From 22d1618575060104addf444a53ec75ce2a3d8bf4 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 26 Mar 2025 16:00:34 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/27xxx/CVE-2025-27404.json | 2 +- 2025/27xxx/CVE-2025-27405.json | 90 +++++++++++++++++++++++-- 2025/27xxx/CVE-2025-27406.json | 90 +++++++++++++++++++++++-- 2025/2xxx/CVE-2025-2098.json | 74 +++++++++++++++++++-- 2025/2xxx/CVE-2025-2821.json | 18 +++++ 2025/2xxx/CVE-2025-2822.json | 18 +++++ 2025/2xxx/CVE-2025-2823.json | 18 +++++ 2025/2xxx/CVE-2025-2824.json | 18 +++++ 2025/2xxx/CVE-2025-2825.json | 116 +++++++++++++++++++++++++++++++++ 2025/31xxx/CVE-2025-31114.json | 18 +++++ 2025/31xxx/CVE-2025-31115.json | 18 +++++ 2025/31xxx/CVE-2025-31116.json | 18 +++++ 2025/31xxx/CVE-2025-31117.json | 18 +++++ 2025/31xxx/CVE-2025-31118.json | 18 +++++ 2025/31xxx/CVE-2025-31119.json | 18 +++++ 2025/31xxx/CVE-2025-31120.json | 18 +++++ 2025/31xxx/CVE-2025-31121.json | 18 +++++ 2025/31xxx/CVE-2025-31122.json | 18 +++++ 2025/31xxx/CVE-2025-31123.json | 18 +++++ 2025/31xxx/CVE-2025-31124.json | 18 +++++ 2025/31xxx/CVE-2025-31125.json | 18 +++++ 2025/31xxx/CVE-2025-31126.json | 18 +++++ 2025/31xxx/CVE-2025-31127.json | 18 +++++ 2025/31xxx/CVE-2025-31128.json | 18 +++++ 2025/31xxx/CVE-2025-31129.json | 18 +++++ 2025/31xxx/CVE-2025-31130.json | 18 +++++ 2025/31xxx/CVE-2025-31131.json | 18 +++++ 2025/31xxx/CVE-2025-31132.json | 18 +++++ 2025/31xxx/CVE-2025-31133.json | 18 +++++ 2025/31xxx/CVE-2025-31134.json | 18 +++++ 2025/31xxx/CVE-2025-31135.json | 18 +++++ 2025/31xxx/CVE-2025-31136.json | 18 +++++ 2025/31xxx/CVE-2025-31137.json | 18 +++++ 2025/31xxx/CVE-2025-31138.json | 18 +++++ 34 files changed, 880 insertions(+), 14 deletions(-) create mode 100644 2025/2xxx/CVE-2025-2821.json create mode 100644 2025/2xxx/CVE-2025-2822.json create mode 100644 2025/2xxx/CVE-2025-2823.json create mode 100644 2025/2xxx/CVE-2025-2824.json create mode 100644 2025/2xxx/CVE-2025-2825.json create mode 100644 2025/31xxx/CVE-2025-31114.json create mode 100644 2025/31xxx/CVE-2025-31115.json create mode 100644 2025/31xxx/CVE-2025-31116.json create mode 100644 2025/31xxx/CVE-2025-31117.json create mode 100644 2025/31xxx/CVE-2025-31118.json create mode 100644 2025/31xxx/CVE-2025-31119.json create mode 100644 2025/31xxx/CVE-2025-31120.json create mode 100644 2025/31xxx/CVE-2025-31121.json create mode 100644 2025/31xxx/CVE-2025-31122.json create mode 100644 2025/31xxx/CVE-2025-31123.json create mode 100644 2025/31xxx/CVE-2025-31124.json create mode 100644 2025/31xxx/CVE-2025-31125.json create mode 100644 2025/31xxx/CVE-2025-31126.json create mode 100644 2025/31xxx/CVE-2025-31127.json create mode 100644 2025/31xxx/CVE-2025-31128.json create mode 100644 2025/31xxx/CVE-2025-31129.json create mode 100644 2025/31xxx/CVE-2025-31130.json create mode 100644 2025/31xxx/CVE-2025-31131.json create mode 100644 2025/31xxx/CVE-2025-31132.json create mode 100644 2025/31xxx/CVE-2025-31133.json create mode 100644 2025/31xxx/CVE-2025-31134.json create mode 100644 2025/31xxx/CVE-2025-31135.json create mode 100644 2025/31xxx/CVE-2025-31136.json create mode 100644 2025/31xxx/CVE-2025-31137.json create mode 100644 2025/31xxx/CVE-2025-31138.json diff --git a/2025/27xxx/CVE-2025-27404.json b/2025/27xxx/CVE-2025-27404.json index 34a3d99ea8a..1fde8b2f7f4 100644 --- a/2025/27xxx/CVE-2025-27404.json +++ b/2025/27xxx/CVE-2025-27404.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 allows an attacker to craft a URL that, once visited by any user, allows to embed arbitrary Javascript into Icinga Web and to act on behalf of that user. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. As a workaround, those who have Icinga Web 2.12.2 may enable CSP in the application settings." + "value": "Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 allows an attacker to craft a URL that, once visited by any user, allows to embed arbitrary Javascript into Icinga Web and to act on behalf of that user. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. As a workaround, those who have Icinga Web 2.12.2 may enable a content security policy in the application settings." } ] }, diff --git a/2025/27xxx/CVE-2025-27405.json b/2025/27xxx/CVE-2025-27405.json index 75ecb683f9d..bc7bd5e2cca 100644 --- a/2025/27xxx/CVE-2025-27405.json +++ b/2025/27xxx/CVE-2025-27405.json @@ -1,17 +1,99 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-27405", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. A vulnerability in versions prior to 2.11.5 and 2.12.13 allows an attacker to craft a URL that, once visited by any user, allows to embed arbitrary Javascript into Icinga Web and to act on behalf of that user. This issue has been resolved in versions 2.11.5 and 2.12.3 of Icinga Web 2. As a workaround, those who have Icinga Web 2.12.2 may enable a content security policy in the application settings." