From 4369ce9642d17f121b250c260e311e2eebedec3f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 28 Mar 2025 11:00:38 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/24xxx/CVE-2021-24008.json | 168 ++++++++++++++++++++++++++++++++- 2024/10xxx/CVE-2024-10307.json | 100 +++++++++++++++++++- 2024/12xxx/CVE-2024-12619.json | 100 +++++++++++++++++++- 2025/2xxx/CVE-2025-2868.json | 68 ++++++++++++- 2025/2xxx/CVE-2025-2869.json | 68 ++++++++++++- 2025/2xxx/CVE-2025-2870.json | 68 ++++++++++++- 2025/2xxx/CVE-2025-2908.json | 18 ++++ 2025/2xxx/CVE-2025-2909.json | 18 ++++ 2025/2xxx/CVE-2025-2910.json | 18 ++++ 2025/2xxx/CVE-2025-2911.json | 18 ++++ 2025/31xxx/CVE-2025-31365.json | 18 ++++ 2025/31xxx/CVE-2025-31366.json | 18 ++++ 2025/31xxx/CVE-2025-31367.json | 18 ++++ 2025/31xxx/CVE-2025-31368.json | 18 ++++ 2025/31xxx/CVE-2025-31369.json | 18 ++++ 2025/31xxx/CVE-2025-31370.json | 18 ++++ 2025/31xxx/CVE-2025-31371.json | 18 ++++ 2025/31xxx/CVE-2025-31372.json | 18 ++++ 2025/31xxx/CVE-2025-31373.json | 18 ++++ 2025/31xxx/CVE-2025-31374.json | 18 ++++ 2025/31xxx/CVE-2025-31375.json | 18 ++++ 2025/31xxx/CVE-2025-31376.json | 18 ++++ 2025/31xxx/CVE-2025-31377.json | 18 ++++ 2025/31xxx/CVE-2025-31378.json | 18 ++++ 2025/31xxx/CVE-2025-31379.json | 18 ++++ 2025/31xxx/CVE-2025-31380.json | 18 ++++ 2025/31xxx/CVE-2025-31381.json | 18 ++++ 2025/31xxx/CVE-2025-31382.json | 18 ++++ 2025/31xxx/CVE-2025-31383.json | 18 ++++ 2025/31xxx/CVE-2025-31384.json | 18 ++++ 2025/31xxx/CVE-2025-31385.json | 18 ++++ 2025/31xxx/CVE-2025-31386.json | 18 ++++ 2025/31xxx/CVE-2025-31387.json | 18 ++++ 2025/31xxx/CVE-2025-31388.json | 18 ++++ 2025/31xxx/CVE-2025-31389.json | 18 ++++ 2025/31xxx/CVE-2025-31390.json | 18 ++++ 2025/31xxx/CVE-2025-31391.json | 18 ++++ 2025/31xxx/CVE-2025-31392.json | 18 ++++ 2025/31xxx/CVE-2025-31393.json | 18 ++++ 2025/31xxx/CVE-2025-31394.json | 18 ++++ 2025/31xxx/CVE-2025-31395.json | 18 ++++ 2025/31xxx/CVE-2025-31396.json | 18 ++++ 2025/31xxx/CVE-2025-31397.json | 18 ++++ 2025/31xxx/CVE-2025-31398.json | 18 ++++ 2025/31xxx/CVE-2025-31399.json | 18 ++++ 2025/31xxx/CVE-2025-31400.json | 18 ++++ 2025/31xxx/CVE-2025-31401.json | 18 ++++ 2025/31xxx/CVE-2025-31402.json | 18 ++++ 2025/31xxx/CVE-2025-31403.json | 18 ++++ 2025/31xxx/CVE-2025-31404.json | 18 ++++ 2025/31xxx/CVE-2025-31405.json | 18 ++++ 2025/31xxx/CVE-2025-31406.json | 18 ++++ 2025/31xxx/CVE-2025-31407.json | 18 ++++ 2025/31xxx/CVE-2025-31408.json | 18 ++++ 2025/31xxx/CVE-2025-31409.json | 18 ++++ 2025/31xxx/CVE-2025-31410.json | 18 ++++ 2025/31xxx/CVE-2025-31411.json | 18 ++++ 2025/31xxx/CVE-2025-31412.json | 18 ++++ 2025/31xxx/CVE-2025-31413.json | 18 ++++ 2025/31xxx/CVE-2025-31414.json | 18 ++++ 2025/31xxx/CVE-2025-31415.json | 18 ++++ 2025/31xxx/CVE-2025-31416.json | 18 ++++ 2025/31xxx/CVE-2025-31417.json | 18 ++++ 2025/31xxx/CVE-2025-31418.json | 18 ++++ 2025/31xxx/CVE-2025-31419.json | 18 ++++ 2025/31xxx/CVE-2025-31420.json | 18 ++++ 2025/31xxx/CVE-2025-31421.json | 18 ++++ 2025/31xxx/CVE-2025-31422.json | 18 ++++ 2025/31xxx/CVE-2025-31423.json | 18 ++++ 2025/31xxx/CVE-2025-31424.json | 18 ++++ 70 files changed, 1697 insertions(+), 27 deletions(-) create mode 100644 2025/2xxx/CVE-2025-2908.json create mode 100644 2025/2xxx/CVE-2025-2909.json create mode 100644 2025/2xxx/CVE-2025-2910.json create mode 100644 2025/2xxx/CVE-2025-2911.json create mode 100644 2025/31xxx/CVE-2025-31365.json create mode 100644 2025/31xxx/CVE-2025-31366.json create mode 100644 2025/31xxx/CVE-2025-31367.json create mode 100644 2025/31xxx/CVE-2025-31368.json create mode 100644 2025/31xxx/CVE-2025-31369.json create mode 100644 2025/31xxx/CVE-2025-31370.json create mode 100644 2025/31xxx/CVE-2025-31371.json create mode 100644 2025/31xxx/CVE-2025-31372.json create mode 100644 2025/31xxx/CVE-2025-31373.json create mode 100644 2025/31xxx/CVE-2025-31374.json create mode 100644 2025/31xxx/CVE-2025-31375.json create mode 100644 2025/31xxx/CVE-2025-31376.json create mode 100644 2025/31xxx/CVE-2025-31377.json create mode 100644 2025/31xxx/CVE-2025-31378.json create mode 100644 2025/31xxx/CVE-2025-31379.json create mode 100644 2025/31xxx/CVE-2025-31380.json create mode 100644 2025/31xxx/CVE-2025-31381.json create mode 100644 2025/31xxx/CVE-2025-31382.json create mode 100644 2025/31xxx/CVE-2025-31383.json create mode 100644 2025/31xxx/CVE-2025-31384.json create mode 100644 2025/31xxx/CVE-2025-31385.json create mode 100644 2025/31xxx/CVE-2025-31386.json create mode 100644 2025/31xxx/CVE-2025-31387.json create mode 100644 2025/31xxx/CVE-2025-31388.json