From 32a6b615823e728698324a45f1b2a2b98adab2d1 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 6 Jan 2025 18:01:02 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/46xxx/CVE-2024-46073.json | 61 +++++++++++++++++-- 2024/46xxx/CVE-2024-46622.json | 61 +++++++++++++++++-- 2024/47xxx/CVE-2024-47475.json | 84 ++++++++++++++++++++++++-- 2024/54xxx/CVE-2024-54879.json | 61 +++++++++++++++++-- 2024/54xxx/CVE-2024-54880.json | 61 +++++++++++++++++-- 2024/55xxx/CVE-2024-55529.json | 56 ++++++++++++++++-- 2024/55xxx/CVE-2024-55605.json | 81 +++++++++++++++++++++++-- 2024/55xxx/CVE-2024-55626.json | 86 +++++++++++++++++++++++++-- 2024/55xxx/CVE-2024-55627.json | 105 +++++++++++++++++++++++++++++++-- 2024/56xxx/CVE-2024-56828.json | 66 +++++++++++++++++++-- 2025/22xxx/CVE-2025-22403.json | 18 ++++++ 2025/22xxx/CVE-2025-22404.json | 18 ++++++ 2025/22xxx/CVE-2025-22405.json | 18 ++++++ 2025/22xxx/CVE-2025-22406.json | 18 ++++++ 2025/22xxx/CVE-2025-22407.json | 18 ++++++ 2025/22xxx/CVE-2025-22408.json | 18 ++++++ 2025/22xxx/CVE-2025-22409.json | 18 ++++++ 2025/22xxx/CVE-2025-22410.json | 18 ++++++ 2025/22xxx/CVE-2025-22411.json | 18 ++++++ 2025/22xxx/CVE-2025-22412.json | 18 ++++++ 2025/22xxx/CVE-2025-22413.json | 18 ++++++ 2025/22xxx/CVE-2025-22414.json | 18 ++++++ 2025/22xxx/CVE-2025-22415.json | 18 ++++++ 2025/22xxx/CVE-2025-22416.json | 18 ++++++ 2025/22xxx/CVE-2025-22417.json | 18 ++++++ 2025/22xxx/CVE-2025-22418.json | 18 ++++++ 2025/22xxx/CVE-2025-22419.json | 18 ++++++ 2025/22xxx/CVE-2025-22420.json | 18 ++++++ 2025/22xxx/CVE-2025-22421.json | 18 ++++++ 2025/22xxx/CVE-2025-22422.json | 18 ++++++ 2025/22xxx/CVE-2025-22423.json | 18 ++++++ 2025/22xxx/CVE-2025-22424.json | 18 ++++++ 2025/22xxx/CVE-2025-22425.json | 18 ++++++ 2025/22xxx/CVE-2025-22426.json | 18 ++++++ 2025/22xxx/CVE-2025-22427.json | 18 ++++++ 2025/22xxx/CVE-2025-22428.json | 18 ++++++ 2025/22xxx/CVE-2025-22429.json | 18 ++++++ 2025/22xxx/CVE-2025-22430.json | 18 ++++++ 2025/22xxx/CVE-2025-22431.json | 18 ++++++ 2025/22xxx/CVE-2025-22432.json | 18 ++++++ 2025/22xxx/CVE-2025-22433.json | 18 ++++++ 2025/22xxx/CVE-2025-22434.json | 18 ++++++ 2025/22xxx/CVE-2025-22435.json | 18 ++++++ 2025/22xxx/CVE-2025-22436.json | 18 ++++++ 2025/22xxx/CVE-2025-22437.json | 18 ++++++ 2025/22xxx/CVE-2025-22438.json | 18 ++++++ 2025/22xxx/CVE-2025-22439.json | 18 ++++++ 2025/22xxx/CVE-2025-22440.json | 18 ++++++ 2025/22xxx/CVE-2025-22441.json | 18 ++++++ 2025/22xxx/CVE-2025-22442.json | 18 ++++++ 50 files changed, 1390 insertions(+), 52 deletions(-) create mode 100644 2025/22xxx/CVE-2025-22403.json create mode 100644 2025/22xxx/CVE-2025-22404.json create mode 100644 2025/22xxx/CVE-2025-22405.json create mode 100644 2025/22xxx/CVE-2025-22406.json create mode 100644 2025/22xxx/CVE-2025-22407.json create mode 100644 2025/22xxx/CVE-2025-22408.json create mode 100644 2025/22xxx/CVE-2025-22409.json create mode 100644 2025/22xxx/CVE-2025-22410.json create mode 100644 2025/22xxx/CVE-2025-22411.json create mode 100644 2025/22xxx/CVE-2025-22412.json create mode 100644 2025/22xxx/CVE-2025-22413.json create mode 100644 2025/22xxx/CVE-2025-22414.json create mode 100644 2025/22xxx/CVE-2025-22415.json create mode 100644 2025/22xxx/CVE-2025-22416.json create mode 100644 2025/22xxx/CVE-2025-22417.json create mode 100644 2025/22xxx/CVE-2025-22418.json create mode 100644 2025/22xxx/CVE-2025-22419.json create mode 100644 2025/22xxx/CVE-2025-22420.json create mode 100644 2025/22xxx/CVE-2025-22421.json create mode 100644 2025/22xxx/CVE-2025-22422.json create mode 100644 2025/22xxx/CVE-2025-22423.json create mode 100644 2025/22xxx/CVE-2025-22424.json create mode 100644 2025/22xxx/CVE-2025-22425.json create mode 100644 2025/22xxx/CVE-2025-22426.json create mode 100644 2025/22xxx/CVE-2025-22427.json create mode 100644 2025/22xxx/CVE-2025-22428.json create mode 100644 2025/22xxx/CVE-2025-22429.json create mode 100644 2025/22xxx/CVE-2025-22430.json create mode 100644 2025/22xxx/CVE-2025-22431.json create mode 100644 2025/22xxx/CVE-2025-22432.json create mode 100644 2025/22xxx/CVE-2025-22433.json create mode 100644 2025/22xxx/CVE-2025-22434.json create mode 100644 2025/22xxx/CVE-2025-22435.json create mode 100644 2025/22xxx/CVE-2025-22436.json create mode 100644 2025/22xxx/CVE-2025-22437.json create mode 100644 2025/22xxx/CVE-2025-22438.json create mode 100644 2025/22xxx/CVE-2025-22439.json create mode 100644 2025/22xxx/CVE-2025-22440.json create mode 100644 2025/22xxx/CVE-2025-22441.json create mode 100644 2025/22xxx/CVE-2025-22442.json diff --git a/2024/46xxx/CVE-2024-46073.json b/2024/46xxx/CVE-2024-46073.json index d5bf43d7280..4a71845c290 100644 --- a/2024/46xxx/CVE-2024-46073.json +++ b/2024/46xxx/CVE-2024-46073.