From 7c7ee5cd468e8ca4590b7da71b07ba25d57af9f5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 26 Apr 2025 08:00:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/2xxx/CVE-2025-2850.json | 340 ++++++++++++++++++++++++++++++++++- 2025/2xxx/CVE-2025-2851.json | 340 ++++++++++++++++++++++++++++++++++- 2025/3xxx/CVE-2025-3958.json | 18 ++ 2025/3xxx/CVE-2025-3959.json | 18 ++ 2025/3xxx/CVE-2025-3960.json | 18 ++ 2025/3xxx/CVE-2025-3961.json | 18 ++ 2025/3xxx/CVE-2025-3962.json | 18 ++ 2025/3xxx/CVE-2025-3963.json | 18 ++ 2025/3xxx/CVE-2025-3964.json | 18 ++ 2025/3xxx/CVE-2025-3965.json | 18 ++ 2025/3xxx/CVE-2025-3966.json | 18 ++ 2025/3xxx/CVE-2025-3967.json | 18 ++ 2025/3xxx/CVE-2025-3968.json | 18 ++ 2025/3xxx/CVE-2025-3969.json | 18 ++ 2025/3xxx/CVE-2025-3970.json | 18 ++ 2025/3xxx/CVE-2025-3971.json | 18 ++ 2025/3xxx/CVE-2025-3972.json | 18 ++ 2025/3xxx/CVE-2025-3973.json | 18 ++ 2025/3xxx/CVE-2025-3974.json | 18 ++ 2025/3xxx/CVE-2025-3975.json | 18 ++ 2025/3xxx/CVE-2025-3976.json | 18 ++ 2025/3xxx/CVE-2025-3977.json | 18 ++ 2025/3xxx/CVE-2025-3978.json | 18 ++ 2025/3xxx/CVE-2025-3979.json | 18 ++ 2025/3xxx/CVE-2025-3980.json | 18 ++ 2025/3xxx/CVE-2025-3981.json | 18 ++ 2025/3xxx/CVE-2025-3982.json | 18 ++ 2025/3xxx/CVE-2025-3983.json | 18 ++ 28 files changed, 1140 insertions(+), 8 deletions(-) create mode 100644 2025/3xxx/CVE-2025-3958.json create mode 100644 2025/3xxx/CVE-2025-3959.json create mode 100644 2025/3xxx/CVE-2025-3960.json create mode 100644 2025/3xxx/CVE-2025-3961.json create mode 100644 2025/3xxx/CVE-2025-3962.json create mode 100644 2025/3xxx/CVE-2025-3963.json create mode 100644 2025/3xxx/CVE-2025-3964.json create mode 100644 2025/3xxx/CVE-2025-3965.json create mode 100644 2025/3xxx/CVE-2025-3966.json create mode 100644 2025/3xxx/CVE-2025-3967.json create mode 100644 2025/3xxx/CVE-2025-3968.json create mode 100644 2025/3xxx/CVE-2025-3969.json create mode 100644 2025/3xxx/CVE-2025-3970.json create mode 100644 2025/3xxx/CVE-2025-3971.json create mode 100644 2025/3xxx/CVE-2025-3972.json create mode 100644 2025/3xxx/CVE-2025-3973.json create mode 100644 2025/3xxx/CVE-2025-3974.json create mode 100644 2025/3xxx/CVE-2025-3975.json create mode 100644 2025/3xxx/CVE-2025-3976.json create mode 100644 2025/3xxx/CVE-2025-3977.json create mode 100644 2025/3xxx/CVE-2025-3978.json create mode 100644 2025/3xxx/CVE-2025-3979.json create mode 100644 2025/3xxx/CVE-2025-3980.json create mode 100644 2025/3xxx/CVE-2025-3981.json create mode 100644 2025/3xxx/CVE-2025-3982.json create mode 100644 2025/3xxx/CVE-2025-3983.json diff --git a/2025/2xxx/CVE-2025-2850.json b/2025/2xxx/CVE-2025-2850.json index 26c8099ba02..8a49f837791 100644 --- a/2025/2xxx/CVE-2025-2850.json +++ b/2025/2xxx/CVE-2025-2850.json @@ -1,17 +1,349 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2850", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x. It has been rated as problematic. This issue affects some unknown processing of the component Download Interface. The manipulation leads to improper authorization. It is recommended to upgrade the affected component." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x ausgemacht. Sie wurde als problematisch eingestuft. Dies betrifft einen unbekannten Teil der Komponente Download Interface. Durch die Manipulation mit unbekannten Daten kann eine improper authorization-Schwachstelle ausgenutzt werden. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Authorization", + "cweId": "CWE-285" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Incorrect Privilege Assignment", + "cweId": "CWE-266" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GL.iNet", + "product": { + "product_data": [ + { + "product_name": "GL-A1300 Slate Plus", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-AR300M16 Shadow", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-AR300M Shadow", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-AR750 Creta", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-AR750S-EXT Slate", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-AX1800 Flint", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-AXT1800 Slate AX", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-B1300 Convexa-B", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-B3000 Marble", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-BE3600 Slate 7", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-E750", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-E750V2 Mudi", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-MT300N-V2 Mango", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-MT1300 Beryl", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-MT2500 Brume 2", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-MT3000 Beryl AX", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-MT6000 Flint 2", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-SFT1200 Opal", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-X300B Collie", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-X750 Spitz", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-X3000 Spitz AX", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-XE300 Puli", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-XE3000 Puli