create mode 100644 2025/31xxx/CVE-2025-31389.json create mode 100644 2025/31xxx/CVE-2025-31390.json create mode 100644 2025/31xxx/CVE-2025-31391.json create mode 100644 2025/31xxx/CVE-2025-31392.json create mode 100644 2025/31xxx/CVE-2025-31393.json create mode 100644 2025/31xxx/CVE-2025-31394.json create mode 100644 2025/31xxx/CVE-2025-31395.json create mode 100644 2025/31xxx/CVE-2025-31396.json create mode 100644 2025/31xxx/CVE-2025-31397.json create mode 100644 2025/31xxx/CVE-2025-31398.json create mode 100644 2025/31xxx/CVE-2025-31399.json create mode 100644 2025/31xxx/CVE-2025-31400.json create mode 100644 2025/31xxx/CVE-2025-31401.json create mode 100644 2025/31xxx/CVE-2025-31402.json create mode 100644 2025/31xxx/CVE-2025-31403.json create mode 100644 2025/31xxx/CVE-2025-31404.json create mode 100644 2025/31xxx/CVE-2025-31405.json create mode 100644 2025/31xxx/CVE-2025-31406.json create mode 100644 2025/31xxx/CVE-2025-31407.json create mode 100644 2025/31xxx/CVE-2025-31408.json create mode 100644 2025/31xxx/CVE-2025-31409.json create mode 100644 2025/31xxx/CVE-2025-31410.json create mode 100644 2025/31xxx/CVE-2025-31411.json create mode 100644 2025/31xxx/CVE-2025-31412.json create mode 100644 2025/31xxx/CVE-2025-31413.json create mode 100644 2025/31xxx/CVE-2025-31414.json create mode 100644 2025/31xxx/CVE-2025-31415.json create mode 100644 2025/31xxx/CVE-2025-31416.json create mode 100644 2025/31xxx/CVE-2025-31417.json create mode 100644 2025/31xxx/CVE-2025-31418.json create mode 100644 2025/31xxx/CVE-2025-31419.json create mode 100644 2025/31xxx/CVE-2025-31420.json create mode 100644 2025/31xxx/CVE-2025-31421.json create mode 100644 2025/31xxx/CVE-2025-31422.json create mode 100644 2025/31xxx/CVE-2025-31423.json create mode 100644 2025/31xxx/CVE-2025-31424.json diff --git a/2021/24xxx/CVE-2021-24008.json b/2021/24xxx/CVE-2021-24008.json index 30e1cc46aca..ee3cd64aa9b 100644 --- a/2021/24xxx/CVE-2021-24008.json +++ b/2021/24xxx/CVE-2021-24008.json @@ -1,17 +1,177 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-24008", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiDDoS version 5.4.0, version 5.3.2 and below, version 5.2.0, version 5.1.0, version 5.0.0, version 4.7.0, version 4.6.0, version 4.5.0, version 4.4.2 and below, FortiDDoS-CM version 5.3.0, version 5.2.0, version 5.1.0, version 5.0.0, version 4.7.0, FortiVoice version 6.0.6 and below, FortiRecorder version 6.0.3 and below and FortiMail version 6.4.1 and below, version 6.2.4 and below, version 6.0.9 and below may allow a remote, unauthenticated attacker to obtain potentially sensitive software-version information by reading a JavaScript file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information disclosure", + "cweId": "CWE-200" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "FortiDDoS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "5.4.0" + }, + { + "version_affected": "<=", + "version_name": "5.3.0", + "version_value": "5.3.2" + }, + { + "version_affected": "=", + "version_value": "5.2.0" + }, + { + "version_affected": "=", + "version_value": "5.1.0" + }, + { + "version_affected": "=", + "version_value": "5.0.0" + }, + { + "version_affected": "=", + "version_value": "4.7.0" + }, + { + "version_affected": "=", + "version_value": "4.6.0" + }, + { + "version_affected": "=", + "version_value": "4.5.0" + }, + { + "version_affected": "<=", + "version_name": "4.4.0", + "version_value": "4.4.2" + } + ] + } + }, + { + "product_name": "FortiNDR", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "1.5.0", + "version_value": "1.5.3" + }, + { + "version_affected": "=", + "version_value": "1.4.0" + }, + { + "version_affected": "<=", + "version_name": "1.3.0", + "version_value": "1.3.1" + }, + { + "version_affected": "=", + "version_value": "1.2.0" + }, + { + "version_affected": "=", + "version_value": "1.1.0" + } + ] + } + }, + { + "product_name": "FortiDDoS-CM", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "5.3.0" + }, + { + "version_affected": "=", + "version_value": "5.2.0" + }, + { + "version_affected": "=", + "version_value": "5.1.0" + }, + { + "version_affected": "=", + "version_value": "5.0.0" + }, + { + "version_affected": "=", + "version_value": "4.7.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-20-105", + "refsource": "MISC", + "name": "https://fortiguard.fortinet.com/psirt/FG-IR-20-105" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Please upgrade to FortiMail versions 6.0.10 or above.\n\r\nPlease upgrade to FortiMail versions 6.2.5 or above.