From 66bf65e645040c4aa6051d55f72dd7af32bd1a04 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 15 Apr 2025 22:01:52 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/27xxx/CVE-2025-27892.json | 61 ++++++++++++++++-- 2025/27xxx/CVE-2025-27938.json | 99 +++++++++++++++++++++++++++-- 2025/30xxx/CVE-2025-30966.json | 113 +++++++++++++++++++++++++++++++-- 2025/30xxx/CVE-2025-30967.json | 113 +++++++++++++++++++++++++++++++-- 2025/30xxx/CVE-2025-30970.json | 85 +++++++++++++++++++++++-- 2025/35xxx/CVE-2025-35940.json | 18 ++++++ 2025/35xxx/CVE-2025-35941.json | 18 ++++++ 2025/35xxx/CVE-2025-35942.json | 18 ++++++ 2025/35xxx/CVE-2025-35943.json | 18 ++++++ 2025/35xxx/CVE-2025-35944.json | 18 ++++++ 2025/35xxx/CVE-2025-35945.json | 18 ++++++ 2025/35xxx/CVE-2025-35946.json | 18 ++++++ 2025/35xxx/CVE-2025-35947.json | 18 ++++++ 2025/36xxx/CVE-2025-36151.json | 18 ++++++ 2025/36xxx/CVE-2025-36152.json | 18 ++++++ 2025/36xxx/CVE-2025-36153.json | 18 ++++++ 2025/36xxx/CVE-2025-36154.json | 18 ++++++ 2025/36xxx/CVE-2025-36155.json | 18 ++++++ 2025/36xxx/CVE-2025-36156.json | 18 ++++++ 2025/36xxx/CVE-2025-36157.json | 18 ++++++ 2025/36xxx/CVE-2025-36158.json | 18 ++++++ 2025/36xxx/CVE-2025-36159.json | 18 ++++++ 2025/36xxx/CVE-2025-36160.json | 18 ++++++ 2025/36xxx/CVE-2025-36161.json | 18 ++++++ 2025/36xxx/CVE-2025-36162.json | 18 ++++++ 2025/36xxx/CVE-2025-36163.json | 18 ++++++ 2025/36xxx/CVE-2025-36164.json | 18 ++++++ 2025/36xxx/CVE-2025-36165.json | 18 ++++++ 2025/36xxx/CVE-2025-36166.json | 18 ++++++ 2025/36xxx/CVE-2025-36167.json | 18 ++++++ 2025/36xxx/CVE-2025-36168.json | 18 ++++++ 2025/36xxx/CVE-2025-36169.json | 18 ++++++ 2025/36xxx/CVE-2025-36170.json | 18 ++++++ 2025/36xxx/CVE-2025-36171.json | 18 ++++++ 2025/36xxx/CVE-2025-36172.json | 18 ++++++ 2025/36xxx/CVE-2025-36173.json | 18 ++++++ 2025/36xxx/CVE-2025-36406.json | 18 ++++++ 2025/36xxx/CVE-2025-36407.json | 18 ++++++ 2025/36xxx/CVE-2025-36408.json | 18 ++++++ 2025/36xxx/CVE-2025-36409.json | 18 ++++++ 2025/36xxx/CVE-2025-36410.json | 18 ++++++ 2025/36xxx/CVE-2025-36411.json | 18 ++++++ 2025/36xxx/CVE-2025-36412.json | 18 ++++++ 2025/36xxx/CVE-2025-36413.json | 18 ++++++ 2025/36xxx/CVE-2025-36414.json | 18 ++++++ 2025/36xxx/CVE-2025-36415.json | 18 ++++++ 2025/36xxx/CVE-2025-36416.json | 18 ++++++ 2025/36xxx/CVE-2025-36417.json | 18 ++++++ 2025/36xxx/CVE-2025-36418.json | 18 ++++++ 2025/36xxx/CVE-2025-36419.json | 18 ++++++ 2025/36xxx/CVE-2025-36420.json | 18 ++++++ 2025/36xxx/CVE-2025-36421.json | 18 ++++++ 2025/36xxx/CVE-2025-36422.json | 18 ++++++ 2025/36xxx/CVE-2025-36423.json | 18 ++++++ 2025/36xxx/CVE-2025-36424.json | 18 ++++++ 2025/36xxx/CVE-2025-36425.json | 18 ++++++ 2025/36xxx/CVE-2025-36426.json | 18 ++++++ 2025/36xxx/CVE-2025-36427.json | 18 ++++++ 2025/36xxx/CVE-2025-36428.json | 18 ++++++ 2025/36xxx/CVE-2025-36645.json | 18 ++++++ 2025/36xxx/CVE-2025-36646.json | 18 ++++++ 2025/36xxx/CVE-2025-36647.json | 18 ++++++ 2025/36xxx/CVE-2025-36648.json | 18 ++++++ 2025/36xxx/CVE-2025-36649.json | 18 ++++++ 2025/36xxx/CVE-2025-36650.json | 18 ++++++ 2025/36xxx/CVE-2025-36651.json | 18 ++++++ 2025/36xxx/CVE-2025-36652.json | 18 ++++++ 2025/36xxx/CVE-2025-36653.json | 18 ++++++ 2025/36xxx/CVE-2025-36654.json | 18 ++++++ 2025/36xxx/CVE-2025-36655.json | 18 ++++++ 2025/36xxx/CVE-2025-36656.json | 18 ++++++ 2025/36xxx/CVE-2025-36657.json | 18 ++++++ 2025/36xxx/CVE-2025-36658.json | 18 ++++++ 2025/36xxx/CVE-2025-36659.json | 18 ++++++ 2025/36xxx/CVE-2025-36660.json | 18 ++++++ 2025/36xxx/CVE-2025-36661.json | 18 ++++++ 2025/36xxx/CVE-2025-36662.json | 18 ++++++ 2025/36xxx/CVE-2025-36663.json | 18 ++++++ 2025/36xxx/CVE-2025-36664.json | 18 ++++++ 2025/36xxx/CVE-2025-36665.json | 18 ++++++ 2025/36xxx/CVE-2025-36666.json | 18 ++++++ 2025/36xxx/CVE-2025-36775.json | 18 ++++++ 2025/36xxx/CVE-2025-36776.json | 18 ++++++ 2025/36xxx/CVE-2025-36777.json | 18 ++++++ 2025/36xxx/CVE-2025-36778.json | 18 ++++++ 2025/36xxx/CVE-2025-36779.json | 18 ++++++ 2025/36xxx/CVE-2025-36780.json | 18 ++++++ 2025/36xxx/CVE-2025-36781.json | 18 ++++++ 2025/36xxx/CVE-2025-36782.json | 18 ++++++ 2025/36xxx/CVE-2025-36783.json | 18 ++++++ 2025/36xxx/CVE-2025-36784.json | 18 ++++++ 2025/36xxx/CVE-2025-36785.json | 18 ++++++ 2025/36xxx/CVE-2025-36786.json | 18 ++++++ 2025/36xxx/CVE-2025-36787.json | 18 ++++++ 2025/36xxx/CVE-2025-36788.json | 18 ++++++ 2025/36xxx/CVE-2025-36789.json | 18 ++++++ 2025/36xxx/CVE-2025-36790.json | 18 ++++++ 2025/36xxx/CVE-2025-36791.json | 18 ++++++ 2025/36xxx/CVE-2025-36792.json | 18 ++++++ 2025/36xxx/CVE-2025-36793.json | 18 ++++++ 100 files changed, 2159 insertions(+), 22 deletions(-) create mode 100644 2025/35xxx/CVE-2025-35940.json create mode 100644 2025/35xxx/CVE-2025-35941.json create mode 100644 2025/35xxx/CVE-2025-35942.json create mode 100644 2025/35xxx/CVE-2025-35943.json create mode 100644 2025/35xxx/CVE-2025-35944.json create mode 100644 2025/35xxx/CVE-2025-35945.json create mode 100644 2025/35xxx/CVE-2025-35946.json create mode 100644 2025/35xxx/CVE-2025-35947.json create mode 100644 2025/36xxx/CVE-2025-36151.json create mode 100644 