AX", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.306287", + "refsource": "MISC", + "name": "https://vuldb.com/?id.306287" + }, + { + "url": "https://vuldb.com/?ctiid.306287", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.306287" + }, + { + "url": "https://www.gl-inet.com/security-updates/security-advisories-vulnerabilities-and-cves-apr-24-2025/", + "refsource": "MISC", + "name": "https://www.gl-inet.com/security-updates/security-advisories-vulnerabilities-and-cves-apr-24-2025/" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.5, + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.5, + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 2.7, + "vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N" } ] } diff --git a/2025/2xxx/CVE-2025-2851.json b/2025/2xxx/CVE-2025-2851.json index ea0aa8d5a8a..9435e8bd9ae 100644 --- a/2025/2xxx/CVE-2025-2851.json +++ b/2025/2xxx/CVE-2025-2851.json @@ -1,17 +1,349 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2851", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical has been found in GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x. Affected is an unknown function of the file plugins.so of the component RPC Handler. The manipulation leads to buffer overflow. It is recommended to upgrade the affected component." + }, + { + "lang": "deu", + "value": "Es wurde eine kritische Schwachstelle in GL.iNet GL-A1300 Slate Plus, GL-AR300M16 Shadow, GL-AR300M Shadow, GL-AR750 Creta, GL-AR750S-EXT Slate, GL-AX1800 Flint, GL-AXT1800 Slate AX, GL-B1300 Convexa-B, GL-B3000 Marble, GL-BE3600 Slate 7, GL-E750, GL-E750V2 Mudi, GL-MT300N-V2 Mango, GL-MT1300 Beryl, GL-MT2500 Brume 2, GL-MT3000 Beryl AX, GL-MT6000 Flint 2, GL-SFT1200 Opal, GL-X300B Collie, GL-X750 Spitz, GL-X3000 Spitz AX, GL-XE300 Puli and GL-XE3000 Puli AX 4.x entdeckt. Dabei betrifft es einen unbekannter Codeteil der Datei plugins.so der Komponente RPC Handler. Durch Manipulation mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Overflow", + "cweId": "CWE-120" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Memory Corruption", + "cweId": "CWE-119" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GL.iNet", + "product": { + "product_data": [ + { + "product_name": "GL-A1300 Slate Plus", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-AR300M16 Shadow", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-AR300M Shadow", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-AR750 Creta", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-AR750S-EXT Slate", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-AX1800 Flint", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-AXT1800 Slate AX", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-B1300 Convexa-B", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-B3000 Marble", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-BE3600 Slate 7", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-E750", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-E750V2 Mudi", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-MT300N-V2 Mango", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-MT1300 Beryl", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-MT2500 Brume 2", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-MT3000 Beryl AX", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-MT6000 Flint 2", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-SFT1200 Opal", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-X300B Collie", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-X750 Spitz", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-X3000 Spitz AX", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-XE300 Puli", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + }, + { + "product_name": "GL-XE3000 Puli AX", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.x" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.306288", + "refsource": "MISC", + "name": "https://vuldb.com/?id.306288" + }, + { + "url": "https://vuldb.com/?ctiid.306288", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.306288" + }, + { + "url": "https://www.gl-inet.com/security-updates/security-advisories-vulnerabilities-and-cves-apr-24-2025/", + "refsource": "MISC", + "name": "https://www.gl-inet.com/security-updates/security-advisories-vulnerabilities-and-cves-apr-24-2025/" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 8, + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseSeverity": "HIGH" + }, + { + "version": "3.0", + "baseScore": 8, + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseSeverity": "HIGH" + }, + { + "version": "2.0", + "baseScore": 7.7, + "vectorString": "AV:A/AC:L/Au:S/C:C/I:C/A:C" } ] } diff --git a/2025/3xxx/CVE-2025-3958.json b/2025/3xxx/CVE-2025-3958.json new file mode 100644 index 00000000000..25ebe3e386e --- /dev/null +++ b/2025/3xxx/CVE-2025-3958.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3958", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3959.json b/2025/3xxx/CVE-2025-3959.json new file mode 100644 index 00000000000..c7563046281 --- /dev/null +++ b/2025/3xxx/CVE-2025-3959.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3959", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3960.json b/2025/3xxx/CVE-2025-3960.json new file mode 100644 index 00000000000..78d4bdb9488 --- /dev/null +++ b/2025/3xxx/CVE-2025-3960.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3960", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3961.json b/2025/3xxx/CVE-2025-3961.json new file mode 100644 index 00000000000..29586cd066b --- /dev/null +++ b/2025/3xxx/CVE-2025-3961.