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-46073", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-46073", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A reflected Cross-Site Scripting (XSS) vulnerability exists in the login page of IceHRM v32.4.0.OS. The vulnerability is due to improper sanitization of the \"next\" parameter, which is included in the application's response without adequate escaping. An attacker can exploit this flaw by tricking a user into visiting a specially crafted URL, causing the execution of arbitrary JavaScript code in the context of the victim's browser. The issue occurs even though the application has sanitization mechanisms in place." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/gamonoid/icehrm", + "refsource": "MISC", + "name": "https://github.com/gamonoid/icehrm" + }, + { + "refsource": "MISC", + "name": "https://github.com/manisashank/CVE-Publish/blob/main/CVE-2024-46073.md", + "url": "https://github.com/manisashank/CVE-Publish/blob/main/CVE-2024-46073.md" } ] } diff --git a/2024/46xxx/CVE-2024-46622.json b/2024/46xxx/CVE-2024-46622.json index a13f5b533c9..67872a68b3f 100644 --- a/2024/46xxx/CVE-2024-46622.json +++ b/2024/46xxx/CVE-2024-46622.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-46622", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-46622", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Escalation of Privilege security vulnerability was found in SecureAge Security Suite software 7.0.x before 7.0.38, 7.1.x before 7.1.11, 8.0.x before 8.0.18, and 8.1.x before 8.1.18 that allows arbitrary file creation, modification and deletion." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.secureage.com/", + "refsource": "MISC", + "name": "https://www.secureage.com/" + }, + { + "refsource": "CONFIRM", + "name": "https://www.secureage.com/blog/resolved-escalation-of-privilege", + "url": "https://www.secureage.com/blog/resolved-escalation-of-privilege" } ] } diff --git a/2024/47xxx/CVE-2024-47475.json b/2024/47xxx/CVE-2024-47475.json index 6c016f601b0..804f5f0e6bb 100644 --- a/2024/47xxx/CVE-2024-47475.json +++ b/2024/47xxx/CVE-2024-47475.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-47475", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secure@dell.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Dell PowerScale OneFS 8.2.2.x through 9.8.0.x contains an incorrect permission assignment for critical resource vulnerability. A locally authenticated attacker could potentially exploit this vulnerability, leading to denial of service." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-732: Incorrect Permission Assignment for Critical Resource", + "cweId": "CWE-732" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Dell", + "product": { + "product_data": [ + { + "product_name": "PowerScale OneFS", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "8.2.2.x", + "version_value": "9.4.0.19" + }, + { + "version_affected": "<=", + "version_name": "9.8.0.0", + "version_value": "9.8.0.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000242681/dsa-2024-417-security-update-for-dell-powerscale-onefs-for-security-vulnerability", + "refsource": "MISC", + "name": "https://www.dell.com/support/kbdoc/en-us/000242681/dsa-2024-417-security-update-for-dell-powerscale-onefs-for-security-vulnerability" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/54xxx/CVE-2024-54879.json b/2024/54xxx/CVE-2024-54879.json index 71c0cb70687..81c8c84aaa1 100644 --- a/2024/54xxx/CVE-2024-54879.json +++ b/2024/54xxx/CVE-2024-54879.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-54879", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-54879", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SeaCMS V13.1 is vulnerable to Incorrect Access Control. A logic flaw can be exploited by an attacker to allow any user to recharge members indefinitely." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://seacms.com", + "refsource": "MISC", + "name": "http://seacms.com" + }, + { + "refsource": "MISC", + "name": "https://blog.csdn.net/weixin_46686336/article/details/144797242", + "url": "https://blog.csdn.net/weixin_46686336/article/details/144797242" } ] } diff --git a/2024/54xxx/CVE-2024-54880.json b/2024/54xxx/CVE-2024-54880.json index cf4107bcf35..c93e89d1c1c 100644 --- a/2024/54xxx/CVE-2024-54880.json +++ b/2024/54xxx/CVE-2024-54880.