\n\r\nPlease upgrade to FortiMail versions 6.4.2 or above." + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:X" } ] } diff --git a/2024/10xxx/CVE-2024-10307.json b/2024/10xxx/CVE-2024-10307.json index 784ef64cb9c..779a42d93c3 100644 --- a/2024/10xxx/CVE-2024-10307.json +++ b/2024/10xxx/CVE-2024-10307.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-10307", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab EE/CE affecting all versions from 12.10 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1. A maliciously crafted file can cause uncontrolled CPU consumption when viewing the associated merge request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-770: Allocation of Resources Without Limits or Throttling", + "cweId": "CWE-770" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "12.10", + "version_value": "17.8.6" + }, + { + "version_affected": "<", + "version_name": "17.9", + "version_value": "17.9.3" + }, + { + "version_affected": "<", + "version_name": "17.10", + "version_value": "17.10.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/500497", + "refsource": "MISC", + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/500497" + }, + { + "url": "https://hackerone.com/reports/2775113", + "refsource": "MISC", + "name": "https://hackerone.com/reports/2775113" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Upgrade to versions 17.8.6, 17.9.3, 17.10.1 or above." + } + ], + "credits": [ + { + "lang": "en", + "value": "Thanks [l33thaxor](https://hackerone.com/l33thaxor) for reporting this vulnerability through our HackerOne bug bounty program" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" } ] } diff --git a/2024/12xxx/CVE-2024-12619.json b/2024/12xxx/CVE-2024-12619.json index d5ae924edba..1b4c70a0cb2 100644 --- a/2024/12xxx/CVE-2024-12619.json +++ b/2024/12xxx/CVE-2024-12619.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2024-12619", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions from 16.0 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1, allowing internal users to gain unauthorized access to internal projects." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1220: Insufficient Granularity of Access Control", + "cweId": "CWE-1220" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "16.0", + "version_value": "17.8.6" + }, + { + "version_affected": "<", + "version_name": "17.9", + "version_value": "17.9.3" + }, + { + "version_affected": "<", + "version_name": "17.10", + "version_value": "17.10.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/509324", + "refsource": "MISC", + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/509324" + }, + { + "url": "https://hackerone.com/reports/2888260", + "refsource": "MISC", + "name": "https://hackerone.com/reports/2888260" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Upgrade to versions 17.8.6, 17.9.3, 17.10.1 or above." + } + ], + "credits": [ + { + "lang": "en", + "value": "Thanks [aituglo](https://hackerone.com/aituglo) for reporting this vulnerability through our HackerOne bug bounty program" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" } ] } diff --git a/2025/2xxx/CVE-2025-2868.json b/2025/2xxx/CVE-2025-2868.json index ba76bd4215a..029db8bbbc3 100644 --- a/2025/2xxx/CVE-2025-2868.json +++ b/2025/2xxx/CVE-2025-2868.json @@ -1,18 +1,76 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2868", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-coordination@incibe.es", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Reflected Cross-Site Scripting (XSS) vulnerability in version 1.0 of the Clinic Queuing System. This vulnerability could allow an attacker to execute JavaScript code in the victim's browser by sending a malicious URL through the\u00a0page parameter in /index.php." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Clinic Queuing System", + "product": { + "product_data": [ + { + "product_name": "Clinic Queuing System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-clinic-queuing-system", + "refsource": "MISC", + "name": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-clinic-queuing-system" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Rafael Pedrero" + } + ] } \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2869.json b/2025/2xxx/CVE-2025-2869.json index 94e1760442f..a637bd863a3 100644 --- a/2025/2xxx/CVE-2025-2869.json +++ b/2025/2xxx/CVE-2025-2869.json @@ -1,18 +1,76 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2869", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-coordination@incibe.es", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Reflected Cross-Site Scripting (XSS) vulnerability in version 1.0 of the Clinic Queuing System. This vulnerability could allow an attacker to execute JavaScript code in the victim's browser by sending a malicious URL through the\u00a0id parameter in /manage_user.php." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Clinic Queuing System", + "product": { + "product_data": [ + { + "product_name": "Clinic Queuing System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-clinic-queuing-system", + "refsource": "MISC", + "name": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-clinic-queuing-system" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Rafael Pedrero" + } + ] } \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2870.json b/2025/2xxx/CVE-2025-2870.json index f7ead9bff62..f6897504f86 100644 --- a/2025/2xxx/CVE-2025-2870.json +++ b/2025/2xxx/CVE-2025-2870.json @@ -1,18 +1,76 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2870", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve-coordination@incibe.es", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Reflected Cross-Site Scripting (XSS) vulnerability in version 1.0 of the Clinic Queuing System. This vulnerability could allow an attacker to execute JavaScript code in the victim's browser by sending a malicious URL through the\u00a0page parameter in /patient_side.php." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Clinic Queuing System", + "product": { + "product_data": [ + { + "product_name": "Clinic Queuing System", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-clinic-queuing-system", + "refsource": "MISC", + "name": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-clinic-queuing-system" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Rafael Pedrero" + } + ] } \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2908.json b/2025/2xxx/CVE-2025-2908.json new file mode 100644 index 00000000000..b80076a1134 --- /dev/null +++ b/2025/2xxx/CVE-2025-2908.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-2908", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2909.json b/2025/2xxx/CVE-2025-2909.json new file mode 100644 index 00000000000..d557474708d --- /dev/null +++ b/2025/2xxx/CVE-2025-2909.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-2909", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2910.json b/2025/2xxx/CVE-2025-2910.json new file mode 100644 index 00000000000..84c95776f9a --- /dev/null +++ b/2025/2xxx/CVE-2025-2910.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-2910", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2911.json b/2025/2xxx/CVE-2025-2911.json new file mode 100644 index 00000000000..952734814a1 --- /dev/null +++ b/2025/2xxx/CVE-2025-2911.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-2911", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31365.json b/2025/31xxx/CVE-2025-31365.json new file mode 100644 index 00000000000..f8eea2d84b6 --- /dev/null +++ b/2025/31xxx/CVE-2025-31365.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31365", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31366.json b/2025/31xxx/CVE-2025-31366.json new file mode 100644 index 00000000000..8cbc8bf4765 --- /dev/null +++ b/2025/31xxx/CVE-2025-31366.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31366", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31367.json b/2025/31xxx/CVE-2025-31367.json new file mode 100644 index 00000000000..84eabc79fac --- /dev/null +++ b/2025/31xxx/CVE-2025-31367.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31367", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31368.json b/2025/31xxx/CVE-2025-31368.json new file mode 100644 index 00000000000..48125b2df9b --- /dev/null +++ b/2025/31xxx/CVE-2025-31368.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31368", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31369.json b/2025/31xxx/CVE-2025-31369.json new file mode 100644 index 00000000000..b8d74068a0e --- /dev/null +++ b/2025/31xxx/CVE-2025-31369.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31369", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31370.json b/2025/31xxx/CVE-2025-31370.json new file mode 100644 index 00000000000..64f737dedee --- /dev/null +++ b/2025/31xxx/CVE-2025-31370.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31370", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31371.json b/2025/31xxx/CVE-2025-31371.json new file mode 100644 index 00000000000..98b6379b023 --- /dev/null +++ b/2025/31xxx/CVE-2025-31371.