From 05ce255debf1a9318f02b197c7c873debc8d14b0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 10 Jan 2025 17:01:38 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/50xxx/CVE-2024-50807.json | 56 ++++++++++++++++++++++++--- 2024/54xxx/CVE-2024-54846.json | 66 ++++++++++++++++++++++++++++--- 2024/54xxx/CVE-2024-54847.json | 66 ++++++++++++++++++++++++++++--- 2024/54xxx/CVE-2024-54848.json | 71 +++++++++++++++++++++++++++++++--- 2024/54xxx/CVE-2024-54849.json | 61 ++++++++++++++++++++++++++--- 2025/0xxx/CVE-2025-0378.json | 18 +++++++++ 2025/0xxx/CVE-2025-0379.json | 18 +++++++++ 2025/0xxx/CVE-2025-0380.json | 18 +++++++++ 2025/0xxx/CVE-2025-0381.json | 18 +++++++++ 2025/0xxx/CVE-2025-0382.json | 18 +++++++++ 2025/0xxx/CVE-2025-0383.json | 18 +++++++++ 2025/0xxx/CVE-2025-0384.json | 18 +++++++++ 2025/0xxx/CVE-2025-0385.json | 18 +++++++++ 2025/0xxx/CVE-2025-0386.json | 18 +++++++++ 2025/0xxx/CVE-2025-0387.json | 18 +++++++++ 2025/0xxx/CVE-2025-0388.json | 18 +++++++++ 2025/0xxx/CVE-2025-0389.json | 18 +++++++++ 2025/23xxx/CVE-2025-23050.json | 18 +++++++++ 2025/23xxx/CVE-2025-23051.json | 18 +++++++++ 2025/23xxx/CVE-2025-23052.json | 18 +++++++++ 2025/23xxx/CVE-2025-23053.json | 18 +++++++++ 2025/23xxx/CVE-2025-23054.json | 18 +++++++++ 2025/23xxx/CVE-2025-23055.json | 18 +++++++++ 2025/23xxx/CVE-2025-23056.json | 18 +++++++++ 2025/23xxx/CVE-2025-23057.json | 18 +++++++++ 2025/23xxx/CVE-2025-23058.json | 18 +++++++++ 2025/23xxx/CVE-2025-23059.json | 18 +++++++++ 2025/23xxx/CVE-2025-23060.json | 18 +++++++++ 2025/23xxx/CVE-2025-23061.json | 18 +++++++++ 2025/23xxx/CVE-2025-23062.json | 18 +++++++++ 2025/23xxx/CVE-2025-23063.json | 18 +++++++++ 2025/23xxx/CVE-2025-23064.json | 18 +++++++++ 2025/23xxx/CVE-2025-23065.json | 18 +++++++++ 2025/23xxx/CVE-2025-23066.json | 18 +++++++++ 2025/23xxx/CVE-2025-23067.json | 18 +++++++++ 2025/23xxx/CVE-2025-23068.json | 18 +++++++++ 2025/23xxx/CVE-2025-23069.json | 18 +++++++++ 2025/23xxx/CVE-2025-23070.json | 18 +++++++++ 2025/23xxx/CVE-2025-23071.json | 18 +++++++++ 39 files changed, 902 insertions(+), 30 deletions(-) create mode 100644 2025/0xxx/CVE-2025-0378.json create mode 100644 2025/0xxx/CVE-2025-0379.json create mode 100644 2025/0xxx/CVE-2025-0380.json create mode 100644 2025/0xxx/CVE-2025-0381.json create mode 100644 2025/0xxx/CVE-2025-0382.json create mode 100644 2025/0xxx/CVE-2025-0383.json create mode 100644 2025/0xxx/CVE-2025-0384.json create mode 100644 2025/0xxx/CVE-2025-0385.json create mode 100644 2025/0xxx/CVE-2025-0386.json create mode 100644 2025/0xxx/CVE-2025-0387.json create mode 100644 2025/0xxx/CVE-2025-0388.json create mode 100644 2025/0xxx/CVE-2025-0389.json create mode 100644 2025/23xxx/CVE-2025-23050.json create mode 100644 2025/23xxx/CVE-2025-23051.json create mode 100644 2025/23xxx/CVE-2025-23052.json create mode 100644 2025/23xxx/CVE-2025-23053.json create mode 100644 2025/23xxx/CVE-2025-23054.json create mode 100644 2025/23xxx/CVE-2025-23055.json create mode 100644 2025/23xxx/CVE-2025-23056.json create mode 100644 2025/23xxx/CVE-2025-23057.json create mode 100644 2025/23xxx/CVE-2025-23058.json create mode 100644 2025/23xxx/CVE-2025-23059.json create mode 100644 2025/23xxx/CVE-2025-23060.json create mode 100644 2025/23xxx/CVE-2025-23061.json create mode 100644 2025/23xxx/CVE-2025-23062.json create mode 100644 2025/23xxx/CVE-2025-23063.json create mode 100644 2025/23xxx/CVE-2025-23064.json create mode 100644 2025/23xxx/CVE-2025-23065.json create mode 100644 2025/23xxx/CVE-2025-23066.json create mode 100644 2025/23xxx/CVE-2025-23067.json create mode 100644 2025/23xxx/CVE-2025-23068.json create mode 100644 2025/23xxx/CVE-2025-23069.json create mode 100644 2025/23xxx/CVE-2025-23070.json create mode 100644 2025/23xxx/CVE-2025-23071.json diff --git a/2024/50xxx/CVE-2024-50807.json b/2024/50xxx/CVE-2024-50807.json index 598ecb232f2..38d95d983bb 100644 --- a/2024/50xxx/CVE-2024-50807.json +++ b/2024/50xxx/CVE-2024-50807.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-50807", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-50807", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Trippo Responsive Filemanager 9.14.0 is vulnerable to Cross Site Scripting (XSS) via file upload using the svg and pdf extensions." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gist.github.com/HackShiv/4254db89214913867aa8dd5c1ec09b7e", + "refsource": "MISC", + "name": "https://gist.github.com/HackShiv/4254db89214913867aa8dd5c1ec09b7e" } ] } diff --git a/2024/54xxx/CVE-2024-54846.json b/2024/54xxx/CVE-2024-54846.json index c025a334670..555bdbc0093 100644 --- a/2024/54xxx/CVE-2024-54846.json +++ b/2024/54xxx/CVE-2024-54846.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-54846", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-54846", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in CP Plus CP-VNR-3104 B3223P22C02424 allows attackers to obtain the EC private key and access sensitive data or execute a man-in-the-middle attack." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15522", + "refsource": "MISC", + "name": "https://nvd.nist.gov/vuln/detail/CVE-2020-15522" + }, + { + "url": "https://payatu.com/blog/solving-the-problem-of-encrypted-firmware/", + "refsource": "MISC", + "name": "https://payatu.com/blog/solving-the-problem-of-encrypted-firmware/" + }, + { + "refsource": "MISC", + "name": "https://github.com/Yashodhanvivek/CP-VNR-3104-NVR-Vulnerabilties/blob/main/CPPlus_CP-VNR-3104_Security_Assessment.pdf", + "url": "https://github.com/Yashodhanvivek/CP-VNR-3104-NVR-Vulnerabilties/blob/main/CPPlus_CP-VNR-3104_Security_Assessment.pdf" } ] } diff --git a/2024/54xxx/CVE-2024-54847.json b/2024/54xxx/CVE-2024-54847.json index e06e45d67f0..b81422c9728 100644 --- a/2024/54xxx/CVE-2024-54847.json +++ b/2024/54xxx/CVE-2024-54847.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-54847", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-54847", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in CP Plus CP-VNR-3104 B3223P22C02424 allows attackers to access the Diffie-Hellman (DH) parameters and access sensitive data or execute a man-in-the-middle attack." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://payatu.com/blog/solving-the-problem-of-encrypted-firmware/", + "refsource": "MISC", + "name": "https://payatu.com/blog/solving-the-problem-of-encrypted-firmware/" + }, + { + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3817", + "refsource": "MISC", + "name": "https://nvd.nist.gov/vuln/detail/CVE-2023-3817" + }, + { + "refsource": "MISC", + "name": "https://github.com/Yashodhanvivek/CP-VNR-3104-NVR-Vulnerabilties/blob/main/CPPlus_CP-VNR-3104_Security_Assessment.pdf", + "url": "https://github.com/Yashodhanvivek/CP-VNR-3104-NVR-Vulnerabilties/blob/main/CPPlus_CP-VNR-3104_Security_Assessment.pdf" } ] } diff --git a/2024/54xxx/CVE-2024-54848.json b/2024/54xxx/CVE-2024-54848.json index 28369aecafc..e034d1a7bc5 100644 --- a/2024/54xxx/CVE-2024-54848.json +++ b/2024/54xxx/CVE-2024-54848.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-54848", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-54848", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper handling and storage of certificates in CP Plus CP-VNR-3104 B3223P22C02424 allow attackers to decrypt communications or execute a man-in-the-middle attacks." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://payatu.com/blog/solving-the-problem-of-encrypted-firmware/", + "refsource": "MISC", + "name": "https://payatu.com/blog/solving-the-problem-of-encrypted-firmware/" + }, + { + "url": "https://capec.mitre.org/data/definitions/233", + "refsource": "MISC", + "name": "https://capec.mitre.org/data/definitions/233" + }, + { + "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21551", + "refsource": "MISC", + "name": "https://nvd.nist.gov/vuln/detail/CVE-2021-21551" + }, + { + "refsource": "MISC", + "name": "https://github.com/Yashodhanvivek/CP-VNR-3104-NVR-Vulnerabilties/blob/main/CPPlus_CP-VNR-3104_Security_Assessment.pdf", + "url": "https://github.com/Yashodhanvivek/CP-VNR-3104-NVR-Vulnerabilties/blob/main/CPPlus_CP-VNR-3104_Security_Assessment.pdf" } ] } diff --git a/2024/54xxx/CVE-2024-54849.json b/2024/54xxx/CVE-2024-54849.json index 6ae38ba66af..b74262394f9 100644 --- a/2024/54xxx/CVE-2024-54849.json +++ b/2024/54xxx/CVE-2024-54849.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-54849", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-54849", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in CP Plus CP-VNR-3104 B3223P22C02424 allows attackers to obtain the second RSA private key and access sensitive data or execute a man-in-the-middle attack." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15522", + "refsource": "MISC", + "name": "https://nvd.nist.gov/vuln/detail/CVE-2020-15522" + }, + { + "url": "https://payatu.com/blog/solving-the-problem-of-encrypted-firmware/", + "refsource": "MISC", + "name": "https://payatu.com/blog/solving-the-problem-of-encrypted-firmware/" } ] } diff --git a/2025/0xxx/CVE-2025-0378.json b/2025/0xxx/CVE-2025-0378.json new file mode 100644 index 00000000000..ca8eed8a11d --- /dev/null +++ b/2025/0xxx/CVE-2025-0378.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0378", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0379.json b/2025/0xxx/CVE-2025-0379.json new file mode 100644 index 00000000000..4a9cac11f2a --- /dev/null +++ b/2025/0xxx/CVE-2025-0379.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0379", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0380.json b/2025/0xxx/CVE-2025-0380.json new file mode 100644 index 00000000000..f05b3b21615 --- /dev/null +++ b/2025/0xxx/CVE-2025-0380.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0380", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0381.json b/2025/0xxx/CVE-2025-0381.json new file mode 100644 index 00000000000..2ef055f4376 --- /dev/null +++ b/2025/0xxx/CVE-2025-0381.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0381", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0382.json b/2025/0xxx/CVE-2025-0382.json new file mode 100644 index 00000000000..7a257533295 --- /dev/null +++ b/2025/0xxx/CVE-2025-0382.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0382", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0383.json b/2025/0xxx/CVE-2025-0383.json new file mode 100644 index 00000000000..97b02170f2e --- /dev/null +++ b/2025/0xxx/CVE-2025-0383.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0383", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0384.json b/2025/0xxx/CVE-2025-0384.json new file mode 100644 index 00000000000..381e3857c80 --- /dev/null +++ b/2025/0xxx/CVE-2025-0384.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0384", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0385.json b/2025/0xxx/CVE-2025-0385.json new file mode 100644 index 00000000000..65ab8512ddf --- /dev/null +++ b/2025/0xxx/CVE-2025-0385.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0385", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0386.json b/2025/0xxx/CVE-2025-0386.json new file mode 100644 index 00000000000..f56660c2bed --- /dev/null +++ b/2025/0xxx/CVE-2025-0386.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0386", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0387.json b/2025/0xxx/CVE-2025-0387.json new file mode 100644 index 00000000000..3e1de987ee5 --- /dev/null +++ b/2025/0xxx/CVE-2025-0387.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0387", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0388.json b/2025/0xxx/CVE-2025-0388.json new file mode 100644 index 00000000000..488829bbb11 --- /dev/null +++ b/2025/0xxx/CVE-2025-0388.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0388", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0389.json b/2025/0xxx/CVE-2025-0389.json new file mode 100644 index 00000000000..4316f45aa5b --- /dev/null +++ b/2025/0xxx/CVE-2025-0389.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0389", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23050.json b/2025/23xxx/CVE-2025-23050.json new file mode 100644 index 00000000000..5a9e87b09fd --- /dev/null +++ b/2025/23xxx/CVE-2025-23050.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23050", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23051.json b/2025/23xxx/CVE-2025-23051.json new file mode 100644 index 00000000000..d4910f94c4b --- /dev/null +++ b/2025/23xxx/CVE-2025-23051.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23051", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23052.json b/2025/23xxx/CVE-2025-23052.json new file mode 100644 index 00000000000..94a1a882027 --- /dev/null +++ b/2025/23xxx/CVE-2025-23052.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23052", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23053.json b/2025/23xxx/CVE-2025-23053.json new file mode 100644 index 00000000000..fa12d662d00 --- /dev/null +++ b/2025/23xxx/CVE-2025-23053.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23053", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23054.json b/2025/23xxx/CVE-2025-23054.json new file mode 100644 index 00000000000..84f5d430bae --- /dev/null +++ b/2025/23xxx/CVE-2025-23054.