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Icinga", + "product": { + "product_data": [ + { + "product_name": "icingaweb2", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 2.11.5" + }, + { + "version_affected": "=", + "version_value": ">= 2.12.0, < 2.12.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Icinga/icingaweb2/security/advisories/GHSA-3x37-fjc3-ch8w", + "refsource": "MISC", + "name": "https://github.com/Icinga/icingaweb2/security/advisories/GHSA-3x37-fjc3-ch8w" + }, + { + "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.11.5", + "refsource": "MISC", + "name": "https://github.com/Icinga/icingaweb2/releases/tag/v2.11.5" + }, + { + "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.12.3", + "refsource": "MISC", + "name": "https://github.com/Icinga/icingaweb2/releases/tag/v2.12.3" + } + ] + }, + "source": { + "advisory": "GHSA-3x37-fjc3-ch8w", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2025/27xxx/CVE-2025-27406.json b/2025/27xxx/CVE-2025-27406.json index 5e49222c51f..92111ca5d76 100644 --- a/2025/27xxx/CVE-2025-27406.json +++ b/2025/27xxx/CVE-2025-27406.json @@ -1,17 +1,99 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-27406", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Icinga Reporting is the central component for reporting related functionality in the monitoring web frontend and framework Icinga Web 2. A vulnerability present in versions 0.10.0 through 1.0.2 allows to set up a template that allows to embed arbitrary Javascript. This enables the attacker to act on behalf of the user, if the template is being previewed; and act on behalf of the headless browser, if a report using the template is printed to PDF. This issue has been resolved in version 1.0.3 of Icinga Reporting. As a workaround, review all templates and remove suspicious settings." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-918: Server-Side Request Forgery (SSRF)", + "cweId": "CWE-918" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Icinga", + "product": { + "product_data": [ + { + "product_name": "icingaweb2-module-reporting", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": ">= 0.10.0, < 1.0.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/Icinga/icingaweb2-module-reporting/security/advisories/GHSA-7qvq-54vm-r7hx", + "refsource": "MISC", + "name": "https://github.com/Icinga/icingaweb2-module-reporting/security/advisories/GHSA-7qvq-54vm-r7hx" + }, + { + "url": "https://github.com/Icinga/icingaweb2-module-reporting/releases/tag/v1.0.3", + "refsource": "MISC", + "name": "https://github.com/Icinga/icingaweb2-module-reporting/releases/tag/v1.0.3" + } + ] + }, + "source": { + "advisory": "GHSA-7qvq-54vm-r7hx", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2025/2xxx/CVE-2025-2098.json b/2025/2xxx/CVE-2025-2098.json index 3bd7e16a521..66b8b4c186d 100644 --- a/2025/2xxx/CVE-2025-2098.json +++ b/2025/2xxx/CVE-2025-2098.json @@ -1,18 +1,82 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2098", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cvd@cert.pl", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Fast CAD Reader application on MacOS was found to be installed with incorrect file permissions (rwxrwxrwx). This is inconsistent with standard macOS security practices, where applications should have drwxr-xr-x permissions. Incorrect permissions allow for Dylib Hijacking. Guest account, other users and applications can exploit this vulnerability for privilege escalation. This issue affects Fast CAD Reader\u00a0in possibly all versions since the vendor has not responded to our messages. The tested version was 4.1.5" } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-266 Incorrect Privilege Assignment", + "cweId": "CWE-266" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Beijing Honghu Yuntu Technology", + "product": { + "product_data": [ + { + "product_name": "Fast CAD Reader", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0", + "version_value": "4.1.5" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://cert.pl/en/posts/2025/03/CVE-2025-2098/", + "refsource": "MISC", + "name": "https://cert.pl/en/posts/2025/03/CVE-2025-2098/" + }, + { + "url": "https://apps.apple.com/pl/app/fast-cad-reader/id1484905765", + "refsource": "MISC", + "name": "https://apps.apple.com/pl/app/fast-cad-reader/id1484905765" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Karol Mazurek with AFINE" + } + ] } \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2821.json b/2025/2xxx/CVE-2025-2821.json new file mode 100644 index 00000000000..e8304ae3b2b --- /dev/null +++ b/2025/2xxx/CVE-2025-2821.