From 840c54c8a331ba116ee4c9bd6f4bd55c0aa7d052 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 7 Feb 2023 03:00:42 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/31xxx/CVE-2022-31611.json | 78 ++++++++++++++++++++++++++++++++-- 2022/42xxx/CVE-2022-42270.json | 74 ++++++++++++++++++++------------ 2022/42xxx/CVE-2022-42291.json | 78 ++++++++++++++++++++++++++++++++-- 2023/25xxx/CVE-2023-25505.json | 18 ++++++++ 2023/25xxx/CVE-2023-25506.json | 18 ++++++++ 2023/25xxx/CVE-2023-25507.json | 18 ++++++++ 2023/25xxx/CVE-2023-25508.json | 18 ++++++++ 2023/25xxx/CVE-2023-25509.json | 18 ++++++++ 2023/25xxx/CVE-2023-25510.json | 18 ++++++++ 2023/25xxx/CVE-2023-25511.json | 18 ++++++++ 2023/25xxx/CVE-2023-25512.json | 18 ++++++++ 2023/25xxx/CVE-2023-25513.json | 18 ++++++++ 2023/25xxx/CVE-2023-25514.json | 18 ++++++++ 2023/25xxx/CVE-2023-25515.json | 18 ++++++++ 2023/25xxx/CVE-2023-25516.json | 18 ++++++++ 2023/25xxx/CVE-2023-25517.json | 18 ++++++++ 2023/25xxx/CVE-2023-25518.json | 18 ++++++++ 2023/25xxx/CVE-2023-25519.json | 18 ++++++++ 2023/25xxx/CVE-2023-25520.json | 18 ++++++++ 2023/25xxx/CVE-2023-25521.json | 18 ++++++++ 2023/25xxx/CVE-2023-25522.json | 18 ++++++++ 2023/25xxx/CVE-2023-25523.json | 18 ++++++++ 2023/25xxx/CVE-2023-25524.json | 18 ++++++++ 2023/25xxx/CVE-2023-25525.json | 18 ++++++++ 2023/25xxx/CVE-2023-25526.json | 18 ++++++++ 2023/25xxx/CVE-2023-25527.json | 18 ++++++++ 2023/25xxx/CVE-2023-25528.json | 18 ++++++++ 2023/25xxx/CVE-2023-25529.json | 18 ++++++++ 2023/25xxx/CVE-2023-25530.json | 18 ++++++++ 2023/25xxx/CVE-2023-25531.json | 18 ++++++++ 2023/25xxx/CVE-2023-25532.json | 18 ++++++++ 2023/25xxx/CVE-2023-25533.json | 18 ++++++++ 2023/25xxx/CVE-2023-25534.json | 18 ++++++++ 33 files changed, 736 insertions(+), 34 deletions(-) create mode 100644 2023/25xxx/CVE-2023-25505.json create mode 100644 2023/25xxx/CVE-2023-25506.json create mode 100644 2023/25xxx/CVE-2023-25507.json create mode 100644 2023/25xxx/CVE-2023-25508.json create mode 100644 2023/25xxx/CVE-2023-25509.json create mode 100644 2023/25xxx/CVE-2023-25510.json create mode 100644 2023/25xxx/CVE-2023-25511.json create mode 100644 2023/25xxx/CVE-2023-25512.json create mode 100644 2023/25xxx/CVE-2023-25513.json create mode 100644 2023/25xxx/CVE-2023-25514.json create mode 100644 2023/25xxx/CVE-2023-25515.json create mode 100644 2023/25xxx/CVE-2023-25516.json create mode 100644 2023/25xxx/CVE-2023-25517.json create mode 100644 2023/25xxx/CVE-2023-25518.json create mode 100644 2023/25xxx/CVE-2023-25519.json create mode 100644 2023/25xxx/CVE-2023-25520.json create mode 100644 2023/25xxx/CVE-2023-25521.json create mode 100644 2023/25xxx/CVE-2023-25522.json create mode 100644 2023/25xxx/CVE-2023-25523.json create mode 100644 2023/25xxx/CVE-2023-25524.json create mode 100644 2023/25xxx/CVE-2023-25525.json create mode 100644 2023/25xxx/CVE-2023-25526.json create mode 100644 2023/25xxx/CVE-2023-25527.json create mode 100644 2023/25xxx/CVE-2023-25528.json create mode 100644 2023/25xxx/CVE-2023-25529.json create mode 100644 2023/25xxx/CVE-2023-25530.json create mode 100644 2023/25xxx/CVE-2023-25531.json create mode 100644 2023/25xxx/CVE-2023-25532.json create mode 100644 2023/25xxx/CVE-2023-25533.json create mode 100644 2023/25xxx/CVE-2023-25534.json diff --git a/2022/31xxx/CVE-2022-31611.json b/2022/31xxx/CVE-2022-31611.json index 80c03850964..4eef3132c4d 100644 --- a/2022/31xxx/CVE-2022-31611.json +++ b/2022/31xxx/CVE-2022-31611.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-31611", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@nvidia.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NVIDIA GeForce Experience contains an uncontrolled search path vulnerability in all its client installers, where an attacker with user level privileges may cause the installer to load an arbitrary DLL when the installer is launched. A successful exploit of this vulnerability could lead to escalation of privileges and code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-427 Uncontrolled Search Path Element", + "cweId": "CWE-427" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NVIDIA", + "product": { + "product_data": [ + { + "product_name": "GeForce Experience", + "version": { + "version_data": [ + { + "version_value": "All versions prior to 3.27.0.112", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5384", + "refsource": "MISC", + "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5384" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:H", + "version": "3.1" } ] } diff --git a/2022/42xxx/CVE-2022-42270.json b/2022/42xxx/CVE-2022-42270.json index 4ae5ba0a8eb..318e8e2c1cb 100644 --- a/2022/42xxx/CVE-2022-42270.json +++ b/2022/42xxx/CVE-2022-42270.json @@ -1,12 +1,12 @@ { + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", "CVE_data_meta": { - "ASSIGNER": "psirt@nvidia.com", "ID": "CVE-2022-42270", + "ASSIGNER": "psirt@nvidia.com", "STATE": "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", "description": { "description_data": [ { @@ -15,56 +15,78 @@ } ] }, - "impact": { - "cvss": { - "baseScore": "7.8", - "baseSeverity": "High", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "version": "3.1" - } - }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", - "value": "CWE-121" + "value": "CWE-121: