From 472baaff1b988a5a55011d1348e0a5669a77371c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 8 Apr 2025 11:00:39 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/29xxx/CVE-2025-29985.json | 79 ++++++++++++++++++++++++++++++++-- 2025/29xxx/CVE-2025-29986.json | 79 ++++++++++++++++++++++++++++++++-- 2025/32xxx/CVE-2025-32421.json | 18 ++++++++ 2025/32xxx/CVE-2025-32422.json | 18 ++++++++ 2025/32xxx/CVE-2025-32423.json | 18 ++++++++ 2025/32xxx/CVE-2025-32424.json | 18 ++++++++ 2025/32xxx/CVE-2025-32425.json | 18 ++++++++ 2025/32xxx/CVE-2025-32426.json | 18 ++++++++ 2025/32xxx/CVE-2025-32427.json | 18 ++++++++ 2025/32xxx/CVE-2025-32428.json | 18 ++++++++ 2025/32xxx/CVE-2025-32429.json | 18 ++++++++ 2025/32xxx/CVE-2025-32430.json | 18 ++++++++ 2025/32xxx/CVE-2025-32431.json | 18 ++++++++ 2025/32xxx/CVE-2025-32432.json | 18 ++++++++ 2025/32xxx/CVE-2025-32433.json | 18 ++++++++ 2025/32xxx/CVE-2025-32434.json | 18 ++++++++ 2025/32xxx/CVE-2025-32435.json | 18 ++++++++ 2025/32xxx/CVE-2025-32436.json | 18 ++++++++ 2025/32xxx/CVE-2025-32437.json | 18 ++++++++ 2025/32xxx/CVE-2025-32438.json | 18 ++++++++ 2025/32xxx/CVE-2025-32439.json | 18 ++++++++ 2025/32xxx/CVE-2025-32440.json | 18 ++++++++ 2025/32xxx/CVE-2025-32441.json | 18 ++++++++ 2025/32xxx/CVE-2025-32442.json | 18 ++++++++ 2025/32xxx/CVE-2025-32443.json | 18 ++++++++ 2025/32xxx/CVE-2025-32444.json | 18 ++++++++ 2025/32xxx/CVE-2025-32445.json | 18 ++++++++ 27 files changed, 600 insertions(+), 8 deletions(-) create mode 100644 2025/32xxx/CVE-2025-32421.json create mode 100644 2025/32xxx/CVE-2025-32422.json create mode 100644 2025/32xxx/CVE-2025-32423.json create mode 100644 2025/32xxx/CVE-2025-32424.json create mode 100644 2025/32xxx/CVE-2025-32425.json create mode 100644 2025/32xxx/CVE-2025-32426.json create mode 100644 2025/32xxx/CVE-2025-32427.json create mode 100644 2025/32xxx/CVE-2025-32428.json create mode 100644 2025/32xxx/CVE-2025-32429.json create mode 100644 2025/32xxx/CVE-2025-32430.json create mode 100644 2025/32xxx/CVE-2025-32431.json create mode 100644 2025/32xxx/CVE-2025-32432.json create mode 100644 2025/32xxx/CVE-2025-32433.json create mode 100644 2025/32xxx/CVE-2025-32434.json create mode 100644 2025/32xxx/CVE-2025-32435.json create mode 100644 2025/32xxx/CVE-2025-32436.json create mode 100644 2025/32xxx/CVE-2025-32437.json create mode 100644 2025/32xxx/CVE-2025-32438.json create mode 100644 2025/32xxx/CVE-2025-32439.json create mode 100644 2025/32xxx/CVE-2025-32440.json create mode 100644 2025/32xxx/CVE-2025-32441.json create mode 100644 2025/32xxx/CVE-2025-32442.json create mode 100644 2025/32xxx/CVE-2025-32443.json create mode 100644 2025/32xxx/CVE-2025-32444.json create mode 100644 2025/32xxx/CVE-2025-32445.json diff --git a/2025/29xxx/CVE-2025-29985.json b/2025/29xxx/CVE-2025-29985.json index 2ce127c9fb6..9c56db0d28a 100644 --- a/2025/29xxx/CVE-2025-29985.json +++ b/2025/29xxx/CVE-2025-29985.json @@ -1,17 +1,88 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-29985", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secure@dell.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Dell Common Event Enabler, version(s) CEE 9.0.0.0, contain(s) an Initialization of a Resource with an Insecure Default vulnerability in the Common Anti-Virus Agent (CAVA). An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1188: Initialization of a Resource with an Insecure Default", + "cweId": "CWE-1188" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Dell", + "product": { + "product_data": [ + { + "product_name": "Common Event Enabler", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "N/A", + "version_value": "9.0.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000303931/dsa-2025-158-security-update-for-dell-common-event-enabler-vulnerabilities", + "refsource": "MISC", + "name": "https://www.dell.com/support/kbdoc/en-us/000303931/dsa-2025-158-security-update-for-dell-common-event-enabler-vulnerabilities" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2025/29xxx/CVE-2025-29986.json b/2025/29xxx/CVE-2025-29986.json index 24cf842f118..c9f81ffd347 100644 --- a/2025/29xxx/CVE-2025-29986.json +++ b/2025/29xxx/CVE-2025-29986.json @@ -1,17 +1,88 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-29986", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secure@dell.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Dell Common Event Enabler, version(s) CEE 9.0.0.0, contain(s) an Improper Restriction of Communication Channel to Intended Endpoints vulnerability in the Common Anti-Virus Agent (CAVA). An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Unauthorized access." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-923: Improper Restriction of Communication Channel to Intended Endpoints", + "cweId": "CWE-923" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Dell", + "product": { + "product_data": [ + { + "product_name": "Common Event Enabler", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "N/A", + "version_value": "9.0.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000303931/dsa-2025-158-security-update-for-dell-common-event-enabler-vulnerabilities", + "refsource": "MISC", + "name": "https://www.dell.com/support/kbdoc/en-us/000303931/dsa-2025-158-security-update-for-dell-common-event-enabler-vulnerabilities" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", + "version": "3.1" } ] } diff --git a/2025/32xxx/CVE-2025-32421.json b/2025/32xxx/CVE-2025-32421.json new file mode 100644 index 00000000000..ec074b04db1 --- /dev/null +++ b/2025/32xxx/CVE-2025-32421.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32421", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32422.json b/2025/32xxx/CVE-2025-32422.json new file mode 100644 index 00000000000..74eeab2025a --- /dev/null +++ b/2025/32xxx/CVE-2025-32422.