From 9861d2ba44e5e5e93efa2e54c6f35acfbc37011f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 11 Mar 2025 23:00:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/29xxx/CVE-2025-29817.json | 18 ++++++ 2025/29xxx/CVE-2025-29818.json | 18 ++++++ 2025/29xxx/CVE-2025-29819.json | 18 ++++++ 2025/29xxx/CVE-2025-29820.json | 18 ++++++ 2025/29xxx/CVE-2025-29821.json | 18 ++++++ 2025/29xxx/CVE-2025-29822.json | 18 ++++++ 2025/29xxx/CVE-2025-29823.json | 18 ++++++ 2025/29xxx/CVE-2025-29824.json | 18 ++++++ 2025/29xxx/CVE-2025-29825.json | 18 ++++++ 2025/29xxx/CVE-2025-29826.json | 18 ++++++ 2025/29xxx/CVE-2025-29827.json | 18 ++++++ 2025/29xxx/CVE-2025-29828.json | 18 ++++++ 2025/29xxx/CVE-2025-29829.json | 18 ++++++ 2025/29xxx/CVE-2025-29830.json | 18 ++++++ 2025/29xxx/CVE-2025-29831.json | 18 ++++++ 2025/29xxx/CVE-2025-29832.json | 18 ++++++ 2025/29xxx/CVE-2025-29833.json | 18 ++++++ 2025/29xxx/CVE-2025-29834.json | 18 ++++++ 2025/29xxx/CVE-2025-29835.json | 18 ++++++ 2025/29xxx/CVE-2025-29836.json | 18 ++++++ 2025/29xxx/CVE-2025-29837.json | 18 ++++++ 2025/29xxx/CVE-2025-29838.json | 18 ++++++ 2025/29xxx/CVE-2025-29839.json | 18 ++++++ 2025/29xxx/CVE-2025-29840.json | 18 ++++++ 2025/29xxx/CVE-2025-29841.json | 18 ++++++ 2025/29xxx/CVE-2025-29842.json | 18 ++++++ 2025/2xxx/CVE-2025-2210.json | 109 +++++++++++++++++++++++++++++++-- 2025/2xxx/CVE-2025-2211.json | 109 +++++++++++++++++++++++++++++++-- 2025/2xxx/CVE-2025-2212.json | 104 +++++++++++++++++++++++++++++-- 2025/2xxx/CVE-2025-2213.json | 104 +++++++++++++++++++++++++++++-- 2025/2xxx/CVE-2025-2232.json | 18 ++++++ 2025/2xxx/CVE-2025-2233.json | 78 +++++++++++++++++++++++ 2025/2xxx/CVE-2025-2234.json | 18 ++++++ 2025/2xxx/CVE-2025-2235.json | 18 ++++++ 2025/2xxx/CVE-2025-2236.json | 18 ++++++ 35 files changed, 1028 insertions(+), 16 deletions(-) create mode 100644 2025/29xxx/CVE-2025-29817.json create mode 100644 2025/29xxx/CVE-2025-29818.json create mode 100644 2025/29xxx/CVE-2025-29819.json create mode 100644 2025/29xxx/CVE-2025-29820.json create mode 100644 2025/29xxx/CVE-2025-29821.json create mode 100644 2025/29xxx/CVE-2025-29822.json create mode 100644 2025/29xxx/CVE-2025-29823.json create mode 100644 2025/29xxx/CVE-2025-29824.json create mode 100644 2025/29xxx/CVE-2025-29825.json create mode 100644 2025/29xxx/CVE-2025-29826.json create mode 100644 2025/29xxx/CVE-2025-29827.json create mode 100644 2025/29xxx/CVE-2025-29828.json create mode 100644 2025/29xxx/CVE-2025-29829.json create mode 100644 2025/29xxx/CVE-2025-29830.json create mode 100644 2025/29xxx/CVE-2025-29831.json create mode 100644 2025/29xxx/CVE-2025-29832.json create mode 100644 2025/29xxx/CVE-2025-29833.json create mode 100644 2025/29xxx/CVE-2025-29834.json create mode 100644 2025/29xxx/CVE-2025-29835.json create mode 100644 2025/29xxx/CVE-2025-29836.json create mode 100644 2025/29xxx/CVE-2025-29837.json create mode 100644 2025/29xxx/CVE-2025-29838.json create mode 100644 2025/29xxx/CVE-2025-29839.json create mode 100644 2025/29xxx/CVE-2025-29840.json create mode 100644 2025/29xxx/CVE-2025-29841.json create mode 100644 2025/29xxx/CVE-2025-29842.json create mode 100644 2025/2xxx/CVE-2025-2232.json create mode 100644 2025/2xxx/CVE-2025-2233.json create mode 100644 2025/2xxx/CVE-2025-2234.json create mode 100644 2025/2xxx/CVE-2025-2235.json create mode 100644 2025/2xxx/CVE-2025-2236.json diff --git a/2025/29xxx/CVE-2025-29817.json b/2025/29xxx/CVE-2025-29817.json new file mode 100644 index 00000000000..f04a31d40d9 --- /dev/null +++ b/2025/29xxx/CVE-2025-29817.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29817", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29818.json b/2025/29xxx/CVE-2025-29818.json new file mode 100644 index 00000000000..4a6f5c0d00b --- /dev/null +++ b/2025/29xxx/CVE-2025-29818.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29818", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29819.json b/2025/29xxx/CVE-2025-29819.json new file mode 100644 index 00000000000..e65d2123c28 --- /dev/null +++ b/2025/29xxx/CVE-2025-29819.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29819", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29820.json b/2025/29xxx/CVE-2025-29820.json new file mode 100644 index 00000000000..be4d87152d4 --- /dev/null +++ b/2025/29xxx/CVE-2025-29820.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29820", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29821.json b/2025/29xxx/CVE-2025-29821.json new file mode 100644 index 00000000000..b84b03c10f0 --- /dev/null +++ b/2025/29xxx/CVE-2025-29821.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29821", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29822.json b/2025/29xxx/CVE-2025-29822.json new file mode 100644 index 00000000000..59e33d3c3d4 --- /dev/null +++ b/2025/29xxx/CVE-2025-29822.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29822", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29823.json b/2025/29xxx/CVE-2025-29823.json new file mode 100644 index 00000000000..73a9f83e18d --- /dev/null +++ b/2025/29xxx/CVE-2025-29823.