From 20ba497bbdc648bd419cc5e0772bb2bd6bcd22bc Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 19 Feb 2025 23:00:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2023/51xxx/CVE-2023-51305.json | 61 ++++++++++++++++++--- 2024/10xxx/CVE-2024-10339.json | 8 +-- 2024/37xxx/CVE-2024-37359.json | 97 ++++++++++++++++++++++++++++++++-- 2024/54xxx/CVE-2024-54840.json | 5 ++ 2024/5xxx/CVE-2024-5705.json | 97 ++++++++++++++++++++++++++++++++-- 2024/5xxx/CVE-2024-5706.json | 97 ++++++++++++++++++++++++++++++++-- 2025/1xxx/CVE-2025-1489.json | 18 +++++++ 2025/1xxx/CVE-2025-1490.json | 18 +++++++ 2025/1xxx/CVE-2025-1491.json | 18 +++++++ 2025/21xxx/CVE-2025-21355.json | 64 ++++++++++++++++++++-- 2025/24xxx/CVE-2025-24989.json | 64 ++++++++++++++++++++-- 2025/25xxx/CVE-2025-25943.json | 56 +++++++++++++++++--- 2025/25xxx/CVE-2025-25944.json | 56 +++++++++++++++++--- 2025/25xxx/CVE-2025-25947.json | 56 +++++++++++++++++--- 2025/27xxx/CVE-2025-27092.json | 63 ++++++++++++++++++++-- 2025/27xxx/CVE-2025-27158.json | 18 +++++++ 2025/27xxx/CVE-2025-27159.json | 18 +++++++ 2025/27xxx/CVE-2025-27160.json | 18 +++++++ 2025/27xxx/CVE-2025-27161.json | 18 +++++++ 2025/27xxx/CVE-2025-27162.json | 18 +++++++ 2025/27xxx/CVE-2025-27163.json | 18 +++++++ 2025/27xxx/CVE-2025-27164.json | 18 +++++++ 2025/27xxx/CVE-2025-27165.json | 18 +++++++ 2025/27xxx/CVE-2025-27166.json | 18 +++++++ 2025/27xxx/CVE-2025-27167.json | 18 +++++++ 2025/27xxx/CVE-2025-27168.json | 18 +++++++ 2025/27xxx/CVE-2025-27169.json | 18 +++++++ 2025/27xxx/CVE-2025-27170.json | 18 +++++++ 2025/27xxx/CVE-2025-27171.json | 18 +++++++ 2025/27xxx/CVE-2025-27172.json | 18 +++++++ 2025/27xxx/CVE-2025-27173.json | 18 +++++++ 2025/27xxx/CVE-2025-27174.json | 18 +++++++ 2025/27xxx/CVE-2025-27175.json | 18 +++++++ 2025/27xxx/CVE-2025-27176.json | 18 +++++++ 2025/27xxx/CVE-2025-27177.json | 18 +++++++ 2025/27xxx/CVE-2025-27178.json | 18 +++++++ 2025/27xxx/CVE-2025-27179.json | 18 +++++++ 2025/27xxx/CVE-2025-27180.json | 18 +++++++ 2025/27xxx/CVE-2025-27181.json | 18 +++++++ 2025/27xxx/CVE-2025-27182.json | 18 +++++++ 2025/27xxx/CVE-2025-27183.json | 18 +++++++ 2025/27xxx/CVE-2025-27184.json | 18 +++++++ 2025/27xxx/CVE-2025-27185.json | 18 +++++++ 2025/27xxx/CVE-2025-27186.json | 18 +++++++ 2025/27xxx/CVE-2025-27187.json | 18 +++++++ 2025/27xxx/CVE-2025-27188.json | 18 +++++++ 2025/27xxx/CVE-2025-27189.json | 18 +++++++ 2025/27xxx/CVE-2025-27190.json | 18 +++++++ 2025/27xxx/CVE-2025-27191.json | 18 +++++++ 2025/27xxx/CVE-2025-27192.json | 18 +++++++ 2025/27xxx/CVE-2025-27193.json | 18 +++++++ 2025/27xxx/CVE-2025-27194.json | 18 +++++++ 2025/27xxx/CVE-2025-27195.json | 18 +++++++ 2025/27xxx/CVE-2025-27196.json | 18 +++++++ 2025/27xxx/CVE-2025-27197.json | 18 +++++++ 2025/27xxx/CVE-2025-27198.json | 18 +++++++ 2025/27xxx/CVE-2025-27199.json | 18 +++++++ 2025/27xxx/CVE-2025-27200.json | 18 +++++++ 2025/27xxx/CVE-2025-27201.json | 18 +++++++ 2025/27xxx/CVE-2025-27202.json | 18 +++++++ 2025/27xxx/CVE-2025-27203.json | 18 +++++++ 2025/27xxx/CVE-2025-27204.json | 18 +++++++ 2025/27xxx/CVE-2025-27205.json | 18 +++++++ 2025/27xxx/CVE-2025-27206.json | 18 +++++++ 2025/27xxx/CVE-2025-27207.json | 18 +++++++ 65 files changed, 1626 insertions(+), 52 deletions(-) create mode 100644 2025/1xxx/CVE-2025-1489.json create mode 100644 2025/1xxx/CVE-2025-1490.json create mode 100644 2025/1xxx/CVE-2025-1491.json create mode 100644 2025/27xxx/CVE-2025-27158.json create mode 100644 2025/27xxx/CVE-2025-27159.json create mode 100644 2025/27xxx/CVE-2025-27160.json create mode 100644 2025/27xxx/CVE-2025-27161.json create mode 100644 2025/27xxx/CVE-2025-27162.json create mode 100644 2025/27xxx/CVE-2025-27163.json create mode 100644 2025/27xxx/CVE-2025-27164.json create mode 100644 2025/27xxx/CVE-2025-27165.json create mode 100644 2025/27xxx/CVE-2025-27166.json create mode 100644 2025/27xxx/CVE-2025-27167.json create mode 100644 2025/27xxx/CVE-2025-27168.json create mode 100644 2025/27xxx/CVE-2025-27169.json create mode 100644 2025/27xxx/CVE-2025-27170.json create mode 100644 2025/27xxx/CVE-2025-27171.json create mode 100644 2025/27xxx/CVE-2025-27172.json create mode 100644 2025/27xxx/CVE-2025-27173.json create mode 100644 2025/27xxx/CVE-2025-27174.json create mode 100644 2025/27xxx/CVE-2025-27175.json