVE-2020-13481,vulnerability--7e36f997-7c9e-4c5b-8f82-d99351f4d377 +vulnerability,CVE-2020-35546,vulnerability--66da5862-6a8a-4c05-9291-3eb4bdec3fc1 diff --git a/objects/vulnerability/vulnerability--00978baa-e4b0-4ce9-8edf-cdcd276e44cc.json b/objects/vulnerability/vulnerability--00978baa-e4b0-4ce9-8edf-cdcd276e44cc.json new file mode 100644 index 00000000000..39a42d971bd --- /dev/null +++ b/objects/vulnerability/vulnerability--00978baa-e4b0-4ce9-8edf-cdcd276e44cc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4c32fc7c-10f9-495d-b616-a282c5c90592", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--00978baa-e4b0-4ce9-8edf-cdcd276e44cc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.477696Z", + "modified": "2025-02-20T00:37:45.477696Z", + "name": "CVE-2025-24806", + "description": "Authelia is an open-source authentication and authorization server providing two-factor authentication and single sign-on (SSO) for applications via a web portal. If users are allowed to sign in via both username and email the regulation system treats these as separate login events. This leads to the regulation limitations being effectively doubled assuming an attacker using brute-force to find a user password. It's important to note that due to the effective operation of regulation where no user-facing sign of their regulation ban being visible either via timing or via API responses, it's effectively impossible to determine if a failure occurs due to a bad username password combination, or a effective ban blocking the attempt which heavily mitigates any form of brute-force. This occurs because the records and counting process for this system uses the method utilized for sign in rather than the effective username attribute. This has a minimal impact on account security, this impact is increased naturally in scenarios when there is no two-factor authentication required and weak passwords are used. This makes it a bit easier to brute-force a password. A patch for this issue has been applied to versions 4.38.19, and 4.39.0. Users are advised to upgrade. Users unable to upgrade should 1. Not heavily modify the default settings in a way that ends up with shorter or less frequent regulation bans. The default settings effectively mitigate any potential for this issue to be exploited. and 2. Disable the ability for users to login via an email address.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-24806" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--045d2996-22f9-4601-9b53-6ee701f96542.json b/objects/vulnerability/vulnerability--045d2996-22f9-4601-9b53-6ee701f96542.json new file mode 100644 index 00000000000..5ace64bfff1 --- /dev/null +++ b/objects/vulnerability/vulnerability--045d2996-22f9-4601-9b53-6ee701f96542.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--71c94b84-2fe4-49b2-b495-633e1785d3f3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--045d2996-22f9-4601-9b53-6ee701f96542", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.241479Z", + "modified": "2025-02-20T00:37:45.241479Z", + "name": "CVE-2025-1065", + "description": "The Visualizer: Tables and Charts Manager for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Import Data From File feature in all versions up to, and including, 3.11.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-1065" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--08602999-0c01-4482-9d3e-4a9de101eff2.json b/objects/vulnerability/vulnerability--08602999-0c01-4482-9d3e-4a9de101eff2.json new file mode 100644 index 00000000000..51668718a79 --- /dev/null +++ b/objects/vulnerability/vulnerability--08602999-0c01-4482-9d3e-4a9de101eff2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--50dba9ab-e7a8-49bf-b4d0-9a27ca2dcbec", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--08602999-0c01-4482-9d3e-4a9de101eff2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:46.030662Z", + "modified": "2025-02-20T00:37:46.030662Z", + "name": "CVE-2023-51297", + "description": "A lack of rate limiting in the 'Email Settings' feature of PHPJabbers Hotel Booking System v4.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-51297" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0b841742-aa9a-43bb-8c42-36e19bd36b1f.json b/objects/vulnerability/vulnerability--0b841742-aa9a-43bb-8c42-36e19bd36b1f.json new file mode 100644 index 00000000000..2dcae0b0c18 --- /dev/null +++ b/objects/vulnerability/vulnerability--0b841742-aa9a-43bb-8c42-36e19bd36b1f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--68d771ce-987c-4352-9d0f-d5475a98cc7f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0b841742-aa9a-43bb-8c42-36e19bd36b1f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.276111Z", + "modified": "2025-02-20T00:37:41.276111Z", + "name": "CVE-2024-52541", + "description": "Dell Client Platform BIOS contains a Weak Authentication vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of Privileges.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-52541" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0bb89032-bf22-4151-9811-6f34388f5d45.json b/objects/vulnerability/vulnerability--0bb89032-bf22-4151-9811-6f34388f5d45.json new file mode 100644 index 00000000000..eb7d74bacf9 --- /dev/null +++ b/objects/vulnerability/vulnerability--0bb89032-bf22-4151-9811-6f34388f5d45.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--81cf4bc8-cda5-4283-aa7f-2229a7c85dd3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0bb89032-bf22-4151-9811-6f34388f5d45", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.684563Z", + "modified": "2025-02-20T00:37:41.684563Z", + "name": "CVE-2024-13336", + "description": "The Disable Auto Updates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the 'disable-auto-updates' page. This makes it possible for unauthenticated attackers to disable all auto updates via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13336" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0d323cea-8b83-4ffe-8689-3b5d03d0a559.json b/objects/vulnerability/vulnerability--0d323cea-8b83-4ffe-8689-3b5d03d0a559.json new file mode 100644 index 00000000000..59aefb59ac1 --- /dev/null +++ b/objects/vulnerability/vulnerability--0d323cea-8b83-4ffe-8689-3b5d03d0a559.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--aac8cf3c-c159-48f4-b9df-a83c4818e865", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0d323cea-8b83-4ffe-8689-3b5d03d0a559", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:39.991654Z", + "modified": "2025-02-20T00:37:39.991654Z", + "name": "CVE-2024-28776", + "description": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\nis vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-28776" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0e6a8879-cac8-479d-a2b4-20ca254b5c2c.json b/objects/vulnerability/vulnerability--0e6a8879-cac8-479d-a2b4-20ca254b5c2c.json new file mode 100644 index 00000000000..592bad648a0 --- /dev/null +++ b/objects/vulnerability/vulnerability--0e6a8879-cac8-479d-a2b4-20ca254b5c2c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9f36fc64-1e65-4a7c-99fa-06e6c3cc8bf5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0e6a8879-cac8-479d-a2b4-20ca254b5c2c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.642221Z", + "modified": "2025-02-20T00:37:41.642221Z", + "name": "CVE-2024-13679", + "description": "The Widget BUY.BOX plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'buybox-widget' shortcode in all versions up to, and including, 3.1.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13679" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--0f498444-c7c8-47d9-806e-be4bdd4b756a.json b/objects/vulnerability/vulnerability--0f498444-c7c8-47d9-806e-be4bdd4b756a.json new file mode 100644 index 00000000000..a082ed56a22 --- /dev/null +++ b/objects/vulnerability/vulnerability--0f498444-c7c8-47d9-806e-be4bdd4b756a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2bf933db-3425-49ab-9a16-5e37f97fe443", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--0f498444-c7c8-47d9-806e-be4bdd4b756a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.648782Z", + "modified": "2025-02-20T00:37:41.648782Z", + "name": "CVE-2024-13491", + "description": "The Small Package Quotes – For Customers of FedEx plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 4.3.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13491" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--10088c1a-31da-4e56-a088-be100581a77f.json b/objects/vulnerability/vulnerability--10088c1a-31da-4e56-a088-be100581a77f.json new file mode 100644 index 00000000000..9b34ea2be76 --- /dev/null +++ b/objects/vulnerability/vulnerability--10088c1a-31da-4e56-a088-be100581a77f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bff9f727-9263-4a44-93da-13b03e35c2f3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--10088c1a-31da-4e56-a088-be100581a77f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.669666Z", + "modified": "2025-02-20T00:37:41.669666Z", + "name": "CVE-2024-13478", + "description": "The LTL Freight Quotes – TForce Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameters in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13478" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--10601afd-f050-4db6-8d0c-7b8cb5c50a3e.json b/objects/vulnerability/vulnerability--10601afd-f050-4db6-8d0c-7b8cb5c50a3e.json new file mode 100644 index 00000000000..2e406ff7c2b --- /dev/null +++ b/objects/vulnerability/vulnerability--10601afd-f050-4db6-8d0c-7b8cb5c50a3e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1475f31a-cd6b-42b6-a46c-54811fa9dfa2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--10601afd-f050-4db6-8d0c-7b8cb5c50a3e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.687257Z", + "modified": "2025-02-20T00:37:41.687257Z", + "name": "CVE-2024-13339", + "description": "The DeBounce Email Validator plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.6.6. This is due to missing or incorrect nonce validation on the 'debounce_email_validator' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13339" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--14b2ed93-7584-42e7-9273-61837ba34d46.json b/objects/vulnerability/vulnerability--14b2ed93-7584-42e7-9273-61837ba34d46.json new file mode 100644 index 00000000000..62a52ecd3b3 --- /dev/null +++ b/objects/vulnerability/vulnerability--14b2ed93-7584-42e7-9273-61837ba34d46.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d10f1ca7-0d15-4a17-871b-7e08ba5d9e6e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--14b2ed93-7584-42e7-9273-61837ba34d46", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:39.478263Z", + "modified": "2025-02-20T00:37:39.478263Z", + "name": "CVE-2024-5706", + "description": "The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. (CWE-99) \n\n\n\n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, do not restrict JNDI identifiers during the creation of Community Dashboards, allowing control of system-level data sources. \n\n\n\n\n\n\n\nAn attacker could gain access to or modify sensitive data or system resources. This could allow access to protected files or directories including configuration files and files containing sensitive information, which can lead to remote code execution by unauthorized users.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-5706" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--15897bd1-a64a-4fa8-ab93-44f86821e976.json b/objects/vulnerability/vulnerability--15897bd1-a64a-4fa8-ab93-44f86821e976.json new file mode 100644 index 00000000000..284a818c689 --- /dev/null +++ b/objects/vulnerability/vulnerability--15897bd1-a64a-4fa8-ab93-44f86821e976.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--1db64e92-fce0-4dbc-adf7-5707a157df1d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--15897bd1-a64a-4fa8-ab93-44f86821e976", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.663178Z", + "modified": "2025-02-20T00:37:41.663178Z", + "name": "CVE-2024-13676", + "description": "The Categorized Gallery Plugin plugin for WordPress is vulnerable to SQL Injection via the 'field' attribute of the 'image_gallery' shortcode in all versions up to, and including, 2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13676" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1b4fe9bf-bc82-45fb-ac6f-82d8aa25021b.json b/objects/vulnerability/vulnerability--1b4fe9bf-bc82-45fb-ac6f-82d8aa25021b.json new file mode 100644 index 00000000000..a3c5a8abd7e --- /dev/null +++ b/objects/vulnerability/vulnerability--1b4fe9bf-bc82-45fb-ac6f-82d8aa25021b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f4a04bd5-91d1-4672-807b-f972bf955962", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1b4fe9bf-bc82-45fb-ac6f-82d8aa25021b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:46.044052Z", + "modified": "2025-02-20T00:37:46.044052Z", + "name": "CVE-2023-51301", + "description": "A lack of rate limiting in the \"Login Section, Forgot Email\" feature of PHPJabbers Hotel Booking System v4.0 allows attackers to send an excessive amount of reset requests for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-51301" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1b8e10f0-b73c-4929-a2c1-911c3652e6a9.json b/objects/vulnerability/vulnerability--1b8e10f0-b73c-4929-a2c1-911c3652e6a9.json new file mode 100644 index 00000000000..00c29423959 --- /dev/null +++ b/objects/vulnerability/vulnerability--1b8e10f0-b73c-4929-a2c1-911c3652e6a9.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5837dcce-66af-495a-bbe3-1dc17daef7ca", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1b8e10f0-b73c-4929-a2c1-911c3652e6a9", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:48.742769Z", + "modified": "2025-02-20T00:37:48.742769Z", + "name": "CVE-2020-10095", + "description": "Various Lexmark devices have CSRF that allows an attacker to modify the configuration of the device.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2020-10095" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--1e153386-3647-4332-8162-935b4fe423b1.json b/objects/vulnerability/vulnerability--1e153386-3647-4332-8162-935b4fe423b1.json new file mode 100644 index 00000000000..acc6d07fbce --- /dev/null +++ b/objects/vulnerability/vulnerability--1e153386-3647-4332-8162-935b4fe423b1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--fa359546-6734-45f4-93a5-aa4b6817bff5", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--1e153386-3647-4332-8162-935b4fe423b1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.698815Z", + "modified": "2025-02-20T00:37:41.698815Z", + "name": "CVE-2024-13405", + "description": "The Apptivo Business Site CRM plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.3. This is due to missing or incorrect nonce validation on the 'awp_ip_deny' page. This makes it possible for unauthenticated attackers to block IP addresses via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13405" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2029fff2-b84e-4338-9044-461f461e1b14.json b/objects/vulnerability/vulnerability--2029fff2-b84e-4338-9044-461f461e1b14.json new file mode 100644 index 00000000000..841067113a1 --- /dev/null +++ b/objects/vulnerability/vulnerability--2029fff2-b84e-4338-9044-461f461e1b14.