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29823", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29824.json b/2025/29xxx/CVE-2025-29824.json new file mode 100644 index 00000000000..d513345a148 --- /dev/null +++ b/2025/29xxx/CVE-2025-29824.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29824", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29825.json b/2025/29xxx/CVE-2025-29825.json new file mode 100644 index 00000000000..deacf5046f7 --- /dev/null +++ b/2025/29xxx/CVE-2025-29825.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29825", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29826.json b/2025/29xxx/CVE-2025-29826.json new file mode 100644 index 00000000000..bba8d5f6fba --- /dev/null +++ b/2025/29xxx/CVE-2025-29826.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29826", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29827.json b/2025/29xxx/CVE-2025-29827.json new file mode 100644 index 00000000000..4f023048dff --- /dev/null +++ b/2025/29xxx/CVE-2025-29827.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29827", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29828.json b/2025/29xxx/CVE-2025-29828.json new file mode 100644 index 00000000000..8a79b36bbb0 --- /dev/null +++ b/2025/29xxx/CVE-2025-29828.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29828", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29829.json b/2025/29xxx/CVE-2025-29829.json new file mode 100644 index 00000000000..8c437a30bb2 --- /dev/null +++ b/2025/29xxx/CVE-2025-29829.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29829", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29830.json b/2025/29xxx/CVE-2025-29830.json new file mode 100644 index 00000000000..0b44d3ac8bb --- /dev/null +++ b/2025/29xxx/CVE-2025-29830.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29830", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29831.json b/2025/29xxx/CVE-2025-29831.json new file mode 100644 index 00000000000..e20bffb85ce --- /dev/null +++ b/2025/29xxx/CVE-2025-29831.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29831", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29832.json b/2025/29xxx/CVE-2025-29832.json new file mode 100644 index 00000000000..f73c9413de0 --- /dev/null +++ b/2025/29xxx/CVE-2025-29832.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29832", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29833.json b/2025/29xxx/CVE-2025-29833.json new file mode 100644 index 00000000000..fda62975d1f --- /dev/null +++ b/2025/29xxx/CVE-2025-29833.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29833", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29834.json b/2025/29xxx/CVE-2025-29834.json new file mode 100644 index 00000000000..0aade2bde4e --- /dev/null +++ b/2025/29xxx/CVE-2025-29834.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29834", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29835.json b/2025/29xxx/CVE-2025-29835.json new file mode 100644 index 00000000000..4b642f09d56 --- /dev/null +++ b/2025/29xxx/CVE-2025-29835.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29835", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29836.json b/2025/29xxx/CVE-2025-29836.json new file mode 100644 index 00000000000..804b3ac47cf --- /dev/null +++ b/2025/29xxx/CVE-2025-29836.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29836", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29837.json b/2025/29xxx/CVE-2025-29837.json new file mode 100644 index 00000000000..d3a1de27d50 --- /dev/null +++ b/2025/29xxx/CVE-2025-29837.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29837", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29838.json b/2025/29xxx/CVE-2025-29838.json new file mode 100644 index 00000000000..a013f4e94b8 --- /dev/null +++ b/2025/29xxx/CVE-2025-29838.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29838", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29839.json b/2025/29xxx/CVE-2025-29839.json new file mode 100644 index 00000000000..29e923a2e2e --- /dev/null +++ b/2025/29xxx/CVE-2025-29839.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29839", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29840.json b/2025/29xxx/CVE-2025-29840.json new file mode 100644 index 00000000000..2f83db980e2 --- /dev/null +++ b/2025/29xxx/CVE-2025-29840.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29840", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29841.json b/2025/29xxx/CVE-2025-29841.json new file mode 100644 index 00000000000..a8967e5558f --- /dev/null +++ b/2025/29xxx/CVE-2025-29841.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29841", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/29xxx/CVE-2025-29842.json b/2025/29xxx/CVE-2025-29842.json new file mode 100644 index 00000000000..63e41331c48 --- /dev/null +++ b/2025/29xxx/CVE-2025-29842.