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31371", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31372.json b/2025/31xxx/CVE-2025-31372.json new file mode 100644 index 00000000000..1f9d09aac42 --- /dev/null +++ b/2025/31xxx/CVE-2025-31372.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31372", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31373.json b/2025/31xxx/CVE-2025-31373.json new file mode 100644 index 00000000000..ec727a408ee --- /dev/null +++ b/2025/31xxx/CVE-2025-31373.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31373", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31374.json b/2025/31xxx/CVE-2025-31374.json new file mode 100644 index 00000000000..ceee686c8ad --- /dev/null +++ b/2025/31xxx/CVE-2025-31374.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31374", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31375.json b/2025/31xxx/CVE-2025-31375.json new file mode 100644 index 00000000000..3406e6b490d --- /dev/null +++ b/2025/31xxx/CVE-2025-31375.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31375", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31376.json b/2025/31xxx/CVE-2025-31376.json new file mode 100644 index 00000000000..a15b352b2d2 --- /dev/null +++ b/2025/31xxx/CVE-2025-31376.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31376", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31377.json b/2025/31xxx/CVE-2025-31377.json new file mode 100644 index 00000000000..ccead3baafb --- /dev/null +++ b/2025/31xxx/CVE-2025-31377.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31377", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31378.json b/2025/31xxx/CVE-2025-31378.json new file mode 100644 index 00000000000..479f926f055 --- /dev/null +++ b/2025/31xxx/CVE-2025-31378.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31378", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31379.json b/2025/31xxx/CVE-2025-31379.json new file mode 100644 index 00000000000..e9fe3dce0d4 --- /dev/null +++ b/2025/31xxx/CVE-2025-31379.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31379", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31380.json b/2025/31xxx/CVE-2025-31380.json new file mode 100644 index 00000000000..118a2cf0765 --- /dev/null +++ b/2025/31xxx/CVE-2025-31380.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31380", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31381.json b/2025/31xxx/CVE-2025-31381.json new file mode 100644 index 00000000000..7ca88147252 --- /dev/null +++ b/2025/31xxx/CVE-2025-31381.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31381", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31382.json b/2025/31xxx/CVE-2025-31382.json new file mode 100644 index 00000000000..ffc24ae6d3c --- /dev/null +++ b/2025/31xxx/CVE-2025-31382.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31382", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31383.json b/2025/31xxx/CVE-2025-31383.json new file mode 100644 index 00000000000..ae6e578d026 --- /dev/null +++ b/2025/31xxx/CVE-2025-31383.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31383", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31384.json b/2025/31xxx/CVE-2025-31384.json new file mode 100644 index 00000000000..594498dcf4a --- /dev/null +++ b/2025/31xxx/CVE-2025-31384.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31384", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31385.json b/2025/31xxx/CVE-2025-31385.json new file mode 100644 index 00000000000..f50607164b8 --- /dev/null +++ b/2025/31xxx/CVE-2025-31385.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31385", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31386.json b/2025/31xxx/CVE-2025-31386.json new file mode 100644 index 00000000000..f76f9f7cd84 --- /dev/null +++ b/2025/31xxx/CVE-2025-31386.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31386", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31387.json b/2025/31xxx/CVE-2025-31387.json new file mode 100644 index 00000000000..7c4628130b4 --- /dev/null +++ b/2025/31xxx/CVE-2025-31387.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31387", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31388.json b/2025/31xxx/CVE-2025-31388.json new file mode 100644 index 00000000000..1ccd28e4e50 --- /dev/null +++ b/2025/31xxx/CVE-2025-31388.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31388", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31389.json b/2025/31xxx/CVE-2025-31389.json new file mode 100644 index 00000000000..4e94797ad88 --- /dev/null +++ b/2025/31xxx/CVE-2025-31389.