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--149b9658-c2db-449e-8771-a828829007a2", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2029fff2-b84e-4338-9044-461f461e1b14", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:46.04917Z", + "modified": "2025-02-20T00:37:46.04917Z", + "name": "CVE-2023-51303", + "description": "PHPJabbers Event Ticketing System v1.0 is vulnerable to Multiple HTML Injection in the \"lid, name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title\" parameters.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-51303" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--20b855e3-4354-43df-9579-167c42d46872.json b/objects/vulnerability/vulnerability--20b855e3-4354-43df-9579-167c42d46872.json new file mode 100644 index 00000000000..2157bfc35eb --- /dev/null +++ b/objects/vulnerability/vulnerability--20b855e3-4354-43df-9579-167c42d46872.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--454e4399-d193-4430-8ba7-2060624e7f0a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--20b855e3-4354-43df-9579-167c42d46872", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.469378Z", + "modified": "2025-02-20T00:37:45.469378Z", + "name": "CVE-2025-27089", + "description": "Directus is a real-time API and App dashboard for managing SQL database content. In affected versions if there are two overlapping policies for the `update` action that allow access to different fields, instead of correctly checking access permissions against the item they apply for the user is allowed to update the superset of fields allowed by any of the policies. E.g. have one policy allowing update access to `field_a` if the `id == 1` and one policy allowing update access to `field_b` if the `id == 2`. The user with both these policies is allowed to update both `field_a` and `field_b` for the items with ids `1` and `2`. Before v11, if a user was allowed to update an item they were allowed to update the fields that the single permission, that applied to that item, listed. With overlapping permissions this isn't as clear cut anymore and the union of fields might not be the fields the user is allowed to update for that specific item. The solution that this PR introduces is to evaluate the permissions for each field that the user tries to update in the validateItemAccess DB query, instead of only verifying access to the item as a whole. This is done by, instead of returning the actual field value, returning a flag that indicates if the user has access to that field. This uses the same case/when mechanism that is used for stripping out non permitted field that is at the core of the permissions engine. As a result, for every item that the access is validated for, the expected result is an item that has either 1 or null for all the \"requested\" fields instead of any of the actual field values. These results are not useful for anything other than verifying the field level access permissions. The final check in validateItemAccess can either fail if the number of items does not match the number of items the access is checked for (ie. the user does not have access to the item at all) or if not all of the passed in fields have access permissions for any of the returned items. This is a vulnerability that allows update access to unintended fields, potentially impacting the password field for user accounts. This has been addressed in version 11.1.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-27089" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--229872d6-641f-4d9c-a845-8c9b9c86050a.json b/objects/vulnerability/vulnerability--229872d6-641f-4d9c-a845-8c9b9c86050a.json new file mode 100644 index 00000000000..73a3ea86041 --- /dev/null +++ b/objects/vulnerability/vulnerability--229872d6-641f-4d9c-a845-8c9b9c86050a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3e72e165-5079-4452-9017-e5f938bb1f7d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--229872d6-641f-4d9c-a845-8c9b9c86050a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.25106Z", + "modified": "2025-02-20T00:37:45.25106Z", + "name": "CVE-2025-1134", + "description": "A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection vulnerability in the DonatedItemEditor functionality. The CurrentFundraiser parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion. Please note that this vulnerability requires Administrator privileges.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-1134" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--23ad66aa-be2c-4acd-9bd2-b55e87c1837d.json b/objects/vulnerability/vulnerability--23ad66aa-be2c-4acd-9bd2-b55e87c1837d.json new file mode 100644 index 00000000000..261c1b799a0 --- /dev/null +++ b/objects/vulnerability/vulnerability--23ad66aa-be2c-4acd-9bd2-b55e87c1837d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--49081820-6e9a-47ef-8fb9-89b5fc781d75", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--23ad66aa-be2c-4acd-9bd2-b55e87c1837d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.561202Z", + "modified": "2025-02-20T00:37:45.561202Z", + "name": "CVE-2025-25946", + "description": "An issue in Bento4 v1.6.0-641 allows an attacker to cause a memory leak via Ap4Marlin.cpp and Ap4Processor.cpp, specifically in AP4_MarlinIpmpEncryptingProcessor::Initialize and AP4_Processor::Process, during the execution of mp4encrypt with a specially crafted MP4 input file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-25946" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2590fcb4-4406-424c-89d5-049b2130b7c1.json b/objects/vulnerability/vulnerability--2590fcb4-4406-424c-89d5-049b2130b7c1.json new file mode 100644 index 00000000000..b6bd4dc7e16 --- /dev/null +++ b/objects/vulnerability/vulnerability--2590fcb4-4406-424c-89d5-049b2130b7c1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--62b629a5-4f38-4180-a430-285a0a28302f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2590fcb4-4406-424c-89d5-049b2130b7c1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.482366Z", + "modified": "2025-02-20T00:37:45.482366Z", + "name": "CVE-2025-24989", + "description": "An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control.\nThis vulnerability has already been mitigated in the service and all affected cusomters have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you've not been notified this vulnerability does not affect you.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-24989" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--26040cbb-2038-45a7-b7a6-ed5ab0244c2a.json b/objects/vulnerability/vulnerability--26040cbb-2038-45a7-b7a6-ed5ab0244c2a.json new file mode 100644 index 00000000000..0be96ce03cc --- /dev/null +++ b/objects/vulnerability/vulnerability--26040cbb-2038-45a7-b7a6-ed5ab0244c2a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2da56d60-eb69-4083-aec4-09f7cd7a5928", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--26040cbb-2038-45a7-b7a6-ed5ab0244c2a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:40.31913Z", + "modified": "2025-02-20T00:37:40.31913Z", + "name": "CVE-2024-53974", + "description": "Adobe Experience Manager versions 6.5.21 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-53974" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--264b370c-94ef-45be-8db2-1ec079cca2e7.json b/objects/vulnerability/vulnerability--264b370c-94ef-45be-8db2-1ec079cca2e7.json new file mode 100644 index 00000000000..8b609c57468 --- /dev/null +++ b/objects/vulnerability/vulnerability--264b370c-94ef-45be-8db2-1ec079cca2e7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b2027e9f-e4f2-416b-b6c6-cc77ad4a9c5c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--264b370c-94ef-45be-8db2-1ec079cca2e7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.64619Z", + "modified": "2025-02-20T00:37:41.64619Z", + "name": "CVE-2024-13712", + "description": "The Pollin plugin for WordPress is vulnerable to SQL Injection via the 'question' parameter in all versions up to, and including, 1.01.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13712" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--291c2f5b-4e1f-45dd-ba54-5b1a25f8d755.json b/objects/vulnerability/vulnerability--291c2f5b-4e1f-45dd-ba54-5b1a25f8d755.json new file mode 100644 index 00000000000..a193c1ddf8e --- /dev/null +++ b/objects/vulnerability/vulnerability--291c2f5b-4e1f-45dd-ba54-5b1a25f8d755.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--341471ba-3258-4f1c-8b19-b0da90dfe8ac", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--291c2f5b-4e1f-45dd-ba54-5b1a25f8d755", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.537167Z", + "modified": "2025-02-20T00:37:45.537167Z", + "name": "CVE-2025-25054", + "description": "Movable Type contains a reflected cross-site scripting vulnerability in the user information edit page. When Multi-Factor authentication plugin is enabled and a user accesses a crafted page while logged in to the affected product, an arbitrary script may be executed on the web browser of the user.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-25054" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--2c7b964c-d5ce-468a-900b-750051253bfc.json b/objects/vulnerability/vulnerability--2c7b964c-d5ce-468a-900b-750051253bfc.json new file mode 100644 index 00000000000..fc9a5b9ab43 --- /dev/null +++ b/objects/vulnerability/vulnerability--2c7b964c-d5ce-468a-900b-750051253bfc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--68110bf1-0927-4cb4-97a5-f0c9ccc1d09c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--2c7b964c-d5ce-468a-900b-750051253bfc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.683384Z", + "modified": "2025-02-20T00:37:41.683384Z", + "name": "CVE-2024-13443", + "description": "The Easypromos Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Easypromos shortcode in all versions up to, and including, 1.3.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13443" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--31a9e648-f08a-455a-9786-ff5ce86b8d81.json b/objects/vulnerability/vulnerability--31a9e648-f08a-455a-9786-ff5ce86b8d81.json new file mode 100644 index 00000000000..c9aebd926ef --- /dev/null +++ b/objects/vulnerability/vulnerability--31a9e648-f08a-455a-9786-ff5ce86b8d81.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--41d0ca18-850d-44f9-9a4d-ff936cb73192", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--31a9e648-f08a-455a-9786-ff5ce86b8d81", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.89322Z", + "modified": "2025-02-20T00:37:41.89322Z", + "name": "CVE-2024-11582", + "description": "The Subscribe2 – Form, Email Subscribers & Newsletters plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ip parameter in all versions up to, and including, 10.43 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11582" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3540893c-5af1-414e-9009-4f09acb916ed.json b/objects/vulnerability/vulnerability--3540893c-5af1-414e-9009-4f09acb916ed.json new file mode 100644 index 00000000000..c97c772efb2 --- /dev/null +++ b/objects/vulnerability/vulnerability--3540893c-5af1-414e-9009-4f09acb916ed.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a0cab352-fddb-493f-9363-d40136318273", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3540893c-5af1-414e-9009-4f09acb916ed", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:40.175445Z", + "modified": "2025-02-20T00:37:40.175445Z", + "name": "CVE-2024-12284", + "description": "Authenticated privilege escalation in NetScaler Console and NetScaler Agent allows.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-12284" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3904c458-a0d5-4a41-8f90-8a6ef70db2f6.json b/objects/vulnerability/vulnerability--3904c458-a0d5-4a41-8f90-8a6ef70db2f6.json new file mode 100644 index 00000000000..f1667351e35 --- /dev/null +++ b/objects/vulnerability/vulnerability--3904c458-a0d5-4a41-8f90-8a6ef70db2f6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--91bbd46b-d9bb-47b8-a437-f8b6f4ebdb39", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3904c458-a0d5-4a41-8f90-8a6ef70db2f6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.671946Z", + "modified": "2025-02-20T00:37:41.671946Z", + "name": "CVE-2024-13799", + "description": "The User Private Files – File Upload & Download Manager with Secure File Sharing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘new-fldr-name’ parameter in all versions up to, and including, 2.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13799" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3927fc98-a2f1-4322-b012-d7fcf702397c.json b/objects/vulnerability/vulnerability--3927fc98-a2f1-4322-b012-d7fcf702397c.json new file mode 100644 index 00000000000..610941b16e5 --- /dev/null +++ b/objects/vulnerability/vulnerability--3927fc98-a2f1-4322-b012-d7fcf702397c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ddba8f69-4278-4294-8af5-a6ce37d904f1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3927fc98-a2f1-4322-b012-d7fcf702397c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.956582Z", + "modified": "2025-02-20T00:37:45.956582Z", + "name": "CVE-2023-46272", + "description": "Buffer Overflow vulnerability in Extreme Networks IQ Engine before 10.6r1a, and through 10.6r4 before 10.6r5, allows an attacker to execute arbitrary code via the implementation of the ah_auth service", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-46272" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3c51cdbe-8468-4f98-ba02-687d84e18559.json b/objects/vulnerability/vulnerability--3c51cdbe-8468-4f98-ba02-687d84e18559.json new file mode 100644 index 00000000000..097088e0513 --- /dev/null +++ b/objects/vulnerability/vulnerability--3c51cdbe-8468-4f98-ba02-687d84e18559.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--65d79f59-3762-4dba-b5a7-e9b754a3b29c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3c51cdbe-8468-4f98-ba02-687d84e18559", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:40.335744Z", + "modified": "2025-02-20T00:37:40.335744Z", + "name": "CVE-2024-45081", + "description": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\n\n\ncould allow an authenticated user to modify restricted content due to incorrect authorization checks.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45081" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--3d508ce2-de1b-42c4-b984-5aaaa4c56132.json b/objects/vulnerability/vulnerability--3d508ce2-de1b-42c4-b984-5aaaa4c56132.json new file mode 100644 index 00000000000..22c6216e9f9 --- /dev/null +++ b/objects/vulnerability/vulnerability--3d508ce2-de1b-42c4-b984-5aaaa4c56132.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--77d71aef-6f4b-46e2-8846-7db1a4133b5b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--3d508ce2-de1b-42c4-b984-5aaaa4c56132", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.908952Z", + "modified": "2025-02-20T00:37:41.908952Z", + "name": "CVE-2024-11753", + "description": "The UMich OIDC Login plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'umich_oidc_button' shortcode in all versions up to, and including, 1.2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11753" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4373597c-0841-4165-9b44-173991430e52.json b/objects/vulnerability/vulnerability--4373597c-0841-4165-9b44-173991430e52.json new file mode 100644 index 00000000000..786d7217695 --- /dev/null +++ b/objects/vulnerability/vulnerability--4373597c-0841-4165-9b44-173991430e52.