create mode 100644 2025/27xxx/CVE-2025-27176.json create mode 100644 2025/27xxx/CVE-2025-27177.json create mode 100644 2025/27xxx/CVE-2025-27178.json create mode 100644 2025/27xxx/CVE-2025-27179.json create mode 100644 2025/27xxx/CVE-2025-27180.json create mode 100644 2025/27xxx/CVE-2025-27181.json create mode 100644 2025/27xxx/CVE-2025-27182.json create mode 100644 2025/27xxx/CVE-2025-27183.json create mode 100644 2025/27xxx/CVE-2025-27184.json create mode 100644 2025/27xxx/CVE-2025-27185.json create mode 100644 2025/27xxx/CVE-2025-27186.json create mode 100644 2025/27xxx/CVE-2025-27187.json create mode 100644 2025/27xxx/CVE-2025-27188.json create mode 100644 2025/27xxx/CVE-2025-27189.json create mode 100644 2025/27xxx/CVE-2025-27190.json create mode 100644 2025/27xxx/CVE-2025-27191.json create mode 100644 2025/27xxx/CVE-2025-27192.json create mode 100644 2025/27xxx/CVE-2025-27193.json create mode 100644 2025/27xxx/CVE-2025-27194.json create mode 100644 2025/27xxx/CVE-2025-27195.json create mode 100644 2025/27xxx/CVE-2025-27196.json create mode 100644 2025/27xxx/CVE-2025-27197.json create mode 100644 2025/27xxx/CVE-2025-27198.json create mode 100644 2025/27xxx/CVE-2025-27199.json create mode 100644 2025/27xxx/CVE-2025-27200.json create mode 100644 2025/27xxx/CVE-2025-27201.json create mode 100644 2025/27xxx/CVE-2025-27202.json create mode 100644 2025/27xxx/CVE-2025-27203.json create mode 100644 2025/27xxx/CVE-2025-27204.json create mode 100644 2025/27xxx/CVE-2025-27205.json create mode 100644 2025/27xxx/CVE-2025-27206.json create mode 100644 2025/27xxx/CVE-2025-27207.json diff --git a/2023/51xxx/CVE-2023-51305.json b/2023/51xxx/CVE-2023-51305.json index 6675a208e6a..0500c3dcb1b 100644 --- a/2023/51xxx/CVE-2023-51305.json +++ b/2023/51xxx/CVE-2023-51305.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-51305", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-51305", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "PHPJabbers Car Park Booking System v3.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key\" parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.phpjabbers.com/car-park-booking/#sectionDemo", + "refsource": "MISC", + "name": "https://www.phpjabbers.com/car-park-booking/#sectionDemo" + }, + { + "refsource": "MISC", + "name": "https://packetstorm.news/files/id/176491", + "url": "https://packetstorm.news/files/id/176491" } ] } diff --git a/2024/10xxx/CVE-2024-10339.json b/2024/10xxx/CVE-2024-10339.json index 0163c73a64d..0dc49beaa53 100644 --- a/2024/10xxx/CVE-2024-10339.json +++ b/2024/10xxx/CVE-2024-10339.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10339", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] } diff --git a/2024/37xxx/CVE-2024-37359.json b/2024/37xxx/CVE-2024-37359.json index b4007d8a2ee..594f6a97829 100644 --- a/2024/37xxx/CVE-2024-37359.json +++ b/2024/37xxx/CVE-2024-37359.json @@ -1,17 +1,106 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-37359", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security.vulnerabilities@hitachivantara.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. (CWE-918) \n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, do not validate the Host header of incoming HTTP/HTTPS requests.\n\n\n\n\u00a0\n\n\n\nBy providing URLs to unexpected hosts or ports, attackers can make it appear that the server is sending the request, possibly bypassing access controls such as firewalls that prevent the attackers from accessing the URLs directly. The server can be used as a proxy to conduct port scanning of hosts in internal networks, use other URLs such as that can access documents on the system (using file://), or use other protocols such as gopher:// or tftp://, which may provide greater control over the contents of requests." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-918 Server-Side Request Forgery (SSRF)", + "cweId": "CWE-918" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Hitachi Vantara", + "product": { + "product_data": [ + { + "product_name": "Pentaho Data Integration & Analytics", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0", + "version_value": "10.2.0.0" + } + ] + } + }, + { + "product_name": "Pentaho Business Analytics Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.0", + "version_value": "9.3.0.9" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.pentaho.com/hc/en-us/articles/34296789835917--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Server-Side-Request-Forgery-Versions-before-10-2-0-0-and-9-3-0-9-including-8-3-x-Impacted-CVE-2024-37359", + "refsource": "MISC", + "name": "https://support.pentaho.com/hc/en-us/articles/34296789835917--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Server-Side-Request-Forgery-Versions-before-10-2-0-0-and-9-3-0-9-including-8-3-x-Impacted-CVE-2024-37359" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Hitachi Group Member" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "version": "3.1" } ] } diff --git a/2024/54xxx/CVE-2024-54840.json b/2024/54xxx/CVE-2024-54840.json index ec3a09dd564..e6573bb791c 100644 --- a/2024/54xxx/CVE-2024-54840.json +++ b/2024/54xxx/CVE-2024-54840.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://docs.cyberark.com/pam-self-hosted/latest/en/content/release%20notes/rn-whatsnew14-4.htm#Securitybugfixes", "url": "https://docs.cyberark.com/pam-self-hosted/latest/en/content/release%20notes/rn-whatsnew14-4.htm#Securitybugfixes" + }, + { + "refsource": "MISC", + "name": "https://gist.github.com/Hurdano/8244855ef8ec364fd98a2693de6e30c5", + "url": "https://gist.github.com/Hurdano/8244855ef8ec364fd98a2693de6e30c5" } ] } diff --git a/2024/5xxx/CVE-2024-5705.json b/2024/5xxx/CVE-2024-5705.json index 8f81a9956ed..9d74e0ca02d 100644 --- a/2024/5xxx/CVE-2024-5705.json +++ b/2024/5xxx/CVE-2024-5705.json @@ -1,17 +1,106 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-5705", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security.vulnerabilities@hitachivantara.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. (CWE-863) \n\n\n\n\u00a0\n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, have modules enabled by default that allow execution of system level processes. \n\n\n\n\u00a0\n\n\n\n\n\n\n\n\nWhen access control checks are incorrectly applied, users can access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures and denial of service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-863 Incorrect Authorization", + "cweId": "CWE-863" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Hitachi Vantara", + "product": { + "product_data": [ + { + "product_name": "Pentaho Data Integration & Analytics", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0", + "version_value": "10.2.0.0" + } + ] + } + }, + { + "product_name": "Pentaho Business Analytics Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.0", + "version_value": "9.3.0.9" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.pentaho.com/hc/en-us/articles/34296615099405--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Incorrect-Authorization-Versions-before-10-2-0-0-and-9-3-0-9-including-8-3-x-Impacted-CVE-2024-5705", + "refsource": "MISC", + "name": "https://support.pentaho.com/hc/en-us/articles/34296615099405--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Incorrect-Authorization-Versions-before-10-2-0-0-and-9-3-0-9-including-8-3-x-Impacted-CVE-2024-5705" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "tuo4n8 & thongvv (GE) from VNG Security Response Center" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2024/5xxx/CVE-2024-5706.json b/2024/5xxx/CVE-2024-5706.json index d6267ca0659..4154ec9bc39 100644 --- a/2024/5xxx/CVE-2024-5706.json +++ b/2024/5xxx/CVE-2024-5706.json @@ -1,17 +1,106 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-5706", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security.vulnerabilities@hitachivantara.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. (CWE-99)\u00a0\n\n\n\n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, do not restrict JNDI identifiers during the creation of Community Dashboards, allowing control of system-level data sources.\u00a0\n\n\n\n\n\n\n\nAn attacker could gain access to or modify sensitive data or system resources. This could allow access to protected files or directories including configuration files and files containing sensitive information, which can lead to remote code execution by unauthorized users." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-99: Improper Control of Resource Identifiers ('Resource Injection')", + "cweId": "CWE-99" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Hitachi Vantara", + "product": { + "product_data": [ + { + "product_name": "Pentaho Data Integration & Analytics", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "10.0", + "version_value": "10.2.0.0" + } + ] + } + }, + { + "product_name": "Pentaho Business Analytics Server", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.0", + "version_value": "9.3.0.9" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://support.pentaho.com/hc/en-us/articles/34296195570189--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Improper-Control-of-Resource-Identifiers-Resource-Injection-Versions-before-10-2-0-0-and-9-3-0-9-including-8-3-x-Impacted-CVE-2024-5706", + "refsource": "MISC", + "name": "https://support.pentaho.com/hc/en-us/articles/34296195570189--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Improper-Control-of-Resource-Identifiers-Resource-Injection-Versions-before-10-2-0-0-and-9-3-0-9-including-8-3-x-Impacted-CVE-2024-5706" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "tuo4n8 & thongvv (GE) from VNG Security Response Center" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2025/1xxx/CVE-2025-1489.json b/2025/1xxx/CVE-2025-1489.json new file mode 100644 index 00000000000..c9b709f4f20 --- /dev/null +++ b/2025/1xxx/CVE-2025-1489.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1489", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1490.json b/2025/1xxx/CVE-2025-1490.json new file mode 100644 index 00000000000..d6f11b2993c --- /dev/null +++ b/2025/1xxx/CVE-2025-1490.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1490", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/1xxx/CVE-2025-1491.json b/2025/1xxx/CVE-2025-1491.json new file mode 100644 index 00000000000..5d450a2644e --- /dev/null +++ b/2025/1xxx/CVE-2025-1491.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-1491", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/21xxx/CVE-2025-21355.json b/2025/21xxx/CVE-2025-21355.json index 8644a9bdf52..957f11932d6 100644 --- a/2025/21xxx/CVE-2025-21355.json +++ b/2025/21xxx/CVE-2025-21355.json @@ -1,17 +1,73 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-21355", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secure@microsoft.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Missing Authentication for Critical Function in Microsoft Bing allows an unauthorized attacker to execute code over a network" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-306: Missing Authentication for Critical Function", + "cweId": "CWE-306" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Microsoft Bing", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "N/A" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21355", + "refsource": "MISC", + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21355" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 8.6, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N/E:P/RL:O/RC:C" } ] } diff --git a/2025/24xxx/CVE-2025-24989.json b/2025/24xxx/CVE-2025-24989.json index fa5af215da4..3740cee7588 100644 --- a/2025/24xxx/CVE-2025-24989.json +++ b/2025/24xxx/CVE-2025-24989.json @@ -1,17 +1,73 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-24989", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secure@microsoft.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control.\nThis vulnerability has already been mitigated in the service and all affected cusomters have been notified. This update addressed the registration control bypass. Affected customers have been given instructions on reviewing their sites for potential exploitation and clean up methods. If you've not been notified this vulnerability does not affect you." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-284: Improper Access Control", + "cweId": "CWE-284" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Microsoft Power Pages", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "N/A" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24989", + "refsource": "MISC", + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24989" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 8.2, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N/E:U/RL:O/RC:C" } ] } diff --git a/2025/25xxx/CVE-2025-25943.json b/2025/25xxx/CVE-2025-25943.json index 057fd9477d7..f4ee7a50687 100644 --- a/2025/25xxx/CVE-2025-25943.json +++ b/2025/25xxx/CVE-2025-25943.