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-54880", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-54880", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SeaCMS V13.1 is vulnerable to Incorrect Access Control. A logic flaw can be exploited by an attacker to allow any user to register accounts in bulk." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.seacms.net/", + "refsource": "MISC", + "name": "https://www.seacms.net/" + }, + { + "refsource": "MISC", + "name": "https://blog.csdn.net/weixin_46686336/article/details/144797063", + "url": "https://blog.csdn.net/weixin_46686336/article/details/144797063" } ] } diff --git a/2024/55xxx/CVE-2024-55529.json b/2024/55xxx/CVE-2024-55529.json index b6680edd66c..113655c36a4 100644 --- a/2024/55xxx/CVE-2024-55529.json +++ b/2024/55xxx/CVE-2024-55529.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-55529", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-55529", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Z-BlogPHP 1.7.3 is vulnerable to arbitrary code execution via \\zb_users\\theme\\shell\\template." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/fengyijiu520/Z-Blog-", + "url": "https://github.com/fengyijiu520/Z-Blog-" } ] } diff --git a/2024/55xxx/CVE-2024-55605.json b/2024/55xxx/CVE-2024-55605.json index 6d7d909a6ed..f93df5f0f75 100644 --- a/2024/55xxx/CVE-2024-55605.json +++ b/2024/55xxx/CVE-2024-55605.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-55605", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large input buffer to the to_lowercase, to_uppercase, strip_whitespace, compress_whitespace, dotprefix, header_lowercase, strip_pseudo_headers, url_decode, or xor transform can lead to a stack overflow causing Suricata to crash. The issue has been addressed in Suricata 7.0.8." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-400: Uncontrolled Resource Consumption", + "cweId": "CWE-400" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "OISF", + "product": { + "product_data": [ + { + "product_name": "suricata", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 7.0.8" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-x2hr-33vp-w289", + "refsource": "MISC", + "name": "https://github.com/OISF/suricata/security/advisories/GHSA-x2hr-33vp-w289" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/7229", + "refsource": "MISC", + "name": "https://redmine.openinfosecfoundation.org/issues/7229" + } + ] + }, + "source": { + "advisory": "GHSA-x2hr-33vp-w289", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/55xxx/CVE-2024-55626.json b/2024/55xxx/CVE-2024-55626.json index fec800fab1b..6f48568dd86 100644 --- a/2024/55xxx/CVE-2024-55626.json +++ b/2024/55xxx/CVE-2024-55626.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-55626", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large BPF filter file provided to Suricata at startup can lead to a buffer overflow at Suricata startup. The issue has been addressed in Suricata 7.0.8." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-680: Integer Overflow to Buffer Overflow", + "cweId": "CWE-680" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "OISF", + "product": { + "product_data": [ + { + "product_name": "suricata", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 7.0.8" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-wmg4-jqx5-4h9v", + "refsource": "MISC", + "name": "https://github.com/OISF/suricata/security/advisories/GHSA-wmg4-jqx5-4h9v" + }, + { + "url": "https://github.com/OISF/suricata/commit/dd71ef0af222a566e54dfc479dd1951dd17d7ceb", + "refsource": "MISC", + "name": "https://github.com/OISF/suricata/commit/dd71ef0af222a566e54dfc479dd1951dd17d7ceb" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/7366", + "refsource": "MISC", + "name": "https://redmine.openinfosecfoundation.org/issues/7366" + } + ] + }, + "source": { + "advisory": "GHSA-wmg4-jqx5-4h9v", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "LOW", + "baseScore": 3.3, + "baseSeverity": "LOW", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "version": "3.1" } ] } diff --git a/2024/55xxx/CVE-2024-55627.json b/2024/55xxx/CVE-2024-55627.json index 3498329ad0b..0cdf70db04d 100644 --- a/2024/55xxx/CVE-2024-55627.json +++ b/2024/55xxx/CVE-2024-55627.json @@ -1,17 +1,114 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-55627", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a specially crafted TCP stream can lead to a very large buffer overflow while being zero-filled during initialization with memset due to an unsigned integer underflow. The issue has been addressed in Suricata 7.0.8." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-191: Integer Underflow (Wrap or Wraparound)", + "cweId": "CWE-191" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "OISF", + "product": { + "product_data": [ + { + "product_name": "suricata", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 7.0.8" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/OISF/suricata/security/advisories/GHSA-h2mv-7gg8-8x7v", + "refsource": "MISC", + "name": "https://github.com/OISF/suricata/security/advisories/GHSA-h2mv-7gg8-8x7v" + }, + { + "url": "https://github.com/OISF/suricata/commit/282509f70c4ce805098e59535af445362e3e9ebd", + "refsource": "MISC", + "name": "https://github.com/OISF/suricata/commit/282509f70c4ce805098e59535af445362e3e9ebd" + }, + { + "url": "https://github.com/OISF/suricata/commit/8900041405dbb5f9584edae994af2100733fb4be", + "refsource": "MISC", + "name": "https://github.com/OISF/suricata/commit/8900041405dbb5f9584edae994af2100733fb4be" + }, + { + "url": "https://github.com/OISF/suricata/commit/9a53ec43b13f0039a083950511a18bf6f408e432", + "refsource": "MISC", + "name": "https://github.com/OISF/suricata/commit/9a53ec43b13f0039a083950511a18bf6f408e432" + }, + { + "url": "https://redmine.openinfosecfoundation.org/issues/7393", + "refsource": "MISC", + "name": "https://redmine.openinfosecfoundation.org/issues/7393" + } + ] + }, + "source": { + "advisory": "GHSA-h2mv-7gg8-8x7v", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1" } ] } diff --git a/2024/56xxx/CVE-2024-56828.json b/2024/56xxx/CVE-2024-56828.json index af835f666d3..3a56a0e0de1 100644 --- a/2024/56xxx/CVE-2024-56828.json +++ b/2024/56xxx/CVE-2024-56828.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-56828", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-56828", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "File Upload vulnerability in ChestnutCMS through 1.5.0. Based on the code analysis, it was determined that the /api/member/avatar API endpoint receives a base64 string as input. This string is then passed to the memberService.uploadAvatarByBase64 method for processing. Within the service, the base64-encoded image is parsed. For example, given a string like: data:image/html;base64,PGh0bWw+PGltZyBzcmM9eCBvbmVycm9yPWFsZXJ0KDEpPjwvaHRtbD4= the content after the comma is extracted and decoded using Base64.getDecoder().decode(). The substring from the 11th character up to the first occurrence of a semicolon (;) is assigned to the suffix variable (representing the file extension). The decoded content is then written to a file. However, the file extension is not validated, and since this functionality is exposed to the frontend, it poses significant security risks." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://gitee.com/liweiyi/ChestnutCMS", + "refsource": "MISC", + "name": "https://gitee.com/liweiyi/ChestnutCMS" + }, + { + "url": "https://www.1000mz.com/", + "refsource": "MISC", + "name": "https://www.1000mz.com/" + }, + { + "refsource": "MISC", + "name": "https://github.com/Zerone0x00/CVE/blob/main/ChestnutCMS/CVE-2024-56828.md", + "url": "https://github.com/Zerone0x00/CVE/blob/main/ChestnutCMS/CVE-2024-56828.md" } ] } diff --git a/2025/22xxx/CVE-2025-22403.json b/2025/22xxx/CVE-2025-22403.json new file mode 100644 index 00000000000..c6ce88f9387 --- /dev/null +++ b/2025/22xxx/CVE-2025-22403.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22403", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22404.json b/2025/22xxx/CVE-2025-22404.json new file mode 100644 index 00000000000..49670d2d4f0 --- /dev/null +++ b/2025/22xxx/CVE-2025-22404.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22404", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22405.json b/2025/22xxx/CVE-2025-22405.json new file mode 100644 index 00000000000..7efc0d9cf84 --- /dev/null +++ b/2025/22xxx/CVE-2025-22405.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22405", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22406.json b/2025/22xxx/CVE-2025-22406.json new file mode 100644 index 00000000000..39d3865f456 --- /dev/null +++ b/2025/22xxx/CVE-2025-22406.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22406", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22407.json b/2025/22xxx/CVE-2025-22407.json new file mode 100644 index 00000000000..688f773101a --- /dev/null +++ b/2025/22xxx/CVE-2025-22407.