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--aaae99ad-db6c-4458-bd37-cadd8cfcad5b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4373597c-0841-4165-9b44-173991430e52", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.246084Z", + "modified": "2025-02-20T00:37:45.246084Z", + "name": "CVE-2025-1007", + "description": "In OpenVSX version v0.9.0 to v0.20.0, the \n/user/namespace/{namespace}/details API allows a user to edit all \nnamespace details, even if the user is not a namespace Owner or \nContributor. The details include: name, description, website, support \nlink and social media links. The same issues existed in \n/user/namespace/{namespace}/details/logo and allowed a user to change \nthe logo.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-1007" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--45ab0e31-7180-4289-b87d-967d79742f8d.json b/objects/vulnerability/vulnerability--45ab0e31-7180-4289-b87d-967d79742f8d.json new file mode 100644 index 00000000000..4ad22f7fff4 --- /dev/null +++ b/objects/vulnerability/vulnerability--45ab0e31-7180-4289-b87d-967d79742f8d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--83da6e5a-5064-4c6f-a5d8-f349071e1e45", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--45ab0e31-7180-4289-b87d-967d79742f8d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:40.171599Z", + "modified": "2025-02-20T00:37:40.171599Z", + "name": "CVE-2024-12339", + "description": "The Digihood HTML Sitemap plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘channel' parameter in all versions up to, and including, 3.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-12339" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4a496bcb-2749-4e85-aac0-4a4b26cce5dd.json b/objects/vulnerability/vulnerability--4a496bcb-2749-4e85-aac0-4a4b26cce5dd.json new file mode 100644 index 00000000000..4d8a617dbcc --- /dev/null +++ b/objects/vulnerability/vulnerability--4a496bcb-2749-4e85-aac0-4a4b26cce5dd.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--db430286-0bf8-4fdb-972c-f744cb40ca57", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4a496bcb-2749-4e85-aac0-4a4b26cce5dd", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.637029Z", + "modified": "2025-02-20T00:37:41.637029Z", + "name": "CVE-2024-13711", + "description": "The Pollin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'question' parameter in all versions up to, and including, 1.01.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13711" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--4a60fd98-0da2-4273-acdc-7fbcee1ce370.json b/objects/vulnerability/vulnerability--4a60fd98-0da2-4273-acdc-7fbcee1ce370.json new file mode 100644 index 00000000000..943efd210c8 --- /dev/null +++ b/objects/vulnerability/vulnerability--4a60fd98-0da2-4273-acdc-7fbcee1ce370.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3a159078-134d-45d4-9daa-7fb25e50bb95", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--4a60fd98-0da2-4273-acdc-7fbcee1ce370", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.224303Z", + "modified": "2025-02-20T00:37:45.224303Z", + "name": "CVE-2025-1426", + "description": "Heap buffer overflow in GPU in Google Chrome on Android prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-1426" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--503c83af-4d24-4ac4-bf37-6b3dacbbb2f4.json b/objects/vulnerability/vulnerability--503c83af-4d24-4ac4-bf37-6b3dacbbb2f4.json new file mode 100644 index 00000000000..bb679e5caeb --- /dev/null +++ b/objects/vulnerability/vulnerability--503c83af-4d24-4ac4-bf37-6b3dacbbb2f4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b068ac57-e1e0-466b-b760-0144119c9f93", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--503c83af-4d24-4ac4-bf37-6b3dacbbb2f4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.631241Z", + "modified": "2025-02-20T00:37:45.631241Z", + "name": "CVE-2025-0865", + "description": "The WP Media Category Management plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions 2.0 to 2.3.3. This is due to missing or incorrect nonce validation on the wp_mcm_handle_action_settings() function. This makes it possible for unauthenticated attackers to alter plugin settings, such as the taxonomy used for media, the base slug for media categories, and the default media category via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0865" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--526c8939-6787-4780-9ccc-db2d26d0f452.json b/objects/vulnerability/vulnerability--526c8939-6787-4780-9ccc-db2d26d0f452.json new file mode 100644 index 00000000000..eddcf654430 --- /dev/null +++ b/objects/vulnerability/vulnerability--526c8939-6787-4780-9ccc-db2d26d0f452.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--68710282-412c-4fe6-8a8e-33ed06eec995", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--526c8939-6787-4780-9ccc-db2d26d0f452", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.449649Z", + "modified": "2025-02-20T00:37:45.449649Z", + "name": "CVE-2025-20158", + "description": "A vulnerability in the debug shell of Cisco Video Phone 8875 and Cisco Desk Phone 9800 Series could allow an authenticated, local attacker to access sensitive information on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials with SSH access on the affected device. SSH access is disabled by default.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the debug shell of an affected device. An attacker could exploit this vulnerability by sending a crafted SSH client command to the CLI. A successful exploit could allow the attacker to access sensitive information on the underlying operating system.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-20158" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--57285280-0948-4625-bc03-f720af2672c4.json b/objects/vulnerability/vulnerability--57285280-0948-4625-bc03-f720af2672c4.json new file mode 100644 index 00000000000..31bd09c4a4c --- /dev/null +++ b/objects/vulnerability/vulnerability--57285280-0948-4625-bc03-f720af2672c4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--80f8e644-9630-4f7d-86c7-c241955877dc", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--57285280-0948-4625-bc03-f720af2672c4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:40.190953Z", + "modified": "2025-02-20T00:37:40.190953Z", + "name": "CVE-2024-12173", + "description": "The Master Slider WordPress plugin before 3.10.5 does not sanitise and escape some of its settings, which could allow high privilege users such as Editor and above to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-12173" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--58449b87-35af-4bda-8047-7c33f90db94d.json b/objects/vulnerability/vulnerability--58449b87-35af-4bda-8047-7c33f90db94d.json new file mode 100644 index 00000000000..62d44f4af3e --- /dev/null +++ b/objects/vulnerability/vulnerability--58449b87-35af-4bda-8047-7c33f90db94d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3c828400-b5c3-4a9b-9950-14b93b52b598", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--58449b87-35af-4bda-8047-7c33f90db94d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.638551Z", + "modified": "2025-02-20T00:37:41.638551Z", + "name": "CVE-2024-13719", + "description": "The PeproDev Ultimate Invoice plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.0.8 via the invoicing viewer due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view invoices for completed orders which can contain PII of users.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13719" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5a2750d9-1be8-478a-9d73-d8de801e0812.json b/objects/vulnerability/vulnerability--5a2750d9-1be8-478a-9d73-d8de801e0812.json new file mode 100644 index 00000000000..d7242ef4ac9 --- /dev/null +++ b/objects/vulnerability/vulnerability--5a2750d9-1be8-478a-9d73-d8de801e0812.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--071301f6-e5fd-4e91-a0c0-25b9273bf504", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5a2750d9-1be8-478a-9d73-d8de801e0812", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.910727Z", + "modified": "2025-02-20T00:37:41.910727Z", + "name": "CVE-2024-11335", + "description": "The UltraEmbed – Advanced Iframe Plugin For WordPress with Gutenberg Block Included plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'iframe' shortcode in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11335" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5a45c1f1-58d9-42a3-ac25-2bc9c8c7f480.json b/objects/vulnerability/vulnerability--5a45c1f1-58d9-42a3-ac25-2bc9c8c7f480.json new file mode 100644 index 00000000000..71c17be3aec --- /dev/null +++ b/objects/vulnerability/vulnerability--5a45c1f1-58d9-42a3-ac25-2bc9c8c7f480.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--dbea6e7b-f764-415c-850b-a7e06e43df8e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5a45c1f1-58d9-42a3-ac25-2bc9c8c7f480", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.263668Z", + "modified": "2025-02-20T00:37:41.263668Z", + "name": "CVE-2024-52902", + "description": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 client application contains hard coded database passwords in source code which could be used for unauthorized access to the system.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-52902" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5acb0eb0-8758-477b-9a54-53bca20032d0.json b/objects/vulnerability/vulnerability--5acb0eb0-8758-477b-9a54-53bca20032d0.json new file mode 100644 index 00000000000..d0f2ac5570a --- /dev/null +++ b/objects/vulnerability/vulnerability--5acb0eb0-8758-477b-9a54-53bca20032d0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6a7b47a0-6881-469c-801e-4d573c7f2ac9", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5acb0eb0-8758-477b-9a54-53bca20032d0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.628797Z", + "modified": "2025-02-20T00:37:45.628797Z", + "name": "CVE-2025-0893", + "description": "Symantec Diagnostic Tool (SymDiag), prior to 3.0.79, may be susceptible to a Privilege Escalation vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0893" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5b9ac498-4e40-4276-9925-fe3f77672fad.json b/objects/vulnerability/vulnerability--5b9ac498-4e40-4276-9925-fe3f77672fad.json new file mode 100644 index 00000000000..2745bab6c01 --- /dev/null +++ b/objects/vulnerability/vulnerability--5b9ac498-4e40-4276-9925-fe3f77672fad.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b84664a8-fca9-4f86-ab02-ef2429679d6e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5b9ac498-4e40-4276-9925-fe3f77672fad", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.286555Z", + "modified": "2025-02-20T00:37:45.286555Z", + "name": "CVE-2025-21355", + "description": "Missing Authentication for Critical Function in Microsoft Bing allows an unauthorized attacker to execute code over a network", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-21355" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5c46a36f-5145-4c3f-845e-3550ddeee2a8.json b/objects/vulnerability/vulnerability--5c46a36f-5145-4c3f-845e-3550ddeee2a8.json new file mode 100644 index 00000000000..ddba9adf57a --- /dev/null +++ b/objects/vulnerability/vulnerability--5c46a36f-5145-4c3f-845e-3550ddeee2a8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--48f431d4-3a0b-4782-9d40-5f9fed3dc0ca", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5c46a36f-5145-4c3f-845e-3550ddeee2a8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.376121Z", + "modified": "2025-02-20T00:37:45.376121Z", + "name": "CVE-2025-22622", + "description": "Age Verification for your checkout page. Verify your customer's identity 1.20.0 was found to be vulnerable. The web application dynamically generates web content without validating the source of the potentially untrusted data in myapp/class-wc-integration-agechecker-integration.php.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22622" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5d2619a5-074f-4ad0-a243-e8e288c32460.json b/objects/vulnerability/vulnerability--5d2619a5-074f-4ad0-a243-e8e288c32460.json new file mode 100644 index 00000000000..01a4b4283b4 --- /dev/null +++ b/objects/vulnerability/vulnerability--5d2619a5-074f-4ad0-a243-e8e288c32460.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9c6d014f-3e6b-4ee0-8525-c2589e5b7ca8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5d2619a5-074f-4ad0-a243-e8e288c32460", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:40.349622Z", + "modified": "2025-02-20T00:37:40.349622Z", + "name": "CVE-2024-45777", + "description": "A flaw was found in grub2. The calculation of the translation buffer when reading a language .mo file in grub_gettext_getstr_from_position() may overflow, leading to a Out-of-bound write. This issue can be leveraged by an attacker to overwrite grub2's sensitive heap data, eventually leading to the circumvention of secure boot protections.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45777" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5e838a89-9e84-487b-9565-cdf615cfc028.json b/objects/vulnerability/vulnerability--5e838a89-9e84-487b-9565-cdf615cfc028.json new file mode 100644 index 00000000000..ed3e4cf435c --- /dev/null +++ b/objects/vulnerability/vulnerability--5e838a89-9e84-487b-9565-cdf615cfc028.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--be85b2d0-c6e9-40f2-8912-88cc65030c9a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5e838a89-9e84-487b-9565-cdf615cfc028", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.664744Z", + "modified": "2025-02-20T00:37:41.664744Z", + "name": "CVE-2024-13462", + "description": "The WP Wiki Tooltip plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wiki' shortcode in all versions up to, and including, 2.0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13462" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--5f40614a-2f1a-425f-8b00-febc72943d4d.json b/objects/vulnerability/vulnerability--5f40614a-2f1a-425f-8b00-febc72943d4d.json new file mode 100644 index 00000000000..04f7c31328e --- /dev/null +++ b/objects/vulnerability/vulnerability--5f40614a-2f1a-425f-8b00-febc72943d4d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--dac5b148-dda2-45a6-9443-1dc60f974cdd", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--5f40614a-2f1a-425f-8b00-febc72943d4d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:46.0344Z", + "modified": "2025-02-20T00:37:46.0344Z", + "name": "CVE-2023-51298", + "description": "PHPJabbers Event Booking Calendar v4.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-51298" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6264c5f3-b9fc-455c-90bd-f026fa6d1545.json b/objects/vulnerability/vulnerability--6264c5f3-b9fc-455c-90bd-f026fa6d1545.json new file mode 100644 index 00000000000..f0566ffd1ec --- /dev/null +++ b/objects/vulnerability/vulnerability--6264c5f3-b9fc-455c-90bd-f026fa6d1545.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c608256e-7c3f-42b4-b7a6-b3b7dc4ef333", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6264c5f3-b9fc-455c-90bd-f026fa6d1545", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.650317Z", + "modified": "2025-02-20T00:37:41.650317Z", + "name": "CVE-2024-13481", + "description": "The LTL Freight Quotes – R+L Carriers Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 3.3.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13481" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6353184c-5a4d-4b6d-a2ef-3c281e761b41.json b/objects/vulnerability/vulnerability--6353184c-5a4d-4b6d-a2ef-3c281e761b41.json new file mode 100644 index 00000000000..04ddca89dc4 --- /dev/null +++ b/objects/vulnerability/vulnerability--6353184c-5a4d-4b6d-a2ef-3c281e761b41.