2025/36xxx/CVE-2025-36152.json create mode 100644 2025/36xxx/CVE-2025-36153.json create mode 100644 2025/36xxx/CVE-2025-36154.json create mode 100644 2025/36xxx/CVE-2025-36155.json create mode 100644 2025/36xxx/CVE-2025-36156.json create mode 100644 2025/36xxx/CVE-2025-36157.json create mode 100644 2025/36xxx/CVE-2025-36158.json create mode 100644 2025/36xxx/CVE-2025-36159.json create mode 100644 2025/36xxx/CVE-2025-36160.json create mode 100644 2025/36xxx/CVE-2025-36161.json create mode 100644 2025/36xxx/CVE-2025-36162.json create mode 100644 2025/36xxx/CVE-2025-36163.json create mode 100644 2025/36xxx/CVE-2025-36164.json create mode 100644 2025/36xxx/CVE-2025-36165.json create mode 100644 2025/36xxx/CVE-2025-36166.json create mode 100644 2025/36xxx/CVE-2025-36167.json create mode 100644 2025/36xxx/CVE-2025-36168.json create mode 100644 2025/36xxx/CVE-2025-36169.json create mode 100644 2025/36xxx/CVE-2025-36170.json create mode 100644 2025/36xxx/CVE-2025-36171.json create mode 100644 2025/36xxx/CVE-2025-36172.json create mode 100644 2025/36xxx/CVE-2025-36173.json create mode 100644 2025/36xxx/CVE-2025-36406.json create mode 100644 2025/36xxx/CVE-2025-36407.json create mode 100644 2025/36xxx/CVE-2025-36408.json create mode 100644 2025/36xxx/CVE-2025-36409.json create mode 100644 2025/36xxx/CVE-2025-36410.json create mode 100644 2025/36xxx/CVE-2025-36411.json create mode 100644 2025/36xxx/CVE-2025-36412.json create mode 100644 2025/36xxx/CVE-2025-36413.json create mode 100644 2025/36xxx/CVE-2025-36414.json create mode 100644 2025/36xxx/CVE-2025-36415.json create mode 100644 2025/36xxx/CVE-2025-36416.json create mode 100644 2025/36xxx/CVE-2025-36417.json create mode 100644 2025/36xxx/CVE-2025-36418.json create mode 100644 2025/36xxx/CVE-2025-36419.json create mode 100644 2025/36xxx/CVE-2025-36420.json create mode 100644 2025/36xxx/CVE-2025-36421.json create mode 100644 2025/36xxx/CVE-2025-36422.json create mode 100644 2025/36xxx/CVE-2025-36423.json create mode 100644 2025/36xxx/CVE-2025-36424.json create mode 100644 2025/36xxx/CVE-2025-36425.json create mode 100644 2025/36xxx/CVE-2025-36426.json create mode 100644 2025/36xxx/CVE-2025-36427.json create mode 100644 2025/36xxx/CVE-2025-36428.json create mode 100644 2025/36xxx/CVE-2025-36645.json create mode 100644 2025/36xxx/CVE-2025-36646.json create mode 100644 2025/36xxx/CVE-2025-36647.json create mode 100644 2025/36xxx/CVE-2025-36648.json create mode 100644 2025/36xxx/CVE-2025-36649.json create mode 100644 2025/36xxx/CVE-2025-36650.json create mode 100644 2025/36xxx/CVE-2025-36651.json create mode 100644 2025/36xxx/CVE-2025-36652.json create mode 100644 2025/36xxx/CVE-2025-36653.json create mode 100644 2025/36xxx/CVE-2025-36654.json create mode 100644 2025/36xxx/CVE-2025-36655.json create mode 100644 2025/36xxx/CVE-2025-36656.json create mode 100644 2025/36xxx/CVE-2025-36657.json create mode 100644 2025/36xxx/CVE-2025-36658.json create mode 100644 2025/36xxx/CVE-2025-36659.json create mode 100644 2025/36xxx/CVE-2025-36660.json create mode 100644 2025/36xxx/CVE-2025-36661.json create mode 100644 2025/36xxx/CVE-2025-36662.json create mode 100644 2025/36xxx/CVE-2025-36663.json create mode 100644 2025/36xxx/CVE-2025-36664.json create mode 100644 2025/36xxx/CVE-2025-36665.json create mode 100644 2025/36xxx/CVE-2025-36666.json create mode 100644 2025/36xxx/CVE-2025-36775.json create mode 100644 2025/36xxx/CVE-2025-36776.json create mode 100644 2025/36xxx/CVE-2025-36777.json create mode 100644 2025/36xxx/CVE-2025-36778.json create mode 100644 2025/36xxx/CVE-2025-36779.json create mode 100644 2025/36xxx/CVE-2025-36780.json create mode 100644 2025/36xxx/CVE-2025-36781.json create mode 100644 2025/36xxx/CVE-2025-36782.json create mode 100644 2025/36xxx/CVE-2025-36783.json create mode 100644 2025/36xxx/CVE-2025-36784.json create mode 100644 2025/36xxx/CVE-2025-36785.json create mode 100644 2025/36xxx/CVE-2025-36786.json create mode 100644 2025/36xxx/CVE-2025-36787.json create mode 100644 2025/36xxx/CVE-2025-36788.json create mode 100644 2025/36xxx/CVE-2025-36789.json create mode 100644 2025/36xxx/CVE-2025-36790.json create mode 100644 2025/36xxx/CVE-2025-36791.json create mode 100644 2025/36xxx/CVE-2025-36792.json create mode 100644 2025/36xxx/CVE-2025-36793.json diff --git a/2025/27xxx/CVE-2025-27892.json b/2025/27xxx/CVE-2025-27892.json index 19bf1c4a87d..bbaf47ee963 100644 --- a/2025/27xxx/CVE-2025-27892.json +++ b/2025/27xxx/CVE-2025-27892.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-27892", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-27892", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Shopware prior to version 6.5.8.13 is affected by a SQL injection vulnerability in the /api/search/order endpoint. NOTE: this issue exists because of a CVE-2024-22406 and CVE-2024-42357 regression." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/shopware/shopware/security/advisories/GHSA-8g35-7rmw-7f59", + "url": "https://github.com/shopware/shopware/security/advisories/GHSA-8g35-7rmw-7f59" + }, + { + "refsource": "MISC", + "name": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2025-001/", + "url": "https://www.redteam-pentesting.de/en/advisories/rt-sa-2025-001/" } ] } diff --git a/2025/27xxx/CVE-2025-27938.json b/2025/27xxx/CVE-2025-27938.json index 27dfcbd0a75..c41220fbda6 100644 --- a/2025/27xxx/CVE-2025-27938.json +++ b/2025/27xxx/CVE-2025-27938.json @@ -1,17 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-27938", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Unauthenticated attackers can obtain restricted information about a user's smart device collections (i.e., \"rooms\")." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-639 Authorization Bypass Through User-Controlled Key", + "cweId": "CWE-639" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Growatt", + "product": { + "product_data": [ + { + "product_name": "Cloud portal", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "3.6.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", + "refsource": "MISC", + "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "advisory": "ICSA-25-105-04", + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions:

\n\n
" + } + ], + "value": "Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions:\n\n * Update all devices to the latest firmware version when available. (Updates are automatic, no user action needed.)\n * Use strong passwords and enable multi-factor authentication where applicable.\n * Report any security concerns to Service@Growatt.com.\n * Stay vigilant. Users and installers should regularly review security settings, follow best practices, and report any unusual activity." + } + ], + "credits": [ + { + "lang": "en", + "value": "Forescout Technologies reported these vulnerabilities to CISA." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2025/30xxx/CVE-2025-30966.json b/2025/30xxx/CVE-2025-30966.json index 92a02ff8914..e541059e43f 100644 --- a/2025/30xxx/CVE-2025-30966.json +++ b/2025/30xxx/CVE-2025-30966.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-30966", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Path Traversal vulnerability in NotFound WPJobBoard allows Path Traversal. This issue affects WPJobBoard: from n/a through n/a." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-35 Path Traversal", + "cweId": "CWE-35" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NotFound", + "product": { + "product_data": [ + { + "product_name": "WPJobBoard", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "5.11.1", + "status": "affected", + "version": "n/a", + "versionType": "custom", + "changes": [ + { + "at": "5.11.1", + "status": "unaffected" + } + ] + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wpjobboard/vulnerability/wordpress-wpjobboard-plugin-5-11-1-path-traversal-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/wordpress/plugin/wpjobboard/vulnerability/wordpress-wpjobboard-plugin-5-11-1-path-traversal-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update the WordPress WPJobBoard plugin to the latest available version (at least 5.11.1)." + } + ], + "value": "Update the WordPress WPJobBoard plugin to the latest available version (at least 5.11.1)." + } + ], + "credits": [ + { + "lang": "en", + "value": "Ananda Dhakal (Patchstack)" + } + ], + "impact": { + "cvss": [ + { + "baseScore": 5.4, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseSeverity": "MEDIUM", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "version": "3.1" } ] } diff --git a/2025/30xxx/CVE-2025-30967.json b/2025/30xxx/CVE-2025-30967.json index aa9cfd8c26e..7a2020b58fa 100644 --- a/2025/30xxx/CVE-2025-30967.json +++ b/2025/30xxx/CVE-2025-30967.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-30967", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross-Site Request Forgery (CSRF) vulnerability in NotFound WPJobBoard allows Upload a Web Shell to a Web Server. This issue affects WPJobBoard: from n/a through n/a." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352 Cross-Site Request Forgery (CSRF)", + "cweId": "CWE-352" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NotFound", + "product": { + "product_data": [ + { + "product_name": "WPJobBoard", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "lessThan": "5.11.1", + "status": "affected", + "version": "n/a", + "versionType": "custom", + "changes": [ + { + "at": "5.11.1", + "status": "unaffected" + } + ] + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wpjobboard/vulnerability/wordpress-wpjobboard-plugin-5-11-1-csrf-to-remote-code-execution-rce-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/wordpress/plugin/wpjobboard/vulnerability/wordpress-wpjobboard-plugin-5-11-1-csrf-to-remote-code-execution-rce-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update the WordPress WPJobBoard plugin to the latest available version (at least 5.11.1)." + } + ], + "value": "Update the WordPress WPJobBoard plugin to the latest available version (at least 5.11.1)." + } + ], + "credits": [ + { + "lang": "en", + "value": "Ananda Dhakal (Patchstack)" + } + ], + "impact": { + "cvss": [ + { + "baseScore": 9.6, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseSeverity": "CRITICAL", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "version": "3.1" } ] } diff --git a/2025/30xxx/CVE-2025-30970.json b/2025/30xxx/CVE-2025-30970.json index bd408d5bb61..039203464e1 100644 --- a/2025/30xxx/CVE-2025-30970.json +++ b/2025/30xxx/CVE-2025-30970.json @@ -1,17 +1,94 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-30970", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Easy Contact allows Reflected XSS. This issue affects Easy Contact: from n/a through 0.1.2." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NotFound", + "product": { + "product_data": [ + { + "product_name": "Easy Contact", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "n/a", + "version_value": "0.1.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/easy-contact/vulnerability/wordpress-easy-contact-plugin-0-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/wordpress/plugin/easy-contact/vulnerability/wordpress-easy-contact-plugin-0-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Phat RiO - BlueRock (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "baseScore": 7.1, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseSeverity": "HIGH", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "version": "3.1" } ] } diff --git a/2025/35xxx/CVE-2025-35940.json b/2025/35xxx/CVE-2025-35940.json new file mode 100644 index 00000000000..c728f670637 --- /dev/null +++ b/2025/35xxx/CVE-2025-35940.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35940", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35941.json b/2025/35xxx/CVE-2025-35941.json new file mode 100644 index 00000000000..b6bcfa1bd1c --- /dev/null +++ b/2025/35xxx/CVE-2025-35941.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35941", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35942.json b/2025/35xxx/CVE-2025-35942.json new file mode 100644 index 00000000000..a741291cd6f --- /dev/null +++ b/2025/35xxx/CVE-2025-35942.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35942", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35943.json b/2025/35xxx/CVE-2025-35943.json new file mode 100644 index 00000000000..6c625861f46 --- /dev/null +++ b/2025/35xxx/CVE-2025-35943.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35943", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35944.json b/2025/35xxx/CVE-2025-35944.json new file mode 100644 index 00000000000..b6444ff3b41 --- /dev/null +++ b/2025/35xxx/CVE-2025-35944.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35944", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35945.json b/2025/35xxx/CVE-2025-35945.json new file mode 100644 index 00000000000..32bf00058b5 --- /dev/null +++ b/2025/35xxx/CVE-2025-35945.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35945", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35946.json b/2025/35xxx/CVE-2025-35946.json new file mode 100644 index 00000000000..4b115fc2258 --- /dev/null +++ b/2025/35xxx/CVE-2025-35946.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35946", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35947.json b/2025/35xxx/CVE-2025-35947.json new file mode 100644 index 00000000000..1934ce9b0cb --- /dev/null +++ b/2025/35xxx/CVE-2025-35947.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35947", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36151.json b/2025/36xxx/CVE-2025-36151.json new file mode 100644 index 00000000000..a5dc4ae2b28 --- /dev/null +++ b/2025/36xxx/CVE-2025-36151.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36151", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36152.json b/2025/36xxx/CVE-2025-36152.json new file mode 100644 index 00000000000..cd43527dc41 --- /dev/null +++ b/2025/36xxx/CVE-2025-36152.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36152", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36153.json b/2025/36xxx/CVE-2025-36153.json new file mode 100644 index 00000000000..acfe6327d35 --- /dev/null +++ b/2025/36xxx/CVE-2025-36153.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36153", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36154.json b/2025/36xxx/CVE-2025-36154.json new file mode 100644 index 00000000000..e287b3384cc --- /dev/null +++ b/2025/36xxx/CVE-2025-36154.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36154", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36155.json b/2025/36xxx/CVE-2025-36155.json new file mode 100644 index 00000000000..d1db7ccd86f --- /dev/null +++ b/2025/36xxx/CVE-2025-36155.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36155", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36156.json b/2025/36xxx/CVE-2025-36156.json new file mode 100644 index 00000000000..73d318d624e --- /dev/null +++ b/2025/36xxx/CVE-2025-36156.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36156", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36157.json b/2025/36xxx/CVE-2025-36157.json new file mode 100644 index 00000000000..d6762bf32fc --- /dev/null +++ b/2025/36xxx/CVE-2025-36157.