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-2821", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2822.json b/2025/2xxx/CVE-2025-2822.json new file mode 100644 index 00000000000..746dd022527 --- /dev/null +++ b/2025/2xxx/CVE-2025-2822.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-2822", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2823.json b/2025/2xxx/CVE-2025-2823.json new file mode 100644 index 00000000000..85157d468bd --- /dev/null +++ b/2025/2xxx/CVE-2025-2823.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-2823", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2824.json b/2025/2xxx/CVE-2025-2824.json new file mode 100644 index 00000000000..23c9ebd689b --- /dev/null +++ b/2025/2xxx/CVE-2025-2824.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-2824", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2825.json b/2025/2xxx/CVE-2025-2825.json new file mode 100644 index 00000000000..c6f0c8610fc --- /dev/null +++ b/2025/2xxx/CVE-2025-2825.json @@ -0,0 +1,116 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2025-2825", + "ASSIGNER": "disclosure@vulncheck.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "CrushFTP versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0 are affected by a vulnerability that may result in unauthenticated access. Remote and unauthenticated HTTP requests to CrushFTP may allow attackers to gain unauthorized access." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "CrushFTP", + "product": { + "product_data": [ + { + "product_name": "CrushFTP", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "11.0.0", + "version_value": "11.3.1" + }, + { + "version_affected": "<", + "version_name": "10.0.0", + "version_value": "10.8.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update", + "refsource": "MISC", + "name": "https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update" + }, + { + "url": "https://www.rapid7.com/blog/post/2025/03/25/etr-notable-vulnerabilities-in-next-js-cve-2025-29927/", + "refsource": "MISC", + "name": "https://www.rapid7.com/blog/post/2025/03/25/etr-notable-vulnerabilities-in-next-js-cve-2025-29927/" + }, + { + "url": "https://www.runzero.com/blog/crushftp/", + "refsource": "MISC", + "name": "https://www.runzero.com/blog/crushftp/" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "work_around": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "The vulnerability is mitigated if you have the DMZ feature of CrushFTP in place." + } + ], + "value": "The vulnerability is mitigated if you have the DMZ feature of CrushFTP in place." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31114.json b/2025/31xxx/CVE-2025-31114.json new file mode 100644 index 00000000000..50bac6e93fd --- /dev/null +++ b/2025/31xxx/CVE-2025-31114.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31114", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31115.json b/2025/31xxx/CVE-2025-31115.json new file mode 100644 index 00000000000..91321b42e36 --- /dev/null +++ b/2025/31xxx/CVE-2025-31115.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31115", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31116.json b/2025/31xxx/CVE-2025-31116.json new file mode 100644 index 00000000000..812182e7a20 --- /dev/null +++ b/2025/31xxx/CVE-2025-31116.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31116", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31117.json b/2025/31xxx/CVE-2025-31117.json new file mode 100644 index 00000000000..8192dcd6cb9 --- /dev/null +++ b/2025/31xxx/CVE-2025-31117.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31117", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31118.json b/2025/31xxx/CVE-2025-31118.json new file mode 100644 index 00000000000..ce198ccf1e7 --- /dev/null +++ b/2025/31xxx/CVE-2025-31118.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31118", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31119.json b/2025/31xxx/CVE-2025-31119.json new file mode 100644 index 00000000000..087b0585caf --- /dev/null +++ b/2025/31xxx/CVE-2025-31119.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31119", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31120.json b/2025/31xxx/CVE-2025-31120.json new file mode 100644 index 00000000000..09f667e22e7 --- /dev/null +++ b/2025/31xxx/CVE-2025-31120.