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7556e639-d0cb-455c-a3df-d00dbf9fe4af", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6353184c-5a4d-4b6d-a2ef-3c281e761b41", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.526571Z", + "modified": "2025-02-20T00:37:45.526571Z", + "name": "CVE-2025-25942", + "description": "An issue in Bento4 v1.6.0-641 allows an attacker to obtain sensitive information via the the mp4fragment tool when processing invalid files. Specifically, memory allocated in SampleArray::SampleArray in Mp4Fragment.cpp is not properly released.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-25942" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--641f21a0-ca29-4b37-83c6-2ae80f24e6ae.json b/objects/vulnerability/vulnerability--641f21a0-ca29-4b37-83c6-2ae80f24e6ae.json new file mode 100644 index 00000000000..4aa58f34f5e --- /dev/null +++ b/objects/vulnerability/vulnerability--641f21a0-ca29-4b37-83c6-2ae80f24e6ae.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9f839b1b-457a-4540-a696-c86992507472", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--641f21a0-ca29-4b37-83c6-2ae80f24e6ae", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.24895Z", + "modified": "2025-02-20T00:37:45.24895Z", + "name": "CVE-2025-1024", + "description": "A vulnerability exists in ChurchCRM 5.13.0 that allows an attacker to execute arbitrary JavaScript in a victim's browser via Reflected Cross-Site Scripting (XSS) in the EditEventAttendees.php page. This requires Administration privileges and affects the EID parameter. The flaw allows an attacker to steal session cookies, perform actions on behalf of an authenticated user, and gain unauthorized access to the application.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-1024" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--66ae8e4a-00e8-453e-9728-b59906128ccd.json b/objects/vulnerability/vulnerability--66ae8e4a-00e8-453e-9728-b59906128ccd.json new file mode 100644 index 00000000000..4ec5dae7820 --- /dev/null +++ b/objects/vulnerability/vulnerability--66ae8e4a-00e8-453e-9728-b59906128ccd.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--f067bf8d-196b-48d2-81a9-36b2780dca61", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--66ae8e4a-00e8-453e-9728-b59906128ccd", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.535686Z", + "modified": "2025-02-20T00:37:45.535686Z", + "name": "CVE-2025-25947", + "description": "An issue in Bento4 v1.6.0-641 allows an attacker to trigger a segmentation fault via Ap4Atom.cpp, specifically in AP4_AtomParent::RemoveChild, during the execution of mp4encrypt with a specially crafted MP4 input file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-25947" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--66da5862-6a8a-4c05-9291-3eb4bdec3fc1.json b/objects/vulnerability/vulnerability--66da5862-6a8a-4c05-9291-3eb4bdec3fc1.json new file mode 100644 index 00000000000..768dbbb4ac1 --- /dev/null +++ b/objects/vulnerability/vulnerability--66da5862-6a8a-4c05-9291-3eb4bdec3fc1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a5f65276-799f-4573-b4d3-bc45413b9e8b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--66da5862-6a8a-4c05-9291-3eb4bdec3fc1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:49.579972Z", + "modified": "2025-02-20T00:37:49.579972Z", + "name": "CVE-2020-35546", + "description": "Lexmark MX6500 LW75.JD.P296 and previous devices have Incorrect Access Control via the access control settings.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2020-35546" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6b7b11c9-9f0b-471e-a35e-4ac947a81563.json b/objects/vulnerability/vulnerability--6b7b11c9-9f0b-471e-a35e-4ac947a81563.json new file mode 100644 index 00000000000..f6a8f81c213 --- /dev/null +++ b/objects/vulnerability/vulnerability--6b7b11c9-9f0b-471e-a35e-4ac947a81563.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e3ea2d7a-8b13-434d-87a9-3834e63e4d30", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6b7b11c9-9f0b-471e-a35e-4ac947a81563", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.667398Z", + "modified": "2025-02-20T00:37:45.667398Z", + "name": "CVE-2025-0112", + "description": "A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This vulnerability can also be leveraged by malware to disable the Cortex XDR agent and then perform malicious activity.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0112" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--6b9f1be6-3658-4a38-b808-1d45dc3115bb.json b/objects/vulnerability/vulnerability--6b9f1be6-3658-4a38-b808-1d45dc3115bb.json new file mode 100644 index 00000000000..ea5d6d8b415 --- /dev/null +++ b/objects/vulnerability/vulnerability--6b9f1be6-3658-4a38-b808-1d45dc3115bb.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e2fb21f4-4823-40eb-9f8d-65b589fef0f6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--6b9f1be6-3658-4a38-b808-1d45dc3115bb", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:39.763554Z", + "modified": "2025-02-20T00:37:39.763554Z", + "name": "CVE-2024-37362", + "description": "The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. (CWE-522) \n\n\n\n \n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.0 and 9.3.0.8, including 8.3.x, discloses database passwords when saving connections to RedShift.\n\n\n\n \n\n\n\nProducts must not disclose sensitive information without cause. Disclosure of sensitive information can lead to further exploitation.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-37362" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--76d72b79-81cd-4330-bb42-26589e7c5ce3.json b/objects/vulnerability/vulnerability--76d72b79-81cd-4330-bb42-26589e7c5ce3.json new file mode 100644 index 00000000000..811d77476de --- /dev/null +++ b/objects/vulnerability/vulnerability--76d72b79-81cd-4330-bb42-26589e7c5ce3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--68bb43da-77ed-45e0-9494-4b6e22965496", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--76d72b79-81cd-4330-bb42-26589e7c5ce3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:39.522924Z", + "modified": "2025-02-20T00:37:39.522924Z", + "name": "CVE-2024-5705", + "description": "The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. (CWE-863) \n\n\n\n \n\n\n\n \n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, have modules enabled by default that allow execution of system level processes. \n\n\n\n \n\n\n\n\n\n\n\n\nWhen access control checks are incorrectly applied, users can access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures and denial of service.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-5705" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--771a5fd7-8a06-4b51-b9fe-ca49df421b14.json b/objects/vulnerability/vulnerability--771a5fd7-8a06-4b51-b9fe-ca49df421b14.json new file mode 100644 index 00000000000..44b4763c58b --- /dev/null +++ b/objects/vulnerability/vulnerability--771a5fd7-8a06-4b51-b9fe-ca49df421b14.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5104185f-82d2-4d66-921c-351cdc4849b0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--771a5fd7-8a06-4b51-b9fe-ca49df421b14", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.214374Z", + "modified": "2025-02-20T00:37:45.214374Z", + "name": "CVE-2025-1075", + "description": "Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p27, <2.2.0p40, and 2.1.0p51 (EOL) causes LDAP credentials to be written to Apache error log file accessible to administrators.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-1075" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7dd36f5f-4882-4932-a267-edce6aed98f2.json b/objects/vulnerability/vulnerability--7dd36f5f-4882-4932-a267-edce6aed98f2.json new file mode 100644 index 00000000000..d9b729c96ba --- /dev/null +++ b/objects/vulnerability/vulnerability--7dd36f5f-4882-4932-a267-edce6aed98f2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--80a33963-2a11-4660-8d00-b77a10bc7f67", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7dd36f5f-4882-4932-a267-edce6aed98f2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.634261Z", + "modified": "2025-02-20T00:37:41.634261Z", + "name": "CVE-2024-13674", + "description": "The Cosmic Blocks (40+) Content Editor Blocks Collection plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'cwp_social_share' shortcode in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13674" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7e36f997-7c9e-4c5b-8f82-d99351f4d377.json b/objects/vulnerability/vulnerability--7e36f997-7c9e-4c5b-8f82-d99351f4d377.json new file mode 100644 index 00000000000..a0cf66bf87c --- /dev/null +++ b/objects/vulnerability/vulnerability--7e36f997-7c9e-4c5b-8f82-d99351f4d377.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c9415e8f-84fe-45c8-9253-ae81abc08bd8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7e36f997-7c9e-4c5b-8f82-d99351f4d377", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:49.504778Z", + "modified": "2025-02-20T00:37:49.504778Z", + "name": "CVE-2020-13481", + "description": "Certain Lexmark products through 2020-05-25 allow XSS which allows an attacker to obtain session credentials and other sensitive information.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2020-13481" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--7eb04ec5-b423-4192-a504-467e9c7049b4.json b/objects/vulnerability/vulnerability--7eb04ec5-b423-4192-a504-467e9c7049b4.json new file mode 100644 index 00000000000..d86d6d5a255 --- /dev/null +++ b/objects/vulnerability/vulnerability--7eb04ec5-b423-4192-a504-467e9c7049b4.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--338b46fe-adf6-463e-aa83-8b7811dbb034", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--7eb04ec5-b423-4192-a504-467e9c7049b4", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.667553Z", + "modified": "2025-02-20T00:37:41.667553Z", + "name": "CVE-2024-13589", + "description": "The YouTube Playlists with Schema plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'yt_grid' shortcode in all versions up to, and including, 2.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13589" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--80a10140-e848-46f8-b868-c0b0908f7eea.json b/objects/vulnerability/vulnerability--80a10140-e848-46f8-b868-c0b0908f7eea.json new file mode 100644 index 00000000000..bb09c06eeb1 --- /dev/null +++ b/objects/vulnerability/vulnerability--80a10140-e848-46f8-b868-c0b0908f7eea.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--73b47397-ed7a-4abd-a069-ed04947a8f4e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--80a10140-e848-46f8-b868-c0b0908f7eea", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.243556Z", + "modified": "2025-02-20T00:37:45.243556Z", + "name": "CVE-2025-1464", + "description": "A vulnerability, which was classified as critical, has been found in Baiyi Cloud Asset Management System up to 20250204. This issue affects some unknown processing of the file /wuser/admin.house.collect.php. The manipulation of the argument project_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-1464" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8523e6b2-db80-4d9c-95fc-3fc6c33cfb72.json b/objects/vulnerability/vulnerability--8523e6b2-db80-4d9c-95fc-3fc6c33cfb72.json new file mode 100644 index 00000000000..2b644c58507 --- /dev/null +++ b/objects/vulnerability/vulnerability--8523e6b2-db80-4d9c-95fc-3fc6c33cfb72.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--329be651-d09e-47fd-9bc2-cacf2d3c43ed", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8523e6b2-db80-4d9c-95fc-3fc6c33cfb72", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.231812Z", + "modified": "2025-02-20T00:37:45.231812Z", + "name": "CVE-2025-1447", + "description": "A vulnerability was found in kasuganosoras Pigeon 1.0.177. It has been declared as critical. This vulnerability affects unknown code of the file /pigeon/imgproxy/index.php. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. Upgrading to version 1.0.181 is able to address this issue. The patch is identified as 84cea5fe73141689da2e7ec8676d47435bd6423e. It is recommended to upgrade the affected component.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-1447" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--855d5735-43b1-4b65-9e14-3d043d0cee69.json b/objects/vulnerability/vulnerability--855d5735-43b1-4b65-9e14-3d043d0cee69.json new file mode 100644 index 00000000000..16a4ac4159e --- /dev/null +++ b/objects/vulnerability/vulnerability--855d5735-43b1-4b65-9e14-3d043d0cee69.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b4468ea2-6b54-4bfb-8afe-af365e6e40c0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--855d5735-43b1-4b65-9e14-3d043d0cee69", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.650033Z", + "modified": "2025-02-20T00:37:45.650033Z", + "name": "CVE-2025-0624", + "description": "A flaw was found in grub2. During the network boot process, when trying to search for the configuration file, grub copies data from a user controlled environment variable into an internal buffer using the grub_strcpy() function. During this step, it fails to consider the environment variable length when allocating the internal buffer, resulting in an out-of-bounds write. If correctly exploited, this issue may result in remote code execution through the same network segment grub is searching for the boot information, which can be used to by-pass secure boot protections.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0624" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--87bd9756-8729-4aa8-af26-ae9fe64b8a5e.json b/objects/vulnerability/vulnerability--87bd9756-8729-4aa8-af26-ae9fe64b8a5e.json new file mode 100644 index 00000000000..571a892dd15 --- /dev/null +++ b/objects/vulnerability/vulnerability--87bd9756-8729-4aa8-af26-ae9fe64b8a5e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--78dba173-c03f-43ec-91f4-baf8a5cf1f64", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--87bd9756-8729-4aa8-af26-ae9fe64b8a5e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.662583Z", + "modified": "2025-02-20T00:37:45.662583Z", + "name": "CVE-2025-0633", + "description": "Heap-based Buffer Overflow vulnerability in iniparser_dumpsection_ini() in iniparser allows attacker to read out of bound memory", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0633" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--87fc2115-656a-41de-8e29-da55205b860c.json b/objects/vulnerability/vulnerability--87fc2115-656a-41de-8e29-da55205b860c.json new file mode 100644 index 00000000000..65bd3465d04 --- /dev/null +++ b/objects/vulnerability/vulnerability--87fc2115-656a-41de-8e29-da55205b860c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--c6da446b-8493-405d-a221-2831107ecde0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--87fc2115-656a-41de-8e29-da55205b860c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.656056Z", + "modified": "2025-02-20T00:37:41.656056Z", + "name": "CVE-2024-13660", + "description": "The Responsive Flickr Slideshow plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'fshow' shortcode in all versions up to, and including, 2.