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22407", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22408.json b/2025/22xxx/CVE-2025-22408.json new file mode 100644 index 00000000000..cc1d203508f --- /dev/null +++ b/2025/22xxx/CVE-2025-22408.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22408", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22409.json b/2025/22xxx/CVE-2025-22409.json new file mode 100644 index 00000000000..e3552d3d291 --- /dev/null +++ b/2025/22xxx/CVE-2025-22409.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22409", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22410.json b/2025/22xxx/CVE-2025-22410.json new file mode 100644 index 00000000000..d8f10a2d6cb --- /dev/null +++ b/2025/22xxx/CVE-2025-22410.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22410", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22411.json b/2025/22xxx/CVE-2025-22411.json new file mode 100644 index 00000000000..17d0f57521b --- /dev/null +++ b/2025/22xxx/CVE-2025-22411.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22411", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22412.json b/2025/22xxx/CVE-2025-22412.json new file mode 100644 index 00000000000..6dc65c002b3 --- /dev/null +++ b/2025/22xxx/CVE-2025-22412.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22412", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22413.json b/2025/22xxx/CVE-2025-22413.json new file mode 100644 index 00000000000..f1243dad52e --- /dev/null +++ b/2025/22xxx/CVE-2025-22413.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22413", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22414.json b/2025/22xxx/CVE-2025-22414.json new file mode 100644 index 00000000000..2a296916e27 --- /dev/null +++ b/2025/22xxx/CVE-2025-22414.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22414", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22415.json b/2025/22xxx/CVE-2025-22415.json new file mode 100644 index 00000000000..86f13401085 --- /dev/null +++ b/2025/22xxx/CVE-2025-22415.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22415", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22416.json b/2025/22xxx/CVE-2025-22416.json new file mode 100644 index 00000000000..5200e19cb3c --- /dev/null +++ b/2025/22xxx/CVE-2025-22416.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22416", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22417.json b/2025/22xxx/CVE-2025-22417.json new file mode 100644 index 00000000000..6f06b9a088e --- /dev/null +++ b/2025/22xxx/CVE-2025-22417.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22417", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22418.json b/2025/22xxx/CVE-2025-22418.json new file mode 100644 index 00000000000..250be57514a --- /dev/null +++ b/2025/22xxx/CVE-2025-22418.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22418", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22419.json b/2025/22xxx/CVE-2025-22419.json new file mode 100644 index 00000000000..9a82b804abc --- /dev/null +++ b/2025/22xxx/CVE-2025-22419.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22419", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22420.json b/2025/22xxx/CVE-2025-22420.json new file mode 100644 index 00000000000..1624a4e4ccf --- /dev/null +++ b/2025/22xxx/CVE-2025-22420.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22420", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22421.json b/2025/22xxx/CVE-2025-22421.json new file mode 100644 index 00000000000..9e2f1559279 --- /dev/null +++ b/2025/22xxx/CVE-2025-22421.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22421", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22422.json b/2025/22xxx/CVE-2025-22422.json new file mode 100644 index 00000000000..62102d10a9a --- /dev/null +++ b/2025/22xxx/CVE-2025-22422.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22422", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22423.json b/2025/22xxx/CVE-2025-22423.json new file mode 100644 index 00000000000..920f6530247 --- /dev/null +++ b/2025/22xxx/CVE-2025-22423.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22423", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22424.json b/2025/22xxx/CVE-2025-22424.json new file mode 100644 index 00000000000..ee0daf3abda --- /dev/null +++ b/2025/22xxx/CVE-2025-22424.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22424", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22425.json b/2025/22xxx/CVE-2025-22425.json new file mode 100644 index 00000000000..7146a078f72 --- /dev/null +++ b/2025/22xxx/CVE-2025-22425.