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25943", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25943", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the AP4_Stz2Atom::AP4_Stz2Atom component located in Ap4Stz2Atom.cpp." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/axiomatic-systems/Bento4/issues/993", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/issues/993" } ] } diff --git a/2025/25xxx/CVE-2025-25944.json b/2025/25xxx/CVE-2025-25944.json index 9ec736023cc..6e579e65d16 100644 --- a/2025/25xxx/CVE-2025-25944.json +++ b/2025/25xxx/CVE-2025-25944.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25944", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25944", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the Ap4RtpAtom.cpp, specifically in AP4_RtpAtom::AP4_RtpAtom, during the execution of mp4fragment with a crafted MP4 input file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/axiomatic-systems/Bento4/issues/993", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/issues/993" } ] } diff --git a/2025/25xxx/CVE-2025-25947.json b/2025/25xxx/CVE-2025-25947.json index 20f7b7ede93..13f6dfceea4 100644 --- a/2025/25xxx/CVE-2025-25947.json +++ b/2025/25xxx/CVE-2025-25947.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25947", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25947", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue in Bento4 v1.6.0-641 allows an attacker to trigger a segmentation fault via Ap4Atom.cpp, specifically in AP4_AtomParent::RemoveChild, during the execution of mp4encrypt with a specially crafted MP4 input file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/axiomatic-systems/Bento4/issues/994", + "refsource": "MISC", + "name": "https://github.com/axiomatic-systems/Bento4/issues/994" } ] } diff --git a/2025/27xxx/CVE-2025-27092.json b/2025/27xxx/CVE-2025-27092.json index 9597c8b3408..d62cc373ef3 100644 --- a/2025/27xxx/CVE-2025-27092.json +++ b/2025/27xxx/CVE-2025-27092.json @@ -1,18 +1,73 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-27092", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "GHOSTS is an open source user simulation framework for cyber experimentation, simulation, training, and exercise. A path traversal vulnerability was discovered in GHOSTS version 8.0.0.0 that allows an attacker to access files outside of the intended directory through the photo retrieval endpoint. The vulnerability exists in the /api/npcs/{id}/photo endpoint, which is designed to serve profile photos for NPCs (Non-Player Characters) but fails to properly validate and sanitize file paths. When an NPC is created with a specially crafted photoLink value containing path traversal sequences (../, ..\\, etc.), the application processes these sequences without proper sanitization. This allows an attacker to traverse directory structures and access files outside of the intended photo directory, potentially exposing sensitive system files. The vulnerability is particularly severe because it allows reading arbitrary files from the server's filesystem with the permissions of the web application process, which could include configuration files, credentials, or other sensitive data. This issue has been addressed in version 8.2.7.90 and all users are advised to upgrade. There are no known workarounds for this vulnerability." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", + "cweId": "CWE-22" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "cmu-sei", + "product": { + "product_data": [ + { + "product_name": "GHOSTS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": ">= 8.0.0, < 8.2.7.90" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/cmu-sei/GHOSTS/security/advisories/GHSA-qr67-m6w9-wj3j", + "refsource": "MISC", + "name": "https://github.com/cmu-sei/GHOSTS/security/advisories/GHSA-qr67-m6w9-wj3j" + }, + { + "url": "https://github.com/cmu-sei/GHOSTS/commit/e69827556a52ff813de00e1017c4b62598d2c887", + "refsource": "MISC", + "name": "https://github.com/cmu-sei/GHOSTS/commit/e69827556a52ff813de00e1017c4b62598d2c887" + } + ] + }, + "source": { + "advisory": "GHSA-qr67-m6w9-wj3j", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27158.json b/2025/27xxx/CVE-2025-27158.json new file mode 100644 index 00000000000..ecca7f36d4f --- /dev/null +++ b/2025/27xxx/CVE-2025-27158.