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13660" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8a778e5a-662a-40f2-a7a4-17df87f912eb.json b/objects/vulnerability/vulnerability--8a778e5a-662a-40f2-a7a4-17df87f912eb.json new file mode 100644 index 00000000000..aba8ba62c88 --- /dev/null +++ b/objects/vulnerability/vulnerability--8a778e5a-662a-40f2-a7a4-17df87f912eb.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5213433b-77f0-42b6-afe1-cba4deb1aa60", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8a778e5a-662a-40f2-a7a4-17df87f912eb", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.239976Z", + "modified": "2025-02-20T00:37:45.239976Z", + "name": "CVE-2025-1441", + "description": "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.1007. This is due to missing or incorrect nonce validation on the 'wpr_filter_woo_products' function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-1441" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8b8dc3e4-dbfd-4284-be9a-06adb96b6589.json b/objects/vulnerability/vulnerability--8b8dc3e4-dbfd-4284-be9a-06adb96b6589.json new file mode 100644 index 00000000000..f40f7b7563f --- /dev/null +++ b/objects/vulnerability/vulnerability--8b8dc3e4-dbfd-4284-be9a-06adb96b6589.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bb90f3ed-2500-45d1-aa7c-5f5a6a3715c3", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8b8dc3e4-dbfd-4284-be9a-06adb96b6589", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:40.36814Z", + "modified": "2025-02-20T00:37:40.36814Z", + "name": "CVE-2024-45084", + "description": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\ncould allow an authenticated attacker to conduct formula injection. An attacker could execute arbitrary commands on the system, caused by improper validation of file contents.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-45084" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8bc3f43a-0eec-4932-b7a3-e04672fdf88a.json b/objects/vulnerability/vulnerability--8bc3f43a-0eec-4932-b7a3-e04672fdf88a.json new file mode 100644 index 00000000000..b6bd90f7abf --- /dev/null +++ b/objects/vulnerability/vulnerability--8bc3f43a-0eec-4932-b7a3-e04672fdf88a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d3854ef1-162c-4dc8-be26-1d275970aae1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8bc3f43a-0eec-4932-b7a3-e04672fdf88a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.626111Z", + "modified": "2025-02-20T00:37:41.626111Z", + "name": "CVE-2024-13483", + "description": "The LTL Freight Quotes – SAIA Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 2.2.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13483" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--8e59e19a-5316-40fd-9bbf-1424e7eef46e.json b/objects/vulnerability/vulnerability--8e59e19a-5316-40fd-9bbf-1424e7eef46e.json new file mode 100644 index 00000000000..86f11143d43 --- /dev/null +++ b/objects/vulnerability/vulnerability--8e59e19a-5316-40fd-9bbf-1424e7eef46e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ab7ead87-5897-4031-bcee-971bca21b65c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--8e59e19a-5316-40fd-9bbf-1424e7eef46e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.675636Z", + "modified": "2025-02-20T00:37:41.675636Z", + "name": "CVE-2024-13854", + "description": "The Education Addon for Elementor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.3.1 via the naedu_elementor_template shortcode due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract information from posts that are not public, including drafts, password protected, and restricted posts. This applies to posts created with Elementor only.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13854" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--90fa2549-5f43-424b-84d8-4b1953dcd737.json b/objects/vulnerability/vulnerability--90fa2549-5f43-424b-84d8-4b1953dcd737.json new file mode 100644 index 00000000000..38cd6348441 --- /dev/null +++ b/objects/vulnerability/vulnerability--90fa2549-5f43-424b-84d8-4b1953dcd737.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--a996609d-dbe9-4bee-ac67-781bc467bce6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--90fa2549-5f43-424b-84d8-4b1953dcd737", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:46.035496Z", + "modified": "2025-02-20T00:37:46.035496Z", + "name": "CVE-2023-51300", + "description": "PHPJabbers Hotel Booking System v4.0 is vulnerable to Cross-Site Scripting (XSS) vulnerabilities in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key\" parameters.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-51300" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--922d7fce-6242-4030-bc73-4294fb33fdcc.json b/objects/vulnerability/vulnerability--922d7fce-6242-4030-bc73-4294fb33fdcc.json new file mode 100644 index 00000000000..6c40cdd82fc --- /dev/null +++ b/objects/vulnerability/vulnerability--922d7fce-6242-4030-bc73-4294fb33fdcc.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b8aa7621-4d06-4fd3-8f89-d8a87bc212be", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--922d7fce-6242-4030-bc73-4294fb33fdcc", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.660464Z", + "modified": "2025-02-20T00:37:41.660464Z", + "name": "CVE-2024-13534", + "description": "The Small Package Quotes – Worldwide Express Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 5.2.18 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13534" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--922f7fb3-0c17-4a01-b468-3a604779bd44.json b/objects/vulnerability/vulnerability--922f7fb3-0c17-4a01-b468-3a604779bd44.json new file mode 100644 index 00000000000..29e4dbaf37d --- /dev/null +++ b/objects/vulnerability/vulnerability--922f7fb3-0c17-4a01-b468-3a604779bd44.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--77be09ca-6491-48ea-a7bb-dfbc21317011", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--922f7fb3-0c17-4a01-b468-3a604779bd44", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.859044Z", + "modified": "2025-02-20T00:37:41.859044Z", + "name": "CVE-2024-11778", + "description": "The CanadaHelps Embedded Donation Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'embedcdn' shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-11778" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--92cfda54-24be-4cb0-bec4-5adda96cea08.json b/objects/vulnerability/vulnerability--92cfda54-24be-4cb0-bec4-5adda96cea08.json new file mode 100644 index 00000000000..26f04a5f9c2 --- /dev/null +++ b/objects/vulnerability/vulnerability--92cfda54-24be-4cb0-bec4-5adda96cea08.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--07e667f9-f005-400f-813b-fb438eae79b8", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--92cfda54-24be-4cb0-bec4-5adda96cea08", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.244788Z", + "modified": "2025-02-20T00:37:45.244788Z", + "name": "CVE-2025-1135", + "description": "A vulnerability exists in ChurchCRM 5.13.0. and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection vulnerability in the BatchWinnerEntry functionality. The CurrentFundraiser parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion. Please note the vulnerability requires Administrator privileges.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-1135" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9325e2e8-0543-4651-a4b2-ccb347b59f43.json b/objects/vulnerability/vulnerability--9325e2e8-0543-4651-a4b2-ccb347b59f43.json new file mode 100644 index 00000000000..08ace665717 --- /dev/null +++ b/objects/vulnerability/vulnerability--9325e2e8-0543-4651-a4b2-ccb347b59f43.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--87a48ab9-236e-432b-b3f6-c359ff64e793", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9325e2e8-0543-4651-a4b2-ccb347b59f43", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.48829Z", + "modified": "2025-02-20T00:37:45.48829Z", + "name": "CVE-2025-24841", + "description": "Movable Type contains a stored cross-site scripting vulnerability in the HTML edit mode of MT Block Editor. It is exploitable when TinyMCE6 is used as a rich text editor and an arbitrary script may be executed on a logged-in user's web browser.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-24841" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--935461fb-9fec-4482-8384-d25bc3156d99.json b/objects/vulnerability/vulnerability--935461fb-9fec-4482-8384-d25bc3156d99.json new file mode 100644 index 00000000000..c2143c88be4 --- /dev/null +++ b/objects/vulnerability/vulnerability--935461fb-9fec-4482-8384-d25bc3156d99.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5624c993-2ab8-4905-a307-73f5fc5a74a6", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--935461fb-9fec-4482-8384-d25bc3156d99", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:47.40255Z", + "modified": "2025-02-20T00:37:47.40255Z", + "name": "CVE-2023-47160", + "description": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\n\n\n\n\nis vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-47160" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--989a56b1-cd65-4efe-a5a5-3795c6b0a25e.json b/objects/vulnerability/vulnerability--989a56b1-cd65-4efe-a5a5-3795c6b0a25e.json new file mode 100644 index 00000000000..254ade8e874 --- /dev/null +++ b/objects/vulnerability/vulnerability--989a56b1-cd65-4efe-a5a5-3795c6b0a25e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2e8e88ba-fa21-4c2f-9aed-9846b9e2e70c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--989a56b1-cd65-4efe-a5a5-3795c6b0a25e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.395931Z", + "modified": "2025-02-20T00:37:45.395931Z", + "name": "CVE-2025-22888", + "description": "Movable Type contains a stored cross-site scripting vulnerability in the custom block edit page of MT Block Editor. If exploited, an arbitrary script may be executed on a logged-in user's web browser.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-22888" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9af43b39-1f96-4d99-b53d-d142461b4fb8.json b/objects/vulnerability/vulnerability--9af43b39-1f96-4d99-b53d-d142461b4fb8.json new file mode 100644 index 00000000000..a5e741a54da --- /dev/null +++ b/objects/vulnerability/vulnerability--9af43b39-1f96-4d99-b53d-d142461b4fb8.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--70f6ad5b-f8af-4566-932f-8e51fff8fed1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9af43b39-1f96-4d99-b53d-d142461b4fb8", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:39.8075Z", + "modified": "2025-02-20T00:37:39.8075Z", + "name": "CVE-2024-37363", + "description": "The product does not perform an authorization check when an actor attempts to access a resource or perform an action. (CWE-862)\n\n\n\n\n\n\n Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.8, including 8.3.x, do not correctly perform an authorization check in the data source management service.\n\n\n\n\n\n\n\n\nWhen access control checks are incorrectly applied, users can access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures and denial of service.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-37363" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9ebb69be-8ba3-47f6-a420-6c05ebb8dd1e.json b/objects/vulnerability/vulnerability--9ebb69be-8ba3-47f6-a420-6c05ebb8dd1e.json new file mode 100644 index 00000000000..e280d3ca9a4 --- /dev/null +++ b/objects/vulnerability/vulnerability--9ebb69be-8ba3-47f6-a420-6c05ebb8dd1e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--74d0a557-4dd0-4a8e-baf6-021d5834b147", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9ebb69be-8ba3-47f6-a420-6c05ebb8dd1e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:40.126757Z", + "modified": "2025-02-20T00:37:40.126757Z", + "name": "CVE-2024-57262", + "description": "In barebox before 2025.01.0, ext4fs_read_symlink has an integer overflow for zalloc (adding one to an le32 variable) via a crafted ext4 filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and resultant memory overwrite, a related issue to CVE-2024-57256.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-57262" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--9f09ab27-4eda-472a-b22e-d0f9cdca4cb1.json b/objects/vulnerability/vulnerability--9f09ab27-4eda-472a-b22e-d0f9cdca4cb1.json new file mode 100644 index 00000000000..8d910bd3248 --- /dev/null +++ b/objects/vulnerability/vulnerability--9f09ab27-4eda-472a-b22e-d0f9cdca4cb1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--52468479-33a9-44b9-8081-f455870e7a55", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--9f09ab27-4eda-472a-b22e-d0f9cdca4cb1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.673982Z", + "modified": "2025-02-20T00:37:41.673982Z", + "name": "CVE-2024-13533", + "description": "The Small Package Quotes – USPS Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' parameter in all versions up to, and including, 1.3.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13533" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a49f167a-b3ef-489f-b989-8f453d7ddeaf.json b/objects/vulnerability/vulnerability--a49f167a-b3ef-489f-b989-8f453d7ddeaf.json new file mode 100644 index 00000000000..8be0acb4714 --- /dev/null +++ b/objects/vulnerability/vulnerability--a49f167a-b3ef-489f-b989-8f453d7ddeaf.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5fda3384-132d-4eb2-8f11-396d3933e687", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a49f167a-b3ef-489f-b989-8f453d7ddeaf", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.624522Z", + "modified": "2025-02-20T00:37:41.624522Z", + "name": "CVE-2024-13364", + "description": "The Raptive Ads plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the site_ads_files_reset() and cls_file_reset() functions in all versions up to, and including, 3.6.3. This makes it possible for unauthenticated attackers to reset the ad and cls files.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13364" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a55840f8-06af-470e-a972-2212e4baa585.json b/objects/vulnerability/vulnerability--a55840f8-06af-470e-a972-2212e4baa585.json new file mode 100644 index 00000000000..24c84aa0f78 --- /dev/null +++ b/objects/vulnerability/vulnerability--a55840f8-06af-470e-a972-2212e4baa585.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--23789922-be90-4d32-a0ca-521e40beb06f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a55840f8-06af-470e-a972-2212e4baa585", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:39.77654Z", + "modified": "2025-02-20T00:37:39.77654Z", + "name": "CVE-2024-37359", + "description": "The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. (CWE-918) \n\n\n\n \n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, do not validate the Host header of incoming HTTP/HTTPS requests.\n\n\n\n \n\n\n\nBy providing URLs to unexpected hosts or ports, attackers can make it appear that the server is sending the request, possibly bypassing access controls such as firewalls that prevent the attackers from accessing the URLs directly. The server can be used as a proxy to conduct port scanning of hosts in internal networks, use other URLs such as that can access documents on the system (using file://), or use other protocols such as gopher:// or tftp://, which may provide greater control over the contents of requests.