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3961", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3962.json b/2025/3xxx/CVE-2025-3962.json new file mode 100644 index 00000000000..3c55d83ea79 --- /dev/null +++ b/2025/3xxx/CVE-2025-3962.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3962", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3963.json b/2025/3xxx/CVE-2025-3963.json new file mode 100644 index 00000000000..60bcd8328fa --- /dev/null +++ b/2025/3xxx/CVE-2025-3963.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3963", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3964.json b/2025/3xxx/CVE-2025-3964.json new file mode 100644 index 00000000000..94c1b43cbbb --- /dev/null +++ b/2025/3xxx/CVE-2025-3964.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3964", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3965.json b/2025/3xxx/CVE-2025-3965.json new file mode 100644 index 00000000000..656cd0e5b55 --- /dev/null +++ b/2025/3xxx/CVE-2025-3965.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3965", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3966.json b/2025/3xxx/CVE-2025-3966.json new file mode 100644 index 00000000000..567dba5519d --- /dev/null +++ b/2025/3xxx/CVE-2025-3966.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3966", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3967.json b/2025/3xxx/CVE-2025-3967.json new file mode 100644 index 00000000000..864eed80373 --- /dev/null +++ b/2025/3xxx/CVE-2025-3967.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3967", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3968.json b/2025/3xxx/CVE-2025-3968.json new file mode 100644 index 00000000000..dc64f171ba7 --- /dev/null +++ b/2025/3xxx/CVE-2025-3968.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3968", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3969.json b/2025/3xxx/CVE-2025-3969.json new file mode 100644 index 00000000000..e81324a94d4 --- /dev/null +++ b/2025/3xxx/CVE-2025-3969.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3969", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3970.json b/2025/3xxx/CVE-2025-3970.json new file mode 100644 index 00000000000..598c90d392c --- /dev/null +++ b/2025/3xxx/CVE-2025-3970.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3970", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3971.json b/2025/3xxx/CVE-2025-3971.json new file mode 100644 index 00000000000..ed52b8c04cf --- /dev/null +++ b/2025/3xxx/CVE-2025-3971.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3971", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3972.json b/2025/3xxx/CVE-2025-3972.json new file mode 100644 index 00000000000..ced080fdd66 --- /dev/null +++ b/2025/3xxx/CVE-2025-3972.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3972", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3973.json b/2025/3xxx/CVE-2025-3973.json new file mode 100644 index 00000000000..ee6443a6c5f --- /dev/null +++ b/2025/3xxx/CVE-2025-3973.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3973", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3974.json b/2025/3xxx/CVE-2025-3974.json new file mode 100644 index 00000000000..a24c9a6e79c --- /dev/null +++ b/2025/3xxx/CVE-2025-3974.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3974", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3975.json b/2025/3xxx/CVE-2025-3975.json new file mode 100644 index 00000000000..0353a247098 --- /dev/null +++ b/2025/3xxx/CVE-2025-3975.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3975", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3976.json b/2025/3xxx/CVE-2025-3976.json new file mode 100644 index 00000000000..d3738f83849 --- /dev/null +++ b/2025/3xxx/CVE-2025-3976.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3976", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3977.json b/2025/3xxx/CVE-2025-3977.json new file mode 100644 index 00000000000..ebcb2b37937 --- /dev/null +++ b/2025/3xxx/CVE-2025-3977.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3977", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3978.json b/2025/3xxx/CVE-2025-3978.json new file mode 100644 index 00000000000..d694374dd12 --- /dev/null +++ b/2025/3xxx/CVE-2025-3978.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3978", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3979.json b/2025/3xxx/CVE-2025-3979.json new file mode 100644 index 00000000000..7fc0f2ece45 --- /dev/null +++ b/2025/3xxx/CVE-2025-3979.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3979", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3980.json b/2025/3xxx/CVE-2025-3980.json new file mode 100644 index 00000000000..d5cf83072cf --- /dev/null +++ b/2025/3xxx/CVE-2025-3980.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3980", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3981.json b/2025/3xxx/CVE-2025-3981.json new file mode 100644 index 00000000000..544561ed011 --- /dev/null +++ b/2025/3xxx/CVE-2025-3981.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3981", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3982.json b/2025/3xxx/CVE-2025-3982.json new file mode 100644 index 00000000000..54036746b6c --- /dev/null +++ b/2025/3xxx/CVE-2025-3982.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3982", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3983.json b/2025/3xxx/CVE-2025-3983.json new file mode 100644 index 00000000000..0819fb77982 --- /dev/null +++ b/2025/3xxx/CVE-2025-3983.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3983", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file