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36157", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36158.json b/2025/36xxx/CVE-2025-36158.json new file mode 100644 index 00000000000..5da864430ed --- /dev/null +++ b/2025/36xxx/CVE-2025-36158.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36158", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36159.json b/2025/36xxx/CVE-2025-36159.json new file mode 100644 index 00000000000..0a582996e20 --- /dev/null +++ b/2025/36xxx/CVE-2025-36159.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36159", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36160.json b/2025/36xxx/CVE-2025-36160.json new file mode 100644 index 00000000000..993f684a54b --- /dev/null +++ b/2025/36xxx/CVE-2025-36160.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36160", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36161.json b/2025/36xxx/CVE-2025-36161.json new file mode 100644 index 00000000000..5dc62f49eb5 --- /dev/null +++ b/2025/36xxx/CVE-2025-36161.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36161", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36162.json b/2025/36xxx/CVE-2025-36162.json new file mode 100644 index 00000000000..7bda04c6001 --- /dev/null +++ b/2025/36xxx/CVE-2025-36162.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36162", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36163.json b/2025/36xxx/CVE-2025-36163.json new file mode 100644 index 00000000000..88dea3889ff --- /dev/null +++ b/2025/36xxx/CVE-2025-36163.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36163", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36164.json b/2025/36xxx/CVE-2025-36164.json new file mode 100644 index 00000000000..1766aa53640 --- /dev/null +++ b/2025/36xxx/CVE-2025-36164.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36164", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36165.json b/2025/36xxx/CVE-2025-36165.json new file mode 100644 index 00000000000..34e7523e5bc --- /dev/null +++ b/2025/36xxx/CVE-2025-36165.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36165", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36166.json b/2025/36xxx/CVE-2025-36166.json new file mode 100644 index 00000000000..c769015e1fc --- /dev/null +++ b/2025/36xxx/CVE-2025-36166.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36166", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36167.json b/2025/36xxx/CVE-2025-36167.json new file mode 100644 index 00000000000..5785c26b655 --- /dev/null +++ b/2025/36xxx/CVE-2025-36167.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36167", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36168.json b/2025/36xxx/CVE-2025-36168.json new file mode 100644 index 00000000000..891cdff7085 --- /dev/null +++ b/2025/36xxx/CVE-2025-36168.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36168", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36169.json b/2025/36xxx/CVE-2025-36169.json new file mode 100644 index 00000000000..7d6f5843f9e --- /dev/null +++ b/2025/36xxx/CVE-2025-36169.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36169", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36170.json b/2025/36xxx/CVE-2025-36170.json new file mode 100644 index 00000000000..6fc469a2c15 --- /dev/null +++ b/2025/36xxx/CVE-2025-36170.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36170", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36171.json b/2025/36xxx/CVE-2025-36171.json new file mode 100644 index 00000000000..e2fa4c773d4 --- /dev/null +++ b/2025/36xxx/CVE-2025-36171.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36171", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36172.json b/2025/36xxx/CVE-2025-36172.json new file mode 100644 index 00000000000..08062b70d36 --- /dev/null +++ b/2025/36xxx/CVE-2025-36172.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36172", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36173.json b/2025/36xxx/CVE-2025-36173.json new file mode 100644 index 00000000000..94626337482 --- /dev/null +++ b/2025/36xxx/CVE-2025-36173.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36173", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36406.json b/2025/36xxx/CVE-2025-36406.json new file mode 100644 index 00000000000..51ac82f8c01 --- /dev/null +++ b/2025/36xxx/CVE-2025-36406.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36406", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36407.json b/2025/36xxx/CVE-2025-36407.json new file mode 100644 index 00000000000..aa65d70840d --- /dev/null +++ b/2025/36xxx/CVE-2025-36407.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36407", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36408.json b/2025/36xxx/CVE-2025-36408.json new file mode 100644 index 00000000000..48035eb5bbd --- /dev/null +++ b/2025/36xxx/CVE-2025-36408.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36408", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36409.json b/2025/36xxx/CVE-2025-36409.json new file mode 100644 index 00000000000..635ed4a72bf --- /dev/null +++ b/2025/36xxx/CVE-2025-36409.