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-37359" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--a6093929-3d8f-486f-b864-1d8a17b0c50f.json b/objects/vulnerability/vulnerability--a6093929-3d8f-486f-b864-1d8a17b0c50f.json new file mode 100644 index 00000000000..e1767ac4095 --- /dev/null +++ b/objects/vulnerability/vulnerability--a6093929-3d8f-486f-b864-1d8a17b0c50f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ee35c045-8597-4182-9650-3cb7c763a7f4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--a6093929-3d8f-486f-b864-1d8a17b0c50f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.467881Z", + "modified": "2025-02-20T00:37:45.467881Z", + "name": "CVE-2025-27092", + "description": "GHOSTS is an open source user simulation framework for cyber experimentation, simulation, training, and exercise. A path traversal vulnerability was discovered in GHOSTS version 8.0.0.0 that allows an attacker to access files outside of the intended directory through the photo retrieval endpoint. The vulnerability exists in the /api/npcs/{id}/photo endpoint, which is designed to serve profile photos for NPCs (Non-Player Characters) but fails to properly validate and sanitize file paths. When an NPC is created with a specially crafted photoLink value containing path traversal sequences (../, ..\\, etc.), the application processes these sequences without proper sanitization. This allows an attacker to traverse directory structures and access files outside of the intended photo directory, potentially exposing sensitive system files. The vulnerability is particularly severe because it allows reading arbitrary files from the server's filesystem with the permissions of the web application process, which could include configuration files, credentials, or other sensitive data. This issue has been addressed in version 8.2.7.90 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-27092" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--aa07e9af-6d36-4260-96fe-b5b8f43488b2.json b/objects/vulnerability/vulnerability--aa07e9af-6d36-4260-96fe-b5b8f43488b2.json new file mode 100644 index 00000000000..30ba3a7fc3f --- /dev/null +++ b/objects/vulnerability/vulnerability--aa07e9af-6d36-4260-96fe-b5b8f43488b2.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--47b04cae-5c1a-4321-96e1-0971fbd1bc45", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--aa07e9af-6d36-4260-96fe-b5b8f43488b2", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.527635Z", + "modified": "2025-02-20T00:37:45.527635Z", + "name": "CVE-2025-25943", + "description": "Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the AP4_Stz2Atom::AP4_Stz2Atom component located in Ap4Stz2Atom.cpp.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-25943" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--aa98b31b-3cda-4a6b-86e4-a9ef5ae3de2b.json b/objects/vulnerability/vulnerability--aa98b31b-3cda-4a6b-86e4-a9ef5ae3de2b.json new file mode 100644 index 00000000000..2c81678cc43 --- /dev/null +++ b/objects/vulnerability/vulnerability--aa98b31b-3cda-4a6b-86e4-a9ef5ae3de2b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5f78c896-6e95-4d88-8902-d11abefbea4a", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--aa98b31b-3cda-4a6b-86e4-a9ef5ae3de2b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:40.218242Z", + "modified": "2025-02-20T00:37:40.218242Z", + "name": "CVE-2024-12069", + "description": "The Lexicata plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.0.16. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute if they can successfully trick a user into performing an action, such as clicking on a specially crafted link.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-12069" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ac062e33-b8d8-439b-a2da-286b22b305e3.json b/objects/vulnerability/vulnerability--ac062e33-b8d8-439b-a2da-286b22b305e3.json new file mode 100644 index 00000000000..4d730fbc0e2 --- /dev/null +++ b/objects/vulnerability/vulnerability--ac062e33-b8d8-439b-a2da-286b22b305e3.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--7694d76c-58b7-4453-a17c-1d2b8bbe8dbe", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ac062e33-b8d8-439b-a2da-286b22b305e3", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:40.204475Z", + "modified": "2025-02-20T00:37:40.204475Z", + "name": "CVE-2024-12522", + "description": "The Yay! Forms | Embed Custom Forms, Surveys, and Quizzes Easily plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'yayforms' shortcode in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-12522" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b1f2ee8b-73de-48ec-9937-0c231fb8e0b7.json b/objects/vulnerability/vulnerability--b1f2ee8b-73de-48ec-9937-0c231fb8e0b7.json new file mode 100644 index 00000000000..2adb83e0486 --- /dev/null +++ b/objects/vulnerability/vulnerability--b1f2ee8b-73de-48ec-9937-0c231fb8e0b7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--96c3626e-35e1-4755-8dac-6f126232222f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b1f2ee8b-73de-48ec-9937-0c231fb8e0b7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.627453Z", + "modified": "2025-02-20T00:37:41.627453Z", + "name": "CVE-2024-13591", + "description": "The Team Builder For WPBakery Page Builder(Formerly Visual Composer) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'team-builder-vc' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13591" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b2140c9a-888e-483f-bdce-9caac511d36f.json b/objects/vulnerability/vulnerability--b2140c9a-888e-483f-bdce-9caac511d36f.json new file mode 100644 index 00000000000..5b875f30980 --- /dev/null +++ b/objects/vulnerability/vulnerability--b2140c9a-888e-483f-bdce-9caac511d36f.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--81881380-dbee-4557-be6e-e6e134f6c806", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b2140c9a-888e-483f-bdce-9caac511d36f", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:40.003532Z", + "modified": "2025-02-20T00:37:40.003532Z", + "name": "CVE-2024-28777", + "description": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 \n\n\n\nis vulnerable to unrestricted deserialization. This vulnerability allows users to execute arbitrary code, escalate privileges, or cause denial of service attacks by exploiting the unrestricted deserialization of types in the application.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-28777" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b2754b83-e8f8-4534-acb2-fee6617cdf25.json b/objects/vulnerability/vulnerability--b2754b83-e8f8-4534-acb2-fee6617cdf25.json new file mode 100644 index 00000000000..d8065e05d5c --- /dev/null +++ b/objects/vulnerability/vulnerability--b2754b83-e8f8-4534-acb2-fee6617cdf25.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b4504e47-5f28-438d-87c6-1d1ec2f96f83", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b2754b83-e8f8-4534-acb2-fee6617cdf25", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.681089Z", + "modified": "2025-02-20T00:37:41.681089Z", + "name": "CVE-2024-13390", + "description": "The ADFO – Custom data in admin dashboard plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'adfo_list' shortcode in all versions up to, and including, 1.9.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13390" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--b5f84f00-1074-4a49-ac1f-1c13382cb90e.json b/objects/vulnerability/vulnerability--b5f84f00-1074-4a49-ac1f-1c13382cb90e.json new file mode 100644 index 00000000000..eb32b8ef761 --- /dev/null +++ b/objects/vulnerability/vulnerability--b5f84f00-1074-4a49-ac1f-1c13382cb90e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b7570f8e-745b-4840-be5e-f614c733dd13", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--b5f84f00-1074-4a49-ac1f-1c13382cb90e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.623087Z", + "modified": "2025-02-20T00:37:41.623087Z", + "name": "CVE-2024-13489", + "description": "The LTL Freight Quotes – Old Dominion Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 4.2.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13489" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ba68104a-c9cd-433b-8a9e-f31506d28790.json b/objects/vulnerability/vulnerability--ba68104a-c9cd-433b-8a9e-f31506d28790.json new file mode 100644 index 00000000000..737b2d88fd8 --- /dev/null +++ b/objects/vulnerability/vulnerability--ba68104a-c9cd-433b-8a9e-f31506d28790.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--41680cf7-ed69-4fdb-8a18-55a26e55cd62", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ba68104a-c9cd-433b-8a9e-f31506d28790", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.15083Z", + "modified": "2025-02-20T00:37:41.15083Z", + "name": "CVE-2024-6697", + "description": "The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the product in an invalid state. (CWE-280)\n\n\n\n \n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, do not handle invalid and missing permissions correctly, resulting in a denial of service.\n\n\n\n \n\n\n\nAn adversary leverages a legitimate capability of an application in such a way as to achieve a negative technical impact.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-6697" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bdca7d18-cd7d-483b-8233-86c1bc8a7307.json b/objects/vulnerability/vulnerability--bdca7d18-cd7d-483b-8233-86c1bc8a7307.json new file mode 100644 index 00000000000..5121f8eca36 --- /dev/null +++ b/objects/vulnerability/vulnerability--bdca7d18-cd7d-483b-8233-86c1bc8a7307.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--ab190ad1-d28b-403b-99f8-1b976540b938", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bdca7d18-cd7d-483b-8233-86c1bc8a7307", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:46.008132Z", + "modified": "2025-02-20T00:37:46.008132Z", + "name": "CVE-2023-51296", + "description": "PHPJabbers Event Booking Calendar v4.0 is vulnerable to Cross-Site Scripting (XSS) in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key\" parameters which allows attackers to execute arbitrary code", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-51296" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bf35ca4a-00e1-4859-945a-3addd74dd98a.json b/objects/vulnerability/vulnerability--bf35ca4a-00e1-4859-945a-3addd74dd98a.json new file mode 100644 index 00000000000..6fbc9c3689d --- /dev/null +++ b/objects/vulnerability/vulnerability--bf35ca4a-00e1-4859-945a-3addd74dd98a.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--29f50327-4b11-49dc-bc67-cfe640de55a0", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bf35ca4a-00e1-4859-945a-3addd74dd98a", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.152534Z", + "modified": "2025-02-20T00:37:41.152534Z", + "name": "CVE-2024-6696", + "description": "The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad because it allows accesses from unauthorized agents to the security-sensitive assets. (CWE-1220) \n\n\n\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, do not correctly perform an authorization check in the user console trash content\n\n\n\n\n\n\n An attacker exploits a weakness in the configuration of access controls and is able to bypass the intended protection that these measures guard against and thereby obtain unauthorized access to the system or network.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-6696" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--bf9c3bd6-0783-4484-86b8-11eb99435389.json b/objects/vulnerability/vulnerability--bf9c3bd6-0783-4484-86b8-11eb99435389.json new file mode 100644 index 00000000000..2471ff58b84 --- /dev/null +++ b/objects/vulnerability/vulnerability--bf9c3bd6-0783-4484-86b8-11eb99435389.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b6ab28bd-b7de-4b73-be12-1d1a2151993d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--bf9c3bd6-0783-4484-86b8-11eb99435389", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.208505Z", + "modified": "2025-02-20T00:37:45.208505Z", + "name": "CVE-2025-1448", + "description": "A vulnerability was found in Synway SMG Gateway Management Software up to 20250204. It has been rated as critical. This issue affects some unknown processing of the file 9-12ping.php. The manipulation of the argument retry leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-1448" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c103a1eb-c506-4898-b5fd-6f9d64f0aac1.json b/objects/vulnerability/vulnerability--c103a1eb-c506-4898-b5fd-6f9d64f0aac1.json new file mode 100644 index 00000000000..8cc4254ba48 --- /dev/null +++ b/objects/vulnerability/vulnerability--c103a1eb-c506-4898-b5fd-6f9d64f0aac1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--61db4c37-2837-40db-9b1a-610f23dbd8cc", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c103a1eb-c506-4898-b5fd-6f9d64f0aac1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.62948Z", + "modified": "2025-02-20T00:37:41.62948Z", + "name": "CVE-2024-13231", + "description": "The WordPress Portfolio Builder – Portfolio Gallery plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'add_video' function in all versions up to, and including, 1.1.7. This makes it possible for unauthenticated attackers to add arbitrary videos to any portfolio gallery.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13231" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c7f0dad5-2272-4be2-9ece-f3f3b662bec6.json b/objects/vulnerability/vulnerability--c7f0dad5-2272-4be2-9ece-f3f3b662bec6.json new file mode 100644 index 00000000000..8b6832ef7f7 --- /dev/null +++ b/objects/vulnerability/vulnerability--c7f0dad5-2272-4be2-9ece-f3f3b662bec6.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--96e059dc-e2d6-412d-8876-eed386d1dc09", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c7f0dad5-2272-4be2-9ece-f3f3b662bec6", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.210109Z", + "modified": "2025-02-20T00:37:45.210109Z", + "name": "CVE-2025-1465", + "description": "A vulnerability, which was classified as problematic, was found in lmxcms 1.41. Affected is an unknown function of the file db.inc.php of the component Maintenance. The manipulation leads to code injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-1465" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c9582ccc-b203-416d-9f6c-da2e1488a4f7.json b/objects/vulnerability/vulnerability--c9582ccc-b203-416d-9f6c-da2e1488a4f7.json new file mode 100644 index 00000000000..4ef8e196d16 --- /dev/null +++ b/objects/vulnerability/vulnerability--c9582ccc-b203-416d-9f6c-da2e1488a4f7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--538a8947-a75d-4505-aa62-57a2efc81e80", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c9582ccc-b203-416d-9f6c-da2e1488a4f7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.654841Z", + "modified": "2025-02-20T00:37:41.654841Z", + "name": "CVE-2024-13592", + "description": "The Team Builder For WPBakery Page Builder(Formerly Visual Composer) plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.0 via the 'team-builder-vc' shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13592" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--c9633fc1-d75e-4ffd-91ce-99945c49f479.json b/objects/vulnerability/vulnerability--c9633fc1-d75e-4ffd-91ce-99945c49f479.json new file mode 100644 index 00000000000..34cc27a0022 --- /dev/null +++ b/objects/vulnerability/vulnerability--c9633fc1-d75e-4ffd-91ce-99945c49f479.