Stack-based Buffer Overflow", + "cweId": "CWE-121" } ] } ] }, - "references": { - "reference_data": [ - { - "refsource": "MISC", - "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5417", - "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5417" - } - ] - }, "affects": { "vendor": { "vendor_data": [ { + "vendor_name": "NVIDIA", "product": { "product_data": [ { - "product_name": "Jetson AGX Xavier series, Jetson Xavier NX", + "product_name": "NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, Jetson AGX Orin Series", "version": { "version_data": [ { - "version_value": "All versions prior to 32.7.2" + "version_value": "Versions 35.1 and 34.1.1", + "version_affected": "=" + }, + { + "version_value": "32.7.2 and prior releases", + "version_affected": "=" } ] } } ] - }, - "vendor_name": "NVIDIA" + } } ] } + }, + "references": { + "reference_data": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5417", + "refsource": "MISC", + "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5417" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + ] } } \ No newline at end of file diff --git a/2022/42xxx/CVE-2022-42291.json b/2022/42xxx/CVE-2022-42291.json index dc63ad01945..6bf03a7c055 100644 --- a/2022/42xxx/CVE-2022-42291.json +++ b/2022/42xxx/CVE-2022-42291.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-42291", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@nvidia.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "NVIDIA GeForce Experience contains a vulnerability in the installer, where a user installing the NVIDIA GeForce Experience software may inadvertently delete data from a linked location, which may lead to data tampering. An attacker does not have explicit control over the exploitation of this vulnerability, which requires the user to explicitly launch the installer from the compromised directory." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1386: Insecure Operation on Windows Junction / Mount Point", + "cweId": "CWE-1386" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NVIDIA", + "product": { + "product_data": [ + { + "product_name": "GeForce Experience", + "version": { + "version_data": [ + { + "version_value": "All versions prior to 3.27.0.112", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5384", + "refsource": "MISC", + "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/5384" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "EXTERNAL" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "LOCAL", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/25xxx/CVE-2023-25505.json b/2023/25xxx/CVE-2023-25505.json new file mode 100644 index 00000000000..4e6c9fdc02d --- /dev/null +++ b/2023/25xxx/CVE-2023-25505.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25505", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25506.json b/2023/25xxx/CVE-2023-25506.json new file mode 100644 index 00000000000..5c5aab301f0 --- /dev/null +++ b/2023/25xxx/CVE-2023-25506.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25506", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25507.json b/2023/25xxx/CVE-2023-25507.json new file mode 100644 index 00000000000..c53d964abec --- /dev/null +++ b/2023/25xxx/CVE-2023-25507.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25507", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25508.json b/2023/25xxx/CVE-2023-25508.json new file mode 100644 index 00000000000..9739d256ab4 --- /dev/null +++ b/2023/25xxx/CVE-2023-25508.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25508", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25509.json b/2023/25xxx/CVE-2023-25509.json new file mode 100644 index 00000000000..eb325e245e8 --- /dev/null +++ b/2023/25xxx/CVE-2023-25509.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25509", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25510.json b/2023/25xxx/CVE-2023-25510.json new file mode 100644 index 00000000000..e9a0ab91aaa --- /dev/null +++ b/2023/25xxx/CVE-2023-25510.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25510", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25511.json b/2023/25xxx/CVE-2023-25511.json new file mode 100644 index 00000000000..774d0413d74 --- /dev/null +++ b/2023/25xxx/CVE-2023-25511.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25511", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25512.json b/2023/25xxx/CVE-2023-25512.json new file mode 100644 index 00000000000..37c44ba6171 --- /dev/null +++ b/2023/25xxx/CVE-2023-25512.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25512", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25513.json b/2023/25xxx/CVE-2023-25513.json new file mode 100644 index 00000000000..a4b23260492 --- /dev/null +++ b/2023/25xxx/CVE-2023-25513.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25513", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25514.json b/2023/25xxx/CVE-2023-25514.json new file mode 100644 index 00000000000..fc2f70749d5 --- /dev/null +++ b/2023/25xxx/CVE-2023-25514.