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31389", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31390.json b/2025/31xxx/CVE-2025-31390.json new file mode 100644 index 00000000000..12df1a19971 --- /dev/null +++ b/2025/31xxx/CVE-2025-31390.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31390", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31391.json b/2025/31xxx/CVE-2025-31391.json new file mode 100644 index 00000000000..4e2ef67d887 --- /dev/null +++ b/2025/31xxx/CVE-2025-31391.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31391", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31392.json b/2025/31xxx/CVE-2025-31392.json new file mode 100644 index 00000000000..3bd6a5af1cb --- /dev/null +++ b/2025/31xxx/CVE-2025-31392.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31392", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31393.json b/2025/31xxx/CVE-2025-31393.json new file mode 100644 index 00000000000..834773eedf7 --- /dev/null +++ b/2025/31xxx/CVE-2025-31393.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31393", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31394.json b/2025/31xxx/CVE-2025-31394.json new file mode 100644 index 00000000000..c9581b14a60 --- /dev/null +++ b/2025/31xxx/CVE-2025-31394.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31394", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31395.json b/2025/31xxx/CVE-2025-31395.json new file mode 100644 index 00000000000..391756dc56d --- /dev/null +++ b/2025/31xxx/CVE-2025-31395.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31395", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31396.json b/2025/31xxx/CVE-2025-31396.json new file mode 100644 index 00000000000..0ebbe1836ec --- /dev/null +++ b/2025/31xxx/CVE-2025-31396.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31396", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31397.json b/2025/31xxx/CVE-2025-31397.json new file mode 100644 index 00000000000..1388d41baac --- /dev/null +++ b/2025/31xxx/CVE-2025-31397.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31397", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31398.json b/2025/31xxx/CVE-2025-31398.json new file mode 100644 index 00000000000..da45db9775c --- /dev/null +++ b/2025/31xxx/CVE-2025-31398.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31398", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31399.json b/2025/31xxx/CVE-2025-31399.json new file mode 100644 index 00000000000..d35e87ec859 --- /dev/null +++ b/2025/31xxx/CVE-2025-31399.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31399", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31400.json b/2025/31xxx/CVE-2025-31400.json new file mode 100644 index 00000000000..89a046d60df --- /dev/null +++ b/2025/31xxx/CVE-2025-31400.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31400", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31401.json b/2025/31xxx/CVE-2025-31401.json new file mode 100644 index 00000000000..09297a21deb --- /dev/null +++ b/2025/31xxx/CVE-2025-31401.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31401", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31402.json b/2025/31xxx/CVE-2025-31402.json new file mode 100644 index 00000000000..ec005a3f9c8 --- /dev/null +++ b/2025/31xxx/CVE-2025-31402.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31402", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31403.json b/2025/31xxx/CVE-2025-31403.json new file mode 100644 index 00000000000..7533502265d --- /dev/null +++ b/2025/31xxx/CVE-2025-31403.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31403", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31404.json b/2025/31xxx/CVE-2025-31404.json new file mode 100644 index 00000000000..263cdafa1ae --- /dev/null +++ b/2025/31xxx/CVE-2025-31404.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31404", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31405.json b/2025/31xxx/CVE-2025-31405.json new file mode 100644 index 00000000000..a9a13cfe78e --- /dev/null +++ b/2025/31xxx/CVE-2025-31405.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31405", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31406.json b/2025/31xxx/CVE-2025-31406.json new file mode 100644 index 00000000000..3f455e3d209 --- /dev/null +++ b/2025/31xxx/CVE-2025-31406.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31406", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31407.json b/2025/31xxx/CVE-2025-31407.json new file mode 100644 index 00000000000..b0268dd69a4 --- /dev/null +++ b/2025/31xxx/CVE-2025-31407.