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36409", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36410.json b/2025/36xxx/CVE-2025-36410.json new file mode 100644 index 00000000000..a8d4acea82a --- /dev/null +++ b/2025/36xxx/CVE-2025-36410.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36410", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36411.json b/2025/36xxx/CVE-2025-36411.json new file mode 100644 index 00000000000..026ea847f79 --- /dev/null +++ b/2025/36xxx/CVE-2025-36411.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36411", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36412.json b/2025/36xxx/CVE-2025-36412.json new file mode 100644 index 00000000000..b6d5c1bf58f --- /dev/null +++ b/2025/36xxx/CVE-2025-36412.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36412", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36413.json b/2025/36xxx/CVE-2025-36413.json new file mode 100644 index 00000000000..5419c016c4e --- /dev/null +++ b/2025/36xxx/CVE-2025-36413.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36413", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36414.json b/2025/36xxx/CVE-2025-36414.json new file mode 100644 index 00000000000..67b78b914cf --- /dev/null +++ b/2025/36xxx/CVE-2025-36414.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36414", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36415.json b/2025/36xxx/CVE-2025-36415.json new file mode 100644 index 00000000000..a57ff69083c --- /dev/null +++ b/2025/36xxx/CVE-2025-36415.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36415", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36416.json b/2025/36xxx/CVE-2025-36416.json new file mode 100644 index 00000000000..35cc48b03f4 --- /dev/null +++ b/2025/36xxx/CVE-2025-36416.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36416", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36417.json b/2025/36xxx/CVE-2025-36417.json new file mode 100644 index 00000000000..2da253a9e5c --- /dev/null +++ b/2025/36xxx/CVE-2025-36417.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36417", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36418.json b/2025/36xxx/CVE-2025-36418.json new file mode 100644 index 00000000000..90b858bf6f5 --- /dev/null +++ b/2025/36xxx/CVE-2025-36418.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36418", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36419.json b/2025/36xxx/CVE-2025-36419.json new file mode 100644 index 00000000000..57907825ca0 --- /dev/null +++ b/2025/36xxx/CVE-2025-36419.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36419", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36420.json b/2025/36xxx/CVE-2025-36420.json new file mode 100644 index 00000000000..2a22bb3b927 --- /dev/null +++ b/2025/36xxx/CVE-2025-36420.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36420", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36421.json b/2025/36xxx/CVE-2025-36421.json new file mode 100644 index 00000000000..de15968cfa7 --- /dev/null +++ b/2025/36xxx/CVE-2025-36421.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36421", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36422.json b/2025/36xxx/CVE-2025-36422.json new file mode 100644 index 00000000000..daefebdb045 --- /dev/null +++ b/2025/36xxx/CVE-2025-36422.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36422", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36423.json b/2025/36xxx/CVE-2025-36423.json new file mode 100644 index 00000000000..92dc7901351 --- /dev/null +++ b/2025/36xxx/CVE-2025-36423.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36423", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36424.json b/2025/36xxx/CVE-2025-36424.json new file mode 100644 index 00000000000..12f630e93ad --- /dev/null +++ b/2025/36xxx/CVE-2025-36424.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36424", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36425.json b/2025/36xxx/CVE-2025-36425.json new file mode 100644 index 00000000000..5c210308e39 --- /dev/null +++ b/2025/36xxx/CVE-2025-36425.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36425", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36426.json b/2025/36xxx/CVE-2025-36426.json new file mode 100644 index 00000000000..833f0f20445 --- /dev/null +++ b/2025/36xxx/CVE-2025-36426.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36426", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36427.json b/2025/36xxx/CVE-2025-36427.json new file mode 100644 index 00000000000..c3ce6d1ac4a --- /dev/null +++ b/2025/36xxx/CVE-2025-36427.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36427", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36428.json b/2025/36xxx/CVE-2025-36428.json new file mode 100644 index 00000000000..944c5b35e28 --- /dev/null +++ b/2025/36xxx/CVE-2025-36428.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36428", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36645.json b/2025/36xxx/CVE-2025-36645.json new file mode 100644 index 00000000000..fcedce88116 --- /dev/null +++ b/2025/36xxx/CVE-2025-36645.