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23054", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23055.json b/2025/23xxx/CVE-2025-23055.json new file mode 100644 index 00000000000..ccd41438d1f --- /dev/null +++ b/2025/23xxx/CVE-2025-23055.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23055", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23056.json b/2025/23xxx/CVE-2025-23056.json new file mode 100644 index 00000000000..99617a6eda2 --- /dev/null +++ b/2025/23xxx/CVE-2025-23056.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23056", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23057.json b/2025/23xxx/CVE-2025-23057.json new file mode 100644 index 00000000000..3601ef4f87d --- /dev/null +++ b/2025/23xxx/CVE-2025-23057.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23057", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23058.json b/2025/23xxx/CVE-2025-23058.json new file mode 100644 index 00000000000..c046357109b --- /dev/null +++ b/2025/23xxx/CVE-2025-23058.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23058", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23059.json b/2025/23xxx/CVE-2025-23059.json new file mode 100644 index 00000000000..d6868aa1e0c --- /dev/null +++ b/2025/23xxx/CVE-2025-23059.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23059", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23060.json b/2025/23xxx/CVE-2025-23060.json new file mode 100644 index 00000000000..79c072536e2 --- /dev/null +++ b/2025/23xxx/CVE-2025-23060.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23060", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23061.json b/2025/23xxx/CVE-2025-23061.json new file mode 100644 index 00000000000..414bff22b48 --- /dev/null +++ b/2025/23xxx/CVE-2025-23061.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23061", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23062.json b/2025/23xxx/CVE-2025-23062.json new file mode 100644 index 00000000000..bda6844408f --- /dev/null +++ b/2025/23xxx/CVE-2025-23062.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23062", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23063.json b/2025/23xxx/CVE-2025-23063.json new file mode 100644 index 00000000000..d27d554b62e --- /dev/null +++ b/2025/23xxx/CVE-2025-23063.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23063", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23064.json b/2025/23xxx/CVE-2025-23064.json new file mode 100644 index 00000000000..99444adfafd --- /dev/null +++ b/2025/23xxx/CVE-2025-23064.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23064", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23065.json b/2025/23xxx/CVE-2025-23065.json new file mode 100644 index 00000000000..a35717c3857 --- /dev/null +++ b/2025/23xxx/CVE-2025-23065.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23065", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23066.json b/2025/23xxx/CVE-2025-23066.json new file mode 100644 index 00000000000..618f2ea6e38 --- /dev/null +++ b/2025/23xxx/CVE-2025-23066.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23066", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23067.json b/2025/23xxx/CVE-2025-23067.json new file mode 100644 index 00000000000..f5a1c5badcd --- /dev/null +++ b/2025/23xxx/CVE-2025-23067.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23067", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23068.json b/2025/23xxx/CVE-2025-23068.json new file mode 100644 index 00000000000..ed340028f68 --- /dev/null +++ b/2025/23xxx/CVE-2025-23068.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23068", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23069.json b/2025/23xxx/CVE-2025-23069.json new file mode 100644 index 00000000000..6d17cbfdbee --- /dev/null +++ b/2025/23xxx/CVE-2025-23069.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23069", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23070.json b/2025/23xxx/CVE-2025-23070.json new file mode 100644 index 00000000000..fa90b37bdf3 --- /dev/null +++ b/2025/23xxx/CVE-2025-23070.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23070", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/23xxx/CVE-2025-23071.json b/2025/23xxx/CVE-2025-23071.json new file mode 100644 index 00000000000..d1e696d1735 --- /dev/null +++ b/2025/23xxx/CVE-2025-23071.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-23071", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file