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31407", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31408.json b/2025/31xxx/CVE-2025-31408.json new file mode 100644 index 00000000000..b8a3362924e --- /dev/null +++ b/2025/31xxx/CVE-2025-31408.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31408", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31409.json b/2025/31xxx/CVE-2025-31409.json new file mode 100644 index 00000000000..ab0c2097565 --- /dev/null +++ b/2025/31xxx/CVE-2025-31409.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31409", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31410.json b/2025/31xxx/CVE-2025-31410.json new file mode 100644 index 00000000000..2b9001d9d55 --- /dev/null +++ b/2025/31xxx/CVE-2025-31410.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31410", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31411.json b/2025/31xxx/CVE-2025-31411.json new file mode 100644 index 00000000000..5e5a046050f --- /dev/null +++ b/2025/31xxx/CVE-2025-31411.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31411", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31412.json b/2025/31xxx/CVE-2025-31412.json new file mode 100644 index 00000000000..13d822f82f4 --- /dev/null +++ b/2025/31xxx/CVE-2025-31412.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31412", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31413.json b/2025/31xxx/CVE-2025-31413.json new file mode 100644 index 00000000000..59635925bb4 --- /dev/null +++ b/2025/31xxx/CVE-2025-31413.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31413", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31414.json b/2025/31xxx/CVE-2025-31414.json new file mode 100644 index 00000000000..a629f83f535 --- /dev/null +++ b/2025/31xxx/CVE-2025-31414.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31414", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31415.json b/2025/31xxx/CVE-2025-31415.json new file mode 100644 index 00000000000..40b646d97fb --- /dev/null +++ b/2025/31xxx/CVE-2025-31415.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31415", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31416.json b/2025/31xxx/CVE-2025-31416.json new file mode 100644 index 00000000000..155f00aae02 --- /dev/null +++ b/2025/31xxx/CVE-2025-31416.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31416", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31417.json b/2025/31xxx/CVE-2025-31417.json new file mode 100644 index 00000000000..8b2204b9770 --- /dev/null +++ b/2025/31xxx/CVE-2025-31417.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31417", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31418.json b/2025/31xxx/CVE-2025-31418.json new file mode 100644 index 00000000000..fa1235d8ec7 --- /dev/null +++ b/2025/31xxx/CVE-2025-31418.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31418", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31419.json b/2025/31xxx/CVE-2025-31419.json new file mode 100644 index 00000000000..cf3b14cd0a5 --- /dev/null +++ b/2025/31xxx/CVE-2025-31419.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31419", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31420.json b/2025/31xxx/CVE-2025-31420.json new file mode 100644 index 00000000000..183f2bb98a7 --- /dev/null +++ b/2025/31xxx/CVE-2025-31420.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31420", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31421.json b/2025/31xxx/CVE-2025-31421.json new file mode 100644 index 00000000000..5d6d02b10e0 --- /dev/null +++ b/2025/31xxx/CVE-2025-31421.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31421", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31422.json b/2025/31xxx/CVE-2025-31422.json new file mode 100644 index 00000000000..08715ef7ad2 --- /dev/null +++ b/2025/31xxx/CVE-2025-31422.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31422", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31423.json b/2025/31xxx/CVE-2025-31423.json new file mode 100644 index 00000000000..a861c746aea --- /dev/null +++ b/2025/31xxx/CVE-2025-31423.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31423", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/31xxx/CVE-2025-31424.json b/2025/31xxx/CVE-2025-31424.json new file mode 100644 index 00000000000..25cbdd316df --- /dev/null +++ b/2025/31xxx/CVE-2025-31424.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-31424", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file