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36645", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36646.json b/2025/36xxx/CVE-2025-36646.json new file mode 100644 index 00000000000..27d8603515c --- /dev/null +++ b/2025/36xxx/CVE-2025-36646.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36646", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36647.json b/2025/36xxx/CVE-2025-36647.json new file mode 100644 index 00000000000..5fd87c57e04 --- /dev/null +++ b/2025/36xxx/CVE-2025-36647.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36647", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36648.json b/2025/36xxx/CVE-2025-36648.json new file mode 100644 index 00000000000..e4acc1c3cea --- /dev/null +++ b/2025/36xxx/CVE-2025-36648.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36648", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36649.json b/2025/36xxx/CVE-2025-36649.json new file mode 100644 index 00000000000..040ffd11547 --- /dev/null +++ b/2025/36xxx/CVE-2025-36649.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36649", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36650.json b/2025/36xxx/CVE-2025-36650.json new file mode 100644 index 00000000000..20bf8e944ad --- /dev/null +++ b/2025/36xxx/CVE-2025-36650.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36650", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36651.json b/2025/36xxx/CVE-2025-36651.json new file mode 100644 index 00000000000..aebfb57c718 --- /dev/null +++ b/2025/36xxx/CVE-2025-36651.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36651", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36652.json b/2025/36xxx/CVE-2025-36652.json new file mode 100644 index 00000000000..f8cc498b489 --- /dev/null +++ b/2025/36xxx/CVE-2025-36652.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36652", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36653.json b/2025/36xxx/CVE-2025-36653.json new file mode 100644 index 00000000000..df4953eb0c8 --- /dev/null +++ b/2025/36xxx/CVE-2025-36653.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36653", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36654.json b/2025/36xxx/CVE-2025-36654.json new file mode 100644 index 00000000000..a0d959ac63b --- /dev/null +++ b/2025/36xxx/CVE-2025-36654.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36654", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36655.json b/2025/36xxx/CVE-2025-36655.json new file mode 100644 index 00000000000..9fc40f06ae7 --- /dev/null +++ b/2025/36xxx/CVE-2025-36655.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36655", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36656.json b/2025/36xxx/CVE-2025-36656.json new file mode 100644 index 00000000000..d7200e93e64 --- /dev/null +++ b/2025/36xxx/CVE-2025-36656.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36656", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36657.json b/2025/36xxx/CVE-2025-36657.json new file mode 100644 index 00000000000..b77c29eac45 --- /dev/null +++ b/2025/36xxx/CVE-2025-36657.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36657", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36658.json b/2025/36xxx/CVE-2025-36658.json new file mode 100644 index 00000000000..56bd2e8f7e6 --- /dev/null +++ b/2025/36xxx/CVE-2025-36658.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36658", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36659.json b/2025/36xxx/CVE-2025-36659.json new file mode 100644 index 00000000000..1709254b1a5 --- /dev/null +++ b/2025/36xxx/CVE-2025-36659.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36659", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36660.json b/2025/36xxx/CVE-2025-36660.json new file mode 100644 index 00000000000..3fb33cfc859 --- /dev/null +++ b/2025/36xxx/CVE-2025-36660.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36660", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36661.json b/2025/36xxx/CVE-2025-36661.json new file mode 100644 index 00000000000..2b1db2b1f34 --- /dev/null +++ b/2025/36xxx/CVE-2025-36661.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36661", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36662.json b/2025/36xxx/CVE-2025-36662.json new file mode 100644 index 00000000000..617732fd2d5 --- /dev/null +++ b/2025/36xxx/CVE-2025-36662.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36662", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36663.json b/2025/36xxx/CVE-2025-36663.json new file mode 100644 index 00000000000..0bd9ece15e7 --- /dev/null +++ b/2025/36xxx/CVE-2025-36663.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36663", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36664.json b/2025/36xxx/CVE-2025-36664.json new file mode 100644 index 00000000000..89b01baa0b0 --- /dev/null +++ b/2025/36xxx/CVE-2025-36664.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36664", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36665.json b/2025/36xxx/CVE-2025-36665.json new file mode 100644 index 00000000000..9a12f8d1cd5 --- /dev/null +++ b/2025/36xxx/CVE-2025-36665.