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27158", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27159.json b/2025/27xxx/CVE-2025-27159.json new file mode 100644 index 00000000000..2c7b80aca0c --- /dev/null +++ b/2025/27xxx/CVE-2025-27159.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27159", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27160.json b/2025/27xxx/CVE-2025-27160.json new file mode 100644 index 00000000000..bd84c9ddbb3 --- /dev/null +++ b/2025/27xxx/CVE-2025-27160.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27160", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27161.json b/2025/27xxx/CVE-2025-27161.json new file mode 100644 index 00000000000..eb6aa275325 --- /dev/null +++ b/2025/27xxx/CVE-2025-27161.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27161", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27162.json b/2025/27xxx/CVE-2025-27162.json new file mode 100644 index 00000000000..b3774afaf1f --- /dev/null +++ b/2025/27xxx/CVE-2025-27162.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27162", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27163.json b/2025/27xxx/CVE-2025-27163.json new file mode 100644 index 00000000000..a7419161815 --- /dev/null +++ b/2025/27xxx/CVE-2025-27163.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27163", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27164.json b/2025/27xxx/CVE-2025-27164.json new file mode 100644 index 00000000000..9eb64be576e --- /dev/null +++ b/2025/27xxx/CVE-2025-27164.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27164", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27165.json b/2025/27xxx/CVE-2025-27165.json new file mode 100644 index 00000000000..234e93c47c7 --- /dev/null +++ b/2025/27xxx/CVE-2025-27165.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27165", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27166.json b/2025/27xxx/CVE-2025-27166.json new file mode 100644 index 00000000000..032f160e226 --- /dev/null +++ b/2025/27xxx/CVE-2025-27166.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27166", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27167.json b/2025/27xxx/CVE-2025-27167.json new file mode 100644 index 00000000000..ee1ebb8f192 --- /dev/null +++ b/2025/27xxx/CVE-2025-27167.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27167", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27168.json b/2025/27xxx/CVE-2025-27168.json new file mode 100644 index 00000000000..f352ea43d9a --- /dev/null +++ b/2025/27xxx/CVE-2025-27168.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27168", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27169.json b/2025/27xxx/CVE-2025-27169.json new file mode 100644 index 00000000000..dad12135bec --- /dev/null +++ b/2025/27xxx/CVE-2025-27169.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27169", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27170.json b/2025/27xxx/CVE-2025-27170.json new file mode 100644 index 00000000000..141f48487bc --- /dev/null +++ b/2025/27xxx/CVE-2025-27170.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27170", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27171.json b/2025/27xxx/CVE-2025-27171.json new file mode 100644 index 00000000000..34542541df6 --- /dev/null +++ b/2025/27xxx/CVE-2025-27171.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27171", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27172.json b/2025/27xxx/CVE-2025-27172.json new file mode 100644 index 00000000000..d67a84087f0 --- /dev/null +++ b/2025/27xxx/CVE-2025-27172.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27172", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27173.json b/2025/27xxx/CVE-2025-27173.json new file mode 100644 index 00000000000..ba12edecc40 --- /dev/null +++ b/2025/27xxx/CVE-2025-27173.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27173", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27174.json b/2025/27xxx/CVE-2025-27174.json new file mode 100644 index 00000000000..59f57610844 --- /dev/null +++ b/2025/27xxx/CVE-2025-27174.