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--86fee466-0172-411b-9197-f84202373a65", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--c9633fc1-d75e-4ffd-91ce-99945c49f479", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.228732Z", + "modified": "2025-02-20T00:37:45.228732Z", + "name": "CVE-2025-1118", + "description": "A flaw was found in grub2. Grub's dump command is not blocked when grub is in lockdown mode, which allows the user to read any memory information, and an attacker may leverage this in order to extract signatures, salts, and other sensitive information from the memory.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-1118" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ca1c32f3-902e-45ae-a0dd-fbc8f689fe00.json b/objects/vulnerability/vulnerability--ca1c32f3-902e-45ae-a0dd-fbc8f689fe00.json new file mode 100644 index 00000000000..103733dcbc8 --- /dev/null +++ b/objects/vulnerability/vulnerability--ca1c32f3-902e-45ae-a0dd-fbc8f689fe00.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3ea73b3a-369e-47ab-8ba5-8bc15c0794fb", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ca1c32f3-902e-45ae-a0dd-fbc8f689fe00", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.471177Z", + "modified": "2025-02-20T00:37:45.471177Z", + "name": "CVE-2025-27090", + "description": "Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. The reverse port forwarding in sliver teamserver allows the implant to open a reverse tunnel on the sliver teamserver without verifying if the operator instructed the implant to do so. The only impact that has been shown is the exposure of the server's IP address to a third party. This issue has been addressed in version 1.5.43 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-27090" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ccc19c53-c3a3-42a8-ba98-dd198764cf07.json b/objects/vulnerability/vulnerability--ccc19c53-c3a3-42a8-ba98-dd198764cf07.json new file mode 100644 index 00000000000..37bbd265a0a --- /dev/null +++ b/objects/vulnerability/vulnerability--ccc19c53-c3a3-42a8-ba98-dd198764cf07.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0b69c720-4ef3-41e7-a58d-3b36e73736da", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ccc19c53-c3a3-42a8-ba98-dd198764cf07", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.434841Z", + "modified": "2025-02-20T00:37:45.434841Z", + "name": "CVE-2025-20153", + "description": "A vulnerability in the email filtering mechanism of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to bypass the configured rules and allow emails that should have been denied to flow through an affected device.  \r\n\r\nThis vulnerability is due to improper handling of email that passes through an affected device. An attacker could exploit this vulnerability by sending a crafted email through the affected device. A successful exploit could allow the attacker to bypass email filters on the affected device.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-20153" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--cf23d958-9a89-4d68-a508-02c3df07bc93.json b/objects/vulnerability/vulnerability--cf23d958-9a89-4d68-a508-02c3df07bc93.json new file mode 100644 index 00000000000..be89f4755f9 --- /dev/null +++ b/objects/vulnerability/vulnerability--cf23d958-9a89-4d68-a508-02c3df07bc93.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9aef74cc-c3eb-4037-8c2d-068cce744354", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--cf23d958-9a89-4d68-a508-02c3df07bc93", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.644302Z", + "modified": "2025-02-20T00:37:41.644302Z", + "name": "CVE-2024-13736", + "description": "The Pure Chat – Live Chat & More! plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘purechatWidgetName’ parameter in all versions up to, and including, 2.31 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13736" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--cf9bec98-81e0-4146-b414-db9ee9f60166.json b/objects/vulnerability/vulnerability--cf9bec98-81e0-4146-b414-db9ee9f60166.json new file mode 100644 index 00000000000..ccad6f370b0 --- /dev/null +++ b/objects/vulnerability/vulnerability--cf9bec98-81e0-4146-b414-db9ee9f60166.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--d4c5659c-0cc3-4f3a-934d-b5c1f42c28ad", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--cf9bec98-81e0-4146-b414-db9ee9f60166", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.670871Z", + "modified": "2025-02-20T00:37:45.670871Z", + "name": "CVE-2025-0916", + "description": "The YaySMTP and Email Logs: Amazon SES, SendGrid, Outlook, Mailgun, Brevo, Google and Any SMTP Service plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions 2.4.9 to 2.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: The vulnerability has been initially patched in version 2.4.8 and was reintroduced in version 2.4.9 with the removal of the wp_kses_post() built-in WordPress sanitization function.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0916" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d05eeadc-4c1e-4400-bc38-4a857a1f7716.json b/objects/vulnerability/vulnerability--d05eeadc-4c1e-4400-bc38-4a857a1f7716.json new file mode 100644 index 00000000000..5f09ab68b38 --- /dev/null +++ b/objects/vulnerability/vulnerability--d05eeadc-4c1e-4400-bc38-4a857a1f7716.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--0cc3eee3-880a-43b8-a0dc-d35dfdcf8379", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d05eeadc-4c1e-4400-bc38-4a857a1f7716", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:46.02723Z", + "modified": "2025-02-20T00:37:46.02723Z", + "name": "CVE-2023-51302", + "description": "PHPJabbers Hotel Booking System v4.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-51302" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d12a4b2a-6794-4a83-8d97-f4ab5ff1ebce.json b/objects/vulnerability/vulnerability--d12a4b2a-6794-4a83-8d97-f4ab5ff1ebce.json new file mode 100644 index 00000000000..e4243542846 --- /dev/null +++ b/objects/vulnerability/vulnerability--d12a4b2a-6794-4a83-8d97-f4ab5ff1ebce.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e96d4a48-9c0a-4f07-aa65-cd4cb5e49308", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d12a4b2a-6794-4a83-8d97-f4ab5ff1ebce", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:46.061676Z", + "modified": "2025-02-20T00:37:46.061676Z", + "name": "CVE-2023-51293", + "description": "A lack of rate limiting in the 'Forgot Password', 'Email Settings' feature of PHPJabbers Event Booking Calendar v4.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-51293" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d1a50a60-4a35-4766-8054-5ecd698e76fb.json b/objects/vulnerability/vulnerability--d1a50a60-4a35-4766-8054-5ecd698e76fb.json new file mode 100644 index 00000000000..a39a409ca7d --- /dev/null +++ b/objects/vulnerability/vulnerability--d1a50a60-4a35-4766-8054-5ecd698e76fb.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9ceab044-7419-4126-912d-f0cf25316925", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d1a50a60-4a35-4766-8054-5ecd698e76fb", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.682001Z", + "modified": "2025-02-20T00:37:45.682001Z", + "name": "CVE-2025-0677", + "description": "A flaw was found in grub2. When performing a symlink lookup, the grub's UFS module checks the inode's data size to allocate the internal buffer to read the file content, however, it fails to check if the symlink data size has overflown. When this occurs, grub_malloc() may be called with a smaller value than needed. When further reading the data from the disk into the buffer, the grub_ufs_lookup_symlink() function will write past the end of the allocated size. An attack can leverage this by crafting a malicious filesystem, and as a result, it will corrupt data stored in the heap, allowing for arbitrary code execution used to by-pass secure boot mechanisms.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0677" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d2720a8e-2d40-4aa5-a545-b438a3cbcfd0.json b/objects/vulnerability/vulnerability--d2720a8e-2d40-4aa5-a545-b438a3cbcfd0.json new file mode 100644 index 00000000000..83b9961cc78 --- /dev/null +++ b/objects/vulnerability/vulnerability--d2720a8e-2d40-4aa5-a545-b438a3cbcfd0.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--628e7cad-9ca5-4393-8aee-cbcad1633248", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d2720a8e-2d40-4aa5-a545-b438a3cbcfd0", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.230065Z", + "modified": "2025-02-20T00:37:45.230065Z", + "name": "CVE-2025-1132", + "description": "A time-based blind SQL Injection vulnerability exists in the ChurchCRM 5.13.0 and prior EditEventAttendees.php within the EN_tyid parameter. The parameter is directly inserted into an SQL query without proper sanitization, allowing attackers to inject malicious SQL commands. Please note that the vulnerability requires Administrator permissions. This flaw can potentially allow attackers to delay the response, indicating the presence of an SQL injection vulnerability. While it is a time-based blind injection, it can be exploited to gain insights into the underlying database, and with further exploitation, sensitive data could be retrieved.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-1132" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d3012c38-0886-4e68-a237-b81ba11c180e.json b/objects/vulnerability/vulnerability--d3012c38-0886-4e68-a237-b81ba11c180e.json new file mode 100644 index 00000000000..13705905c2c --- /dev/null +++ b/objects/vulnerability/vulnerability--d3012c38-0886-4e68-a237-b81ba11c180e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--5e4ae8ce-c825-4a4e-969a-1c5c17f8d77d", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d3012c38-0886-4e68-a237-b81ba11c180e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:39.993064Z", + "modified": "2025-02-20T00:37:39.993064Z", + "name": "CVE-2024-28780", + "description": "IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0 Rich Client \n\n\n\n\n\nuses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-28780" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d4fb6f2f-3a45-4c47-bcf2-781b6a1f210b.json b/objects/vulnerability/vulnerability--d4fb6f2f-3a45-4c47-bcf2-781b6a1f210b.json new file mode 100644 index 00000000000..83289da0d7c --- /dev/null +++ b/objects/vulnerability/vulnerability--d4fb6f2f-3a45-4c47-bcf2-781b6a1f210b.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--284d589e-7d74-436e-a42d-fb6e70f0b4fb", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d4fb6f2f-3a45-4c47-bcf2-781b6a1f210b", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.678599Z", + "modified": "2025-02-20T00:37:41.678599Z", + "name": "CVE-2024-13479", + "description": "The LTL Freight Quotes – SEFL Edition plugin for WordPress is vulnerable to SQL Injection via the 'dropship_edit_id' and 'edit_id' parameters in all versions up to, and including, 3.2.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13479" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--d7457272-3c94-4711-bf33-d7e35a42081d.json b/objects/vulnerability/vulnerability--d7457272-3c94-4711-bf33-d7e35a42081d.json new file mode 100644 index 00000000000..ddb4665a2f0 --- /dev/null +++ b/objects/vulnerability/vulnerability--d7457272-3c94-4711-bf33-d7e35a42081d.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--248bb873-5085-47a8-973b-b9d04c2b8565", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--d7457272-3c94-4711-bf33-d7e35a42081d", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.638814Z", + "modified": "2025-02-20T00:37:45.638814Z", + "name": "CVE-2025-0999", + "description": "Heap buffer overflow in V8 in Google Chrome prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0999" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--dad24515-187a-4d76-8e59-bbfde0a49c24.json b/objects/vulnerability/vulnerability--dad24515-187a-4d76-8e59-bbfde0a49c24.json new file mode 100644 index 00000000000..cb06fa445b8 --- /dev/null +++ b/objects/vulnerability/vulnerability--dad24515-187a-4d76-8e59-bbfde0a49c24.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--9bfe8244-0766-4fca-8067-e24120b961d4", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--dad24515-187a-4d76-8e59-bbfde0a49c24", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.961917Z", + "modified": "2025-02-20T00:37:45.961917Z", + "name": "CVE-2023-46271", + "description": "Extreme Networks IQ Engine before 10.6r1a, and through 10.6r4 before 10.6r5, has a buffer overflow. This issue arises from the ah_webui service, which listens on TCP port 3009 by default.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-46271" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--de31fc2c-72fb-46e0-a350-823d76b176ff.json b/objects/vulnerability/vulnerability--de31fc2c-72fb-46e0-a350-823d76b176ff.json new file mode 100644 index 00000000000..5ce639962c0 --- /dev/null +++ b/objects/vulnerability/vulnerability--de31fc2c-72fb-46e0-a350-823d76b176ff.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--38fcf01c-145f-4957-8135-9b76d17ee295", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--de31fc2c-72fb-46e0-a350-823d76b176ff", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.235652Z", + "modified": "2025-02-20T00:37:45.235652Z", + "name": "CVE-2025-1006", + "description": "Use after free in Network in Google Chrome prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted web app. (Chromium security severity: Medium)", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-1006" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--df73531e-5068-40bf-8d54-5ddedc04a3e1.json b/objects/vulnerability/vulnerability--df73531e-5068-40bf-8d54-5ddedc04a3e1.json new file mode 100644 index 00000000000..f25c71941c1 --- /dev/null +++ b/objects/vulnerability/vulnerability--df73531e-5068-40bf-8d54-5ddedc04a3e1.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--4715c6f9-efa6-4392-a322-2f87539b305b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--df73531e-5068-40bf-8d54-5ddedc04a3e1", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.568364Z", + "modified": "2025-02-20T00:37:45.568364Z", + "name": "CVE-2025-25945", + "description": "An issue in Bento4 v1.6.0-641 allows an attacker to obtain sensitive information via the the Mp4Fragment.cpp and in AP4_DescriptorFactory::CreateDescriptorFromStream at Ap4DescriptorFactory.cpp.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-25945" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e01a808c-3326-4ecd-a484-7a8b0fee224e.json b/objects/vulnerability/vulnerability--e01a808c-3326-4ecd-a484-7a8b0fee224e.json new file mode 100644 index 00000000000..b3616504af8 --- /dev/null +++ b/objects/vulnerability/vulnerability--e01a808c-3326-4ecd-a484-7a8b0fee224e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--e389c27f-44c5-4a4c-ba57-137fbf45445e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e01a808c-3326-4ecd-a484-7a8b0fee224e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.563566Z", + "modified": "2025-02-20T00:37:45.563566Z", + "name": "CVE-2025-25196", + "description": "OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA < v1.8.4 (Helm chart < openfga-0.2.22, docker < v.1.8.4) are vulnerable to authorization bypass when certain Check and ListObject calls are executed. Users on OpenFGA v1.8.4 or previous, specifically under the following conditions are affected by this authorization bypass vulnerability: 1. Calling Check API or ListObjects with a model that has a relation directly assignable to both public access AND userset with the same type. 2. A type bound public access tuple is assigned to an object. 