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36665", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36666.json b/2025/36xxx/CVE-2025-36666.json new file mode 100644 index 00000000000..6849ad76e70 --- /dev/null +++ b/2025/36xxx/CVE-2025-36666.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36666", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36775.json b/2025/36xxx/CVE-2025-36775.json new file mode 100644 index 00000000000..91dd9320c99 --- /dev/null +++ b/2025/36xxx/CVE-2025-36775.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36775", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36776.json b/2025/36xxx/CVE-2025-36776.json new file mode 100644 index 00000000000..78449d0e25f --- /dev/null +++ b/2025/36xxx/CVE-2025-36776.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36776", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36777.json b/2025/36xxx/CVE-2025-36777.json new file mode 100644 index 00000000000..ee4169f4172 --- /dev/null +++ b/2025/36xxx/CVE-2025-36777.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36777", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36778.json b/2025/36xxx/CVE-2025-36778.json new file mode 100644 index 00000000000..1ca69cf5f23 --- /dev/null +++ b/2025/36xxx/CVE-2025-36778.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36778", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36779.json b/2025/36xxx/CVE-2025-36779.json new file mode 100644 index 00000000000..c6c50a00079 --- /dev/null +++ b/2025/36xxx/CVE-2025-36779.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36779", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36780.json b/2025/36xxx/CVE-2025-36780.json new file mode 100644 index 00000000000..750b5438d9d --- /dev/null +++ b/2025/36xxx/CVE-2025-36780.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36780", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36781.json b/2025/36xxx/CVE-2025-36781.json new file mode 100644 index 00000000000..72cc2869c15 --- /dev/null +++ b/2025/36xxx/CVE-2025-36781.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36781", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36782.json b/2025/36xxx/CVE-2025-36782.json new file mode 100644 index 00000000000..d6889e186f0 --- /dev/null +++ b/2025/36xxx/CVE-2025-36782.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36782", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36783.json b/2025/36xxx/CVE-2025-36783.json new file mode 100644 index 00000000000..f6d16b26c75 --- /dev/null +++ b/2025/36xxx/CVE-2025-36783.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36783", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36784.json b/2025/36xxx/CVE-2025-36784.json new file mode 100644 index 00000000000..50d08530160 --- /dev/null +++ b/2025/36xxx/CVE-2025-36784.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36784", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36785.json b/2025/36xxx/CVE-2025-36785.json new file mode 100644 index 00000000000..281bd94b633 --- /dev/null +++ b/2025/36xxx/CVE-2025-36785.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36785", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36786.json b/2025/36xxx/CVE-2025-36786.json new file mode 100644 index 00000000000..125f639c4df --- /dev/null +++ b/2025/36xxx/CVE-2025-36786.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36786", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36787.json b/2025/36xxx/CVE-2025-36787.json new file mode 100644 index 00000000000..8b08bbeb680 --- /dev/null +++ b/2025/36xxx/CVE-2025-36787.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36787", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36788.json b/2025/36xxx/CVE-2025-36788.json new file mode 100644 index 00000000000..8560529c19d --- /dev/null +++ b/2025/36xxx/CVE-2025-36788.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36788", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36789.json b/2025/36xxx/CVE-2025-36789.json new file mode 100644 index 00000000000..1fcf50d2d89 --- /dev/null +++ b/2025/36xxx/CVE-2025-36789.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36789", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36790.json b/2025/36xxx/CVE-2025-36790.json new file mode 100644 index 00000000000..183534b57cf --- /dev/null +++ b/2025/36xxx/CVE-2025-36790.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36790", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36791.json b/2025/36xxx/CVE-2025-36791.json new file mode 100644 index 00000000000..8e098b6563c --- /dev/null +++ b/2025/36xxx/CVE-2025-36791.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36791", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36792.json b/2025/36xxx/CVE-2025-36792.json new file mode 100644 index 00000000000..8a52d124a81 --- /dev/null +++ b/2025/36xxx/CVE-2025-36792.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36792", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36793.json b/2025/36xxx/CVE-2025-36793.json new file mode 100644 index 00000000000..b91699aaa2e --- /dev/null +++ b/2025/36xxx/CVE-2025-36793.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36793", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file