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25514", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25515.json b/2023/25xxx/CVE-2023-25515.json new file mode 100644 index 00000000000..e82282fce84 --- /dev/null +++ b/2023/25xxx/CVE-2023-25515.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25515", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25516.json b/2023/25xxx/CVE-2023-25516.json new file mode 100644 index 00000000000..3548f24b539 --- /dev/null +++ b/2023/25xxx/CVE-2023-25516.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25516", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25517.json b/2023/25xxx/CVE-2023-25517.json new file mode 100644 index 00000000000..550775e4eff --- /dev/null +++ b/2023/25xxx/CVE-2023-25517.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25517", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25518.json b/2023/25xxx/CVE-2023-25518.json new file mode 100644 index 00000000000..4dabac7ab54 --- /dev/null +++ b/2023/25xxx/CVE-2023-25518.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25518", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25519.json b/2023/25xxx/CVE-2023-25519.json new file mode 100644 index 00000000000..9d7fb68aae6 --- /dev/null +++ b/2023/25xxx/CVE-2023-25519.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25519", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25520.json b/2023/25xxx/CVE-2023-25520.json new file mode 100644 index 00000000000..4e332714d0b --- /dev/null +++ b/2023/25xxx/CVE-2023-25520.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25520", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25521.json b/2023/25xxx/CVE-2023-25521.json new file mode 100644 index 00000000000..0e78137e2a2 --- /dev/null +++ b/2023/25xxx/CVE-2023-25521.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25521", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25522.json b/2023/25xxx/CVE-2023-25522.json new file mode 100644 index 00000000000..7cc25ee398f --- /dev/null +++ b/2023/25xxx/CVE-2023-25522.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25522", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25523.json b/2023/25xxx/CVE-2023-25523.json new file mode 100644 index 00000000000..3827fc6948b --- /dev/null +++ b/2023/25xxx/CVE-2023-25523.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25523", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25524.json b/2023/25xxx/CVE-2023-25524.json new file mode 100644 index 00000000000..3a616876c6e --- /dev/null +++ b/2023/25xxx/CVE-2023-25524.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25524", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25525.json b/2023/25xxx/CVE-2023-25525.json new file mode 100644 index 00000000000..9509957b186 --- /dev/null +++ b/2023/25xxx/CVE-2023-25525.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25525", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25526.json b/2023/25xxx/CVE-2023-25526.json new file mode 100644 index 00000000000..8defabde9a7 --- /dev/null +++ b/2023/25xxx/CVE-2023-25526.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25526", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25527.json b/2023/25xxx/CVE-2023-25527.json new file mode 100644 index 00000000000..2b2f9c54200 --- /dev/null +++ b/2023/25xxx/CVE-2023-25527.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25527", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25528.json b/2023/25xxx/CVE-2023-25528.json new file mode 100644 index 00000000000..f2acca2ad8d --- /dev/null +++ b/2023/25xxx/CVE-2023-25528.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25528", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25529.json b/2023/25xxx/CVE-2023-25529.json new file mode 100644 index 00000000000..6b12aca0043 --- /dev/null +++ b/2023/25xxx/CVE-2023-25529.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25529", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25530.json b/2023/25xxx/CVE-2023-25530.json new file mode 100644 index 00000000000..779a12d9604 --- /dev/null +++ b/2023/25xxx/CVE-2023-25530.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25530", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25531.json b/2023/25xxx/CVE-2023-25531.json new file mode 100644 index 00000000000..418d4d6844d --- /dev/null +++ b/2023/25xxx/CVE-2023-25531.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25531", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25532.json b/2023/25xxx/CVE-2023-25532.json new file mode 100644 index 00000000000..96c23d2f659 --- /dev/null +++ b/2023/25xxx/CVE-2023-25532.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25532", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25533.json b/2023/25xxx/CVE-2023-25533.json new file mode 100644 index 00000000000..e9175565737 --- /dev/null +++ b/2023/25xxx/CVE-2023-25533.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25533", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/25xxx/CVE-2023-25534.json b/2023/25xxx/CVE-2023-25534.json new file mode 100644 index 00000000000..fc1775c54a3 --- /dev/null +++ b/2023/25xxx/CVE-2023-25534.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-25534", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file