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-29842", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2210.json b/2025/2xxx/CVE-2025-2210.json index c9210ff1646..f731afd0de4 100644 --- a/2025/2xxx/CVE-2025-2210.json +++ b/2025/2xxx/CVE-2025-2210.json @@ -1,17 +1,118 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2210", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability has been found in aitangbao springboot-manager 3.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /sysJob/add. The manipulation of the argument name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "In aitangbao springboot-manager 3.0 wurde eine Schwachstelle gefunden. Sie wurde als problematisch eingestuft. Das betrifft eine unbekannte Funktionalit\u00e4t der Datei /sysJob/add. Durch Manipulation des Arguments name mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross Site Scripting", + "cweId": "CWE-79" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Code Injection", + "cweId": "CWE-94" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "aitangbao", + "product": { + "product_data": [ + { + "product_name": "springboot-manager", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.299281", + "refsource": "MISC", + "name": "https://vuldb.com/?id.299281" + }, + { + "url": "https://vuldb.com/?ctiid.299281", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.299281" + }, + { + "url": "https://vuldb.com/?submit.511740", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.511740" + }, + { + "url": "https://github.com/uglory-gll/javasec/blob/main/spring-manage.md", + "refsource": "MISC", + "name": "https://github.com/uglory-gll/javasec/blob/main/spring-manage.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "uglory (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 2.4, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 2.4, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 3.3, + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N" } ] } diff --git a/2025/2xxx/CVE-2025-2211.json b/2025/2xxx/CVE-2025-2211.json index 62abf764f4a..1af39c15bb7 100644 --- a/2025/2xxx/CVE-2025-2211.json +++ b/2025/2xxx/CVE-2025-2211.json @@ -1,17 +1,118 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2211", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in aitangbao springboot-manager 3.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /sysDictDetail/add. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in aitangbao springboot-manager 3.0 gefunden. Sie wurde als problematisch eingestuft. Dies betrifft einen unbekannten Teil der Datei /sysDictDetail/add. Mittels dem Manipulieren des Arguments name mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross Site Scripting", + "cweId": "CWE-79" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Code Injection", + "cweId": "CWE-94" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "aitangbao", + "product": { + "product_data": [ + { + "product_name": "springboot-manager", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "3.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.299282", + "refsource": "MISC", + "name": "https://vuldb.com/?id.299282" + }, + { + "url": "https://vuldb.com/?ctiid.299282", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.299282" + }, + { + "url": "https://vuldb.com/?submit.511741", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.511741" + }, + { + "url": "https://github.com/uglory-gll/javasec/blob/main/spring-manage.md", + "refsource": "MISC", + "name": "https://github.com/uglory-gll/javasec/blob/main/spring-manage.md" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "uglory (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 2.4, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 2.4, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 3.3, + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N" } ] } diff --git a/2025/2xxx/CVE-2025-2212.json b/2025/2xxx/CVE-2025-2212.json index 20f3061cb5a..d55e9d03e52 100644 --- a/2025/2xxx/CVE-2025-2212.json +++ b/2025/2xxx/CVE-2025-2212.json @@ -1,17 +1,113 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2212", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Castlenet CBW383G2N up to 20250301. It has been classified as problematic. This affects an unknown part of the file /RgSwInfo.asp. The manipulation of the argument Description with the input leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "Es wurde eine Schwachstelle in Castlenet CBW383G2N bis 20250301 ausgemacht. Sie wurde als problematisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Datei /RgSwInfo.asp. Mittels Manipulieren des Arguments Description mit der Eingabe mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross Site Scripting", + "cweId": "CWE-79" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Code Injection", + "cweId": "CWE-94" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Castlenet", + "product": { + "product_data": [ + { + "product_name": "CBW383G2N", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "20250301" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.299283", + "refsource": "MISC", + "name": "https://vuldb.com/?id.299283" + }, + { + "url": "https://vuldb.com/?ctiid.299283", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.299283" + }, + { + "url": "https://vuldb.com/?submit.511873", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.511873" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Havook (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 2.4, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 2.4, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 3.3, + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N" } ] } diff --git a/2025/2xxx/CVE-2025-2213.json b/2025/2xxx/CVE-2025-2213.json index 5bb75aca1b7..61a8ca59fca 100644 --- a/2025/2xxx/CVE-2025-2213.json +++ b/2025/2xxx/CVE-2025-2213.json @@ -1,17 +1,113 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2213", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability was found in Castlenet CBW383G2N up to 20250301. It has been declared as problematic. This vulnerability affects unknown code of the file /wlanPrimaryNetwork.asp of the component Wireless Menu. The manipulation of the argument SSID with the input leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "deu", + "value": "In Castlenet CBW383G2N bis 20250301 wurde eine Schwachstelle ausgemacht. Sie wurde als problematisch eingestuft. Hierbei betrifft es unbekannten Programmcode der Datei /wlanPrimaryNetwork.asp der Komponente Wireless Menu. Durch das Manipulieren des Arguments SSID mit der Eingabe mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross Site Scripting", + "cweId": "CWE-79" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Code Injection", + "cweId": "CWE-94" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Castlenet", + "product": { + "product_data": [ + { + "product_name": "CBW383G2N", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "20250301" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.299284", + "refsource": "MISC", + "name": "https://vuldb.com/?id.299284" + }, + { + "url": "https://vuldb.com/?ctiid.299284", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.299284" + }, + { + "url": "https://vuldb.com/?submit.511882", + "refsource": "MISC", + "name": "https://vuldb.com/?submit.511882" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Fergod (VulDB User)" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 2.4, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 2.4, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 3.3, + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N" } ] } diff --git a/2025/2xxx/CVE-2025-2232.json b/2025/2xxx/CVE-2025-2232.json new file mode 100644 index 00000000000..5c99c28b86f --- /dev/null +++ b/2025/2xxx/CVE-2025-2232.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-2232", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2233.json b/2025/2xxx/CVE-2025-2233.json new file mode 100644 index 00000000000..a660e5aebd7 --- /dev/null +++ b/2025/2xxx/CVE-2025-2233.json @@ -0,0 +1,78 @@ +{ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2025-2233", + "ASSIGNER": "zdi-disclosures@trendmicro.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Samsung SmartThings Improper Verification of Cryptographic Signature Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Samsung SmartThings. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the Hub Local API service, which listens on TCP port 8766 by default. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-25615." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-347: Improper Verification of Cryptographic Signature", + "cweId": "CWE-347" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Samsung", + "product": { + "product_data": [ + { + "product_name": "SmartThings", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "000.054.00013" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-127/", + "refsource": "MISC", + "name": "https://www.zerodayinitiative.com/advisories/ZDI-25-127/" + } + ] + }, + "source": { + "lang": "en", + "value": "NiNi (@terrynini38514) from DEVCORE Research Team" + }, + "impact": { + "cvss": [ + { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH" + } + ] + } +} \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2234.json b/2025/2xxx/CVE-2025-2234.json new file mode 100644 index 00000000000..c9f235459a2 --- /dev/null +++ b/2025/2xxx/CVE-2025-2234.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-2234", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2235.json b/2025/2xxx/CVE-2025-2235.json new file mode 100644 index 00000000000..0584208860a --- /dev/null +++ b/2025/2xxx/CVE-2025-2235.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-2235", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/2xxx/CVE-2025-2236.json b/2025/2xxx/CVE-2025-2236.json new file mode 100644 index 00000000000..04f69d0063a --- /dev/null +++ b/2025/2xxx/CVE-2025-2236.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-2236", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file