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22425", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22426.json b/2025/22xxx/CVE-2025-22426.json new file mode 100644 index 00000000000..c26035638c2 --- /dev/null +++ b/2025/22xxx/CVE-2025-22426.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22426", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22427.json b/2025/22xxx/CVE-2025-22427.json new file mode 100644 index 00000000000..f0f10546e6a --- /dev/null +++ b/2025/22xxx/CVE-2025-22427.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22427", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22428.json b/2025/22xxx/CVE-2025-22428.json new file mode 100644 index 00000000000..2a94e645feb --- /dev/null +++ b/2025/22xxx/CVE-2025-22428.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22428", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22429.json b/2025/22xxx/CVE-2025-22429.json new file mode 100644 index 00000000000..8ea19b8f990 --- /dev/null +++ b/2025/22xxx/CVE-2025-22429.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22429", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22430.json b/2025/22xxx/CVE-2025-22430.json new file mode 100644 index 00000000000..307660438ef --- /dev/null +++ b/2025/22xxx/CVE-2025-22430.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22430", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22431.json b/2025/22xxx/CVE-2025-22431.json new file mode 100644 index 00000000000..d07b9638f1c --- /dev/null +++ b/2025/22xxx/CVE-2025-22431.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22431", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22432.json b/2025/22xxx/CVE-2025-22432.json new file mode 100644 index 00000000000..053239ecce8 --- /dev/null +++ b/2025/22xxx/CVE-2025-22432.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22432", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22433.json b/2025/22xxx/CVE-2025-22433.json new file mode 100644 index 00000000000..f05d4a1c5f0 --- /dev/null +++ b/2025/22xxx/CVE-2025-22433.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22433", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22434.json b/2025/22xxx/CVE-2025-22434.json new file mode 100644 index 00000000000..818ae2a02e9 --- /dev/null +++ b/2025/22xxx/CVE-2025-22434.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22434", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22435.json b/2025/22xxx/CVE-2025-22435.json new file mode 100644 index 00000000000..b66bdee89b5 --- /dev/null +++ b/2025/22xxx/CVE-2025-22435.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22435", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22436.json b/2025/22xxx/CVE-2025-22436.json new file mode 100644 index 00000000000..c7d03d92b71 --- /dev/null +++ b/2025/22xxx/CVE-2025-22436.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22436", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22437.json b/2025/22xxx/CVE-2025-22437.json new file mode 100644 index 00000000000..a616addac08 --- /dev/null +++ b/2025/22xxx/CVE-2025-22437.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22437", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22438.json b/2025/22xxx/CVE-2025-22438.json new file mode 100644 index 00000000000..e0681faa1c9 --- /dev/null +++ b/2025/22xxx/CVE-2025-22438.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22438", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22439.json b/2025/22xxx/CVE-2025-22439.json new file mode 100644 index 00000000000..f9f731b84ad --- /dev/null +++ b/2025/22xxx/CVE-2025-22439.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22439", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22440.json b/2025/22xxx/CVE-2025-22440.json new file mode 100644 index 00000000000..f01acb94e55 --- /dev/null +++ b/2025/22xxx/CVE-2025-22440.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22440", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22441.json b/2025/22xxx/CVE-2025-22441.json new file mode 100644 index 00000000000..a4e2023202b --- /dev/null +++ b/2025/22xxx/CVE-2025-22441.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22441", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22442.json b/2025/22xxx/CVE-2025-22442.json new file mode 100644 index 00000000000..5f801c30119 --- /dev/null +++ b/2025/22xxx/CVE-2025-22442.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-22442", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file