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32422", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32423.json b/2025/32xxx/CVE-2025-32423.json new file mode 100644 index 00000000000..91a20333045 --- /dev/null +++ b/2025/32xxx/CVE-2025-32423.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32423", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32424.json b/2025/32xxx/CVE-2025-32424.json new file mode 100644 index 00000000000..962c6278006 --- /dev/null +++ b/2025/32xxx/CVE-2025-32424.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32424", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32425.json b/2025/32xxx/CVE-2025-32425.json new file mode 100644 index 00000000000..be5cc1f4c94 --- /dev/null +++ b/2025/32xxx/CVE-2025-32425.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32425", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32426.json b/2025/32xxx/CVE-2025-32426.json new file mode 100644 index 00000000000..374807470e6 --- /dev/null +++ b/2025/32xxx/CVE-2025-32426.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32426", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32427.json b/2025/32xxx/CVE-2025-32427.json new file mode 100644 index 00000000000..fdb71e3dbd8 --- /dev/null +++ b/2025/32xxx/CVE-2025-32427.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32427", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32428.json b/2025/32xxx/CVE-2025-32428.json new file mode 100644 index 00000000000..c392dbf254f --- /dev/null +++ b/2025/32xxx/CVE-2025-32428.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32428", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32429.json b/2025/32xxx/CVE-2025-32429.json new file mode 100644 index 00000000000..e6e9f59d403 --- /dev/null +++ b/2025/32xxx/CVE-2025-32429.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32429", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32430.json b/2025/32xxx/CVE-2025-32430.json new file mode 100644 index 00000000000..25faf307e78 --- /dev/null +++ b/2025/32xxx/CVE-2025-32430.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32430", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32431.json b/2025/32xxx/CVE-2025-32431.json new file mode 100644 index 00000000000..644984a18be --- /dev/null +++ b/2025/32xxx/CVE-2025-32431.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32431", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32432.json b/2025/32xxx/CVE-2025-32432.json new file mode 100644 index 00000000000..6e61d66738c --- /dev/null +++ b/2025/32xxx/CVE-2025-32432.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32432", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32433.json b/2025/32xxx/CVE-2025-32433.json new file mode 100644 index 00000000000..2a196943c8c --- /dev/null +++ b/2025/32xxx/CVE-2025-32433.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32433", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32434.json b/2025/32xxx/CVE-2025-32434.json new file mode 100644 index 00000000000..3712bb98c17 --- /dev/null +++ b/2025/32xxx/CVE-2025-32434.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32434", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32435.json b/2025/32xxx/CVE-2025-32435.json new file mode 100644 index 00000000000..7bd7053c4c4 --- /dev/null +++ b/2025/32xxx/CVE-2025-32435.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32435", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32436.json b/2025/32xxx/CVE-2025-32436.json new file mode 100644 index 00000000000..3f8f0e0dc05 --- /dev/null +++ b/2025/32xxx/CVE-2025-32436.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32436", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32437.json b/2025/32xxx/CVE-2025-32437.json new file mode 100644 index 00000000000..11fdbb86533 --- /dev/null +++ b/2025/32xxx/CVE-2025-32437.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32437", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32438.json b/2025/32xxx/CVE-2025-32438.json new file mode 100644 index 00000000000..8db845eeec3 --- /dev/null +++ b/2025/32xxx/CVE-2025-32438.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32438", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32439.json b/2025/32xxx/CVE-2025-32439.json new file mode 100644 index 00000000000..2e4bb34fd13 --- /dev/null +++ b/2025/32xxx/CVE-2025-32439.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32439", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32440.json b/2025/32xxx/CVE-2025-32440.json new file mode 100644 index 00000000000..9dd6d2692cb --- /dev/null +++ b/2025/32xxx/CVE-2025-32440.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32440", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32441.json b/2025/32xxx/CVE-2025-32441.json new file mode 100644 index 00000000000..4c81d6bc49c --- /dev/null +++ b/2025/32xxx/CVE-2025-32441.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32441", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32442.json b/2025/32xxx/CVE-2025-32442.json new file mode 100644 index 00000000000..afd364ea93e --- /dev/null +++ b/2025/32xxx/CVE-2025-32442.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32442", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32443.json b/2025/32xxx/CVE-2025-32443.json new file mode 100644 index 00000000000..d1e3589708a --- /dev/null +++ b/2025/32xxx/CVE-2025-32443.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32443", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32444.json b/2025/32xxx/CVE-2025-32444.json new file mode 100644 index 00000000000..c654cdcf2c9 --- /dev/null +++ b/2025/32xxx/CVE-2025-32444.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32444", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32445.json b/2025/32xxx/CVE-2025-32445.json new file mode 100644 index 00000000000..200fda29680 --- /dev/null +++ b/2025/32xxx/CVE-2025-32445.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32445", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file