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27174", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27175.json b/2025/27xxx/CVE-2025-27175.json new file mode 100644 index 00000000000..a5ff5fefe07 --- /dev/null +++ b/2025/27xxx/CVE-2025-27175.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27175", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27176.json b/2025/27xxx/CVE-2025-27176.json new file mode 100644 index 00000000000..2584d45e216 --- /dev/null +++ b/2025/27xxx/CVE-2025-27176.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27176", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27177.json b/2025/27xxx/CVE-2025-27177.json new file mode 100644 index 00000000000..d60b75c35eb --- /dev/null +++ b/2025/27xxx/CVE-2025-27177.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27177", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27178.json b/2025/27xxx/CVE-2025-27178.json new file mode 100644 index 00000000000..c9b51bcd930 --- /dev/null +++ b/2025/27xxx/CVE-2025-27178.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27178", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27179.json b/2025/27xxx/CVE-2025-27179.json new file mode 100644 index 00000000000..fd6d4e1b02f --- /dev/null +++ b/2025/27xxx/CVE-2025-27179.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27179", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27180.json b/2025/27xxx/CVE-2025-27180.json new file mode 100644 index 00000000000..742f06be627 --- /dev/null +++ b/2025/27xxx/CVE-2025-27180.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27180", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27181.json b/2025/27xxx/CVE-2025-27181.json new file mode 100644 index 00000000000..d687eb8e396 --- /dev/null +++ b/2025/27xxx/CVE-2025-27181.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27181", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27182.json b/2025/27xxx/CVE-2025-27182.json new file mode 100644 index 00000000000..f99c122a05f --- /dev/null +++ b/2025/27xxx/CVE-2025-27182.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27182", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27183.json b/2025/27xxx/CVE-2025-27183.json new file mode 100644 index 00000000000..ba4a022251f --- /dev/null +++ b/2025/27xxx/CVE-2025-27183.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27183", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27184.json b/2025/27xxx/CVE-2025-27184.json new file mode 100644 index 00000000000..3ffdf2934ff --- /dev/null +++ b/2025/27xxx/CVE-2025-27184.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27184", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27185.json b/2025/27xxx/CVE-2025-27185.json new file mode 100644 index 00000000000..36b77da460c --- /dev/null +++ b/2025/27xxx/CVE-2025-27185.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27185", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27186.json b/2025/27xxx/CVE-2025-27186.json new file mode 100644 index 00000000000..88272740ec3 --- /dev/null +++ b/2025/27xxx/CVE-2025-27186.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27186", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27187.json b/2025/27xxx/CVE-2025-27187.json new file mode 100644 index 00000000000..d9b0b267f94 --- /dev/null +++ b/2025/27xxx/CVE-2025-27187.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27187", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27188.json b/2025/27xxx/CVE-2025-27188.json new file mode 100644 index 00000000000..15baf46df40 --- /dev/null +++ b/2025/27xxx/CVE-2025-27188.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27188", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27189.json b/2025/27xxx/CVE-2025-27189.json new file mode 100644 index 00000000000..31516de61e9 --- /dev/null +++ b/2025/27xxx/CVE-2025-27189.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27189", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27190.json b/2025/27xxx/CVE-2025-27190.json new file mode 100644 index 00000000000..e602f6679c0 --- /dev/null +++ b/2025/27xxx/CVE-2025-27190.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27190", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27191.json b/2025/27xxx/CVE-2025-27191.json new file mode 100644 index 00000000000..493249873de --- /dev/null +++ b/2025/27xxx/CVE-2025-27191.