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31120", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31121.json b/2025/31xxx/CVE-2025-31121.json new file mode 100644 index 00000000000..48f95d7f21f --- /dev/null +++ b/2025/31xxx/CVE-2025-31121.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31121", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31122.json b/2025/31xxx/CVE-2025-31122.json new file mode 100644 index 00000000000..bd1d564c6bf --- /dev/null +++ b/2025/31xxx/CVE-2025-31122.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31122", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31123.json b/2025/31xxx/CVE-2025-31123.json new file mode 100644 index 00000000000..3daff098386 --- /dev/null +++ b/2025/31xxx/CVE-2025-31123.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31123", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31124.json b/2025/31xxx/CVE-2025-31124.json new file mode 100644 index 00000000000..d253d6db26b --- /dev/null +++ b/2025/31xxx/CVE-2025-31124.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31124", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31125.json b/2025/31xxx/CVE-2025-31125.json new file mode 100644 index 00000000000..af7532c04cf --- /dev/null +++ b/2025/31xxx/CVE-2025-31125.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31125", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31126.json b/2025/31xxx/CVE-2025-31126.json new file mode 100644 index 00000000000..6304771b2fc --- /dev/null +++ b/2025/31xxx/CVE-2025-31126.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31126", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31127.json b/2025/31xxx/CVE-2025-31127.json new file mode 100644 index 00000000000..148bad87814 --- /dev/null +++ b/2025/31xxx/CVE-2025-31127.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31127", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31128.json b/2025/31xxx/CVE-2025-31128.json new file mode 100644 index 00000000000..bd0722edbd0 --- /dev/null +++ b/2025/31xxx/CVE-2025-31128.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31128", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31129.json b/2025/31xxx/CVE-2025-31129.json new file mode 100644 index 00000000000..af124e8cf51 --- /dev/null +++ b/2025/31xxx/CVE-2025-31129.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31129", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31130.json b/2025/31xxx/CVE-2025-31130.json new file mode 100644 index 00000000000..2f541fc0cd2 --- /dev/null +++ b/2025/31xxx/CVE-2025-31130.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31130", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31131.json b/2025/31xxx/CVE-2025-31131.json new file mode 100644 index 00000000000..c2723fedb8f --- /dev/null +++ b/2025/31xxx/CVE-2025-31131.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31131", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31132.json b/2025/31xxx/CVE-2025-31132.json new file mode 100644 index 00000000000..6478ca633b6 --- /dev/null +++ b/2025/31xxx/CVE-2025-31132.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31132", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31133.json b/2025/31xxx/CVE-2025-31133.json new file mode 100644 index 00000000000..3b7f91f951a --- /dev/null +++ b/2025/31xxx/CVE-2025-31133.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31133", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31134.json b/2025/31xxx/CVE-2025-31134.json new file mode 100644 index 00000000000..43c8737a579 --- /dev/null +++ b/2025/31xxx/CVE-2025-31134.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31134", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31135.json b/2025/31xxx/CVE-2025-31135.json new file mode 100644 index 00000000000..40ceedfee44 --- /dev/null +++ b/2025/31xxx/CVE-2025-31135.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31135", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31136.json b/2025/31xxx/CVE-2025-31136.json new file mode 100644 index 00000000000..ebcf65464be --- /dev/null +++ b/2025/31xxx/CVE-2025-31136.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31136", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31137.json b/2025/31xxx/CVE-2025-31137.json new file mode 100644 index 00000000000..461fb236464 --- /dev/null +++ b/2025/31xxx/CVE-2025-31137.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31137", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31138.json b/2025/31xxx/CVE-2025-31138.json new file mode 100644 index 00000000000..4481bcaf7f3 --- /dev/null +++ b/2025/31xxx/CVE-2025-31138.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31138", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file