3. userset tuple is not assigned to the same object. and 4. Check request's user field is a userset that has the same type as the type bound public access tuple's user type. Users are advised to upgrade to v1.8.5 which is backwards compatible. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-25196" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e2f48f18-1325-480a-85b8-c04edd6da88c.json b/objects/vulnerability/vulnerability--e2f48f18-1325-480a-85b8-c04edd6da88c.json new file mode 100644 index 00000000000..9bae899694d --- /dev/null +++ b/objects/vulnerability/vulnerability--e2f48f18-1325-480a-85b8-c04edd6da88c.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--28fc1987-99f5-482f-8ec5-fd21d7862c2b", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e2f48f18-1325-480a-85b8-c04edd6da88c", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.691005Z", + "modified": "2025-02-20T00:37:41.691005Z", + "name": "CVE-2024-13363", + "description": "The Raptive Ads plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'poc' parameter in all versions up to, and including, 3.6.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13363" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e464050e-26c2-47a3-9c95-c347f35f6915.json b/objects/vulnerability/vulnerability--e464050e-26c2-47a3-9c95-c347f35f6915.json new file mode 100644 index 00000000000..feee709d5d8 --- /dev/null +++ b/objects/vulnerability/vulnerability--e464050e-26c2-47a3-9c95-c347f35f6915.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--960240b8-8ae8-4f9e-950c-b2ef299f8673", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e464050e-26c2-47a3-9c95-c347f35f6915", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.689022Z", + "modified": "2025-02-20T00:37:41.689022Z", + "name": "CVE-2024-13468", + "description": "The Trash Duplicate and 301 Redirect plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'duplicates-action-top' action in all versions up to, and including, 1.9. This makes it possible for unauthenticated attackers to delete arbitrary posts/pages.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13468" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--e686bd6e-eb69-4f4c-a6a8-4b6bf7fa6896.json b/objects/vulnerability/vulnerability--e686bd6e-eb69-4f4c-a6a8-4b6bf7fa6896.json new file mode 100644 index 00000000000..ee7c464a3d5 --- /dev/null +++ b/objects/vulnerability/vulnerability--e686bd6e-eb69-4f4c-a6a8-4b6bf7fa6896.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--47e88c94-cd6d-49e9-8346-1a659275de3c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--e686bd6e-eb69-4f4c-a6a8-4b6bf7fa6896", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:46.06366Z", + "modified": "2025-02-20T00:37:46.06366Z", + "name": "CVE-2023-51305", + "description": "PHPJabbers Car Park Booking System v3.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key\" parameters.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-51305" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ec1e2803-f767-40dd-8801-83eb967a5938.json b/objects/vulnerability/vulnerability--ec1e2803-f767-40dd-8801-83eb967a5938.json new file mode 100644 index 00000000000..362b513d26e --- /dev/null +++ b/objects/vulnerability/vulnerability--ec1e2803-f767-40dd-8801-83eb967a5938.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--18a39c1e-ace0-4416-adf2-4eb33e53f2d1", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ec1e2803-f767-40dd-8801-83eb967a5938", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:39.79396Z", + "modified": "2025-02-20T00:37:39.79396Z", + "name": "CVE-2024-37360", + "description": "Hitachi Vantara Pentaho Business Analytics Server - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') \n\n\n\n \n\n\n\nThe software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (CWE-79)\n\n\n\n \n\n\n\nHitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.0 and 9.3.0.9, including 8.3.x, allow a malicious URL to inject content into the Analyzer plugin interface.\n\n\n\n \n\n\n\n\nOnce the malicious script is injected, the attacker can perform a variety of malicious activities. The attacker could transfer private information, such as cookies that may include session information, from the victim's machine to the attacker. The attacker could send malicious requests to a web site on behalf of the victim, which could be especially dangerous to the site if the victim has administrator privileges to manage that site.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-37360" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--ec56e504-2d28-4bc9-a00f-f0bffafb2052.json b/objects/vulnerability/vulnerability--ec56e504-2d28-4bc9-a00f-f0bffafb2052.json new file mode 100644 index 00000000000..5fbe8dfba1a --- /dev/null +++ b/objects/vulnerability/vulnerability--ec56e504-2d28-4bc9-a00f-f0bffafb2052.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--3eaabf05-6a23-4d83-813c-c77dc7286b3c", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--ec56e504-2d28-4bc9-a00f-f0bffafb2052", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.437133Z", + "modified": "2025-02-20T00:37:45.437133Z", + "name": "CVE-2025-20211", + "description": "A vulnerability in the web-based management interface of Cisco BroadWorks Application Delivery Platform could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-20211" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--efd1569d-e0d7-42b2-8f14-9b3fb7f1bac5.json b/objects/vulnerability/vulnerability--efd1569d-e0d7-42b2-8f14-9b3fb7f1bac5.json new file mode 100644 index 00000000000..05d0c8a5e4e --- /dev/null +++ b/objects/vulnerability/vulnerability--efd1569d-e0d7-42b2-8f14-9b3fb7f1bac5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--af672040-f3e2-49da-b42e-3954d903605e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--efd1569d-e0d7-42b2-8f14-9b3fb7f1bac5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.253085Z", + "modified": "2025-02-20T00:37:45.253085Z", + "name": "CVE-2025-1133", + "description": "A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based blind SQL Injection vulnerability in the EditEventAttendees functionality. The EID parameter is directly concatenated into an SQL query without proper sanitization, making it susceptible to SQL injection attacks. An attacker can manipulate the query, potentially leading to data exfiltration, modification, or deletion.  Please note that this vulnerability requires Administrator privileges.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-1133" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f05617a4-d28c-4a8d-aaa1-c897277c705e.json b/objects/vulnerability/vulnerability--f05617a4-d28c-4a8d-aaa1-c897277c705e.json new file mode 100644 index 00000000000..723a4dda6ba --- /dev/null +++ b/objects/vulnerability/vulnerability--f05617a4-d28c-4a8d-aaa1-c897277c705e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--878be3b6-1055-41a3-bffd-863f990081dc", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f05617a4-d28c-4a8d-aaa1-c897277c705e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.55499Z", + "modified": "2025-02-20T00:37:45.55499Z", + "name": "CVE-2025-25944", + "description": "Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the Ap4RtpAtom.cpp, specifically in AP4_RtpAtom::AP4_RtpAtom, during the execution of mp4fragment with a crafted MP4 input file.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-25944" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f1ceff02-ea17-4340-abdb-7393390f510e.json b/objects/vulnerability/vulnerability--f1ceff02-ea17-4340-abdb-7393390f510e.json new file mode 100644 index 00000000000..1b401f987ab --- /dev/null +++ b/objects/vulnerability/vulnerability--f1ceff02-ea17-4340-abdb-7393390f510e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--742c2504-7caa-4520-8a09-d5df7a8dc863", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f1ceff02-ea17-4340-abdb-7393390f510e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.652047Z", + "modified": "2025-02-20T00:37:41.652047Z", + "name": "CVE-2024-13485", + "description": "The LTL Freight Quotes – ABF Freight Edition plugin for WordPress is vulnerable to SQL Injection via the 'edit_id' and 'dropship_edit_id' parameters in all versions up to, and including, 3.3.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13485" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f3260fbf-0a44-4caf-ba97-385410f2199e.json b/objects/vulnerability/vulnerability--f3260fbf-0a44-4caf-ba97-385410f2199e.json new file mode 100644 index 00000000000..60bf2debb75 --- /dev/null +++ b/objects/vulnerability/vulnerability--f3260fbf-0a44-4caf-ba97-385410f2199e.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--6023c949-51d5-4f3e-8ce6-b52d2d4a0884", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f3260fbf-0a44-4caf-ba97-385410f2199e", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.64068Z", + "modified": "2025-02-20T00:37:41.64068Z", + "name": "CVE-2024-13663", + "description": "The Coaching Staffs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mstw-cs-table' shortcode in all versions up to, and including, 1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13663" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f3d5abd9-d503-4f5b-9a14-66ada3768ec5.json b/objects/vulnerability/vulnerability--f3d5abd9-d503-4f5b-9a14-66ada3768ec5.json new file mode 100644 index 00000000000..35bcd688f67 --- /dev/null +++ b/objects/vulnerability/vulnerability--f3d5abd9-d503-4f5b-9a14-66ada3768ec5.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--b410a1b8-4a2e-468a-afc8-08b9a8b83617", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f3d5abd9-d503-4f5b-9a14-66ada3768ec5", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.509212Z", + "modified": "2025-02-20T00:37:45.509212Z", + "name": "CVE-2025-24965", + "description": "crun is an open source OCI Container Runtime fully written in C. In affected versions A malicious container image could trick the krun handler into escaping the root filesystem, allowing file creation or modification on the host. No special permissions are needed, only the ability for the current user to write to the target file. The problem is fixed in crun 1.20 and all users are advised to upgrade. There are no known workarounds for this vulnerability.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-24965" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f432b9a2-3f34-4d07-b44e-e17e82e858a7.json b/objects/vulnerability/vulnerability--f432b9a2-3f34-4d07-b44e-e17e82e858a7.json new file mode 100644 index 00000000000..60dc99ec13b --- /dev/null +++ b/objects/vulnerability/vulnerability--f432b9a2-3f34-4d07-b44e-e17e82e858a7.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--db9d7584-b204-4b85-967e-542a3d6714ab", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f432b9a2-3f34-4d07-b44e-e17e82e858a7", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:41.657242Z", + "modified": "2025-02-20T00:37:41.657242Z", + "name": "CVE-2024-13657", + "description": "The Store Locator Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'storelocatorwidget' shortcode in all versions up to, and including, 20200131 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-13657" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f497c4d7-3c42-4b6a-a739-7eb4febb9006.json b/objects/vulnerability/vulnerability--f497c4d7-3c42-4b6a-a739-7eb4febb9006.json new file mode 100644 index 00000000000..ece25175750 --- /dev/null +++ b/objects/vulnerability/vulnerability--f497c4d7-3c42-4b6a-a739-7eb4febb9006.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--685becf7-a286-417c-8bbd-723a70a63988", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f497c4d7-3c42-4b6a-a739-7eb4febb9006", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:45.62501Z", + "modified": "2025-02-20T00:37:45.62501Z", + "name": "CVE-2025-0968", + "description": "The ElementsKit Elementor addons plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.4.0 due to a missing capability checks on the get_megamenu_content() function. This makes it possible for unauthenticated attackers to view any item created in Elementor, such as posts, pages and templates including drafts, trashed and private items.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2025-0968" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f4e5c5f6-5e70-4e03-aa52-a7218d95b643.json b/objects/vulnerability/vulnerability--f4e5c5f6-5e70-4e03-aa52-a7218d95b643.json new file mode 100644 index 00000000000..a513922fbd2 --- /dev/null +++ b/objects/vulnerability/vulnerability--f4e5c5f6-5e70-4e03-aa52-a7218d95b643.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--33d9810e-0d8c-4d84-a4ee-18fca9c68636", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f4e5c5f6-5e70-4e03-aa52-a7218d95b643", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:40.149021Z", + "modified": "2025-02-20T00:37:40.149021Z", + "name": "CVE-2024-57261", + "description": "In barebox before 2025.01.0, request2size in common/dlmalloc.c has an integer overflow, a related issue to CVE-2024-57258.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-57261" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--f98c9e9c-6f51-4cb2-86fc-b684fb8aa6df.json b/objects/vulnerability/vulnerability--f98c9e9c-6f51-4cb2-86fc-b684fb8aa6df.json new file mode 100644 index 00000000000..8bac3462e95 --- /dev/null +++ b/objects/vulnerability/vulnerability--f98c9e9c-6f51-4cb2-86fc-b684fb8aa6df.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--bf46640b-28b3-4bd8-ba7b-870ef8a50f6f", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--f98c9e9c-6f51-4cb2-86fc-b684fb8aa6df", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:46.046146Z", + "modified": "2025-02-20T00:37:46.046146Z", + "name": "CVE-2023-51299", + "description": "PHPJabbers Hotel Booking System v4.0 is vulnerable to HTML Injection in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title\" parameters.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2023-51299" + } + ] + } + ] +} \ No newline at end of file diff --git a/objects/vulnerability/vulnerability--fe8d7571-dc12-4fd3-ac21-e9ed42008783.json b/objects/vulnerability/vulnerability--fe8d7571-dc12-4fd3-ac21-e9ed42008783.json new file mode 100644 index 00000000000..d2f91368925 --- /dev/null +++ b/objects/vulnerability/vulnerability--fe8d7571-dc12-4fd3-ac21-e9ed42008783.json @@ -0,0 +1,22 @@ +{ + "type": "bundle", + "id": "bundle--2bd556c5-246e-44f7-a921-7dcc2e55856e", + "objects": [ + { + "type": "vulnerability", + "spec_version": "2.1", + "id": "vulnerability--fe8d7571-dc12-4fd3-ac21-e9ed42008783", + "created_by_ref": "identity--8ce3f695-d5a4-4dc8-9e93-a65af453a31a", + "created": "2025-02-20T00:37:39.779868Z", + "modified": "2025-02-20T00:37:39.779868Z", + "name": "CVE-2024-37361", + "description": "The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid. (CWE-502)\n\n\n\n \n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.\n\n\n\n \n\n\n\nWhen developers place no restrictions on \"gadget chains,\" or series of instances and method invocations that can self-execute during the deserialization process (i.e., before the object is returned to the caller), it is sometimes possible for attackers to leverage them to perform unauthorized actions.", + "external_references": [ + { + "source_name": "cve", + "external_id": "CVE-2024-37361" + } + ] + } + ] +} \ No newline at end of file