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27191", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27192.json b/2025/27xxx/CVE-2025-27192.json new file mode 100644 index 00000000000..ca7d904ea86 --- /dev/null +++ b/2025/27xxx/CVE-2025-27192.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27192", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27193.json b/2025/27xxx/CVE-2025-27193.json new file mode 100644 index 00000000000..4b8e09dd973 --- /dev/null +++ b/2025/27xxx/CVE-2025-27193.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27193", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27194.json b/2025/27xxx/CVE-2025-27194.json new file mode 100644 index 00000000000..50f7c878bfd --- /dev/null +++ b/2025/27xxx/CVE-2025-27194.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27194", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27195.json b/2025/27xxx/CVE-2025-27195.json new file mode 100644 index 00000000000..52e60d6d87e --- /dev/null +++ b/2025/27xxx/CVE-2025-27195.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27195", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27196.json b/2025/27xxx/CVE-2025-27196.json new file mode 100644 index 00000000000..deb56b49c39 --- /dev/null +++ b/2025/27xxx/CVE-2025-27196.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27196", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27197.json b/2025/27xxx/CVE-2025-27197.json new file mode 100644 index 00000000000..f56c9548d7f --- /dev/null +++ b/2025/27xxx/CVE-2025-27197.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27197", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27198.json b/2025/27xxx/CVE-2025-27198.json new file mode 100644 index 00000000000..75c13c824c1 --- /dev/null +++ b/2025/27xxx/CVE-2025-27198.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27198", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27199.json b/2025/27xxx/CVE-2025-27199.json new file mode 100644 index 00000000000..05332f1b698 --- /dev/null +++ b/2025/27xxx/CVE-2025-27199.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27199", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27200.json b/2025/27xxx/CVE-2025-27200.json new file mode 100644 index 00000000000..0913ba0e823 --- /dev/null +++ b/2025/27xxx/CVE-2025-27200.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27200", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27201.json b/2025/27xxx/CVE-2025-27201.json new file mode 100644 index 00000000000..69628889854 --- /dev/null +++ b/2025/27xxx/CVE-2025-27201.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27201", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27202.json b/2025/27xxx/CVE-2025-27202.json new file mode 100644 index 00000000000..3f45cc1cd50 --- /dev/null +++ b/2025/27xxx/CVE-2025-27202.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27202", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27203.json b/2025/27xxx/CVE-2025-27203.json new file mode 100644 index 00000000000..e17e4e8b4a8 --- /dev/null +++ b/2025/27xxx/CVE-2025-27203.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27203", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27204.json b/2025/27xxx/CVE-2025-27204.json new file mode 100644 index 00000000000..e48550cbeab --- /dev/null +++ b/2025/27xxx/CVE-2025-27204.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27204", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27205.json b/2025/27xxx/CVE-2025-27205.json new file mode 100644 index 00000000000..8cc00bb79c1 --- /dev/null +++ b/2025/27xxx/CVE-2025-27205.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27205", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27206.json b/2025/27xxx/CVE-2025-27206.json new file mode 100644 index 00000000000..bd8658a43cf --- /dev/null +++ b/2025/27xxx/CVE-2025-27206.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27206", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27207.json b/2025/27xxx/CVE-2025-27207.json new file mode 100644 index 00000000000..647e4ff8415 --- /dev/null +++ b/2025/27xxx/CVE-2025-27207.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27207", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file